Compare cert salaries and plan your next career move
dtlokee wrote: » If it is BGP peered with 2 ISP's then that would lead me to beleive that the network is using a provider independant address space and has their own ASN. The BGP routing table shouuld decide what ISP to use, not the ASA so I wouldn't use that document on using multiple ISPs.
dtlokee wrote: » once the failover link is established and one unit is active and one unit is standby you will configure the DM on the active unit the same as the inside or outside interface int gi0/0 nameif outside security-level 0 ip address 10.1.1.1 255.255.255.0 standby 10.1.1.2 int gi0/1 nameif inside security-level 100 ip address 172.16.1.1 255.255.255.0 standby 172.16.1.2 int gi0/2 nameif DMZ security-level 50 ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2 That is all there is to it. The active unit will respond to ARP requests and forward packets, the standby unit won't.
cisco_trooper wrote: » According to Cisco and some other forums I've come across it looks like Active/Active and IPSec VPN don't play nice together. Does this mean simply that IPSec VPN will not failover, or that you can't implement it? This is going to be a major point against Active/Active configuration. I have remote users all over the place. In the grand scheme of things remote user sessions will be the last of my worries if a firewall fails, but I do have a problem with not being able to continue using IPSec for my remote access VPNs.....
mikearama wrote: » That means you can't implement it. If you try to enable IPSec VPN, you'll get an error indicating that the ASA's are in Active/Active. The entire option of IPSec VPN's disappears in Active/Active. So yeah, that's a huge reason to stick with Active/Standby. Active/Standy also goes nicely with your dual-homed DMZ setup anyway.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.