Cisco ASA 5505 User Manual

Page 1344

Advertising
background image

63-20

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 63 Configuring Active/Active Failover

Configuring Active/Active Failover

interface GigabitEthernet0/5

no shutdown

failover

failover lan unit primary

failover lan interface folink GigabitEthernet0/1

failover link folink

failover interface ip folink 10.0.4.1 255.255.255.0 standby 10.0.4.11

failover group 1

primary

failover group 2

secondary

admin-context admin

context admin

description admin

allocate-interface GigabitEthernet0/2

allocate-interface GigabitEthernet0/3

config-url flash:/admin.cfg

join-failover-group 1

context ctx1

description context 1

allocate-interface GigabitEthernet0/4

allocate-interface GigabitEthernet0/5

config-url flash:/ctx1.cfg

join-failover-group 2

Example 63-2 admin Context Configuration

hostname SecAppA

interface GigabitEthernet0/2

nameif outsideISP-A

security-level 0

ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2

asr-group 1

interface GigabitEthernet0/3

nameif inside

security-level 100

ip address 10.1.0.1 255.255.255.0 standby 10.1.0.11

monitor-interface outside

Example 63-3 ctx1 Context Configuration

hostname SecAppB

interface GigabitEthernet0/4

nameif outsideISP-B

security-level 0

ip address 192.168.2.2 255.255.255.0 standby 192.168.2.1

asr-group 1

interface GigabitEthernet0/5

nameif inside

security-level 100

ip address 10.2.20.1 255.255.255.0 standby 10.2.20.11

Figure 63-1

shows the ASR support working as follows:

1.

An outbound session passes through ASA SecAppA. It exits interface outsideISP-A (192.168.1.1).

2.

Because of asymmetric routing configured somewhere upstream, the return traffic comes back
through the interface outsideISP-B (192.168.2.2) on ASA SecAppB.

Advertising