asa failover

Posted on 2016-09-19
Medium Priority
Last Modified: 2016-09-19
When configuring ASA failover on a live network, will the ASA's at any point in time drop their connection/restart or on anyway stop operation?
Question by:Shark Attack
LVL 16

Assisted Solution

by:Michael Ortega
Michael Ortega earned 1000 total points
ID: 41804610
During the process of configuring it? No.


Author Comment

by:Shark Attack
ID: 41804850
yes, and powering the standby, there is no point in time where I will loose any connectivity or my end users will have even brief outage?
LVL 58

Accepted Solution

Pete Long earned 1000 total points
ID: 41804868
Failover usually cases a small interruption, if you dont configure it properly it can be up to 15 seconds. I aim to lose one ping packet in a constant ping when I failover firewalls (its one of the tests I do.

Make sure you see something like

PetesASA(config)# failover poll 1 hol 3
PetesASA(config)# failover poll interface 3
PetesASA(config)# int m0/0
PetesASA(config-if)# failover poll interface 3

Open in new window

Where the failover interface is M0/0

Configuring ASA Failover

Featured Post

Get Cisco Certified in IT Security

There’s a high demand for IT security experts and network administrators who can safeguard the data that individuals, corporations, and governments rely on every day. Pursue your B.S. in Network Operations and Security and gain the credentials you need for this high-growth field.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In this article, we’ll look at how to deploy ProxySQL.
OnPage has always empowered IT teams but also amplify alerting capabilities. In the following slides you will see 5 features of OnPage that act as important tools for any IT team to resolve incidents faster
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question