Greetings,
This is a question concerning EIGRP and static routes on our ASA Failover pair in an A/S configuration. The Active ASA is participating in an EIGRP AS and the Standby doesn’t receive any of the EIGRP routes, which, if I understand correctly, is the expected behavior. The problem that we are trying to solve is how to use a Network Management Server (NSM) to actively monitor via ICMP the Standby in case it goes down. This is not working now because NMS is not directly connected to the A/S failover pair and thus it cannot ping the Standby firewall since there is no route back to the NMS. Our proposed solution is to add a static route that points to the NMS. We believe the best way to do this is to configure the route with higher administrative distance than EIGRP (>90) so the Standby firewall would have a route back to the NMS and it wouldn’t affect the active EIGRP routing. Please let me know if we what were are proposing is a good practice. Any suggestions would be appreciated. Thanks for the assitance.
fwco01# show running-config router
!
router eigrp 200
no auto-summary
eigrp stub connected static summary
network 10.NNN.0.0 255.0.0.0
passive-interface default
no passive-interface DMZ
no passive-interface OUTSIDE
no passive-interface OUTSIDE-BACKUP
redistribute static
!
Proposed Route:
route DMZ 10.NNN.79.250 255.255.255.255 10.NNN.249.252 100