In this scenario, you would have some logical separation of traffic. Lets take all LAN traffic. This will flow to Context A's inside interface of this context would need to be set as the default gateway for all of the connected devices. Now, lets say you also have a wireless network as well. You can send all of that traffic to Context B, making its inside interface your default gateway.
Now, you have your multiple contexts built. When setting up your failover, you would create failover groups on your admin context for context A and B. For context A, you would create the primary ASA as active and the standby ASA as standby. For the other context, you would create the standby ASA as active and the primary ASA as standby.
You now are sending active traffic through each firewall and each context can send all traffic to your single ISP as its default gateway.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...