<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Layer 3 Failover Active &amp;lt;&amp;gt; Active in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921479#M973719</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been thinking of doing something like this as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, the only thing I can think of is a L2TP tunnel between the two FWSM or using dot1q-tunneling between the two switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I cannot do this in my scenario because our data centers are seperated by SONET interfaces so it will lose the dot1q tags.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other idea is perhaps creating an L2 MPLS network to pass the FWSM stateful/failover keepalive msgs between the two.  Which is creating an L2VPN PSEUDOWIRE MPLS in between.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it may work.... I havent tested yet but let me know if you're going to try it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 14 Oct 2007 20:38:14 GMT</pubDate>
    <dc:creator>autobot130</dc:creator>
    <dc:date>2007-10-14T20:38:14Z</dc:date>
    <item>
      <title>Layer 3 Failover Active &lt;&gt; Active</title>
      <link>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921478#M973718</link>
      <description>&lt;P&gt;Two firewalls, active &amp;lt;&amp;gt; active, one located in one data center at one&lt;/P&gt;&lt;P&gt;physical location, the other is located in another data center at another&lt;/P&gt;&lt;P&gt;physical location. This arrangement is for disaster recover purposes and to&lt;/P&gt;&lt;P&gt;save money (1 pair instead of 2 pairs of firewalls). There are two of the same &lt;/P&gt;&lt;P&gt;service provider connections at each location.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;QUESTION:&lt;/P&gt;&lt;P&gt;Is there a Cisco technology that allows STATEFUL load-balancing between&lt;/P&gt;&lt;P&gt;these two separated firewalls WITHOUT the requirement of a layer 2 span&lt;/P&gt;&lt;P&gt;between their inside interfaces?&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Put another way: is there such a thing as Layer 3 Failover for Cisco&lt;/P&gt;&lt;P&gt;Firewalls?&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;* The initial positioning would have these two firewall's respective&lt;/P&gt;&lt;P&gt;locations in these two different data centers and so would have them located on&lt;/P&gt;&lt;P&gt;different IP subnets. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;** I am aware of load-balancing options for traffic prior to that traffic&lt;/P&gt;&lt;P&gt;reaching the inside interface of these two firewalls (CSS, GSLB, CSM, 3rd&lt;/P&gt;&lt;P&gt;party LB's) but a firewall failure using inside LB to move traffic back and&lt;/P&gt;&lt;P&gt;forth between the two I don't believe would be stateful (from the FW's perspective) and&lt;/P&gt;&lt;P&gt;that is a requirement in this case.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921478#M973718</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2019-03-11T11:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 3 Failover Active &lt;&gt; Active</title>
      <link>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921479#M973719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been thinking of doing something like this as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, the only thing I can think of is a L2TP tunnel between the two FWSM or using dot1q-tunneling between the two switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I cannot do this in my scenario because our data centers are seperated by SONET interfaces so it will lose the dot1q tags.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other idea is perhaps creating an L2 MPLS network to pass the FWSM stateful/failover keepalive msgs between the two.  Which is creating an L2VPN PSEUDOWIRE MPLS in between.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it may work.... I havent tested yet but let me know if you're going to try it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Oct 2007 20:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921479#M973719</guid>
      <dc:creator>autobot130</dc:creator>
      <dc:date>2007-10-14T20:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 3 Failover Active &lt;&gt; Active</title>
      <link>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921480#M973722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After looking at all the options and contacting several regional Cisco Security resources the answers seems to be, no-can-do. The interface sharing relies on L2 (same subnet) connectivity ala HSRP. It makes sense to me in so far as L3 state can not be maintained if the traffic is coming in to two different L3 (subnets) interfaces - the two ASA failover interfaces have to have the same L3 picture (same subnet) of the packets. So...alas, no breakthroughs on this one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2007 21:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layer-3-failover-active-lt-gt-active/m-p/921480#M973722</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2007-10-29T21:31:46Z</dc:date>
    </item>
  </channel>
</rss>

