<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High Availability and the ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407810#M727434</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kureli Sankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may not be remembering me, But we interacted couple of times when i contacted you for some TAC cases from India,Chennai. Hope you are doing well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While reading this thread, I got more interest as this question is there in my mind for long time, How the wiring is done in HA design when Access switch (inside zone of FW), ASA FW , Router (Outside Zone of Firewall) is connected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 1: How the redundant interface of FW-1 will be connected to Router-2. Since, both primary interface and secondary interface of Firewalls cannot share the same IP subnet, how this wiring and routing is achieved. I know we cannot bridge the Primary and secondary interfaces in Firewall as we do in Routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 2: SInce routers are connected in criss cross fashion, whether i should bridge the 2 interfaces of the routers and run HSRP ? (This IP will be the default gateway for ASA Firewalls running in A/S)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you will spare your valuable time to share your expert ideas and experience on this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAIRAM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Dec 2010 06:18:34 GMT</pubDate>
    <dc:creator>snarayanaraju</dc:creator>
    <dc:date>2010-12-24T06:18:34Z</dc:date>
    <item>
      <title>High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407808#M727399</link>
      <description>&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Hello all.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;...this is my first post here and I tend to be exceedingly verbose but please go easy on me. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/happy.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Nevertheless, I appreciate ALL feedback whether terse or verbose (…but my little, CCNA-level brain will probably have a better chance at understanding your feedback or suggestions if they contain a good amount of detail).&amp;nbsp; &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/confused.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Please participate in this discussion, even if you only have a tiny configuration detail to add to all of this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;STRONG style="mso-bidi-font-weight: normal; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; "&gt;ALL &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;feedback and/or suggestions will be appreciated! …REALLY!&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;I know this post is somewhat lengthy, but please give it a good read-through and see if there is some way in which your experience and knowledge might be able to help me here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;&lt;STRONG&gt;THANK YOU VERY MUCH&lt;/STRONG&gt;, in advance, for any help you can provide me here! &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/laugh.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;…so with that said…let’s get to it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;I have to deploy a kind of collapsed network "block" for a site which is something like a small data center.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;The goal is to create a simple yet High-Availability (HA)/fault-tolerant network design that will give me the highest amount of trouble-free uptime as possible using &lt;/SPAN&gt;&lt;STRONG style="mso-bidi-font-size: 11.0pt; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; "&gt;ONLY &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;the following devices:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;&lt;STRONG&gt;Two - 2811 routers&lt;/STRONG&gt; for my WAN-side connectivity&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;&lt;STRONG&gt;Two - base ASA 5510s&lt;/STRONG&gt;- i.e. with no expansion modules or additional ports &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/sad.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;&lt;STRONG&gt;Two (or more if needed) - Cat 2960-24-TT-L switches&lt;/STRONG&gt; for my server access layer&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;STRONG style="mso-bidi-font-weight: normal; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; "&gt;Note: &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Each server will be equipped with "teamed" NICs and I'm assuming the HA best practice would be to attach each server to two different access-layer switches but please let me know if you have a better idea on how this part of the network should be configured.&amp;nbsp; Each WAN router has a different connection to the Internet over a different circuit type (T1 and ADSL) but both go to the same ISP and will not be running an EGP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; "&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Given the constraints outlined above, what is the best way to cable and configure this network block for HA?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Obviously, if I had ASA 5550s, Cat 3750s or a pair of Nexus 7000s, etc, etc, etc, ...this would be a trivial task (...but a whole lot more expensive too) !&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;But given the specific devices I have to work with here, there will obviously be some design trade-offs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;At a high-level, I imagine the network design should look something like what's shown in the attached picture, but my CCNA-level brain is having trouble figuring-out some of the details required to actually implement this design in the real world.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;So what are some ideas in the community about how to obtain maximum HA given the limitations of the hardware I have on-hand for this project?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;For instance:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="mso-list: Ignore; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: Arial; "&gt;1.&lt;SPAN style="font: 7pt 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Should I run the ASAs in Routed or Transparent mode? (I'm &lt;EM&gt;assuming&lt;/EM&gt; Routed-mode)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="mso-list: Ignore; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: Arial; "&gt;2.&lt;SPAN style="font: 7pt 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;I think I only need a single, security context so I'm thinking I'll run the ASA pair in Active/Standby (unless someone else out there has a clever design in-mind that would use two or more security contexts and Active/Active).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="mso-list: Ignore; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: Arial; "&gt;3.&lt;SPAN style="font: 7pt 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;I'm thinking I should use HSRP on the LAN/Firewall-facing side of the 2811 routers to give my outbound traffic some kind of default gateway/next-hop redundancy/HA - What do you think?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="mso-list: Ignore; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: Arial; "&gt;4.&lt;SPAN style="font: 7pt 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;If I run the ASAs in a Routed - Active/Standby configuration, will this provide an acceptable level of default gateway/next-hop redundancy for my servers or would my servers get better HA (e.g. lower fail-over/convergence times) if the firewalls were transparent and the HSRP VIP on the 2811s was the default gateway for the servers?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="mso-list: Ignore; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: Arial; "&gt;5.&lt;SPAN style="font: 7pt 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Given the fact I only have 5 Ethernet interfaces on the ASA 5510s, where should I implement redundant interfaces and where should I go without (Inside, Outside, Fail-Over Control Link - I'm not planning to implement a DMZ here)?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="mso-list: Ignore; color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: Arial; "&gt;6.&lt;SPAN style="font: 7pt 'Times New Roman';"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;Given your opinion on the question above, what's the best way to cable all these devices together? For instance, if I use a redundant interface on the ASAs to create my logical Inside connection to the access-layer, should I run both physical members of the redundant interface to the same access-layer switch or to different access-layer switches?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;So given all of this, what do you think?&amp;nbsp; ...Curious minds want to know.&amp;nbsp; &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/silly.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;THANKS AGAIN !&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal; mso-list: l0 level1 lfo3; tab-stops: list .5in;"&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';"&gt;--Steve&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407808#M727399</guid>
      <dc:creator>sbyrnes</dc:creator>
      <dc:date>2019-03-11T17:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407809#M727406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link has some samples:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1057935"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1057935&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;1.&lt;SPAN style="font-family: 'Times New Roman'; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;Should I run the ASAs in Routed or Transparent mode? (I'm &lt;EM&gt;assuming&lt;/EM&gt; Routed-mode)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Yes routed mode since this is internet facing and you would be doing NAT. NAT in transparent only is available starting 8.0.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;2.&lt;SPAN style="font-family: 'Times New Roman'; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;I think I only need a single, security context so I'm thinking I'll run the ASA pair in Active/Standby (unless someone else out there has a clever design in-mind that would use two or more security contexts and Active/Active).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;active/standby&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;3.&lt;SPAN style="font-family: 'Times New Roman'; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;I'm thinking I should use HSRP on the LAN/Firewall-facing side of the 2811 routers to give my outbound traffic some kind of default gateway/next-hop redundancy/HA - What do you think?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;YES. Certainly&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;4.&lt;SPAN style="font-family: 'Times New Roman'; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;If I run the ASAs in a Routed - Active/Standby configuration, will this provide an acceptable level of default gateway/next-hop redundancy for my servers or would my servers get better HA (e.g. lower fail-over/convergence times) if the firewalls were transparent and the HSRP VIP on the 2811s was the default gateway for the servers?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I don't see any diff. whether routed or transparent mode. It will be the same for the servers.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;5.&lt;SPAN style="font-family: 'Times New Roman'; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;Given the fact I only have 5 Ethernet interfaces on the ASA 5510s, where should I implement redundant interfaces and where should I go without (Inside, Outside, Fail-Over Control Link - I'm not planning to implement a DMZ here)?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;You can use 2 interfces - redundant for inside&lt;/P&gt;&lt;P&gt;you can use 2 interface - redundant for outside&lt;/P&gt;&lt;P&gt;management interface - failover interface and state&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 2.4pt 0in; text-indent: -0.25in; line-height: normal;"&gt;&lt;SPAN style="color: #333333; font-size: 10pt; font-family: 'Arial','sans-serif';"&gt;6.&lt;SPAN style="font-family: 'Times New Roman'; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;Given your opinion on the question above, what's the best way to cable all these devices together? For instance, if I use a redundant interface on the ASAs to create my logical Inside connection to the access-layer, should I run both physical members of the redundant interface to the same access-layer switch or to different access-layer switches?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: 'Arial','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;To diff. switches. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Apr 2010 03:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407809#M727406</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-11T03:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407810#M727434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kureli Sankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may not be remembering me, But we interacted couple of times when i contacted you for some TAC cases from India,Chennai. Hope you are doing well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While reading this thread, I got more interest as this question is there in my mind for long time, How the wiring is done in HA design when Access switch (inside zone of FW), ASA FW , Router (Outside Zone of Firewall) is connected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 1: How the redundant interface of FW-1 will be connected to Router-2. Since, both primary interface and secondary interface of Firewalls cannot share the same IP subnet, how this wiring and routing is achieved. I know we cannot bridge the Primary and secondary interfaces in Firewall as we do in Routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question 2: SInce routers are connected in criss cross fashion, whether i should bridge the 2 interfaces of the routers and run HSRP ? (This IP will be the default gateway for ASA Firewalls running in A/S)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you will spare your valuable time to share your expert ideas and experience on this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAIRAM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Dec 2010 06:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407810#M727434</guid>
      <dc:creator>snarayanaraju</dc:creator>
      <dc:date>2010-12-24T06:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407811#M727454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sairam,&lt;/P&gt;&lt;P&gt;I am doing well.&lt;/P&gt;&lt;P&gt;Question 1: How the redundant interface of FW-1 will be connected to&amp;nbsp; Router-2. Since, both primary interface and secondary interface of&amp;nbsp; Firewalls cannot share the same IP subnet, how this wiring and routing&amp;nbsp; is achieved. I know we cannot bridge the Primary and secondary&amp;nbsp; interfaces in Firewall as we do in Routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Primary and Secondary firewall will have active and standby IP on the same subnet for each interface.&lt;/P&gt;&lt;P&gt;No two interfaces can share IP address on the same subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1028629"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1028629&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ex:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;interface gigabitethernet0/1 &lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1028657"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp; nameif inside&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1028658"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp; ip address 192.168.2.1 255.255.255.0 standby 192.168.2.2&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1032212"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;&amp;nbsp;&amp;nbsp; no shutdown&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question&amp;nbsp; 2: SInce routers are connected in criss cross fashion, whether i should&amp;nbsp; bridge the 2 interfaces of the routers and run HSRP ? (This IP will be&amp;nbsp; the default gateway for ASA Firewalls running in A/S)&lt;/P&gt;&lt;P&gt;Yes HSRP is a good idea on the routers.&amp;nbsp; The ASA will point to the HSRP IP address for its default gateway or route statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Dec 2010 14:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407811#M727454</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-24T14:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407812#M727489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks for your comments. "Romba nandri madam" .&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;To make your view better, I made 2 sketches. Please find the attached diagrams.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;1.&amp;nbsp; If the wiring is made as shown in Sketch 1, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a)&amp;nbsp; What will be the IP address configured in GE-2 interface of ASA? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b)&amp;nbsp; Whether it will be in the same security-level and Zone (OUTSIDE) of GE-1 interface ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;2. Looking at Sketch 2 whether Link no. 1 (Connecting ASA-1 and Router-2) and Link no. 2 (Connecting ASA-2 and Router-1) is required for best practice HA design? I am seeing all the Design Document shows this Criss cross Link between Routers and Firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I believe in case of Link between ASA-1 &amp;amp; Rouer-1 failure, ASA-2 will take the Active Role and the traffic will pass thru ASA-2----&amp;gt; Router-2-----&amp;gt;Router-1----&amp;gt; ISP-1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;SAIRAM&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Dec 2010 10:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407812#M727489</guid>
      <dc:creator>snarayanaraju</dc:creator>
      <dc:date>2010-12-25T10:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407813#M727523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;1.&amp;nbsp; If the wiring is made as shown in Sketch 1, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a)&amp;nbsp; What will be the IP address configured in GE-2 interface of ASA? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b)&amp;nbsp; Whether it will be in the same security-level and Zone (OUTSIDE) of GE-1 interface ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;GE-2 - should be configured on a completely diff. subnet than GE-1 according to your requirement.&amp;nbsp; The security level also depends on your requirement. Most of the times the OUTSIDE interface as soon as you issue the "nameif" command it will automatically configure the security level as zero.&amp;nbsp; If you choose to leave it at 0 even for GE2, then if GE1 and GE2 networks need to communicate then, you need to implement the same security permit inter-interface" command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;If you need redundancy between GE1 and GE2 you can configure redundant interface.&amp;nbsp; You can read about it here: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/intrface.html#wp1045838"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/intrface.html#wp1045838&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;2. Looking at Sketch&amp;nbsp; 2 whether Link no. 1 (Connecting ASA-1 and Router-2) and Link no. 2&amp;nbsp; (Connecting ASA-2 and Router-1) is required for best practice HA design?&amp;nbsp; I am seeing all the Design Document shows this Criss cross Link between&amp;nbsp; Routers and Firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN&gt;No you don't. Refer this link: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://packetlife.net/media/forum/attachments/17/ASA-FO.jpeg"&gt;http://packetlife.net/media/forum/attachments/17/ASA-FO.jpeg&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;This below link has configuration example of active/standby ASA&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1028629"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1028629&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;It appears that you are planning on connecting the failover link using a cross over cable.&amp;nbsp; I'd recommend carving out a separate vlan on the swtich for this purpose and connecting both ASAs to these ports on this separate vlan.&amp;nbsp; The reason being if the NIC was to go bad on one ASA the other ASA's interface will show down down also.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Dec 2010 17:47:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407813#M727523</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-28T17:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability and the ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407814#M727546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot for your ideas and time&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sairam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 11:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-availability-and-the-asa-5510/m-p/1407814#M727546</guid>
      <dc:creator>snarayanaraju</dc:creator>
      <dc:date>2010-12-29T11:53:47Z</dc:date>
    </item>
  </channel>
</rss>

