<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Redundancy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804038#M6935</link>
    <description>&lt;P&gt;Hi Socratesp,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your prompt response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached a diagram as per your suggestion, Please check and reply if its correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Sajid&lt;/P&gt;</description>
    <pubDate>Mon, 18 Feb 2019 12:50:11 GMT</pubDate>
    <dc:creator>sajid231088</dc:creator>
    <dc:date>2019-02-18T12:50:11Z</dc:date>
    <item>
      <title>Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3803933#M6928</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Hope you all are doing well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help me in below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have below devices :&lt;/P&gt;
&lt;P&gt;ASA 5525 (2 nos)&lt;/P&gt;
&lt;P&gt;Cisco 2801 Router&lt;/P&gt;
&lt;P&gt;Cisco 3560 SW (4 nos)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a very simple setup for my lab, Have one ISP connection terminated on my 2801 Router and from there i have connected one switch (3560) on which all user devices are connected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wanted to build a network with redundant ASA please help me with network diagram and configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Sajid&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3803933#M6928</guid>
      <dc:creator>sajid231088</dc:creator>
      <dc:date>2020-02-21T16:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3803948#M6932</link>
      <description>&lt;P&gt;Hello Sajid I place your ASAs behind your 2801 router and make them as gateways for your internal LANs. In brief the diagram would be&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;|ASA1|&lt;/P&gt;
&lt;P&gt;|ISP|----|3560|-----|-----| ------ |3560|&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;|ASA2|&lt;/P&gt;
&lt;P&gt;This is not the only solution. This can change depending on your ISP's configuration or how you want to treat your internal network&lt;/P&gt;
&lt;P&gt;Configuration on your primary unit assuming you are using a single interface for failover failover lan unit primary failover lan interface folink gi0/2 (assuming your failover interface is gig0/2)&lt;/P&gt;
&lt;P&gt;failover interface ip folink 192.168.0.1 255.255.255.252 standby 192.168.0.2&lt;/P&gt;
&lt;P&gt;failover link statelink gi0/2&lt;/P&gt;
&lt;P&gt;failover interface ip folink 192.168.0.5 255.255.255.255 standby 192.168.0.6&lt;/P&gt;
&lt;P&gt;failover&lt;/P&gt;
&lt;P&gt;On secondary:&lt;/P&gt;
&lt;P&gt;failover lan interface gi0/2&lt;/P&gt;
&lt;P&gt;failover interface ip folink 192.168.0.2 255.255.255.252 standby 192.168.0.1&lt;/P&gt;
&lt;P&gt;failover lan unit secondary&lt;/P&gt;
&lt;P&gt;failover&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 10:03:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3803948#M6932</guid>
      <dc:creator>socratesp1980</dc:creator>
      <dc:date>2019-02-18T10:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804038#M6935</link>
      <description>&lt;P&gt;Hi Socratesp,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your prompt response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached a diagram as per your suggestion, Please check and reply if its correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Sajid&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 12:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804038#M6935</guid>
      <dc:creator>sajid231088</dc:creator>
      <dc:date>2019-02-18T12:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804039#M6940</link>
      <description>&lt;P&gt;PFA&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 12:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804039#M6940</guid>
      <dc:creator>sajid231088</dc:creator>
      <dc:date>2019-02-18T12:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Redundancy</title>
      <link>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804134#M6943</link>
      <description>looks good.

You can also use a single switch where the two ports facing your 2801 router being in a different vlan</description>
      <pubDate>Mon, 18 Feb 2019 14:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-redundancy/m-p/3804134#M6943</guid>
      <dc:creator>socratesp1980</dc:creator>
      <dc:date>2019-02-18T14:49:35Z</dc:date>
    </item>
  </channel>
</rss>

