07-21-2017 04:27 PM - edited 03-12-2019 02:43 AM
Hi guys,
I amin the process of configuring a pair of Cisco ASA 5515-X Firewalls. Firewall A has 5 connections and Firewall B has 6 connections so I don't believe an Active/Standby configuration will work in this instance as they go to different networks so will need both Firewalls processing traffic.
I also have a connection to a client's network and they have provided a /30 subnet to use as a P2P link (192.168.10.0/30). They will use my interface address as their next hop address for routing to my networks.
What I am trying to do is to configure the Firewalls so that the interface they will use as their next hop failovers to the standby Firewall. I think you can do this when in Active/Active or Active/Passive but I am not so sure how I go about this. I think multiple contexts with groups are used but I wouldn't know where to start or if I am indeed correct.
I have attached my topology with example interfaces and addresses. Mine and the client's Firewalls will connect via L2 switches.
Can anybody help me please and provide explanation of the solution?
Thanks in advance :)
EDIT: Updated topology attached. The customer has actually provided a /29 subnet for the P2P links, however they still only wish to use one addaress for the next hop. I need to find a way for both my Firewalls to both be passing traffic and for the 192.168.10.1 address to failover to the secondary Firewall if the normally active fails.
07-22-2017 12:04 AM
Hi,
I do not think failover would work in your scenario.
Failover has these requirements:
•The same hardware model
•The same number of interfaces
•The same types of interfaces
Also, clustering cannot work on this hardware.
So we may need to think something else or ensure we have the same set of interfaces on both the devices.
Regards,
Aditya
Please rate helpful and mark correct answers
07-22-2017 01:26 AM
Hi Aditya, thanks for your reply.
See updated topology attached and in the OP.
From the new topology:
I am pretty sure this can be solved using multiple contexts but I am a little unsure how these work.
Hopefully you can help :)
07-22-2017 07:56 AM
Is there any layer 3 device at the edge, out side of firewall that you can use as a next hop for the client and then route traffic to firewall ? I think this would be a lot less complicated than trying to do this on in your current firewall set up.
07-22-2017 08:07 AM
Hi cofee, than you for your reply.
There is but I have no idea of the IP address as it isn't my design. Also the agreement was made a while ago and the customer has pretty much completed what they need to do from their end.
There must be a way to failover the IP address? If an Active/Standby can do it surely an Active/Active (or otherwise) can too?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide