Solved

Active/Standby configuration on WAN ip

Posted on 2008-06-18
3
648 Views
Last Modified: 2008-11-27
Hi,

I need to setup 2 Cisco ASA 5510 boxes in a Active/Standby failover mode...  My question is if I can use our WAN ips as outside IP's....  So use 3 WAN adresses for the 2 units...?
0
Comment
Question by:it-row
  • 2
3 Comments
 
LVL 32

Expert Comment

by:harbor235
ID: 21812507


All you need is 2 outside IPs in active/standby. You will need additional addresses for the connection between them, however, this can be rfc1918 space, you need a dedicated failover interface per FW.

2 outside address per two units

harbor235 ;}
0
 

Author Comment

by:it-row
ID: 21812539
If they are configured with an static IP per device. How can they "share"  the IP my VPN sites/clients connects to ?   As I understand the standby device should start to respond on the failed device's outside IP if an error occure...
0
 
LVL 32

Accepted Solution

by:
harbor235 earned 125 total points
ID: 21813181

When a failure occurs the standby assumes the IP (and mac if configured) of the configured primary ip,

the config on the primary for a interface used in A/S looks something like this;

ip address 1.1.1.1 255.255.255.0 standby 1.1.1.254    (this is an example)

the primary has the IP of the active and standby in its config, the secondary does not get the full config just failover parameters and a IP address for the failover interface. The two firewalls talk and the config gets copied to the failover unit.

harbor235 ;}
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco Access point 6 86
Set up wireless network on Cisco ASA 5505 with DHCP 13 63
Cisco ASA 3 25
ASA DHCP setup 5 28
When I upgraded my ASA 8.2 to 8.3, I realized that my nonat statement was failing!   The log showed the following error:     %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows It was caused by the config upgrade, because t…
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now