EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1245 background imageLoading...
Page #1245 background image
60-9
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 60 Configuring Active/Active Failover
Configuring Active/Active Failover
–
Testing—Hello messages are not heard on the interface for five poll times.
–
Link Down—The interface is administratively down.
–
No Link—The physical link for the interface is down.
–
Failed—No traffic is received on the interface, yet traffic is heard on the peer interface.
Failover - Transparent
Use this pane to define the standby IP address for the management interface for the security context and
to specify whether the status of the interfaces on the security context should be monitored.
Fields
• Interface—Lists the interfaces for the security context and identifies their monitoring status.
–
Interface Name—Identifies the interface name.
–
Is Monitored—Specifies whether this interface is monitored for failure.
• Edit—Displays the Edit Failover Interface Configuration dialog box for the selected interface.
• Management IP Address—Identifies the active and standby management IP addresses for the
security context.
–
Active—Identifies the management IP address for the active failover unit.
–
Standby—Specifies the management IP address for the standby failover unit.
• Management Netmask—Identifies the mask associated with the management address.
Edit Failover Interface Configuration
Use the Edit Failover Interface Configuration dialog box to specify whether the status of the interface
should be monitored.
Fields
• Interface Name—Identifies the interface name.
• Monitor interface for failure—Specifies whether this interface is monitored for failure. The number
of interfaces that can be monitored for the security appliance is 250. Hello messages are exchanged
between the security appliance failover pair during every interface poll time period. Monitored
failover interfaces can have the following status:
–
Unknown—Initial status. This status can also mean the status cannot be determined.
–
Normal—The interface is receiving traffic.
–
Testing—Hello messages are not heard on the interface for five poll times.
–
Link Down—The interface is administratively down.
–
No Link—The physical link for the interface is down.
–
Failed—No traffic is received on the interface, yet traffic is heard on the peer interface.
Failover-Multiple Mode, System
This pane includes tabs for configuring the system-level failover settings in the system context of a
adaptive security appliance in multiple context mode. In multiple mode, you can configure
Active/Standby or Active/Active failover. Active/Active failover is automatically enabled when you

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals