<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Redundancy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588331#M594573</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your valid input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure HSRP in A-switch1 and A-switch2 using IP SLA monitoring to firewall interface for automatic switchover ? If possible will there be any security issue which has security level 100 (B-switch1 and B-Switch2) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a security issue. How can i beat this ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Jan 2011 06:25:22 GMT</pubDate>
    <dc:creator>singraj2001</dc:creator>
    <dc:date>2011-01-11T06:25:22Z</dc:date>
    <item>
      <title>Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588329#M594570</link>
      <description>&lt;P&gt;&lt;SPAN style="mso-bidi-font-family: 'Times New Roman'; : ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; sans-serif&amp;amp;quot: ; mso-ascii-theme-font: minor-latin; ,&amp;amp;quot: ; line-height: 115%; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-theme-font: minor-latin; font-family: &amp;amp;quot; mso-fareast-font-family: Calibri; Calibri&amp;amp;quot: ; mso-bidi-theme-font: minor-bidi; "&gt; Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-font-family: 'Times New Roman'; : ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; sans-serif&amp;amp;quot: ; mso-ascii-theme-font: minor-latin; ,&amp;amp;quot: ; line-height: 115%; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-theme-font: minor-latin; font-family: &amp;amp;quot; mso-fareast-font-family: Calibri; Calibri&amp;amp;quot: ; mso-bidi-theme-font: minor-bidi; "&gt;In our client organization we are going to migrate the new firewall with existing setup. Here, In the existing&amp;nbsp; setup they are having Pix 525 and the new firewall is ASA (Pix is the end of the sales now). As per my understanding we cannot build failover Active/Active or Active/Standby with the different platform or IOS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-font-family: 'Times New Roman'; : ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; sans-serif&amp;amp;quot: ; mso-ascii-theme-font: minor-latin; ,&amp;amp;quot: ; line-height: 115%; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-theme-font: minor-latin; font-family: &amp;amp;quot; mso-fareast-font-family: Calibri; Calibri&amp;amp;quot: ; mso-bidi-theme-font: minor-bidi; "&gt; So please let me what kind of failover can configure in this scenario.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-font-family: 'Times New Roman'; : ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; sans-serif&amp;amp;quot: ; mso-ascii-theme-font: minor-latin; ,&amp;amp;quot: ; line-height: 115%; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-theme-font: minor-latin; font-family: &amp;amp;quot; mso-fareast-font-family: Calibri; Calibri&amp;amp;quot: ; mso-bidi-theme-font: minor-bidi; "&gt;I have attached the sample diagram for your referance. Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588329#M594570</guid>
      <dc:creator>singraj2001</dc:creator>
      <dc:date>2019-03-11T19:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588330#M594571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are absolutely correct.&lt;/P&gt;&lt;P&gt;You can't have firewall running in failover mode using different platform of the firewalls. They would need to both run the same model and version of code, and have the same module running on both firewalls to be able to run the native failover feature on the firewalls (whether it's Active/Active or Active/Standby failover).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you currently have 2 different types of firewall (ie: one PIX and one ASA), the best you can do is to perform manual failover (cold standby),ie: have exactly the same configuration on the PIX and ASA, and only connect one of the devices to the network, and if that device fails, then manually connect the other device into your network. There is no automatic failover with different types of firewalls unfortunately.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2011 06:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588330#M594571</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-11T06:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588331#M594573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your valid input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure HSRP in A-switch1 and A-switch2 using IP SLA monitoring to firewall interface for automatic switchover ? If possible will there be any security issue which has security level 100 (B-switch1 and B-Switch2) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a security issue. How can i beat this ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2011 06:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588331#M594573</guid>
      <dc:creator>singraj2001</dc:creator>
      <dc:date>2011-01-11T06:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588332#M594575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You won't be able to perform that because you can't configure the same IP Address in the PIX on the ASA because the switch and the router wouldn't have the correct active mac address, and even if it's possible, the state information on the connection will not be replicated across, and there will be a lot of packet drops when the failover happens as both PIX and ASA firewalls are a stateful firewall, and it keeps the state of the connection to ensure security. It's not like a router where it only routes traffic across.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2011 06:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/1588332#M594575</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-11T06:35:19Z</dc:date>
    </item>
  </channel>
</rss>

