• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1786
  • Last Modified:

ASA Failover Pair - SNMP and ICMP issue to the passive box

I have a pair of ASA5520's configured as active/passive failover to each other.

I have an NMS at my head office which has a VPN connection to the ASA pair. My NMS is able to ping the active box and pass SNMP back and forth with no issues, but it can't do the same to the passive box - SNMP and Ping both fail.

As the boxes both in essence have the same config running, is there something I'm missing that needs to be done to allow SNMP and Ping to work to both ASA's ??

TIA


Rob
0
ccfcfc
Asked:
ccfcfc
  • 6
  • 4
  • 2
3 Solutions
 
3nerdsCommented:
On your ASA you should have lines line this configured.

ip address 172.16.1.1 255.255.0.0 standby 172.16.1.2

This means that the active unit will have an address of 172.16.1.1 and the standby will have 172.16.1.2. You should be able to configure your NMS to pull from each separate IP address, giving you the info you want.

Regards,

3nerds
0
 
carlson777Commented:
My assumption is that you are using a VPN tunnel with no NATing involved...  If this is the case then when your NMC device tries to ping your passive device it will try to initiate a VPN tunnel back to your corporate office as that is what its routing table tells it to do.  Have you looked in the logs to see if a VPN tunnel is initiated, looked at the passive ASA to see how routing is setup?
0
 
3nerdsCommented:
Didn't even notice it was across a VPN tunnel. Good catch Carlson!

3nerds
0
Choose an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

 
ccfcfcAuthor Commented:
Thanks for the replies.

We have an IPSec L2L tunnel between the two sites. The tunnel is up constantly as the NMS monitors several devices at the remote site where the two ASAs are located, so I know that the tunnel itself is working and, as the two ASAs are on the same subnet, there should (in theory) be no issues getting to the secondary ASA.

The NMS is pointed at the IP address for both ASAs but can only get responses from the primary.
0
 
carlson777Commented:
But if the passive devices routing table expects to use its own tunnel and it is not up that would be the issue.  Currently the primary tunnel is up.  One the passive firewall try to do a traceroute to the NMC.  Check the routing.  I know that the tunnel is good, just wondering if the passive device is trying to create its own tunnel to route back.
0
 
ccfcfcAuthor Commented:
Thanks for clarifying Carlson. I'll take a look at that.
0
 
carlson777Commented:
Did you find anything?
0
 
carlson777Commented:
What did you see?
0
 
ccfcfcAuthor Commented:
HE is holiday and as soon as he comes back i am sure he will tets and update for yourself......just thought I would update you....
0
 
ccfcfcAuthor Commented:
Sorry for the delay.

I have tried traceroute from the primary ASA, just to see what I get on the box that is working, but there doesn't seem to be a traceroute command on the ASA.

Instead I tried to ping the NMS from the primary ASA, but the ping fails. I can ping devices on the ASA subnets with no issues, but I can't ping devices on the remote end of the VPN.

I can ping devices on the remote end of the VPN from devices that are behind the ASA with no issues. I just can't ping them from the ASA itself.
0
 
ccfcfcAuthor Commented:
A little more info.....

The behaviour in my last update is the same from both ends of the VPN. On the PIX at the remote end I can't ping devices behind the ASA, but I can ping them from devices behind the PIX.
0
 
ccfcfcAuthor Commented:
No further update from any experts to my last comments.

Will award partial points for advuice given so far. We have now resolved the original query ourselves.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

IT Degree with Certifications Included

Aspire to become a network administrator, network security analyst, or computer and information systems manager? Make the most of your experience as an IT professional by earning your B.S. in Network Operations and Security.

  • 6
  • 4
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now