I have been struggling with this, I have two ASA's that are running 8.6 that show the monitored interfaces as good.
I am running 9.2 on these and the interfaces say waiting. Also can I disable the IPS being monitored? I only ask cause back when the IPS was a module in the ASA, if I had to reboot it, the units would failover. I am not sure if its the same now with the IPS being software based inside the ASA running on a separate HD.
ASA5515-01# show failover
Failover On
Failover unit Primary
Failover LAN Interface: FAILOVER GigabitEthernet0/5 (up)
Unit Poll frequency 1 seconds, holdtime 15 seconds
Interface Poll frequency 5 seconds, holdtime 25 seconds
Interface Policy 1
Monitored Interfaces 3 of 114 maximum
MAC Address Move Notification Interval not set
Version: Ours 9.2(2)4, Mate 9.2(2)4
Last Failover at: 03:55:44 CDT Oct 21 2014
This host: Primary - Active
Active time: 507514 (sec)
slot 0: ASA5515 hw/sw rev (1.0/9.2(2)4) status (Up Sys)
Interface outside (4.35.7.90): Normal (Waiting)
Interface inside (172.20.16.30): Normal (Waiting)
Interface Mgmt (172.20.17.10): Normal (Waiting)
slot 1: IPS5515 hw/sw rev (N/A/7.1(4)E4) status (Up/Up)
IPS, 7.1(4)E4, Up
Other host: Secondary - Standby Ready
Active time: 0 (sec)
slot 0: ASA5515 hw/sw rev (1.0/9.2(2)4) status (Up Sys)
Interface outside (0.0.0.0): Normal (Waiting)
Interface inside (0.0.0.0): Normal (Waiting)
Interface Mgmt (0.0.0.0): Normal (Waiting)
slot 1: IPS5515 hw/sw rev (N/A/7.1(4)E4) status (Up/Up)
IPS, 7.1(4)E4, Up
Stateful Failover Logical Update Statistics
Link : Unconfigured.
ASA5515-01# show run | inc failover
failover
failover lan unit primary
failover lan interface FAILOVER GigabitEthernet0/5
failover interface ip FAILOVER 10.10.1.1 255.255.255.252 standby 10.10.1.2
ASA5515-01# ping 10.10.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms
ASA5515-01#
------------
I was also reading not to use a design where a cable is directly attached to each unit, and instead each interface should connect to a downstream switch port so that the link status is always up to one firewall interface if the other firewall interface fails. Otherwise both units sense a link-down condition and assume their own interface is down. Never really thought of that in this sense. Anyone use a direct attached cable and have issues?