<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA, Three Interfaces in Failover in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076947#M895756</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd cable it up more like this based on the diagram you provided.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Sep 2008 14:32:38 GMT</pubDate>
    <dc:creator>Matthew Warrick</dc:creator>
    <dc:date>2008-09-30T14:32:38Z</dc:date>
    <item>
      <title>ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076944#M895739</link>
      <description>&lt;P&gt;Hello Folks!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two ASA 5520 Series, I want to implemented a DMZ three-homed with three ethernet interfaces and I want failover with this solution. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible with this device?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the connections between the differents switch with SPT enabled to redundancy?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076944#M895739</guid>
      <dc:creator>elias.manchon</dc:creator>
      <dc:date>2019-03-11T13:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076945#M895747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you have the proper licenses on each device, this is possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need a total of 4 interfaces to enable failover: inside, outside, DMZ, and fail-link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each firewall interface is a L3 host port so the device does not participate in or have any knowledge of STP.  Each port on the switch side should be in "switchport host" with cdp disabled, etc.  Try to think of the firewall as a "server".  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each interface on the firewall will need a primary and standby IP enabled.  Ideally you will want the fail-link cabled via x-over if the firewalls are co-located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration examples section for ASAs has the rest of the commands you will need to complete the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Sep 2008 15:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076945#M895747</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-09-29T15:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076946#M895750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi mattjw916,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have sent a jpg file with the wire's connectios. Could you have a quick look at this file?. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 07:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076946#M895750</guid>
      <dc:creator>elias.manchon</dc:creator>
      <dc:date>2008-09-30T07:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076947#M895756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd cable it up more like this based on the diagram you provided.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 14:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076947#M895756</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-09-30T14:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076948#M895761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very Thanks Matt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your diagram is very explanatory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My last dude... If the Primary/Active ASA fail, then the secondary ASA take posession of role of Primary. But How could I do that the different IP's of my ISP for each ASA will be transparents for the configuration of the IPSec tunnels on the remotes side?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 15:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076948#M895761</guid>
      <dc:creator>elias.manchon</dc:creator>
      <dc:date>2008-09-30T15:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076949#M895763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When the primary/active fails the secondary/standby assumes the secondary/active state.  The secondary device re-IPs itself with the primary's IP addresses and "impersonates" the dead firewall.  Of course, that vastly oversimplifies the actual process but from the ISP and server's perspective the outside IP address of the active firewall never changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as it is a graceful failover the connection states should be maintained during a failover event.  I personally haven't had to support any nailed-up ipsec tunnels but I assume they would remain connected without any intervention.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 15:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076949#M895763</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-09-30T15:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076950#M895765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Matt,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short, you want say me that I can/must setup the secondary device with the same configuration that the primary device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the public IPs of both of them are the same?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 16:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076950#M895765</guid>
      <dc:creator>elias.manchon</dc:creator>
      <dc:date>2008-09-30T16:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076951#M895768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The secondary firewall doesn't really have its own config.  Once you enable failover and establish IP connectivity between the firewalls the primary writes its config to the flash of the secondary automatically.  To create a failover secondary firewall you only need to cable up a blank ASA, add a couple failover commands, and then primary sees and syncs it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample config that explains this all in great detail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 16:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076951#M895768</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-09-30T16:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076952#M895771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I cannot to enter at this area. Would you mind send me by email?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 16:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076952#M895771</guid>
      <dc:creator>elias.manchon</dc:creator>
      <dc:date>2008-09-30T16:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076953#M895772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this one.  It shouldn't require an account I don't think.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 16:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076953#M895772</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-09-30T16:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA, Three Interfaces in Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076954#M895776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Matt, Very Thanks for all!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2008 17:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-three-interfaces-in-failover/m-p/1076954#M895776</guid>
      <dc:creator>elias.manchon</dc:creator>
      <dc:date>2008-09-30T17:54:47Z</dc:date>
    </item>
  </channel>
</rss>

