I recently set up an Active/Standby failover configuration with 2 sub-interfaces configured on my g0/0 interface (g0/0.1 and g0/0.2) for some reason I cant ping either of these from my testing server (when the server is on the correct network and subnet to test the interface)? I am not sure whats going on... I included a print out of my current interface and failover configuration. The testing server is connected to a Dell 2724 switch and so is the interfaces in question.
no ip address
ip address 66.38.x.x 255.255.x.x standby 66.38.x.x
ip address 64.187.x.x 255.255.x.x standby 64.187.x.x
ip address 10.10.x.x 255.255.x.x standby 10.10.x.x
ip address 192.168.x.x 255.255.x.x standby 192.168.x.x
description LAN/STATE Failover Interface
description STATE Failover Interface
ip address 192.168.x.x 255.255.x.x
clock timezone EST -5
clock summer-time EDT recurring
pager lines 24
logging monitor debugging
logging asdm informational
mtu Outside1 1500
mtu Outside2 1500
mtu DMZ 1500
mtu Private 1500
failover lan unit primary
failover lan interface FoInt GigabitEthernet0/3
failover replication http
failover link FoInt GigabitEthernet0/3
failover interface ip FoInt 192.168.x.x 255.255.x.x standby 192.168.x.x
Your sub-interface config is fine, except you probably need to assign different security level between them unless if you already planned for it.
Normally, it's on the switch-side that need to be configured accordingly. The trunk link between firewall and switch uses DOT1Q encapsulation (IEEE). I am not sure whether Dell support it. Make sure the trunk allows whatever Vlan you assigned to Firewall sub-interfaces.
To be able to ping the interface, make sure you allow firewall to allow/permit icmp to hit the interface using 'icmp' command, e.g "icmp permit any Outside2"
BTW, what's the gateway for your server? Is it ASA sub-interface (according to vlan) or VLAN IP on the switch?
Other than that, you need to apply normal firewall ACL, static NAT and so on.