Standby failover

hi all,
My production running on oracle 9i.Recently i created physical standby for my production.But i don't add any standby redo log files.They are running well.Now, my question is:during a failover condition,when i will switch to physical standby as primary;how i'm gonna add online reod log file in my new production(the old standby)??
i'm writing down the failover command:
(on standby)
1.Alter database recover managed standby database finish skip standby logfile;
2.alter database commit to switchover to primary.
then shutdown and restart the new primary.
I am getting confuse in which stage i will create redo log file or the command(1) will recreate the redo log file for database.
Plss..help me to get the solution.And provide me the command to create online redo log file in these condition.
Warm regards...

Hi,
Do surf in internet about below parameter you will get the solution
Fal_server=stan
Fal_client=prim
Log_archive_config=’dg_config=(prim,stan)’
Log_archive_dest_1=’location=c:\oracle\fra\prim\archivelog valid_for=(all_logfiles,all_roles) db_unique_name=prim’
Log_archive_Dest_2=’service=stan lgwr async valid_for=(online_logfiles,primary_role) db_unique_name=stan’
Regards,
Shafiulla

Similar Messages

  • ASA 5520 VPN load balancing with Active/Standby failover on 2 devices only...

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0in 5.4pt 0in 5.4pt;
    mso-para-margin-top:0in;
    mso-para-margin-right:0in;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0in;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-fareast-font-family:"Times New Roman";
    mso-fareast-theme-font:minor-fareast;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;}
    This topic has been beat to death, but I did not see a real answer. Here is configuration:
    1) 2 x ASA 5520, running 8.2
    2) Both ASA are in same outside and inside interface broadcast domains – common Ethernet on interfaces
    3) Both ASA are running single context but are active/standby failovers of each other. There are no more ASA’s in the equation. Just these 2. NOTE: this is not a Active/Active failover configuration. This is simply a 1-context active/standby configuration.
    4) I want to share VPN load among two devices and retain active/standby failover functionality. Can I use VPN load balancing feature?
    This sounds trivial, but I cannot find a clear answer (without testing this); and many people are confusing the issue. Here are some examples of confusion. These do not apply to my scenario.
    Active/Active failover is understood to mean only two ASA running multi-contexts. Context 1 is active on ASA1 Context 2 is active on ASA2. They are sharing failover information. Active/Active does not mean two independently configured ASA devices, which do not share failover communication, but do VPN load balancing. It is clear that this latter scenario will work and that both ASA are active, but they are not in the Active/Active configuration definition. Some people are calling VPN load balancing on two unique ASA’s “active/active”, but it is not
    The other confusing thing I have seen is that VPN config guide for VPN load balancing mentions configuring separate IP address pools on the VPN devices, so that clients on ASA1 do not have IP address overlap with clients on ASA2. When you configure ip address pool on active ASA1, this gets replicated to standby ASA2. In other words, you cannot have two unique IP address pools on a ASA Active/Standby cluster. I guess I could draw addresses from external DHCP server, and then do some kind of routing. Perhaps this will work?
    In any case, any experts out there that can answer question? TIA!

    Wow, some good info posted here (both questions and some answers). I'm in a similar situation with a couple of vpn load-balanced pairs... my goal was to get active-standby failover up and running in each pair- then I ran into this thread and saw the first post about the unique IP addr pools (and obviously we can't have unique pools in an active-standby failover rig where the complete config is replicated). So it would seem that these two features are indeed mutually exclusive. Real nice initial post to call this out.
    Now I'm wondering if the ASA could actually handle a single addr pool in an active-standby fo rig- *if* the code supported the exchange of addr pool status between the fo members (so they each would know what addrs have been farmed out from this single pool)? Can I get some feedback from folks on this? If this is viable, then I suppose we could submit a feature request to Cisco... not that this would necessarily be supported anytime soon, but it might be worth a try. And I'm also assuming we might need a vip on the inside int as well (not just on the outside), to properly flip the traffic on both sides if the failover occurs (note we're not currently doing this).
    Finally, if a member fails in a std load-balanced vpn pair (w/o fo disabled), the remaining member must take over traffic hitting the vip addr (full time)... can someone tell me how this works? And when this pair is working normally (with both members up), do the two systems coordinate who owns the vip at any time to load-balance the traffic? Is this basically how their load-balancing scheme works?
    Anyway, pretty cool thread... would really appreciate it if folks could give some feedback on some of the above.
    Thanks much,
    Mike

  • About stateful active/standby failover

    Hello guys.
    I have two ASA's, same model and hardware. Asa have configured stateful active/standby failover by someone, few years ago. It was working normally until recently and no one have changed this configuration. Then Secondary unit is failed. Ping between 2 interfaces is ok. Please help me to resolve this problem.
    on Primary site
    interface Management0/0
    description STATE Failover Interface
    management-only
    interface GigabitEthernet1/1
    description LAN Failover Interface
    failover
    failover lan unit primary
    failover lan interface failover GigabitEthernet1/1
    failover link state Management0/0
    failover interface ip failover 172.16.1.1 255.255.255.0 standby 172.16.1.2
    failover interface ip state 172.16.0.1 255.255.255.0 standby 172.16.0.2
    on Secondary site
    interface Management0/0
    description STATE Failover Interface
    management-only
    interface GigabitEthernet1/1
    description LAN Failover Interface
    output of show failover on PRIMARY
    show run failover
    failover
    failover lan unit primary
    failover lan interface failover GigabitEthernet1/1
    failover link state Management0/0
    failover interface ip failover 172.16.1.1 255.255.255.0 standby 172.16.1.2
    failover interface ip state 172.16.0.1 255.255.255.0 standby 172.16.0.2
    F1# show failover
    Failover On
    Failover unit Primary
    Failover LAN Interface: failover GigabitEthernet1/1 (up)
    Unit Poll frequency 1 seconds, holdtime 15 seconds
    Interface Poll frequency 5 seconds, holdtime 25 seconds
    Interface Policy 1
    Monitored Interfaces 5 of 256 maximum
    Version: Ours 8.2(2), Mate 8.2(2)
    Last Failover at: 08:03:11 ULAST Jan 1 2003
            This host: Primary - Active
                    Active time: 5755203 (sec)
                    slot 0: ASA5550 hw/sw rev (2.0/8.2(2)) status (Up Sys)
                      Interface Backup2 (10.2.5.1): Normal (Waiting)
                      Interface Internet (202.131.225.90): No Link (Waiting)
                      Interface Backup1 (10.3.5.1): Normal (Waiting)
                      Interface Server (192.168.227.1): Normal (Waiting)
                      Interface Bank (10.20.1.1): Normal (Waiting)
                    slot 1: ASA-SSM-4GE-INC hw/sw rev (1.0/1.0(0)10) status (Up)
            Other host: Secondary - Failed
                    Active time: 0 (sec)
                    slot 0: ASA5550 hw/sw rev (2.0/8.2(2)) status (Up Sys)
                      Interface Backup2 (0.0.0.0): No Link (Waiting)
                      Interface Internet (0.0.0.0): No Link (Waiting)
                      Interface Backup1 (0.0.0.0): Normal (Waiting)
                      Interface Server (0.0.0.0): Normal (Waiting)
                      Interface Bank (0.0.0.0): Normal (Waiting)
                    slot 1: ASA-SSM-4GE-INC hw/sw rev (1.0/1.0(0)10) status (Up)
    Stateful Failover Logical Update Statistics
            Link : state Management0/0 (up)
            Stateful Obj    xmit       xerr       rcv        rerr
            General         76184539   0          767513     6
            sys cmd         767328     0          767326     1
            up time         0          0          0          0
            RPC services    0          0          0          0
            TCP conn        25878669   0          11         5
            UDP conn        40545710   0          40         0
            ARP tbl         8987688    0          136        0
            Xlate_Timeout   0          0          0          0
            IPv6 ND tbl     0          0          0          0
            VPN IKE upd     1140       0          0          0
            VPN IPSEC upd   4004       0          0          0
            VPN CTCP upd    0          0          0          0
            VPN SDI upd     0          0          0          0
            VPN DHCP upd    0          0          0          0
            SIP Session     0          0          0          0
            Logical Update Queue Information
                            Cur     Max     Total
            Recv Q:         0       7       6522961
            Xmit Q:         0       34      106685671
    output of show failover on SECONDARY
    F1#  show failover
    Failover On
    Failover unit Secondary
    Failover LAN Interface: failover GigabitEthernet1/1 (up)
    Unit Poll frequency 1 seconds, holdtime 15 seconds
    Interface Poll frequency 5 seconds, holdtime 25 seconds
    Interface Policy 1
    Monitored Interfaces 5 of 256 maximum
    Version: Ours 8.2(2), Mate 8.2(2)
    Last Failover at: 03:36:23 ULAST Dec 15 2013
           This host: Secondary - Failed
                    Active time: 0 (sec)
                    slot 0: ASA5550 hw/sw rev (2.0/8.2(2)) status (Up Sys)
                      Interface Backup2 (0.0.0.0): No Link (Waiting)
                      Interface Internet (0.0.0.0): No Link (Waiting)
                      Interface Backup1 (0.0.0.0): Normal (Waiting)
                      Interface Server (0.0.0.0): Normal (Waiting)
                      Interface Bank (0.0.0.0): Normal (Waiting)
                    slot 1: ASA-SSM-4GE-INC hw/sw rev (1.0/1.0(0)10) status (Up)
            Other host: Primary - Active
                    Active time: 5743217 (sec)
                    slot 0: ASA5550 hw/sw rev (2.0/8.2(2)) status (Up Sys)
                      Interface Backup2 (10.2.5.1): Normal (Waiting)
                      Interface Internet (202.131.225.90): No Link (Waiting)
                      Interface Backup1 (10.3.5.1): Normal (Waiting)
                      Interface Server (192.168.227.1): Normal (Waiting)
                      Interface Bank (10.20.1.1): Normal (Waiting)
                    slot 1: ASA-SSM-4GE-INC hw/sw rev (1.0/1.0(0)10) status (Up)
    Stateful Failover Logical Update Statistics
            Link : state Management0/0 (up)
            Stateful Obj    xmit       xerr       rcv        rerr
            General         765518     0          35843181   874
            sys cmd         765518     0          765516     0
            up time         0          0          0          0
            RPC services    0          0          0          0
            TCP conn        0          0          12671303   80
            UDP conn        0          0          13432853   133
            ARP tbl         0          0          8968384    661
            Xlate_Timeout   0          0          0          0
            IPv6 ND tbl     0          0          0          0
            VPN IKE upd     0          0          1137       0
            VPN IPSEC upd   0          0          3988       0
            VPN CTCP upd    0          0          0          0
            VPN SDI upd     0          0          0          0
            VPN DHCP upd    0          0          0          0
            SIP Session     0          0          0          0
            Logical Update Queue Information
                            Cur     Max     Total
            Recv Q:         0       9       72011189
            Xmit Q:         0       1       765518

    - ping is ok between 172.16.1.1 and 172.16.1.2, 172.16.0.1 and 172.16.0.2
    - ASA that shows as failed the ASA that didn't use to be the primary , it used to be secondary.
    - Yes, i logged via console on both ASAs and checked status of the ASAs. Primary is active and Secondary is failed.
    - I have changed cable. Primary ASA indicates below as soon as cable changed.
    Beginning configuration replication: Sending to mate.
    End Configuration Replication to mate
    Then output of SHOW FAILOVER on PRIMARY ASA :
    F1# show failover
    Failover On
    Failover unit Primary
    Failover LAN Interface: failover GigabitEthernet1/1 (up)
    Unit Poll frequency 1 seconds, holdtime 15 seconds
    Interface Poll frequency 5 seconds, holdtime 25 seconds
    Interface Policy 1
    Monitored Interfaces 5 of 256 maximum
    Version: Ours 8.2(2), Mate 8.2(2)
    Last Failover at: 08:03:11 ULAST Jan 1 2003
            This host: Primary - Active
                    Active time: 5812656 (sec)
                    slot 0: ASA5550 hw/sw rev (2.0/8.2(2)) status (Up Sys)
                      Interface Backup2 (10.2.5.1): Normal (Waiting)
                      Interface Internet (202.131.225.90): No Link (Waiting)
                      Interface Backup1 (10.3.5.1): Normal (Waiting)
                      Interface Server (192.168.227.1): Normal (Waiting)
                      Interface Bank (10.20.1.1): Normal (Waiting)
                    slot 1: ASA-SSM-4GE-INC hw/sw rev (1.0/1.0(0)10) status (Up)
           Other host: Secondary - Standby Ready
                    Active time: 9 (sec)
                    slot 0: ASA5550 hw/sw rev (2.0/8.2(2)) status (Up Sys)
                      Interface Backup2 (0.0.0.0): No Link (Waiting)
                      Interface Internet (0.0.0.0): No Link (Waiting)
                      Interface Backup1 (0.0.0.0): Normal (Waiting)
                      Interface Server (0.0.0.0): Normal (Waiting)
                      Interface Bank (0.0.0.0): Normal (Waiting)
                    slot 1: ASA-SSM-4GE-INC hw/sw rev (1.0/1.0(0)10) status (Up)
    Stateful Failover Logical Update Statistics
            Link : state Management0/0 (up)
            Stateful Obj    xmit       xerr       rcv        rerr
            General         76940782   0          775168     6
            sys cmd         774983     0          774981     1
            up time         0          0          0          0
            RPC services    0          0          0          0
            TCP conn        26125140   0          11         5
            UDP conn        40971274   0          40         0
            ARP tbl         9064174    0          136        0
            Xlate_Timeout   0          0          0          0
            IPv6 ND tbl     0          0          0          0
            VPN IKE upd     1155       0          0          0
            VPN IPSEC upd   4056       0          0          0
            VPN CTCP upd    0          0          0          0
            VPN SDI upd     0          0          0          0
            VPN DHCP upd    0          0          0          0
            SIP Session     0          0          0          0
            Logical Update Queue Information
                            Cur     Max     Total
            Recv Q:         0       7       6588043
            Xmit Q:         0       34      107757911
    But few seconds later Secondary ASA become FAILED.
    And i also did FAILOVER RESET  command. After this command, secondary ASA became Standby Ready then few seconds later it became Failed again. Why does it become Failed again ?

  • Cisco ASA Active standby failover problem

    We have configured ASA Active standby failover with ASA5505 . When primary unit power off, secondary unit became active. when primary unit power on, then primary unit is becoming active again. i think for active standby setup there is no preemption. The real issue is when primary ASA became active after power on all the external connectivity getting down. Please see the below config,
    ASA01# show run
    ASA01# show running-config 
    : Saved
    ASA Version 8.2(5) 
    hostname ASA01
    enable password PVSASRJovmamnVkD encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    name 192.168.1.1 MPLS_Router description MPLS_Router 
    name 192.168.2.1 SCADA_Router description SCADA_Router
    interface Ethernet0/0
     switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
     switchport access vlan 2
    interface Ethernet0/3
    interface Ethernet0/4
     switchport access vlan 3
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    interface Vlan1
     nameif inside
     security-level 100
     ip address 192.168.3.8 255.255.255.0 standby 192.168.3.9 
    interface Vlan2
     nameif outside
     security-level 0
     ip address 192.168.1.8 255.255.255.0 standby 192.168.1.9 
    interface Vlan3
     description LAN Failover Interface
    ftp mode passive
    clock timezone AST 3
    access-list inside_access_in extended permit icmp any any 
    access-list inside_access_in extended permit ip any any 
    access-list inside_access_in extended permit ip any host MPLS_Router 
    access-list outside_access_in extended permit icmp any any 
    access-list outside_access_in extended permit ip any any 
    access-list outside_access_in extended permit ip any 192.168.2.0 255.255.255.0 
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    failover
    failover lan unit primary
    failover lan interface FAILOVER Vlan3
    failover key *****
    failover interface ip FAILOVER 10.1.1.1 255.255.255.0 standby 10.1.1.2
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 1 0.0.0.0 0.0.0.0
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route-map Route_Out permit 1
     match ip address inside_access_in outside_access_in
     match interface inside
    route outside 0.0.0.0 0.0.0.0 MPLS_Router 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    http 192.168.2.0 255.255.255.0 inside
    http authentication-certificate inside
    http authentication-certificate outside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    telnet 192.168.2.0 255.255.255.0 inside
    telnet 192.168.1.0 255.255.255.0 outside
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    dhcpd auto_config outside
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    username admin password eY/fQXw7Ure8Qrz7 encrypted
    prompt hostname context 
    no call-home reporting anonymous
    call-home
     profile CiscoTAC-1
      no active
      destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
      destination address email [email protected]
      destination transport-method http
      subscribe-to-alert-group diagnostic
      subscribe-to-alert-group environment
      subscribe-to-alert-group inventory periodic monthly
      subscribe-to-alert-group configuration periodic monthly
      subscribe-to-alert-group telemetry periodic daily
    Cryptochecksum:1a8e46a787aa78502ffd881ab62d1c31
    : end

    I suggest removing the failover configuration on both units and then re-add them, and then test.
    Primary
    failover lan interface FAILOVER Vlan3
    failover interface ip FAILOVER 10.1.1.1 255.255.255.0 standby 10.1.1.2
    failover lan unit primary
    failover key KEY
    failover
    Secondary
    failover lan interface FAILOVER Vlan3
    failover interface ip FAILOVER 10.1.1.1 255.255.255.0 standby 10.1.1.2
    failover lan unit secondary
    failover key KEY
    failover
    Please remember to select a correct answer and rate helpful posts

  • Active/Standby Failover with pair of 5510s and redundant L2 links

    Hi
    I just got two ASA5510-SEC-BUN-K9 and I'm wondering is it possible to implement an Active/Standby Failover configuration (Routed mode) with two ASA5510 and redundant pair of switches from both inside and outside interfaces? In other words, I would like to have two L2 links from each ASA (in pair od ASAa) to each L2 switch (in pair of redundant L2 Switches). The configuration I would like to achive is just like one in Cisco Security Appliance Command Line Configuration Guide, page B-23, figure B-8, with only difference that I wouldn't go with multiple security contexts (I want Active/Standby failover).
    Thanks in advance
    Zoran Milenkovic

    Hello Zoran,
    Absolutely. You can have 2 ASAs configured in Active/Standby mode. For reference, here is a link which has a network connectivity diagram based on PIX, however, connectivity would still be same with ASAs-
    http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/failover.html#wp1053462
    The difference is that on ASA, you can only have LAN-Based failover, hence you'll need to use one additional interface on both ASAs for failover-link. You can connect these two failover-link interfaces directly using a cross cable.
    Apart from this, please refer to following link on how to go with configuration of Lan-based Active/Standby failover-
    http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/failover.html#wp1064158
    Also make sure that both ASAs have required hardware/software/license based on following link-
    http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/failover.html#wp1047269
    Hope this helps.
    Regards,
    Vibhor.

  • Active/Standby failover automatic primary active

    I have 2 ASAs 5510 with same physical configuration and running ok with active/standby failover mode. Like we have PREEMPT command in active/active failover to get back primary active after its been rebooted from failed mode. This command makes primary back to active and makes secondary firewall standby automatically.
    Need help to know any such command for active/standby failover for automatic primary active. Currently we have to use command FAILOVER ACTIVE on primary to make it active manually.

    Remember, failover in ASA works differently than HSRP. ASA does NOT use
    HSRP. Furthermore, there is NO HSRP ip address in ASA either. You are
    talking about two different technologies.
    Think of it this way. HSRP technology works very similar to VRRP and
    Juniper NSRP. All of these technologies use virtual IP address. If you
    have two devices, you will have an Virtual IP address, in addition
    to the physical ip addresses of the two devices. ASA does not use the
    extra VIP.

  • ASA 5520 Anyconnect License on Active/Standby Failover pair

    Hi
    Our customer has purchased 2 x L-ASA-AC-E-5520= Anyconnect Essentials VPN Licenses (750 Users)
    Ive installed both activated licenses as per the cisco guides, I didnt get any errors on the install. I did a reload on both, they are both back up and running as active/standby but when I do a sh ver the license still shows "ASA 5520 VPN Plus License"
    Am I being dumb and has this worked successfully or should it not now display Anyconnect when I do a sh ver
    Any help would be much appreciated on this one please
    Regards
    Graham

    Thanks Marvin
    Below is the show ver, but I was kind of expecting there to be a mention of Anyconnect if I had activated the license
    We previously had the VPN Plus License, and it still shows VPN Plus
    Licensed features for this platform:
    Maximum Physical Interfaces : Unlimited
    Maximum VLANs               : 150      
    Inside Hosts                 : Unlimited
    Failover                     : Active/Active
    VPN-DES                     : Enabled  
    VPN-3DES-AES                 : Enabled  
    Security Contexts           : 2        
    GTP/GPRS                     : Disabled
    VPN Peers                   : 750      
    WebVPN Peers                 : 2        
    AnyConnect for Mobile       : Disabled
    AnyConnect for Linksys phone : Disabled
    Advanced Endpoint Assessment : Disabled
    UC Proxy Sessions           : 2        
    This platform has an ASA 5520 VPN Plus license.

  • Best practice for ASA Active/Standby failover

    Hi,
    I have configured a pair of Cisco ASA in Active/ Standby mode (see attached). What can be done to allow traffic to go from R1 to R2 via ASA2 when ASA1 inside or outside interface is down?
    Currently this happens only when ASA1 is down (shutdown). Is there any recommended best practice for such network redundancy?  Thanks in advanced!

    Hi Vibhor,
    I test ping from R1 to R2 and ping drop when I shutdown either inside (g1) or outside (g0) interface of the Active ASA. Below is the ASA 'show' failover' and 'show run',
    ASSA1# conf t
    ASSA1(config)# int g1
    ASSA1(config-if)# shut
    ASSA1(config-if)# show failover
    Failover On
    Failover unit Primary
    Failover LAN Interface: FAILOVER GigabitEthernet2 (up)
    Unit Poll frequency 1 seconds, holdtime 15 seconds
    Interface Poll frequency 5 seconds, holdtime 25 seconds
    Interface Policy 1
    Monitored Interfaces 3 of 60 maximum
    Version: Ours 8.4(2), Mate 8.4(2)
    Last Failover at: 14:20:00 SGT Nov 18 2014
            This host: Primary - Active
                    Active time: 7862 (sec)
                      Interface outside (100.100.100.1): Normal (Monitored)
                      Interface inside (192.168.1.1): Link Down (Monitored)
                      Interface mgmt (10.101.50.100): Normal (Waiting)
            Other host: Secondary - Standby Ready
                    Active time: 0 (sec)
                      Interface outside (100.100.100.2): Normal (Monitored)
                      Interface inside (192.168.1.2): Link Down (Monitored)
                      Interface mgmt (0.0.0.0): Normal (Waiting)
    Stateful Failover Logical Update Statistics
            Link : FAILOVER GigabitEthernet2 (up)
            Stateful Obj    xmit       xerr       rcv        rerr
            General         1053       0          1045       0
            sys cmd         1045       0          1045       0
            up time         0          0          0          0
            RPC services    0          0          0          0
            TCP conn        0          0          0          0
            UDP conn        0          0          0          0
            ARP tbl         2          0          0          0
            Xlate_Timeout   0          0          0          0
            IPv6 ND tbl     0          0          0          0
            VPN IKEv1 SA    0          0          0          0
            VPN IKEv1 P2    0          0          0          0
            VPN IKEv2 SA    0          0          0          0
            VPN IKEv2 P2    0          0          0          0
            VPN CTCP upd    0          0          0          0
            VPN SDI upd     0          0          0          0
            VPN DHCP upd    0          0          0          0
            SIP Session     0          0          0          0
            Route Session   5          0          0          0
            User-Identity   1          0          0          0
            Logical Update Queue Information
                            Cur     Max     Total
            Recv Q:         0       9       1045
            Xmit Q:         0       30      10226
    ASSA1(config-if)#
    ASSA1# sh run
    : Saved
    ASA Version 8.4(2)
    hostname ASSA1
    enable password 2KFQnbNIdI.2KYOU encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    interface GigabitEthernet0
     nameif outside
     security-level 0
     ip address 100.100.100.1 255.255.255.0 standby 100.100.100.2
     ospf message-digest-key 20 md5 *****
     ospf authentication message-digest
    interface GigabitEthernet1
     nameif inside
     security-level 100
     ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2
     ospf message-digest-key 20 md5 *****
     ospf authentication message-digest
    interface GigabitEthernet2
     description LAN/STATE Failover Interface
    interface GigabitEthernet3
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet4
     nameif mgmt
     security-level 0
     ip address 10.101.50.100 255.255.255.0
    interface GigabitEthernet5
     shutdown
     no nameif
     no security-level
     no ip address
    ftp mode passive
    clock timezone SGT 8
    access-list OUTSIDE_ACCESS_IN extended permit icmp any any
    pager lines 24
    logging timestamp
    logging console debugging
    logging monitor debugging
    mtu outside 1500
    mtu inside 1500
    mtu mgmt 1500
    failover
    failover lan unit primary
    failover lan interface FAILOVER GigabitEthernet2
    failover link FAILOVER GigabitEthernet2
    failover interface ip FAILOVER 192.168.99.1 255.255.255.0 standby 192.168.99.2
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-715-100.bin
    no asdm history enable
    arp timeout 14400
    access-group OUTSIDE_ACCESS_IN in interface outside
    router ospf 10
     network 100.100.100.0 255.255.255.0 area 1
     network 192.168.1.0 255.255.255.0 area 0
     area 0 authentication message-digest
     area 1 authentication message-digest
     log-adj-changes
     default-information originate always
    route outside 0.0.0.0 0.0.0.0 100.100.100.254 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    user-identity default-domain LOCAL
    aaa authentication ssh console LOCAL
    http server enable
    http 10.101.50.0 255.255.255.0 mgmt
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    telnet timeout 5
    ssh 10.101.50.0 255.255.255.0 mgmt
    ssh timeout 5
    console timeout 0
    tls-proxy maximum-session 10000
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    username cisco password 3USUcOPFUiMCO4Jk encrypted
    prompt hostname context
    no call-home reporting anonymous
    call-home
     profile CiscoTAC-1
      no active
      destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
      destination address email [email protected]
      destination transport-method http
      subscribe-to-alert-group diagnostic
      subscribe-to-alert-group environment
      subscribe-to-alert-group inventory periodic monthly
      subscribe-to-alert-group configuration periodic monthly
      subscribe-to-alert-group telemetry periodic daily
    crashinfo save disable
    Cryptochecksum:fafd8a885033aeac12a2f682260f57e9
    : end
    ASSA1#

  • Data Guard Physical Standby Failover

    I need clarification on Physical Standby Failovers. Say I have a Primary db (A) and a physical standby (B), (A) fails and (B) is now the primary, can (A) be setup to become a standby of (B)? I've read 2 different statements in Oracle 10g Data Guard Concepts and Admin
    "During failovers involving a physical standby database: In all cases, after a failover, the original primary database can no longer participate in the Data Guard configuration."
    vice
    "After a fast-start failover occurs, the old primary database will automatically reconfigure itself as a new standby database upon reconnection to the configuration."
    Much thanks.

    In all cases, after a failover, the original primary database can no longer participate in the Data Guard configuration.
    TRUE ! But this doesn't mean that you cannot make your failed primary a new standby database !.
    You can achieve this using FLASHBACK DATABASE option:
    From the documentation:
    After a failover occurs, the original primary database can no longer participate in the Data Guard configuration until it is repaired and established as a standby database in the new configuration. To do this, you can use the Flashback Database feature to recover the failed primary database to a point in time before the failover occurred, and then convert it into a physical or logical standby database in the new configuration.
    Read the following documents:
    http://download.oracle.com/docs/cd/B19306_01/server.102/b14239/role_management.htm#sthref995
    http://download.oracle.com/docs/cd/B19306_01/server.102/b14239/scenarios.htm#i1049997
    In addition to this I'd like to mention that you can achieve the same with doing an incomplete recovery instead of using FLASHBACK DATABASE.
    "After a fast-start failover occurs, the old primary database will automatically reconfigure itself as a new standby database upon reconnection to the configuration."
    TRUE. If you enable Fast-Start Failover:
    http://download.oracle.com/docs/cd/B19306_01/server.102/b14230/sofo.htm#CHDDFFEC
    Cheers!

  • Active/Standby Failover Config change

    Hi everyone,
    This weekend we are doing some change on ASA in Active/Standby mode.
    We will power off standby ASA.
    Do some changes on Active ASA  save the changes  and reboot it.
    Power up the Active ASA and will test  the connectivity if it is working  or not .
    In case Active ASA is not working as expected after the change i will power it off.
    Power up Standby ASA  then it will become active as expected.
    Now if i Power up other ASA where changes were made will  it synchnorize to old config from Standby  ASA or  not?
    Last week we did some changes on Active ASA and it did not work as expected so we have to undo our change.
    Need to make sure our backup plan is working?
    Regards
    Mahesh

    In your fall back scenario you would have to tell what was the secondary ASA that it is now the primary
    change
    failover lan unit secondary
    to
    failover lan unit primary
    and vice-versa on the now primary ASA.
    change
    failover lan unit primary
    to
    failover lan unit secondary
    Hope it helps      

  • Dhcp standby failover

    I was reviewing this article
    http://technet.microsoft.com/en-us/library/dn338973.aspx and see that if DHCP1 becomes unavailable DHCP2 would become active.
    How long should this take and what exactly to these settings mean :-)
    Thanks!

    Hi,
    The following link provides a summary of settings used with DHCP failover. And additional details about each setting are also provided:
    http://technet.microsoft.com/en-us/library/dn338985.aspx
    Time required for this process depends on several factors, such as MCTL, lease time, multi-request caused by network delay, etc. If you want to know the detail of this process, I suggest you to use
    Network Monitor(down load link:
    http://www.microsoft.com/en-us/download/details.aspx?id=4865) on both DHCP servers and client to capture packets.  
    Best Regards,
    Eve Wang
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • FWSM 4.0: switch from active/standby to active/active failover mode

    Hello,
    I have a pair of FWSM's running version 4.0 currently in active/standby failover mode, and I'd like to switch them to be active/active.  Is there a documented procedure for doing this?  What are the implications for any contexts switched to be primary on the FWSM that is currently acting as a standby (i.e., what kind of outage time can we expect)?
    Thanks in advance,
    Mike

    Hi Bro
    Thanks for the update, but still you'll need to create 2 contexts, each context will be ACTIVE on different Cisco ASA FW units. Hence, there will be some cut, copy and paste effort, not forgetting recabling, if that's needed. Here's a Cisco document to configure ACTIVE/ACTIVE for those who can't seem to find this document http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080834058.shtml#req
    Conclusion: There will be some network downtime. I'm guessing 15min, if it was me :-)
    P/S: If you think this comment is helpful, please do rate it nicely :-)

  • Radius auth to standby ASA in Active Active Failover

    Hi Everyone,
    When ASA is in Active/standby failover i can ssh to standby ASA using Radius.
    But when ASA is in multi context mode  Active/Active failover i can not do Radius Auth to standby ASA?
    Is this default behaviour?
    Regards
    MAhesh

    I would not have thought this is the default behavior...but then again, I have never tested this.  If you console into the standby context issue the command show run | in aaa.  Which authentication database is indicated?
    Please remember to select a correct answer and rate helpful posts

  • Help needed in ASA 5540 Cluster/Failover setup

    Hello expert,
                        Currently we have two asa in our Datacenter setup as a Active/Standby failover setup and tested ie failover is working,(if one FW goes down), but what if a the uplink switches/links or backend switches go down, how does the active fw knows to failover ?
    Current setup
              |                                        |
        ___|___                              __|___
    ---| SW 1 |------------------------ | Sw2   |     
              |                                        |
        ___|___                              __|___
    ---| FW 1 |------------------------ | FW-2 |     
              |                                        |
        ___|___                              __|___
    ---| SW 1 |------------------------ | Sw2   |     
    In the above figure, FW1 is active and I have powerd off the uplink  SW1, but the FW2 did not take over, and the same for backend switches, So how do I configure my FW's so that any of the uplink or back end switches go down, the Active should give its role to standby to forward the traffice from a different switch ie sw2 in case sw1 goes down.
    Or Is there any mechanisim where I can monitor the interfaces ie uplinks or back end links etc ?
    Your help is appreciated.
    Regards

    It seems that you have LAN link directly connected between the boxes, so the unit will determine that Primary/Active has interfaces that are inactive and failover. You should read:
    http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml
    This link gives you the failover triggers and failover actions.

  • Need to "move" failover to different interface/port

    Sorry if this is the wrong area, we have so seldom had questions that were not otherwise handled I don't frequent this area.
    How difficult is it to change the interface used for active/standby failover? It's a working, already configured pair with standby, but I need to move the crossover cable and tell them to use a different interface. 
    ASA 5510 pair, already set up and working with failover that was originally configured on Ethernet port 0/3 by the senior network admin. It appears that from his use of interfaces or ports he used things straight out of examples on the web, including the interfaces used. 
    The senior network admin retired last spring and left me "in charge", gee, thanks.
    I need to make some changes and need an Ethernet port for a new important project.
    The Management 0/0 interface is unused and shutdown. We manage via inside interface from a specific subnet inside so don't need the dedicated management interface.
    I want to move failover FROM Ethernet 0/3  TO Management 0/0
    *This is the current setup:
    Result of the command: "sh run failover"
    failover
    failover lan unit primary
    failover lan interface failover Ethernet0/3
    failover link failover Ethernet0/3
    failover interface ip failover 169.254.255.1 255.255.255.252 standby 169.254.255.2
    *And this is the current interface configuration for 0/3 and Management:
    interface Ethernet0/3
     description LAN/STATE Failover Interface
    interface Management0/0
     speed 100
     duplex full
     shutdown
     nameif management
     security-level 0
     no ip address
     ospf cost 10
    I know it can run on the Management 0/0 interface because I see a lot of "how to configure" as if the ASA is brand new and several examples out there indeed show it being setup on Management.
    I'm looking for how to take an ASA pair that is currently configured and has a working functional failover configuration and simply "move failover" to a different hole or change the interfaces used for the "heartbeat" as it were.
    I assume it's not hard - but I also assume there's a specific sequence of events that must take place to prevent the pair from going into failover and switching lead roles........... 
    For example - would I shut off or turn off failover, and if so how, and on which ASA (frankly, I'm not sure how to access the secondary or standby if this must be done from or on the standby unit as I've never done that "deep" a config before)
    CLI is fine - I'd be just as comfortable in either ASDM or cli. 
    I sure hope this makes sense - I'm more of a troubleshooter and fixer than a designer or network engineer....
    And many many thanks - getting this moved will free up the interface I need and can really make a big dent in my project list while the supervisor is on vacation this week! I'd love to have this done and working before his return. 
    Oh, in case it does matter as I've been told, this is the Currently running license and versions shown here:
    Cisco Adaptive Security Appliance Software Version 8.4(4)1 
    Device Manager Version 6.4(7)
    Compiled on Thu 14-Jun-12 11:20 by builders
    System image file is "disk0:/asa844-1-k8.bin"
    Config file at boot was "startup-config"
    VRDSMFW1 up 141 days 4 hours
    failover cluster up 141 days 4 hours
    Hardware:   ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz
    Internal ATA Compact Flash, 256MB
    BIOS Flash M50FW080 @ 0xfff00000, 1024KB
    Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)
                                 Boot microcode   : CN1000-MC-BOOT-2.00 
                                 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03
                                 IPSec microcode  : CNlite-MC-IPSECm-MAIN-2.06
                                 Number of accelerators: 1
     0: Ext: Ethernet0/0         : address is 0024.972b.e020, irq 9
     1: Ext: Ethernet0/1         : address is 0024.972b.e021, irq 9
     2: Ext: Ethernet0/2         : address is 0024.972b.e022, irq 9
     3: Ext: Ethernet0/3         : address is 0024.972b.e023, irq 9
     4: Ext: Management0/0       : address is 0024.972b.e01f, irq 11
     5: Int: Not used            : irq 11
     6: Int: Not used            : irq 5
    Licensed features for this platform:
    Maximum Physical Interfaces       : Unlimited      perpetual
    Maximum VLANs                     : 100            perpetual
    Inside Hosts                      : Unlimited      perpetual
    Failover                          : Active/Active  perpetual
    VPN-DES                           : Enabled        perpetual
    VPN-3DES-AES                      : Enabled        perpetual
    Security Contexts                 : 2              perpetual
    GTP/GPRS                          : Disabled       perpetual
    AnyConnect Premium Peers          : 2              perpetual
    AnyConnect Essentials             : 250            perpetual
    Other VPN Peers                   : 250            perpetual
    Total VPN Peers                   : 250            perpetual
    Shared License                    : Disabled       perpetual
    AnyConnect for Mobile             : Disabled       perpetual
    AnyConnect for Cisco VPN Phone    : Disabled       perpetual
    Advanced Endpoint Assessment      : Disabled       perpetual
    UC Phone Proxy Sessions           : 2              perpetual
    Total UC Proxy Sessions           : 2              perpetual
    Botnet Traffic Filter             : Disabled       perpetual
    Intercompany Media Engine         : Disabled       perpetual
    This platform has an ASA 5510 Security Plus license.
    Failover cluster licensed features for this platform:
    Maximum Physical Interfaces       : Unlimited      perpetual
    Maximum VLANs                     : 100            perpetual
    Inside Hosts                      : Unlimited      perpetual
    Failover                          : Active/Active  perpetual
    VPN-DES                           : Enabled        perpetual
    VPN-3DES-AES                      : Enabled        perpetual
    Security Contexts                 : 4              perpetual
    GTP/GPRS                          : Disabled       perpetual
    AnyConnect Premium Peers          : 4              perpetual
    AnyConnect Essentials             : 250            perpetual
    Other VPN Peers                   : 250            perpetual
    Total VPN Peers                   : 250            perpetual
    Shared License                    : Disabled       perpetual
    AnyConnect for Mobile             : Disabled       perpetual
    AnyConnect for Cisco VPN Phone    : Disabled       perpetual
    Advanced Endpoint Assessment      : Disabled       perpetual
    UC Phone Proxy Sessions           : 4              perpetual
    Total UC Proxy Sessions           : 4              perpetual
    Botnet Traffic Filter             : Disabled       perpetual
    Intercompany Media Engine         : Disabled       perpetual
    This platform has an ASA 5510 Security Plus license.
    Serial Number: ABC12345678
    Running Permanent Activation Key: eieioandapartridgeinapeartree 
    Configuration register is 0x1
    Configuration last modified by me at 15:03:07.132 CDT Mon Sep 15 2014

    If there was a "smack-self-on-forehead" icon here I'd use it now.
    Of course, totally logical - if you disconnect a monitored connection on the standby it's not about to take over as primary because it's had a failure and can't do the job, forcing the primary or active to remain that way. There's the key that would allow all other changes.
    Since the settings or config lines are in place already, then if I'm correct it's a matter of then just modifying what's there, and of course removing the name of the Management interface (no nameif) and making sure it's not shut down (no shutdown), etc.
    You are a handy person to have around. Thanks.
    By the way, *thanks to prior answers received here* and reading responses to others who had questions I can say I've set a record for this agency and done what no one else had been able to do - I've taken a troublesome LAN-to-LAN connection and made it trouble-free with a solid connection that is just 7.5 hours away from being up 90 days with no interruption, no collapse of any SA and improved performance.  I have 2 others out of our 34 that aren't too far behind that. The boss has recognized this after seeing his monthly up-time reports.
    Once I get this done failover change made I will be setting up a "DMZ" of sorts and trying out my hand at telling the 5510s to forward specific traffic aimed at a specific public IP address to a specific server. (But that's another topic............)

Maybe you are looking for

  • ซื้อ line sticker ผ่านบัตร แต่ไม่ได้รับสินค้า

    ฉันซื้อ ไลน์ สติกเกอร์ ทางบัตรเคดิตการ์ดของ citibank ทาง itune ได้แจ้งรายละเอียดสินค้้ามาทางเมลล์ ตามรายละเอียดด้านล่าง แต่ขณะนี้ ยังไม่ได้รับสินค้า ใน อีเมลล์ มีดังนี้ Billed To: [email protected] surirat artnarongkorn 119/16 m.4 T.bamleam A.banleam

  • Upgrade to ECC6 & Unicode: IE Web Browser Issues?

    Has anyone experienced web browser issues at display time? We are on IE7. We are now using the internal ITS. Our carriage returns are totally being ignored by the browser. Thus, we have a dropdown box to pick one of the businesses multiple partners,

  • Printing Extremely Slow Using Crystal Reports 2008 ActiveX Print Control

    Problem: We are trying to upgrade our existing Crystal Reports 10.0 ActiveX Viewer ASP based reports to the new Crystal Reports 2008 ASPX Report Viewer but are having print performance issues that have prohibited us from moving forward. Environment:

  • Error message when creating new video

    Cannnot create a new video i get a error message i have imovie 10.3 says : Operation cannot be completed , No other information is available about the problem.

  • Show Model, OS and Other Details Info in Reply window for Originator

    When posting a reply in a thread it would be helpful if the Model, OS and Other Details information for the person we are replying to be shown in that window. Right now we have to toggle back to the thread window to check on their information. Thanks