<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Failover Interface Principles in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673107#M535125</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well unfortunately there is not much we can do about this. If you are looking for higher number of interfaces, you can look at installing the 4GE-SSM module for the 5520. Details below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps9320/index.html"&gt;http://www.cisco.com/en/US/products/ps9320/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Jul 2011 18:23:21 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2011-07-28T18:23:21Z</dc:date>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673087#M535102</link>
      <description>&lt;P&gt;I'm about to implement my first 5520's, and I have questions about the details which aren't really explained in the documentation. My situation is active/standby.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Failover Link:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Etherchannel is now possible on the ASA's, but is it supported on the Failover link?&amp;nbsp; I sure hope so. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; What is the REAL FUNCTIONAL difference between the failover link going down when using a switch versus a crossover cable between ASA's?&amp;nbsp; Specifically speak to what happens from a detection/reaction perspective in the IOS on both sides. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. If the failover link is down on either side (or both), do the ASA's still communicate across their inside/outside interfaces to prevent a conflict?&amp;nbsp; How does it work exactly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've read a lot of documentation, and am very familar with interface tracking for HSRP/VRRP, routing protocols, and even IPSLA tracking and logic for failover from my routing and switching experience. Still, I'm having a hard time understanding how the ASA's will behave. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking for a unique and verbose explanation from people who have worked with the ASA's exhaustively (in their own words).&amp;nbsp; Please do not post links to any cisco documentation, nor post statements that begin with "I think" or "I believe".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jerry&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673087#M535102</guid>
      <dc:creator>Gerald Wiltse</dc:creator>
      <dc:date>2019-03-11T21:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673088#M535103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See the below links&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080834058.shtml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 18:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673088#M535103</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-07-25T18:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673089#M535104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gerald&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) can't answer this but i suspect not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Main difference is that if you are using a crossover cable if one end fails then the other end goes down as well. This means when you login to the firewalls you can't necessarily tell which firewall interface went down first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously the main advantage is that you are not reliant on another device ie. a switch to stay up as well ie. with a crossover cable only a failure on the firewalls is relevant rather than a switch also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The general recommendation is to use a switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Yes they will communicate over the other interfaces, provided you have ip addresses on the standby interfaces, which you don't acually have to. If they can communicate over another interface the firewalls will not failover but the failover link will be seen as failed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 18:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673089#M535104</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-25T18:30:33Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673090#M535105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for taking a shot Andrew, but this did not help. I realize you were working from your IPAD, so I'll cut you some slack on not reading my whole post and providing a helpful answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plus, I appreciate anyone who tries to help.&lt;/P&gt;&lt;P&gt;Jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 19:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673090#M535105</guid>
      <dc:creator>Gerald Wiltse</dc:creator>
      <dc:date>2011-07-25T19:01:40Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673091#M535106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jon for the response.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I guess I will add "I suspect" to my list next time. Hopefully someone from Cisco will say for sure whether or not etherchannel is supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Good answer, I'm hoping that's the only one. I really want to see if anybody else can point out even one more significant difference. In my opinion, the "which interface went down first" is irrelevant and a terrible reason to insert a switch into the equation. In fact, there is still no logic behind this reason at all... it's nonsenical unless we're still missing something else that's huge. Otherwise... the emperor has no clothes people. Switch = BAD IDEA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Ok this is really helpful. So... the OUTSIDE and INSIDE interfaces each get their standard "virtual" IP and mac which are used for normal operation. You're saying that putting optional "secondary" IP's on each of the interfaces on both the active and standby ASA's allows them to use these links to communicate with each other over.&amp;nbsp; This seems like a really good practice.&amp;nbsp; In theory, does this eliminate the need for the standby link altogether?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 19:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673091#M535106</guid>
      <dc:creator>Gerald Wiltse</dc:creator>
      <dc:date>2011-07-25T19:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673092#M535107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jerry &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I guess I will add "I suspect" to my list next time &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, i thought i might be pushing my luck but then again if you had included it i wouldn't have answered the other questions &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Like i say the Cisco recommendation is to use a switch and it is mainly to help troubleshooting but it is just as valid to use a cross over if that is what you wan to. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) No it doesn't eliminate the link because remember you are not just sending keepalives between the firewalls you are also replicating state information, for which you should use a separate cable. So you need failover cables to send this info. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The idea of interface monitoring is so that you can failover even if the active firewall is still up but an important interface on the firewall has failed. For example when we ran the FWSM we had many interfaces in one context with many DMZs. Some of these really weren't that important and we didn't bother monitoring them but we did monitor the outside interface because if that went down all access through the FWSM was lost. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 19:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673092#M535107</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-07-25T19:39:38Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673093#M535108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Again, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) What I'm saying is that the Cisco recommendation is almost certainly terrible... and I really want to call it out here and have some guys FROM CISCO who know this topic inside and out weight in to confirm or deny my points. Most importantly, if there's a GOOD reason that we've missed, I want it to be revealed here. Thats the goal of making this noise.&amp;nbsp; It's very unlike Cisco to make a bad recommendation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3)&amp;nbsp; Ok, keepalives and monitoring aside... the question is... why can't they sync across the other two interfaces?&amp;nbsp; The bandwidth of the synchronization is tiny, and maybe there's a latency requirement of "must be less than 10 ms".&amp;nbsp; Ok... neither of those are problems... so is there another reason?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any super-technical Cisco guys want to weigh in?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 20:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673093#M535108</guid>
      <dc:creator>Gerald Wiltse</dc:creator>
      <dc:date>2011-07-25T20:10:40Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673094#M535110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gerald,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Etherchannelling is supported on the failover link. Here's the link to the documentation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_start.html#wp1326437"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_start.html#wp1326437&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quoting from the documentation: "&lt;EM&gt;When you use a redundant or EtherChannel interface as a failover link, it must be pre-configured on both units in the failover pair; you cannot configure it on the primary unit and expect it to replicate to the secondary unit because the failover link itself is required for replication".&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) I am not sure about the reommendation of having a switch over a directly connected cable. If you look at the documentation, it only says it is better to use a different switch for the failover interfaces as opposed to the regular data interfaces. At the same time, it does say (and i am quoting from the documentation here) "&lt;EM&gt;To make the ASA failover pair resistant to failover LAN interface failure, we recommend that failover LAN interfaces NOT use the same switch as the data interfaces, as shown in the prededing connections. Instead, use a different switch or use a direct cable to connect two adaptive security appliance failover&lt;/EM&gt; &lt;EM&gt;interfaces&lt;/EM&gt;". I hope this clears the air out about the recommendation of a switch in between. If you are interested, here's the link to that document (it discusses few other scenarios for deplaying failover as well):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ha_overview.html#wp1089655"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ha_overview.html#wp1089655&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As to the functional difference betwen the two, what Jon mentioned is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) There are 2 main types of monitoring performed: unit health monitoring and interface health monitoring. The unit health monitoring is performed over the Failover interface (in addition to the config sync) and interface monitoring is performed over the respective data interfaces. As mentioned by Jon, if the failover interface fails, the ASAs use the data interfaces to figure out if the other ASA is dead or if just the failover interface has failed and accordingly take an action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have further questions. Will do my best to answer those for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 21:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673094#M535110</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-07-25T21:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673095#M535113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Gerald,&lt;/P&gt;&lt;P&gt;About question number 2, The use of the switch between the failover Link?????&lt;/P&gt;&lt;P&gt;Its so important and helpful to use a switch as Cisco recommends between the 2 Failover units , This because it&amp;nbsp; will let you know which interface is the one down or&amp;nbsp; with problems and then will&amp;nbsp; safe you a bunch of time. &lt;/P&gt;&lt;P&gt;Lets see an example ? If you use a cable between the units and you fell that something is wrong so&amp;nbsp; you run commands to check the state of the interfaces and without the switch in the middle you are going to see both interfaces ( Active unit /Standby unit) down. So how are you going to determine which ASA is the one with the interface down or with issues?? As I told you there are ways to figure this out but there is time involved .&lt;/P&gt;&lt;P&gt;Now with the switch in the middle you will safe time and it would be so much easier to troubleshoot this problems. With just one comand you will find out wich interface is the one having the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps you out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 00:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673095#M535113</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-07-26T00:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673096#M535114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I have ASA 5505, 7.2 with 2 ISP's - I followed some postings and cannot seem to get it configured.&amp;nbsp; I do have the Full License.&amp;nbsp; I thought I would just post my configuration.&amp;nbsp; I'm at a point of wiping it out and starting over, but don't want to end up in the same spot.&amp;nbsp; It will show the backup ISP (TWC) IP address, but will not connect to anything.&amp;nbsp; Any help would be appreciated:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sho running-con&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;backup interface Vlan3&lt;/P&gt;&lt;P&gt;nameif Verizon&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 65.208.133.170 255.255.255.248 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;nameif TWC&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 74.62.207.66 255.255.255.240 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name ????????&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt;port-object eq 10019&lt;/P&gt;&lt;P&gt;port-object eq 8016&lt;/P&gt;&lt;P&gt;port-object eq 8200&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;/P&gt;&lt;P&gt;icmp-object echo&lt;/P&gt;&lt;P&gt;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_2&lt;/P&gt;&lt;P&gt;icmp-object echo&lt;/P&gt;&lt;P&gt;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;icmp-object traceroute&lt;/P&gt;&lt;P&gt;icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_3&lt;/P&gt;&lt;P&gt;icmp-object echo&lt;/P&gt;&lt;P&gt;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;icmp-object traceroute&lt;/P&gt;&lt;P&gt;icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_4&lt;/P&gt;&lt;P&gt;icmp-object echo&lt;/P&gt;&lt;P&gt;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt;port-object eq 10019&lt;/P&gt;&lt;P&gt;port-object eq 8016&lt;/P&gt;&lt;P&gt;port-object eq 8200&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound for Security System&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 65.208.133.174 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any host 65.208.133.174 object-group DM_INLINE_ICMP_1 inactive &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any 65.208.133.168 255.255.255.248 object-group DM_INLINE_ICMP_2 &lt;/P&gt;&lt;P&gt;access-list TWC_access_in extended permit icmp any 74.62.207.64 255.255.255.240 object-group DM_INLINE_ICMP_3 &lt;/P&gt;&lt;P&gt;access-list TWC_access_in extended permit icmp any host 74.62.207.78 object-group DM_INLINE_ICMP_4 inactive &lt;/P&gt;&lt;P&gt;access-list TWC_access_in remark Inbound For Security System&lt;/P&gt;&lt;P&gt;access-list TWC_access_in extended permit tcp any host 74.62.207.78 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu Verizon 1500&lt;/P&gt;&lt;P&gt;mtu TWC 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Verizon) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Verizon) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,Verizon) 65.208.133.174 192.168.1.99 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,TWC) 74.62.207.78 192.168.1.99 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface Verizon&lt;/P&gt;&lt;P&gt;access-group TWC_access_in in interface TWC&lt;/P&gt;&lt;P&gt;route Verizon 0.0.0.0 0.0.0.0 65.208.133.169 1 track 3&lt;/P&gt;&lt;P&gt;route TWC 0.0.0.0 0.0.0.0 74.62.207.65 2&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 TWC&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Verizon&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 123&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho 65.208.133.169 interface Verizon&lt;/P&gt;&lt;P&gt;num-packets 3&lt;/P&gt;&lt;P&gt;frequency 10&lt;/P&gt;&lt;P&gt;sla monitor schedule 123 life forever start-time now&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 3 rtr 123 reachability&lt;/P&gt;&lt;P&gt;telnet 68.195.244.98 255.255.255.255 Verizon&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 Verizon&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 TWC&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 68.18.136.8 69.18.136.9&lt;/P&gt;&lt;P&gt;dhcpd auto_config Verizon&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.200 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 208.184.36.10 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username ????? password ???????&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:??????????&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 09:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673096#M535114</guid>
      <dc:creator>radgerjr1</dc:creator>
      <dc:date>2011-07-26T09:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673097#M535115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Roy after checking your configuration I found some things I would like to talk about:&lt;/P&gt;&lt;P&gt;first to understand your network&amp;nbsp; you are tryng to use 2 diferent links to the ISP right so if one goes down the other one will be install in the routing table, this using the SLA Monitoring Feature.&lt;/P&gt;&lt;P&gt;-You should have this nat in order to permit access to the Internet from the inside using the 2 links to the ISP&lt;/P&gt;&lt;P&gt;nat (inside)&amp;nbsp; 1 0 0&lt;/P&gt;&lt;P&gt;global (twc) 1 interface&lt;/P&gt;&lt;P&gt;global (verizon) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-As your running config file you are using the interface Verizon as the backup line to the ISP so the AD for this static route should be higher than the one on the TWCs static&lt;/P&gt;&lt;P&gt;route twc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 0 74.62.207.65&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp; track #&lt;/P&gt;&lt;P&gt;route verizon 0 0 65.208.133.169&amp;nbsp; 254&lt;/P&gt;&lt;P&gt;This will ensure you to use the TWC line to the internet as a primay route and track it and monitor it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-You will need to change the SLA config to monitor the target used on the TWC link instead of the link of verizon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if this works?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 19:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673097#M535115</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-07-26T19:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673098#M535116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks J for getting back with me so soon.&amp;nbsp; Verizon is the Pri for now &amp;amp; TWC is the backup.&amp;nbsp; The reason is I wanted to make sure the backup concept will work before drastically changing everything.&amp;nbsp; These changes are being done on a very active Firewall and downtime is not an option, plus I'm working on it remotely, and after hours.&amp;nbsp; I could never get the global (twc) 1 interface to show up.&amp;nbsp; When I was adding the 3rd interface, it would show up in asdm as Home (dmz). If I set the nat (inside) 1 0 0 will I get the global line?&amp;nbsp; Which is the best way to make the changes, cli or asdm/ Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 21:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673098#M535116</guid>
      <dc:creator>radgerjr1</dc:creator>
      <dc:date>2011-07-26T21:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673099#M535117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi again Roy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the SLA monitoring you will be able to provide a backup path to go the internet if the primary line goes down.&lt;/P&gt;&lt;P&gt;You should be able to create the global (twc) 1, if you dont do it and the primary path goes down there will not be a connection to the internet because the nat statement will only apply to the Global (Verizon). so You need that global to work with SLA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;About the nat (inside) 1 0 0 , this means: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1 - the one is the ID of the nat statement&lt;/P&gt;&lt;P&gt;2- 0 0 means that this Nat statement will afect any host going to the internet and yes it will hit the global line if the Global line&amp;nbsp; uses the same ID of nat than the nat inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should see 3 interfaces on the ASA., About wich is the best way to make the changes, this is all up to you I prefer to deal with CLI but some people rather to use ASDM. so at the end of the day the same changes are going to be applied to the ASA so the question is where do you feel more comfortable, on the CLI or the ASDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 00:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673099#M535117</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-07-27T00:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673100#M535118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi J,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Sorry it took me a while to get back to you with good, no great news - I did what you suggested, and it all worked like a charm. I made the changes in about 10 min, pulled the plug on the Pri ISP (TWC), it switched over to backup (Verizon) in less than 20 seconds, then I plugged the Pri back in, and it switched back in about 20 sec.&amp;nbsp; I even pulled the backup just to make sure.&amp;nbsp; Thank you once again on quality info.&amp;nbsp; I attached the config right after I wrote it to Flash.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ?????&lt;/P&gt;&lt;P&gt;domain-name ?????&lt;/P&gt;&lt;P&gt;enable password ????? encrypted&lt;BR /&gt;passwd ????? encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif Verizon&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 65.208.133.170 255.255.255.248 &lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;backup interface Vlan2&lt;BR /&gt;nameif TWC&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 74.62.207.66 255.255.255.240 &lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;domain-name ?????&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq 10019&lt;BR /&gt;port-object eq 8016&lt;BR /&gt;port-object eq 8200&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_2&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object traceroute&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_3&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object traceroute&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_4&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;port-object eq 10019&lt;BR /&gt;port-object eq 8016&lt;BR /&gt;port-object eq 8200&lt;BR /&gt;access-list outside_access_in remark Inbound for Security System&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 65.208.133.174 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 65.208.133.174 object-group DM_INLINE_ICMP_1 inactive &lt;BR /&gt;access-list outside_access_in extended permit icmp any 65.208.133.168 255.255.255.248 object-group DM_INLINE_ICMP_2 &lt;BR /&gt;access-list TWC_access_in extended permit icmp any 74.62.207.64 255.255.255.240 object-group DM_INLINE_ICMP_3 &lt;BR /&gt;access-list TWC_access_in extended permit icmp any host 74.62.207.78 object-group DM_INLINE_ICMP_4 inactive &lt;BR /&gt;access-list TWC_access_in remark Inbound For Security System&lt;BR /&gt;access-list TWC_access_in extended permit tcp any host 74.62.207.78 object-group DM_INLINE_TCP_2 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Verizon 1500&lt;BR /&gt;mtu TWC 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Verizon) 1 interface&lt;BR /&gt;global (TWC) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Verizon) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,Verizon) 65.208.133.174 192.168.1.99 netmask 255.255.255.255 dns &lt;BR /&gt;static (inside,TWC) 74.62.207.78 192.168.1.99 netmask 255.255.255.255 dns &lt;BR /&gt;access-group outside_access_in in interface Verizon&lt;BR /&gt;access-group TWC_access_in in interface TWC&lt;BR /&gt;route TWC 0.0.0.0 0.0.0.0 74.62.207.65 1 track 3&lt;BR /&gt;route Verizon 0.0.0.0 0.0.0.0 65.208.133.169 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 TWC&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Verizon&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sla monitor 123&lt;BR /&gt;type echo protocol ipIcmpEcho 74.62.207.65 interface TWC&lt;BR /&gt;sla monitor schedule 123 life forever start-time now&lt;BR /&gt;!&lt;BR /&gt;track 3 rtr 123 reachability&lt;BR /&gt;telnet 68.195.244.98 255.255.255.255 Verizon&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Verizon&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 TWC&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 66.75.164.89 66.75.164.90&lt;BR /&gt;dhcpd auto_config TWC&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.200 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 208.184.36.10 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;username ??????? password ????? encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:??????&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 17:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673100#M535118</guid>
      <dc:creator>radgerjr1</dc:creator>
      <dc:date>2011-07-28T17:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673101#M535119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Roy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its great to hear that everything is working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config seems to be right. I would take this statements out from the config because as I told you all the host on the inside are supported on the nat (inside) 1 0 0.I would take the nat (verizon) because that network does not neet to get transalted to the outside so they are unnecesary . Just to let you know this are the 2 statements.&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Verizon) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anything else just let me know??? Points will be appreciated &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 17:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673101#M535119</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-07-28T17:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673102#M535120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi J,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Ok so do the 'ospf cost 10' mean at the end of Interface Vlan section? What do you mean 'Points will be appreciated? Is this some type of support counter.&amp;nbsp; Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 17:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673102#M535120</guid>
      <dc:creator>radgerjr1</dc:creator>
      <dc:date>2011-07-28T17:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673103#M535121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Roy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the config you placed in here, You are not running a ospf instance on your firewall so you cant delete those lines as well.&lt;/P&gt;&lt;P&gt;About the points , dont worry you only give points to people when you feel they have earn it. but no, this is no a Support counter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any questions, Let me know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 18:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673103#M535121</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-07-28T18:11:02Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673104#M535122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for your response... GREAT ANSWERS!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Great find and Great News! So i must humbly admit that I had forgotten that the concept of the "Redundant Link" had existed for some time (long before the etherchannel support. The etherchannel is just a new option. It's interesting that the documentation indicates that it will actually function much like a redundant link, with only one link in the bundle passing traffic at a time.&amp;nbsp; So this is good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Actually multiple Cisco documents feature a direct recommendation for the switch, so I'm surprised that you say you're "not sure" about it. Here's an example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;"&lt;/STRONG&gt;Instead of using a crossover Ethernet cable to directly link the units, Cisco recommends that you use a dedicated switch between the primary and secondary units."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This has lead to countless other blogs by third parties echoing the same misguided recommendation. I still can't see the situation where this is a good decision, but I suppose it's a widely accepted standard now, so perhaps my petition here is pointless. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) This is a REALLY helpful explanation. Thanks again. I did find the table of failover events at the same link above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE bgcolor="#FFFFFF" border="1" cellpadding="3" cellspacing="1" width="60%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH bgcolor="#CCCCFF"&gt;Failure Event&lt;/TH&gt;&lt;TH bgcolor="#CCCCFF"&gt;Policy&lt;/TH&gt;&lt;TH bgcolor="#CCCCFF"&gt;Active Action&lt;/TH&gt;&lt;TH bgcolor="#CCCCFF"&gt;Standby Action&lt;/TH&gt;&lt;TH bgcolor="#CCCCFF"&gt;Notes&lt;/TH&gt; &lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Active unit failed (power or hardware)&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;n/a&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Become active; mark active as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No hello messages are received on any monitored interface or the failover link.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Formerly active unit recovers&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Become standby&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No action&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;None&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Standby unit failed (power or hardware)&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Mark standby as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;n/a&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;When the standby unit is marked as failed, the active unit does not attempt to failover, even if the interface failure threshold is surpassed.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Failover link failed within operation&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Mark failover interface as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Mark failover interface as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;You must restore the failover link as soon as possible because the unit cannot failover to the standby unit while the failover link is down.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Failover link failed at startup&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Mark failover interface as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Become active&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;If the failover link is down at startup, both units become active.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Stateful failover link failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No action&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No action&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;State information becomes out of date, and sessions are terminated if a failover occurs.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Interface failure on active unit above threshold&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Mark active as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Become active&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;None&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;Interface failure on standby unit above threshold&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No failover&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;No action&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;Mark standby as failed&lt;/TD&gt;&lt;TD bgcolor="#FFFFFF"&gt;When the standby unit is marked as failed, the active unit does not attempt to fail over even if the interface failure threshold is surpassed.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thanks for the input and participation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 18:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673104#M535122</guid>
      <dc:creator>Gerald Wiltse</dc:creator>
      <dc:date>2011-07-28T18:13:05Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673105#M535123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I really failed to point out the most important aspect of this.&amp;nbsp; Where the ASA 5520 has a total of 4 ethernet interfaces, there is no capacity for true link redundancy in all directions anyway.&amp;nbsp; 4 interfaces in a device of this size and cost is a joke. Seriously.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 18:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673105#M535123</guid>
      <dc:creator>Gerald Wiltse</dc:creator>
      <dc:date>2011-07-28T18:16:02Z</dc:date>
    </item>
    <item>
      <title>ASA Failover Interface Principles</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673106#M535124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About number 2), like Julio mentioned below that's the only advantage of having a switch in between that i can really think of. It makes it easier to pin-point which side of theinterface ahs really failed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, glad to know you got answers to most of your questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S: Do mark the post as answered if you feel you got the answer you were looking for. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 18:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-interface-principles/m-p/1673106#M535124</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-07-28T18:19:18Z</dc:date>
    </item>
  </channel>
</rss>

