<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Failover - problem with remote VPN connections when fail in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094534#M896344</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the further suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't be too concerned about the sessions disconnecting and reconnecting again (as long as it was for a reasonably short time period)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, unless I've not quite understood things correctly, I'm not sure your suggestion would work with our set-up.  Because, with failover, the ASA devices "share" the same IP addresses (so the secondary ASA would take over the primary's IP addresses in a failover situation) which would mean configuring a second peer in the remote router would have no effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we disabled failover and just included the secondary ASA as an alternative peer on the remote routers, I still don't think it would help as a) our head office users would still lose their internet access if the primary internet pipe failed (since no failover) and b) the routing back out to the remote offices would fail since head office devices would still be routing to the primary ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Sep 2008 15:26:14 GMT</pubDate>
    <dc:creator>mitchen</dc:creator>
    <dc:date>2008-09-16T15:26:14Z</dc:date>
    <item>
      <title>ASA Failover - problem with remote VPN connections when failover occurs</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094530#M896332</link>
      <description>&lt;P&gt;We have a primary ASA5540 at our head office which provides our main site internet connection and terminates all the IPSEC VPNs to our remote sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We also have a secondary ASA5540 at our â&amp;#128;&amp;#156;failoverâ&amp;#128;&amp;#157; site where we have another internet pipe.  The idea being that, if there is a problem with our main internet pipe or primary ASA, comms will failover to the secondary ASA and we will still have connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The head office and failover sites are a few miles apart and are connected by a LES (LAN Extension Service) circuit.  We have a core switch at each site with an isolated â&amp;#128;&amp;#156;failoverâ&amp;#128;&amp;#157; VLAN configured for the connections between the 2 ASA firewalls.  The switch ports are configured with â&amp;#128;&amp;#156;spanning-tree portfastâ&amp;#128;&amp;#157; enabled and trunking disabled ("switchport mode access")  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue we are facing is that, whenever a failover occurs (e.g. if main internet pipe goes down) then the failover to the secondary unit happens but we seem to lose connectivity with all our remote offices.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a diagram to show the basic set-up and also included the "show run failover" and "show failover" output (with IP addresses removed) from each unit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any suggestions as to what the issue might be and how we can set this up so that all connectivity (including remote VPN connections) will resume when a failover occurs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's also a difficult one to troubleshoot as we need downtime in order to test it (as all remote sites connect over the primary internet pipe) - if we organise a test window, can anyone suggest the best debugging/troubleshooting commands to run in order to help us resolve the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help/advice on this one would be greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094530#M896332</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2019-03-11T13:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094531#M896334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as long as u are runing active/standby NOT active/active failover mode then u can use stateful failover to support IPsec vpn&lt;/P&gt;&lt;P&gt;and u need to consider stateful failover on ur firewalls&lt;/P&gt;&lt;P&gt;have alook at the following link which is very helpful :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml#statef" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml#statef&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for show and debuge use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show failover &lt;/P&gt;&lt;P&gt;show failover | include Failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug fo ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exec mode commands/options:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  cable   Failover LAN status&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  fail    Failover internal exception&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  fmsg    Failover message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  ifc     Network interface status trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  open    Failover device open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  rx      Failover Message receive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  rxdmp   Failover recv message dump (serial console only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  rxip    IP network failover packet recv&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  switch  Failover Switching status&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  sync    Failover config/command replication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  tx      Failover Message xmit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  txdmp   Failover xmit message dump (serial console only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  txip    IP network failover packet xmit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  verify  Failover message verify&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To troubleshoot issues related to failover timing, use the debug fo rxip and debug fo txip commands to determine if the packets are being exchanged according to the configured polltimes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful  Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 11:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094531#M896334</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-16T11:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094532#M896337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks - I'll have a look at some of those commands you've suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as the stateful failover is concerned, I believe we have that configured already:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover interface ip failover *.*.*.1 *.*.*.* standby *.*.*.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any further advice/suggestions would be welcome!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 13:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094532#M896337</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2008-09-16T13:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094533#M896340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if u are not concerned too much about the session get disconnected and reconnected again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the remote routers u can make another crypto map with the same name but higher sequence number includ the same interesting traffic and other option except the set peer command which will be the secondary ASA&lt;/P&gt;&lt;P&gt;so u will have one crypto map on each remote router with two sequence numbers fist map with lower sequence number point to ASA 1 and the second one point to the secondary ASA&lt;/P&gt;&lt;P&gt;but this way one ASA one or its link gos down the remote routers will re intiate the tunnel again to the second one when they get interesting traffic&lt;/P&gt;&lt;P&gt;and works even without failover this way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 13:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094533#M896340</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-16T13:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094534#M896344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the further suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't be too concerned about the sessions disconnecting and reconnecting again (as long as it was for a reasonably short time period)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, unless I've not quite understood things correctly, I'm not sure your suggestion would work with our set-up.  Because, with failover, the ASA devices "share" the same IP addresses (so the secondary ASA would take over the primary's IP addresses in a failover situation) which would mean configuring a second peer in the remote router would have no effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we disabled failover and just included the secondary ASA as an alternative peer on the remote routers, I still don't think it would help as a) our head office users would still lose their internet access if the primary internet pipe failed (since no failover) and b) the routing back out to the remote offices would fail since head office devices would still be routing to the primary ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 15:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094534#M896344</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2008-09-16T15:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094535#M896348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just in case anyone is suffering a similar problem, this turned out to be a Cisco software bug.  We were running 7.2(4) when we experienced the failover problem but upgraded to 7.2(4)9 and this resolved the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The related bugs seem to have been:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsl52895 - ASA 7.2.3 number of IPSec SA not replicated in failover unit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsl82200 - IPSec not encrypting after failover&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Oct 2008 14:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094535#M896348</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2008-10-24T14:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094536#M896351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is also another bug to be aware of: search for CSCsi18736 in the bug toolkit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Mar 2009 14:34:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094536#M896351</guid>
      <dc:creator>broeder</dc:creator>
      <dc:date>2009-03-09T14:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094537#M896353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Failover does not work properly over LES circuits, it has something to do with the switches in the provider not coping with the mac address swap&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 13:35:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094537#M896353</guid>
      <dc:creator>Richard Clayton</dc:creator>
      <dc:date>2010-03-29T13:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover - problem with remote VPN connections when fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094538#M896356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats interesting, do you have any more information on that? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our failover &lt;EM&gt;seems&lt;/EM&gt; to work ok now and we are still using LES circuits.&amp;nbsp; However, I've never been completely convinced by it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 13:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-problem-with-remote-vpn-connections-when-failover/m-p/1094538#M896356</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2010-03-29T13:58:21Z</dc:date>
    </item>
  </channel>
</rss>

