12-09-2016 01:58 PM - edited 03-12-2019 01:38 AM
Hello,
I am using 2 ASA, standby and active. They hook up to one switch. Each ASA has a port connected to a port on the switch for failover purposes.
These 2 ports on the switch has a separate/independent Vlan.
The management port on each ASA is connected to another switch with different vlan
My questions:
Thanks!
12-10-2016 04:11 AM
Hi,
Depending on your agreed business SLA requirements, and budget, I would consider having a second switch for added resilience.
I know Cisco recommend that a switch is used for the failover, and sync interface, but using a cross-over cable between the two ASA's, but this way each ASA is immediately aware of the state of its mate.
If both firewalls go into active state, this would surely cause ARP issues as both firewalls would assume the active firewall MAC address and IP address.
I would suggest either a stacked switch or independent switch solution.
ASA (1)
Outside Int - ISP
Inside Int - Switch 1
DMZ Int - Switch 1
Failover Int - ASA (2) [Dedicated VLAN]
Sync Int - ASA (2) [Dedicated VLAN]
ASA (2)
Outside Int - ISP
Inside Int - Switch 2
DMZ Int - Switch 2
Failover Int - ASA (1) [Dedicated VLAN]
Sync Int - ASA (1) [Dedicated VLAN]
*Consider configuring http replication, for stateful http failover during a failover instance.
12-10-2016 04:54 AM
My questions:
02-07-2017 11:44 AM
Thanks Cofee for a great explanation. And also thanks everyone for your inputs
Both ASA become active as they lost communication to each other? Secondary doesn't receive hello from primary anymore and it thinks the primary is down, so it makes itself active? Not if keep alives are received on monitored interfaces. If you have a situation where failover link fails due to a faulty cable or a layer 2 misconfiguration at the start up both firewalls may become active, but that's rare situation and you will need to fix the failover link to resolve the issue
What if the failover link fails due to a fault cable (or loose connection) NOT at the start up of both firewalls, but in middle of the night, then 30 mins later 1 of the monitored face is down, I assume the failover cannot happen at all, correct? I have failover policy set to 1. What else will it try to do when such things happened and eventually what will the be the state of the ASA?
What is the Management interface for? I know it's for the FirePOWER modules to communicate, not sure if anything else use this Management interface.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide