I am about to set up 2 ASA 5520s in an Active/Passive configuration. I have read online that the managment port can be used for the failover interface but also that it operates at 100Mb instead of 1Gb... I figure that the 100Mb should be more then enough to pass the statefull/failover information but I wanted to know for sure... .if anyone has used their managment port for their failover, or has any reason why its not a good idea please reply.
By default the management ports will not pass traffic. I would just use the normal ports unless there is a need not to (as you can still create subinterfaces on the devices). Also, if you are trying to implement statefull failover, and the other interfaces are using more than 100Mbps., you have to have a gig on the statefull to keep up with the connections and info. Hope this helps.
The main problem on our end is that we need 5 physical interfaces for out current setup.... if we want to stay completely redundant on our end. If we were to sub-interface a 1Gb interface.... does that technically create 2 500Mb interfaces... because there are times when I know that the interface that we would need to sub-int would be receiving more then that for each sub-int. Sorry its a bit of a confusing post... I hope you know what I mean by this
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :