<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSec support for Active/Active config on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950456#M941676</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was going through the link for help on configuring failover for multiple contexts &amp;amp; came across a strange statement. Can someone pls help clarify this, "When the security appliance is configured for Active/Active stateful failover, you cannot enable IPSec or SSL VPN. Therefore, these features are unavailable. VPN failover is available for Active/Standby failover configurations only".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;BVS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 12:10:05 GMT</pubDate>
    <dc:creator>bvsnarayana03</dc:creator>
    <dc:date>2019-03-11T12:10:05Z</dc:date>
    <item>
      <title>IPSec support for Active/Active config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950456#M941676</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was going through the link for help on configuring failover for multiple contexts &amp;amp; came across a strange statement. Can someone pls help clarify this, "When the security appliance is configured for Active/Active stateful failover, you cannot enable IPSec or SSL VPN. Therefore, these features are unavailable. VPN failover is available for Active/Standby failover configurations only".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/failover.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;BVS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950456#M941676</guid>
      <dc:creator>bvsnarayana03</dc:creator>
      <dc:date>2019-03-11T12:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec support for Active/Active config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950457#M941677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is as it says. If you are running active active you cannot terminate VPN traffic wheras if you are in active/standby you can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Mar 2008 13:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950457#M941677</guid>
      <dc:creator>cdusio</dc:creator>
      <dc:date>2008-03-01T13:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec support for Active/Active config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950458#M941678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want Active/Active...Active firewall&lt;/P&gt;&lt;P&gt;that can also terminate VPN and/or ssl VPN,&lt;/P&gt;&lt;P&gt;checkpoint can do that.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even with Cisco ASA in Active/Active, it is not&lt;/P&gt;&lt;P&gt;really Active/Active.  It is similar to IOS&lt;/P&gt;&lt;P&gt;HSRP but not as flexible as HSRP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Mar 2008 14:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-support-for-active-active-config-on-asa/m-p/950458#M941678</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-03-01T14:20:49Z</dc:date>
    </item>
  </channel>
</rss>

