<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Failover w/ EIGRP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032632#M916147</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saw this unresolved post today.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically what is going on here is that when a pair of firewalls operates&lt;/P&gt;&lt;P&gt;asa failover pair they are regarded as a single device as far as the routed&lt;/P&gt;&lt;P&gt;path is concerned. The active is supposed to forward traffic and the standby&lt;/P&gt;&lt;P&gt;is supposed to wait until the active fails and then jump in and take over.If&lt;/P&gt;&lt;P&gt;the standby was to participate in the eigrp domain it would cause traffic to&lt;/P&gt;&lt;P&gt;be routed to it and then be dropped because it is not actively forwarding&lt;/P&gt;&lt;P&gt;traffic.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;When an actual failover occurs the standby will become active and then begin&lt;/P&gt;&lt;P&gt;to participate in the eigrp domain. The IP addresses of the active firewall&lt;/P&gt;&lt;P&gt;remain constant through out the process and so from the perspective of our&lt;/P&gt;&lt;P&gt;internal eigrp routers the "firewall" missed a few hello messages and then&lt;/P&gt;&lt;P&gt;came back up.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;But we can put the static route on primary firewall for the network from&lt;/P&gt;&lt;P&gt;where we want to monitor the secondary firewall. And that route will&lt;/P&gt;&lt;P&gt;replicate to secondary firewall as it is not a dynamic route and this will&lt;/P&gt;&lt;P&gt;help up us in accessing the secondary firewall for management purpose from&lt;/P&gt;&lt;P&gt;the inside subnets .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PLEASE RATE IF HELPS. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Sep 2008 20:09:09 GMT</pubDate>
    <dc:creator>suschoud</dc:creator>
    <dc:date>2008-09-10T20:09:09Z</dc:date>
    <item>
      <title>ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032628#M916139</link>
      <description>&lt;P&gt;Does the ASA support EIGRP when failover is configured? My second appliance will not neighbor up with anyone when failover is configured.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032628#M916139</guid>
      <dc:creator>Brian M</dc:creator>
      <dc:date>2019-03-11T13:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032629#M916141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you talking A/A or A/S...multiple context mode (A/A) does not support EIGRP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming you are using A/S EIGRP is supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a debug trace of your EIGRP on the ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 17:39:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032629#M916141</guid>
      <dc:creator>steavg</dc:creator>
      <dc:date>2008-07-23T17:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032630#M916145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A/S with a pretty straight forward configuration using LAN failover and no state information. When I debug EIGRP PACKETS on the second ASA I don't get anything, it just sits. Here is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.3&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.200.200.1 255.255.255.0 standby 200.200.200.2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; no nameif    &lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.252&lt;/P&gt;&lt;P&gt; vlan 252&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.27.252.254 255.255.255.0 standby 172.27.252.253 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.199.1 255.255.255.0 standby 192.168.199.2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif Management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.27.0.12 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit secondary&lt;/P&gt;&lt;P&gt;failover lan interface failover GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover key *****&lt;/P&gt;&lt;P&gt;failover interface ip failover 192.168.1.1 255.255.255.252 standby 192.168.1.2&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;router eigrp 16855&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt; network 172.27.0.15 255.255.255.255&lt;/P&gt;&lt;P&gt; network 172.27.252.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network 192.168.199.1 255.255.255.255&lt;/P&gt;&lt;P&gt; passive-interface default&lt;/P&gt;&lt;P&gt; no passive-interface Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 172.27.252.0 network is the one I need EIGRP running on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 17:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032630#M916145</guid>
      <dc:creator>Brian M</dc:creator>
      <dc:date>2008-07-23T17:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032631#M916146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you ever resolve your issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how it is documented by Cisco and I would like to know if anyone has done it this way.  Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!outside interface configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0 &lt;/P&gt;&lt;P&gt;description outside interface connected to the Internet &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 100.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!inside interface configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1 &lt;/P&gt;&lt;P&gt;description interface connected to the internal network &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!EIGRP authentication is configured on the inside interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication key eigrp 10 cisco123 key-id 1 &lt;/P&gt;&lt;P&gt;authentication mode eigrp 10 md5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!management interface configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;nameif management &lt;/P&gt;&lt;P&gt;security-level 99 &lt;/P&gt;&lt;P&gt;ip address 10.10.20.1 255.255.255.0 management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!EIGRP Configuration - the CLI configuration is very similar to the &lt;/P&gt;&lt;P&gt;!Cisco IOS router EIGRP configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router eigrp 10 &lt;/P&gt;&lt;P&gt;no auto-summary &lt;/P&gt;&lt;P&gt;eigrp router-id 10.10.10.1 &lt;/P&gt;&lt;P&gt;network 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!This is the static default gateway configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 100.10.10.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!Interface that connects to the Cisco ASA. Notice the EIGRP authentication paramenters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0 &lt;/P&gt;&lt;P&gt;ip address 10.10.10.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip authentication mode eigrp 10 md5 &lt;/P&gt;&lt;P&gt;ip authentication key-chain eigrp 10 MYCHAIN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! EIGRP Configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router eigrp 10 &lt;/P&gt;&lt;P&gt;network 10.10.10.0 0.0.0.255 &lt;/P&gt;&lt;P&gt;network 10.20.20.0 0.0.0.255 &lt;/P&gt;&lt;P&gt;network 172.18.124.0 0.0.0.255 &lt;/P&gt;&lt;P&gt;network 192.168.10.0 &lt;/P&gt;&lt;P&gt;no auto-summary    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 17:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032631#M916146</guid>
      <dc:creator>pmccubbin</dc:creator>
      <dc:date>2008-09-05T17:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032632#M916147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saw this unresolved post today.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically what is going on here is that when a pair of firewalls operates&lt;/P&gt;&lt;P&gt;asa failover pair they are regarded as a single device as far as the routed&lt;/P&gt;&lt;P&gt;path is concerned. The active is supposed to forward traffic and the standby&lt;/P&gt;&lt;P&gt;is supposed to wait until the active fails and then jump in and take over.If&lt;/P&gt;&lt;P&gt;the standby was to participate in the eigrp domain it would cause traffic to&lt;/P&gt;&lt;P&gt;be routed to it and then be dropped because it is not actively forwarding&lt;/P&gt;&lt;P&gt;traffic.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;When an actual failover occurs the standby will become active and then begin&lt;/P&gt;&lt;P&gt;to participate in the eigrp domain. The IP addresses of the active firewall&lt;/P&gt;&lt;P&gt;remain constant through out the process and so from the perspective of our&lt;/P&gt;&lt;P&gt;internal eigrp routers the "firewall" missed a few hello messages and then&lt;/P&gt;&lt;P&gt;came back up.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;But we can put the static route on primary firewall for the network from&lt;/P&gt;&lt;P&gt;where we want to monitor the secondary firewall. And that route will&lt;/P&gt;&lt;P&gt;replicate to secondary firewall as it is not a dynamic route and this will&lt;/P&gt;&lt;P&gt;help up us in accessing the secondary firewall for management purpose from&lt;/P&gt;&lt;P&gt;the inside subnets .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PLEASE RATE IF HELPS. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2008 20:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032632#M916147</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-10T20:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032633#M916149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The mode you are using Active/standby does support EIGRP with version 8 software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is EIGRP working on the acive ASA? The standby peer is not forwarding any traffic when in standby mode and will not form any EIGRP neighbour relationship. Based on your config you are using active/standby in a routed mode. Only one ASA isactive and the active ASA can form EIGRP neighbour relationship.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need configuration help with EIGRP routing on the ASA, let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Sep 2008 20:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032633#M916149</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-09-10T20:40:48Z</dc:date>
    </item>
    <item>
      <title>ASA Failover w/ EIGRP</title>
      <link>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032634#M916151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ha_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ha_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"In Version 8.4 and later, Stateful Failover&amp;nbsp; participates in dynamic routing protocols, like OSPF and EIGRP, so&amp;nbsp; routes that are learned through dynamic routing protocols on the active&amp;nbsp; unit are maintained in a Routing Information Base (RIB) table on the&amp;nbsp; standby unit. Upon a failover event, packets travel normally with&amp;nbsp; minimal disruption to traffic because the Active secondary ASA initially&amp;nbsp; has rules that mirror the primary ASA. Immediately after failover, the&amp;nbsp; re-convergence timer starts on the newly Active unit. Then the epoch&amp;nbsp; number for the RIB table increments. During re-convergence, OSPF and&amp;nbsp; EIGRP routes become updated with a new epoch number. Once the timer is&amp;nbsp; expired, stale route entries (determined by the epoch number) are&amp;nbsp; removed from the table. The RIB then contains the newest routing&amp;nbsp; protocol forwarding information on the newly Active unit."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 11:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-failover-w-eigrp/m-p/1032634#M916151</guid>
      <dc:creator>vciric</dc:creator>
      <dc:date>2013-02-04T11:44:53Z</dc:date>
    </item>
  </channel>
</rss>

