Cisco Support Community

ASA Active/Standby Failover handling of Digital Certificates





The document briefly describes  in an FAQ format the Failover requirements for the ASA 55xx VPN/Firewall appliance  in handling digital certificates .


Q. What are the general Failover  capabilities and requirements of the ASA 55xx aplicance?




A. The general Failover requirements are found  in the High Availability (HA) chapter of the Configuration Guide  .





Q. Are digital certificates replicated in a  Active/Standby configuration?


A. Yes. Third-party digital certificates (ie. from Entrust, Verisign, Microdoft,etc)  that are installed on the Active ASA are replicated to the Standby ASA in an active/standby config. However, the ASA's Local/onboard CA-generated certificates (used for SSL VPN remote access) are not replicated to the standby ASA.


Q.  Are there specific procedures in order to carry out the 3rd-party  digital certificates replication in a Active/Standby configuration?



A. Digital Certificate replication across an Active/Standby Failover pair of ASA's only occurs during bulk replication processes.

Bulk replication processes are defined as :

1.Power cycling the ASA device

2.Performing a "write standby" operation on the active ASA


There is an enhancement request to be considered to able to replicate certificates at the time the certificate is imported into the ASA (no specific timeline has been defined).

CSCsr71150-certificates from imported pkcs12 are not replicated to standby






Q. With Active/Standby  will one certificate  installed in Active ASA be all that is needed  to use it for SSL VPN  remote access, or do I need one certificate installed on each ASA?



A. Only one certificate installed on on the Active AS is required, since the failover functionality wil handle the replication of same certificate and keys to the standdby ASA.

Community Member

Does the Certficate replicate for 8.2?

Community Member

No, you must perform a "write standby" operation on the active ASA.

Community Member

I'm buy certyficate ssl from anohter compony.  i'm do exactly: performing a "write standby" operation on the active ASA. I see certificete on both ASA,  but when I"m open https or open AnyConnect I'm see certificate generated on ASA, not uploaded certificate (wich I bouth).

I've resttart the both ASA, but it did not help.

What i do wrong ??

Community Member

TTTTT# sh ru ssl
ssl trust-point ASDM_TrustPoint2 outside
ssl certificate-authentication interface outside port 443

Community Member

Hi all,


we have installed CA certificate on Primary ASA but we are accessing both HA-ASA(primery/sec) with different host name(inp44fw01a / inp44fw01b) and its working now only in primary. 

question : how to bind both ASA in one CA certificate?