Configuring Cisco ASA Active/Standby Failover

In this article, I will share the configurations used in the within the video below. The configurations enable one to configure Active/Standby ASA’s with failover and redundant failover links.


ASAv1 Configurations

interface redundant 1
member-interface g0/0
member-interface g0/1
no shutdown#Interface G0/0
no shutdown#Interface G0/1
no shutdown

Configure failover settings on ASAv1

failover lan unit primary
failover lan interface redundant 1 (This is the interface used for the failover link)
failover interface failover redundant 1 (‘failover’ = the name I gave the failover interface redundant 1)
failover interface ip failover 10.0.0.1 255.255.255.0 standby 10.0.0.2
failover key cisco (Key needs to match on both ASA’s)
failover (Enables failover)
write memory (Save your configuration)

Configure Basic Device Settings

interface g0/2
nameif OUTSIDE
ip address 172.16.235.2 255.255.255.0 standby 172.16.235.3
no shutdown#Interface g0/3
nameif INSIDE
ip address 192.168.10.1 255.255.255.0 standby 192.168.10.2
no shutdown
route OUTSIDE 0.0.0.0 0.0.0.0 172.16.235.1

Configure ASAv2

interface redundant 1
member-interface g0/0
member-interface g0/1
no shutdown
interface G0/0
no shutdown
interface G0/1
no shutdown
failover lan interface redundant 1 (This is the interface used for the failover link)
failover interface failover redundant 1 (‘failover’ = the name I gave the failover interface redundant 1)
failover interface ip failover 10.0.0.1 255.255.255.0 standby 10.0.0.2
failover key cisco (Key needs to match on both ASA’s)
failover (Enables failover)
write memory

Additional Configurations on ASAv1 (Optional)

prompt hostname state priority (Changes he command prompt to show which device is Active and which is Standby)
policy-map global_policy
class inspection_default
inspect ICMP (This command and the above two commands will allow ICMP to be inspected in the global policy)
Please watch the configuration video below for a better understanding.
 

 

Popular Posts

Capturing EAPOL and RADIUS Using Wireshark

Configuring Cisco Smart License Software

Cisco :: FXOS Authentication Using TACACS

Configuring Remote Access VPN on Firepower

Kali Linux :: CAM Table Overflow Attack Demonstration