<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA - Active/Active in Transparent Mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925800#M937896</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help Analnjjar.  I just tried setting this up and one firewall works, but the failover does not and i believe traffic is only passing through the primary firewall.  With a single context it will be active / nothing am i right in thinking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what i can gather you assign interfaces (vlans) to contexts, and each firewall runs a different context ie different vlans.  I seem to be running in trouble where I want all interfaces to run the same vlan (default) and pass traffic so it is fully transparent and balanced.  With a single context you cannot have each firewall running a context so it is Active / Nothing.  As i cannot assign an interface to multiple contexts in transparent mode i am stuck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 May 2008 11:46:15 GMT</pubDate>
    <dc:creator>keith.osullivan</dc:creator>
    <dc:date>2008-05-20T11:46:15Z</dc:date>
    <item>
      <title>ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925790#M937886</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to configure a pair of new ASA'a for transparency and redundancy, they will protect some existing servers who's ip's cannot be changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled the multiple context's but cannot manage the ASA's by IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.0(7) &amp;lt;system&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password **** encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 601&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 602&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 603&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 604&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; description STATE Failover Interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; vlan 201&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover lan unit secondary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover lan interface LANFailover GigabitEthernet0/3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover link Stateful GigabitEthernet0/3.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover interface ip LANFailover ###internal ip#### standby ###internal ip####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover interface ip Stateful ###internal ip#### standby ###internal ip####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover group 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;  secondary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin-context admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;context admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  allocate-interface Management0/0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  config-url disk0:/admin.cfg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  join-failover-group 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;context context1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  allocate-interface GigabitEthernet0/0.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  allocate-interface GigabitEthernet0/1.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  config-url disk0:/context1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  join-failover-group 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;context context2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  allocate-interface GigabitEthernet0/0.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  allocate-interface GigabitEthernet0/1.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  config-url disk0:/context2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  join-failover-group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# changeto context context1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/context1# sh run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.0(7) &amp;lt;context&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname context1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password **** encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address ###internal ip#### standby ###internal ip####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;************&lt;/P&gt;&lt;P&gt;output omitted&lt;/P&gt;&lt;P&gt;************              &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/context1# changeto context context2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/context2# sh run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.0(7) &amp;lt;context&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname context2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password **** encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address ###internal ip#### standby ###internal ip####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;************&lt;/P&gt;&lt;P&gt;output omitted&lt;/P&gt;&lt;P&gt;************              &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/context2# &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925790#M937886</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2019-03-11T12:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925791#M937887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;  You can configure an IP address for the Management 0/0 management-only interface. This IP address can be on a separate subnet from the main management IP address. after that you can manage the ASA through IP.&lt;/P&gt;&lt;P&gt;for example :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;ip address 10.10.10.10 255.255.255.0&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also you need to specify the addresses that can manage the ASA and the interface which they are connected to :&lt;/P&gt;&lt;P&gt;http ip_addresse mask interface&lt;/P&gt;&lt;P&gt;example :&lt;/P&gt;&lt;P&gt;http 10.2.2.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; other solution , you can add the mangement interface to the admin context, then use the previous commands in the admin context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 May 2008 13:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925791#M937887</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-05-13T13:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925792#M937888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the response Alan, entering the security level fixed the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still cannot get traffic to go through the firewall, i am not sure if i have to keep the vlan's on the interfaces and then assign them to the contexts.  As whenever i try adding access rules it says there are no interfaces available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your help.&lt;/P&gt;&lt;P&gt;Keith&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 13:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925792#M937888</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2008-05-15T13:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925793#M937889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;  You need to enable ALL the sub-interfaces in the system configuration and ALL contexts, as you know by using the command   &lt;/P&gt;&lt;P&gt;no shut &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you need to do it for all subinterfaces. note that  the access lists are defined in the contexts not on the system configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will help.&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 May 2008 04:52:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925793#M937889</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-05-18T04:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925794#M937890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I cannot add an interface to multiple contexts (ie sharing cannot be done in transparent mode) and it will only allow me to add 2 data interfaces per a context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Keith&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 07:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925794#M937890</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2008-05-19T07:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925795#M937891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;  Why you want to use shared interface? you didnt mention any thing about that.&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt; In trasparent mode, you can have only two interface per context. also you define the ip address in context mode, not interface mode, and you need to applu an access list to let traffic pass through each context, because by default all traffic are blocked in transparent mode. &lt;/P&gt;&lt;P&gt;  can you specify exactly what you want to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 08:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925795#M937891</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-05-19T08:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925796#M937892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alanajjar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreaciate your input in to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The aim is to firewall of some servers internally and their ip's cannot be changed easily (due to coding of some applications).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal IP (eg 192.168.0.50/24) &amp;lt;----&amp;gt; Transparent Firewalls &amp;lt;------&amp;gt; Internal IP (eg 192.168.0.50/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can allocate interfaces (inside and outsite) to context's, but as its transparent i dont really want to use muliple vlans which seems to be the only way to allocate the interfaces.  The above works with Active / Standby (no vlan's etc), but A/A does not seem possible without vlans.  I only thought about the shared interface as it would mean no vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards in advance&lt;/P&gt;&lt;P&gt;Keith&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 11:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925796#M937892</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2008-05-19T11:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925797#M937893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;  With transparent firewall you have to allocate vlans to interfaces, other wise the firewall will not pass any traffic.&lt;/P&gt;&lt;P&gt;  I have some questions to clarify the picture :&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; are all servers in the same subnet or differnt subnets?&lt;/P&gt;&lt;P&gt;do you have layer 3 switch?&lt;/P&gt;&lt;P&gt;is there a problem if you use vlans?&lt;/P&gt;&lt;P&gt;if you can post your network diagram,this will give good picture about your situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I hope that I can help you in this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with regards &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 12:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925797#M937893</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-05-19T12:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925798#M937894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the servers are on the same subnet, so the goal is just to move the required servers from one side of the firewall to the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have a layer 3 switch and use vlans so that should not be a problem.  I am just thinking if we use vlans on the firewall ports, how will traffic pass through or swap between vlans to balance the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attach a simple network diagram, so hopefully you can see what i am trying to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 12:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925798#M937894</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2008-05-19T12:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925799#M937895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Keith,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; Your situation is easy, for your case you need only one context, in that context define an ip address in the same subnet, i.e 192.168.1.x/24. the ASA will switch traffic through the context based on the source address in your case, so the traffic from specific source, will pass through a specific context, which is in the same subnet, the ASA will use the valns on the context to switch traffic between the inbound interface (or sub-interface) and the outbound interface, and the return traffic will be pass through the same context, it will not go through another context, this will be control be the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  Hope this will clarify the situation.&lt;/P&gt;&lt;P&gt; With regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 May 2008 17:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925799#M937895</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-05-19T17:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925800#M937896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help Analnjjar.  I just tried setting this up and one firewall works, but the failover does not and i believe traffic is only passing through the primary firewall.  With a single context it will be active / nothing am i right in thinking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what i can gather you assign interfaces (vlans) to contexts, and each firewall runs a different context ie different vlans.  I seem to be running in trouble where I want all interfaces to run the same vlan (default) and pass traffic so it is fully transparent and balanced.  With a single context you cannot have each firewall running a context so it is Active / Nothing.  As i cannot assign an interface to multiple contexts in transparent mode i am stuck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 11:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925800#M937896</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2008-05-20T11:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925801#M937897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I think in your situation you dont need to use active/active failover, why you dont use transparent active/standby stateful failover? you need active/active failover when you have multiple subnets, and you want to use failover for those subnets, but here you have only one subnet, am I right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  regarding vlans, the servers are dont care about vlans, only network devices like routers, firewalls or switches. the switching between differnt vlans will be handeled by layer 3 switch in your case, so for this its not an issue. only minor changes in the switch will solve that.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; I hope that I understood the situation correctly.&lt;/P&gt;&lt;P&gt;with regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 15:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925801#M937897</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-05-20T15:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Active/Active in Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925802#M937898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alanjar,&lt;/P&gt;&lt;P&gt;Thank you very much for your help.  I have gone tith the active / standby approach as you suggested.&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Keith&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jun 2008 07:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-in-transparent-mode/m-p/925802#M937898</guid>
      <dc:creator>keith.osullivan</dc:creator>
      <dc:date>2008-06-03T07:54:50Z</dc:date>
    </item>
  </channel>
</rss>

