SlideShare a Scribd company logo
1 of 3
How to Configure Hot Failover-Cisco ASA 5510 and ASA 5500 Series-ActiveStandby?
In this article, the author told the detailed info of Cisco asa 5505, 5500 failover
configuration from primary to standby. What we need to pay attention? Let’s start.
Two Cisco ASAs have identical hardware specs. From "Show version" compare the
licenses installed. Licenses must match on both ASAs. If you are running ASA IOS 8.3
and above, licenses don't need to match. Before upgrading to 8.3 (in case you want
to but you don't have to), study well! Access Lists and NAT are different so you need
to do manual clean up and re-configuration. Also 8.3 needs 1G of memory.
After failover is configured, configuration from primary will replicate to standby. Note
that Important: If you have AnyConnect or VPN images loaded on the primary, you
need to copy them into the secondary because again that will not replicate - only
configuration will replicate.
Connect the two ASAs through a cat5 cable for fail-over link (Heartbeat). You could
use the Management interface management0/0 for that. Pick a network and IP
address for that interface like 192.168.150.1. The standby will have 192.168.150.2
Primary ASA:
For each interface with IP address and mask pick an ip address for the standby from
the same network. For instance for inside network with IP address 192.168.99.1
255.255.255.0, pick an ip address for the standby like 192.168.99.2 (no mask needed)
and configure that interface:
ip address 192.168.99.1 255.255.255.0 standby 192.168.99.2
Do the same thing for all other interfaces that you are going to use like the Outside
and DMZ. Make sure they are in "no shutdown". Interfaces need to be on different
networks.
For management interface, do a no shutdown. Make sure interface has no interface
name "no nameif". Don't configure ip address for it.
Type the following commands
ASA(config)# failover lan unit primary
ASA(config)# failover lan interface failover Management0/0
When you type this command the ASA will say "INFO: Non-failover interface config
is cleared on Management0/0 and its sub-interfaces" and it will give a description to
that interface as "description LAN Failover Interface"
ASA(config)# failover interface ip failover 192.168.150.1 255.255.255.0 standby
192.168.150.2
ASA(config)# failover link failover Management0/0
If you do show running-config you will see that the description of interface
Management 0/0 has changed to "description LAN/STATE Failover Interface".
ASA(config)# failover replication http
ASA(config)# Failover
Secondary/Standby ASA:
Connect all interfaces to the respective network (at least the inside interface to the
inside network and outside interface to the outside network. The Management 0/0
interfaces on both ASAs are connected together through a cross-over cable). Connect
to the ASA through a consol.
Go to all interfaces that you are going to use (just like the Primary ASA) and do a no
shutdown. Don't forget the Management Interface that we are going to use as a
failover interface - Make sure interface has no interface name "no nameif". ASA
configuration including IP addresses will replicate from the Primary ASA when
replication starts.
Following is the minimum configuration that you need to do on the standby. No
more!
Type the following:
ASA(config)# failover lan interface failover Management0/0
ASA(config)# failover interface ip failover 192.168.150.1 255.255.255.0 standby
192.168.150.2 (this is the same exact command you typed on the Primary).
ASA(config)# failover link failover Management0/0
ASA(config)# failover lan unit secondary
ASA(config)# failover replication http
ASA(config)# failover (This is the last command that you need to do and as soon as
you do that the replication of configuration will start)
You will see messages similar to the following:
"Detected an Active mate
Beginning configuration replication from mate.... Jul 12 2013
23:37:14: %ASA-6-720037: (VPN-Secondary) HA progression callback: id
=3,seq=200,grp=0,event=101,op=15,my=Sync Config,peer=Active.
Jul 12 2013 23:37:14: %ASA-6-721003: (WebVPN-Secondary) HA progression
change:
event HA_PROG_STANDBY_CONFIG, my state Sync Config, peer state Active.
Jul 12 2013 23:37:14: %ASA-1-709006: (Secondary) End Configuration Replication
(STB)"
Gie some time for replication to finish before you proceed with the following
After that, go back to the primary ASA (not standby) and save config on it and that
will save it on both ASAs:
ASA#Wr mem
You can use the following two commands to see the state of failover
ASA# show failover
ASA# show failover state
Down the road, if standy configuration is out of sync with the Active asa, go to
standby and do:
conf t
no failover
failover
Last resort if configures are not matching, on the Active/primary ASA:
Wr standby [make sure you read more about "wr standby" this before you do it]
More Cisco ASA Topics:
How to Configure Cisco ASA Failover into Active/Standby Mode?
Cisco ASA Failover, Failover Modes & ASA Failover Configuration
Cisco ASA IPS Module Configuration
How to Configure New ASA 5510 in Transparent Mode?
Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software
Cisco ASA SNMP Polling Via VPN Site-to-Site Tunnel
Create IPv6 LAN-to-LAN VPN Tunnel on Cisco ASAs

More Related Content

Viewers also liked (8)

Network protocols
Network protocolsNetwork protocols
Network protocols
 
How to configure Nagios in Fedora ?
How to configure Nagios in Fedora ?How to configure Nagios in Fedora ?
How to configure Nagios in Fedora ?
 
Cisco switch selector layer2 or layer3
Cisco switch selector layer2 or layer3Cisco switch selector layer2 or layer3
Cisco switch selector layer2 or layer3
 
The feature licenses available for main cisco asa 5500 models
The feature licenses available for main cisco asa 5500 modelsThe feature licenses available for main cisco asa 5500 models
The feature licenses available for main cisco asa 5500 models
 
How to configure flexible netflow export on cisco routers
How to configure flexible netflow export on cisco routersHow to configure flexible netflow export on cisco routers
How to configure flexible netflow export on cisco routers
 
Nagios
NagiosNagios
Nagios
 
Ordering guide for cisco isr g2
Ordering guide for cisco isr g2Ordering guide for cisco isr g2
Ordering guide for cisco isr g2
 
5. mrtg in nagios1 0
5. mrtg in nagios1 05. mrtg in nagios1 0
5. mrtg in nagios1 0
 

More from IT Tech

More from IT Tech (20)

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setup
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guide
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guide
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faq
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switches
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi features
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solution
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switches
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switches
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modes
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fex
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches series
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 series
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration example
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration options
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement model
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 

Recently uploaded (16)

iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 

How to configure hot failover cisco asa 5510, 5500 series firewalls

  • 1. How to Configure Hot Failover-Cisco ASA 5510 and ASA 5500 Series-ActiveStandby? In this article, the author told the detailed info of Cisco asa 5505, 5500 failover configuration from primary to standby. What we need to pay attention? Let’s start. Two Cisco ASAs have identical hardware specs. From "Show version" compare the licenses installed. Licenses must match on both ASAs. If you are running ASA IOS 8.3 and above, licenses don't need to match. Before upgrading to 8.3 (in case you want to but you don't have to), study well! Access Lists and NAT are different so you need to do manual clean up and re-configuration. Also 8.3 needs 1G of memory. After failover is configured, configuration from primary will replicate to standby. Note that Important: If you have AnyConnect or VPN images loaded on the primary, you need to copy them into the secondary because again that will not replicate - only configuration will replicate. Connect the two ASAs through a cat5 cable for fail-over link (Heartbeat). You could use the Management interface management0/0 for that. Pick a network and IP address for that interface like 192.168.150.1. The standby will have 192.168.150.2 Primary ASA: For each interface with IP address and mask pick an ip address for the standby from the same network. For instance for inside network with IP address 192.168.99.1 255.255.255.0, pick an ip address for the standby like 192.168.99.2 (no mask needed) and configure that interface: ip address 192.168.99.1 255.255.255.0 standby 192.168.99.2 Do the same thing for all other interfaces that you are going to use like the Outside and DMZ. Make sure they are in "no shutdown". Interfaces need to be on different networks. For management interface, do a no shutdown. Make sure interface has no interface name "no nameif". Don't configure ip address for it. Type the following commands ASA(config)# failover lan unit primary ASA(config)# failover lan interface failover Management0/0 When you type this command the ASA will say "INFO: Non-failover interface config is cleared on Management0/0 and its sub-interfaces" and it will give a description to that interface as "description LAN Failover Interface" ASA(config)# failover interface ip failover 192.168.150.1 255.255.255.0 standby 192.168.150.2
  • 2. ASA(config)# failover link failover Management0/0 If you do show running-config you will see that the description of interface Management 0/0 has changed to "description LAN/STATE Failover Interface". ASA(config)# failover replication http ASA(config)# Failover Secondary/Standby ASA: Connect all interfaces to the respective network (at least the inside interface to the inside network and outside interface to the outside network. The Management 0/0 interfaces on both ASAs are connected together through a cross-over cable). Connect to the ASA through a consol. Go to all interfaces that you are going to use (just like the Primary ASA) and do a no shutdown. Don't forget the Management Interface that we are going to use as a failover interface - Make sure interface has no interface name "no nameif". ASA configuration including IP addresses will replicate from the Primary ASA when replication starts. Following is the minimum configuration that you need to do on the standby. No more! Type the following: ASA(config)# failover lan interface failover Management0/0 ASA(config)# failover interface ip failover 192.168.150.1 255.255.255.0 standby 192.168.150.2 (this is the same exact command you typed on the Primary). ASA(config)# failover link failover Management0/0 ASA(config)# failover lan unit secondary ASA(config)# failover replication http ASA(config)# failover (This is the last command that you need to do and as soon as you do that the replication of configuration will start) You will see messages similar to the following: "Detected an Active mate Beginning configuration replication from mate.... Jul 12 2013 23:37:14: %ASA-6-720037: (VPN-Secondary) HA progression callback: id =3,seq=200,grp=0,event=101,op=15,my=Sync Config,peer=Active. Jul 12 2013 23:37:14: %ASA-6-721003: (WebVPN-Secondary) HA progression change: event HA_PROG_STANDBY_CONFIG, my state Sync Config, peer state Active. Jul 12 2013 23:37:14: %ASA-1-709006: (Secondary) End Configuration Replication (STB)"
  • 3. Gie some time for replication to finish before you proceed with the following After that, go back to the primary ASA (not standby) and save config on it and that will save it on both ASAs: ASA#Wr mem You can use the following two commands to see the state of failover ASA# show failover ASA# show failover state Down the road, if standy configuration is out of sync with the Active asa, go to standby and do: conf t no failover failover Last resort if configures are not matching, on the Active/primary ASA: Wr standby [make sure you read more about "wr standby" this before you do it] More Cisco ASA Topics: How to Configure Cisco ASA Failover into Active/Standby Mode? Cisco ASA Failover, Failover Modes & ASA Failover Configuration Cisco ASA IPS Module Configuration How to Configure New ASA 5510 in Transparent Mode? Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software Cisco ASA SNMP Polling Via VPN Site-to-Site Tunnel Create IPv6 LAN-to-LAN VPN Tunnel on Cisco ASAs