<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Standby ASA RMA step-by-step in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899342#M5778</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a question regarding the RMA process of a standby unit in a ASA cluster. Here are the steps that I have concluded, please correct/add where im wrong:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure hostname ,&lt;/LI&gt;&lt;LI&gt;Install/Verify boot image and asdm is same as primary.&lt;/LI&gt;&lt;LI&gt;Activate with the new license key&lt;/LI&gt;&lt;LI&gt;Configure failover and connect only failover interface and failover config&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some questions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I assume I need to generate RSA key after configuration, to get ssh access?&lt;/LI&gt;&lt;LI&gt;Is management config&amp;nbsp; possible to be needed to be installed manually?&lt;/LI&gt;&lt;LI&gt;Whats the easiest/fastest way to install boot and asdm image? Can I just copy from primary via failover link (I don’t think there is another interface between them)? I m ean with failover exec mate copy/ noconfirm tftP;…..x.x..xx .bin ?&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:21:05 GMT</pubDate>
    <dc:creator>Melinbonian</dc:creator>
    <dc:date>2020-02-21T17:21:05Z</dc:date>
    <item>
      <title>Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899342#M5778</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a question regarding the RMA process of a standby unit in a ASA cluster. Here are the steps that I have concluded, please correct/add where im wrong:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure hostname ,&lt;/LI&gt;&lt;LI&gt;Install/Verify boot image and asdm is same as primary.&lt;/LI&gt;&lt;LI&gt;Activate with the new license key&lt;/LI&gt;&lt;LI&gt;Configure failover and connect only failover interface and failover config&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some questions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I assume I need to generate RSA key after configuration, to get ssh access?&lt;/LI&gt;&lt;LI&gt;Is management config&amp;nbsp; possible to be needed to be installed manually?&lt;/LI&gt;&lt;LI&gt;Whats the easiest/fastest way to install boot and asdm image? Can I just copy from primary via failover link (I don’t think there is another interface between them)? I m ean with failover exec mate copy/ noconfirm tftP;…..x.x..xx .bin ?&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899342#M5778</guid>
      <dc:creator>Melinbonian</dc:creator>
      <dc:date>2020-02-21T17:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899368#M5779</link>
      <description>&lt;P&gt;Make sure You have same hardware as Active and ASA Version of code.&lt;/P&gt;
&lt;P&gt;Take the exiting backup config( for safer side)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just configure failover config on the standby.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;failover lan unit secondary&lt;/P&gt;
&lt;P&gt;failover lan interface Failover gig x/x&lt;/P&gt;
&lt;P&gt;failover key *****&lt;/P&gt;
&lt;P&gt;failover link Failover gi x/x &lt;/P&gt;
&lt;P&gt;failover interface ip Failover x.x..x.1 255.255.255.248 standby x.x.x.2&lt;/P&gt;
&lt;P&gt;failover&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rest should be replicated automatically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 15:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899368#M5779</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-29T15:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899553#M5780</link>
      <description>&lt;P&gt;Hi Balaji&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks, you mean to take the backup from the primary one which is active?&amp;nbsp; I&amp;nbsp; I will take the show run anyway or even from asdm, in case there are anyconnect profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. But i was wondering for example, hostnames, do you usually configure them first? Because if you dont , will it failover and just have the same name on both (which is ok, since its not impacting, can be changed later)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. If i do configure failover via console, will it 'replicate' ssh key etc , so need for key generation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. And i read that it is possible to copy from one member to another, the asdm and boot image, in case there is no tftp or internet connectivity. Are there any concerns for this?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 19:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899553#M5780</guid>
      <dc:creator>Melinbonian</dc:creator>
      <dc:date>2019-07-29T19:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899627#M5781</link>
      <description>&lt;P&gt;yes take the backup of existing primary, so you have config backup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is cisco official document to configure standby.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/ha_failover.html#53599" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/ha_failover.html#53599&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;another good steps for reference.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cybersana.tech/cisco-asa-firewall-cluster-member-replacement/" target="_blank"&gt;https://cybersana.tech/cisco-asa-firewall-cluster-member-replacement/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 22:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899627#M5781</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-29T22:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899920#M5783</link>
      <description>&lt;P&gt;First make sure you have a full running configuration backup of the primary ASA (more system:running-config).&lt;/P&gt;
&lt;P&gt;1. update ASA software to same version as the primary ASA&lt;/P&gt;
&lt;P&gt;2. copy AnyConnect profiles (the .xml files if any) to the new secondary ASA&lt;/P&gt;
&lt;P&gt;3. import any third party certificates to the standby ASA&lt;/P&gt;
&lt;P&gt;4. configure failover on the new standby ASA&lt;/P&gt;
&lt;P&gt;5. test failover (be sure to do this in a service window)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You only need to make sure that the physical .xml files and certificates are manually copied to the standby ASA.&amp;nbsp; Other than that, all configuration is automatically copied over from the primary ASA.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 11:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3899920#M5783</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-07-30T11:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3900050#M5786</link>
      <description>&lt;P&gt;Thanks Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i know i can check if there are certificates via CLI with:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show crypto ca certificate&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to check the xml profiles as well? I assume a show flash/disk will show if there are any? Although in theory, there could be some but not used.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 14:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3900050#M5786</guid>
      <dc:creator>Melinbonian</dc:creator>
      <dc:date>2019-07-30T14:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3900476#M5787</link>
      <description>&lt;P&gt;You will find the .xml files stored in flash.&amp;nbsp; You can use either &lt;STRONG&gt;dir&lt;/STRONG&gt; or &lt;STRONG&gt;show flash:&lt;/STRONG&gt; to view them.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 06:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3900476#M5787</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-07-31T06:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3917370#M5790</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it was sorted, sorry for the delay , i had account issues. One more thing, in this case was lucky, since it had no need to configure any firepower (SFR module) on it, thus left it to default 5.4.1 version. Is there a guide how to RMA the module though? I found out that either you install new image or upgrade, still is going to take ours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Furthermore, i assume you need to re-install in FMC, but cant find a&amp;nbsp; decent example on it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 16:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3917370#M5790</guid>
      <dc:creator>Melinbonian</dc:creator>
      <dc:date>2019-09-01T16:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Standby ASA RMA step-by-step</title>
      <link>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3917476#M5792</link>
      <description>&lt;P&gt;If you RMA an ASA and there is an associated Firepower service module then it needs to be rebuilt on the replacement unit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The quickest and easiest way is to use the following steps:&lt;/P&gt;
&lt;P&gt;1. Uninstall the 5.4.1 default module on the replacement unit.&lt;/P&gt;
&lt;P&gt;2. Copy the recovery image equal to the major revision level of your FMC.&lt;/P&gt;
&lt;P&gt;3. Configure it and add the system image.&lt;/P&gt;
&lt;P&gt;4. Prep the FMC by removing/deregistering the old module.&lt;/P&gt;
&lt;P&gt;4. Register the rebuilt module to FMC, assigning the licenses and putting it in a device group with the active unit's module.&lt;/P&gt;
&lt;P&gt;5. Resync policies with a deployment to the replaced module.&lt;/P&gt;
&lt;P&gt;6. Patch the replaced module to be equal to the FMC patch level and deploy once more.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2019 05:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/standby-asa-rma-step-by-step/m-p/3917476#M5792</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-02T05:51:53Z</dc:date>
    </item>
  </channel>
</rss>

