Active/Active
failover is only available to ASAs in multiple context mode. In an
Active/Active failover configuration, both ASAs can pass network traffic.
In
Active/Active failover, you divide the security contexts on the ASA into
failover groups. A failover group is simply a logical group of one or more
security contexts. You can create a maximum of two failover groups. The admin
context is always a member of failover group 1. Any unassigned security
contexts are also members of failover group 1 by default.
The
failover group forms the base unit for failover in Active/Active failover.
Interface failure monitoring, failover, and active/standby status are all
attributes of a failover group rather than the unit. When an active failover
group fails, it changes to the standby state while the standby failover group
becomes active. The interfaces in the failover group that becomes active assume
the MAC and IP addresses of the interfaces in the failover group that failed.
The interfaces in the failover group that is now in the standby state take over
the standby MAC and IP addresses.
Failover Configuration Limitations
You
cannot configure failover with these types of IP addresses:
- IP addresses obtained through DHCP
- IP addresses obtained through PPPoE
- IPv6 addresses
Additionally,
these restrictions apply:
- Stateful Failover is not supported on the ASA 5505 adaptive security appliance.
- Active/Active failover is not supported on the ASA 5505 adaptive security appliance.
- You cannot configure failover when Easy VPN Remote is enabled on the ASA 5505 adaptive security appliance.
- VPN failover is not supported in multiple context mode.
Unsupported Features
Multiple
context mode does not support these features:
- Dynamic routing protocols
- Security contexts support only static routes. You cannot enable OSPF or RIP in multiple context mode.
- VPN
- Multicast
Configuration
(Note: First complete basic configuration as per
given in the Topology Figure)
Firewall mode multiple
Failover group 1
preempt
Primary
Failover group 2
Preempt
Secondary
Failover lan unit primary
failover lan interface fover
e0/2
failover replication http
failover link fover e0/2
failover interface ip fover
10.0.0.100 255.255.255.0 standby 10.0.0.101
context c1
join-failover group 1
context c2
join-failover group 2
failover
ASA_2_Active
Firewall mode mutltiple
failover lan interface fover
e0/2
failover replication http
failover link fover e0/2
failover interface ip fover
10.0.0.100 255.255.255.0 standby 10.0.0.101
failover
Verification
ASA(config)#show failover
----
No comments:
Post a Comment