Saturday, July 9, 2016

Cisco ASA URL Filtering via DNS Inspection Policy Map

One of our Ipoque DPI appliance suddenly failed but activated its fail-to-wire feature. I had to temporarily perform URL filtering on the ASA 5525-X by creating regular expression (regex) for the domains to be blocked and apply a DNS inspection policy to block DNS lookups. For this example, I want to block domains such as Youtube, Facebook and Piratebay.


regex Youtube "youtube\.com"
regex Facebook "facebook\.com"
regex Piratebay "piratebay\.org"

class-map type regex match-any DomainBlockList
 match regex Youtube
 match regex Facebook
 match regex Piratebay

policy-map type inspect dns PM-DNS-inspect
  match domain-name regex class DomainBlockList
  drop-connection log   // DROP SPECIFIED DOMAINS AND ALLOW EVERYTHING ELSE

policy-map global_policy
 class inspection_default
  no inspect dns preset_dns_map   // REMOVE DEFAULT DNS INSPECTION POLICY
  inspect dns PM-DNS-inspect


I've also enabled syslog to verify if the regex and DNS filtering policy are working.

logging enable 
logging buffered informational
logging timestamp




ciscoasa# show log
Syslog logging: enabled
    Facility: 20
    Timestamp logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
    Buffer logging: level informational, 1948 messages logged
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
 inside:192.168.1.10/53050 (172.27.25.254/14713)
May 23 2016 17:09:30: %ASA-4-410003: DNS Classification: Dropped DNS request (id 7944) from inside:192.168.1.10/53050 to outside:8.8.8.8/53; matched Class 22: match domain-name regex class DomainBlockList
May 23 2016 17:09:30: %ASA-4-507003: udp flow from inside:192.168.1.10/53050 to outside:8.8.8.8/53 terminated by inspection engine, reason - inspector disconnected, dropped packet.
May 23 2016 17:09:30: %ASA-6-302016: Teardown UDP connection 511 for outside:8.8.8.8/53 to inside:192.168.1.10/53050 duration 0:00:00 bytes 0
May 23 2016 17:09:33: %ASA-6-302014: Teardown TCP connection 495 for outside:172.20.80.21/9100 to inside:192.168.1.10/50128 duration 0:00:30 bytes 0 SYN Timeout
May 23 2016 17:09:34: %ASA-6-305011: Built dynamic TCP translation from inside:192.168.1.10/50132 to outside:172.27.25.254/13351
May 23 2016 17:09:34: %ASA-6-302013: Built outbound TCP connection 512 for outside:172.20.80.21/9100 (172.20.80.21/9100) to inside:192.168.1.10/50132 (172.27.25.254/13351)
May 23 2016 17:09:34: %ASA-6-302015: Built outbound UDP connection 513 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.1.10/53050 (172.27.25.254/14713)
May 23 2016 17:09:34: %ASA-4-410003: DNS Classification: Dropped DNS request (id 7944) from inside:192.168.1.10/53050 to outside:8.8.8.8/53; matched Class 22: match domain-name regex class DomainBlockList
May 23 2016 17:09:34: %ASA-4-507003: udp flow from inside:192.168.1.10/53050 to outside:8.8.8.8/53 terminated by inspection engine, reason - inspector disconnected, dropped packet.
May 23 2016 17:09:34: %ASA-6-302016: Teardown UDP connection 513 for outside:8.8.8.8/53 to inside:192.168.1.10/53050 duration 0:00:00 bytes 0
May 23 2016 17:09:35: %ASA-6-305011: Built dynamic UDP translation from inside:192.168.1.10/53051 to outside:172.27.25.254/9577
May 23 2016 17:09:35: %ASA-6-302015: Built outbound UDP connection 514 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.1.10/53051 (172.27.25.254/9577)
May 23 2016 17:09:35: %ASA-6-305011: Built dynamic UDP translation from inside:192.168.1.10/53052 to outside:172.27.25.254/38752
May 23 2016 17:09:35: %ASA-6-302015: Built outbound UDP connection 515 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.1.10/53052 (172.27.25.254/38752)
May 23 2016 17:09:35: %ASA-6-302016: Teardown UDP connection 515 for outside:8.8.8.8/53 to inside:192.168.1.10/53052 duration 0:00:00 bytes 72
May 23 2016 17:09:35: %ASA-6-302016: Teardown UDP connection 514 for outside:8.8.8.8/53 to inside:192.168.1.10/53051 duration 0:00:00 bytes 72
May 23 2016 17:09:37: %ASA-6-305012: Teardown dynamic TCP translation from inside:192.168.1.10/50127 to outside:172.27.25.254/39345 duration 0:01:00
May 23 2016 17:09:40: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.10/52130 to outside:172.27.25.254/50331 duration 0:00:30
May 23 2016 17:09:40: %ASA-6-302014: Teardown TCP connection 497 for outside:216.146.46.10/445 to inside:192.168.1.10/50129 duration 0:00:30 bytes 0 SYN Timeout
May 23 2016 17:09:41: %ASA-6-302014: Teardown TCP connection 498 for outside:216.146.46.11/445 to inside:192.168.1.10/50130 duration 0:00:30 bytes 0 SYN Timeout
May 23 2016 17:09:43: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.10/60600 to outside:172.27.25.254/9592 duration 0:00:30
May 23 2016 17:09:43: %ASA-6-305012: Teardown dynamic ICMP translation from inside:192.168.1.10/1 to outside:172.27.25.254/44940 duration 0:00:30
May 23 2016 17:09:50: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.10/52188 to outside:172.27.25.254/40294 duration 0:00:30
May 23 2016 17:09:56: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.10/53050 to outside:172.27.25.254/14713 duration 0:00:30
May 23 2016 17:10:00: %ASA-6-305011: Built dynamic TCP translation from inside:192.168.1.10/50133 to outside:172.27.25.254/40275
May 23 2016 17:10:00: %ASA-6-302013: Built outbound TCP connection 516 for outside:172.20.80.21/9100 (172.20.80.21/9100) to inside:192.168.1.10/50133 (172.27.25.254/40275)


Below is the full config that was applied on my lab ASA 5505 running version 8.3.

ciscoasa# show run
: Saved
:
ASA Version 8.3(2)
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.254 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 172.27.25.254 255.255.255.0
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
 shutdown
!
interface Ethernet0/3
 shutdown
!
interface Ethernet0/4
 shutdown
!
interface Ethernet0/5
 shutdown
!
interface Ethernet0/6
 shutdown
!
interface Ethernet0/7
 shutdown
!
regex Piratebay "piratebay\.org"
regex Youtube "youtube\.com"
regex Facebook "facebook\.com"
boot system disk0:/asa832-k8.bin
ftp mode passive
object network INSIDE-PAT
 subnet 192.168.1.0 255.255.255.0
pager lines 24
logging enable
logging timestamp
logging buffered informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
!
object network INSIDE-PAT
 nat (inside,outside) dynamic interface
route outside 0.0.0.0 0.0.0.0 172.27.25.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
!
class-map type regex match-any DomainBlockList
 match regex Youtube
 match regex Facebook
 match regex Piratebay
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map type inspect dns PM-DNS-inspect
 parameters
 match domain-name regex class DomainBlockList
  drop-connection log
policy-map global_policy
 class inspection_default
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect ip-options
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip
  inspect xdmcp
  inspect dns PM-DNS-inspect
!
service-policy global_policy global
prompt hostname context
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:84d1dbdacf047ec442ba73e29b20eecd
: end

Friday, July 1, 2016

FireSight GUI Menu Navigation

Just some additional post setup features or settings that you might want to note in FireSight.

NAT and VPN options under Devices tab are applicable to the dedicated FirePower appliance only. You can't run these features with the ASA FirePower module.


 Objects are similar to ASA object or alias which are used to simply policy creation.


AMP is for managing malware protection for FireAMP endpoints. This is where you download the latest update from FireSight cloud database.


You can create local admin accounts under Local > User Management > Create Users. By default, there's an admin account (default password is Sourcefire). You can also integrate user accounts to external database such as LDAP and RADIUS and specify different privilege levels.



FireSight also has a syslog function under System > Monitoring > Syslog, which can be used for troubleshooting.


The device's health statistics such as uptime, memory and disk usage, etc. can be found under Monitoring > Statistics and click the device under Select Device(s). You can check the health stats on both the ASA with FirePower module and the FireSight Defense Center (DC).



You can perform backup and restore under Tools. You can also schedule system backup and its frequency.




Click on Help > About to check the FireSight DC serial number and current OS version and Help > Support site to redirect you to the TAC support website.



You can change the current user's password under admin > User Preference and also change the dashboard page settings such as home page and time zone preference.



Sunday, June 19, 2016

Cisco ASA 9.x Active-Standby Configuration

I had a remote site with two Cisco ASA 5525-X firewalls deployed as an Active-Standby failover pair. I've posted a blog a couple years back regarding this setup in a GNS3 environment but now I'm deploying it in the real world. Before its deployment, I've upgraded both ASA to the latest code 9.4(2)11, applied and configured the 10-security context license (multiple mode).

According to Cisco ASA 5500-X Configuration Guide starting ASA 8.3(1), you don't need to install identical licenses (with some exceptions) on both firewall units. You just buy and only install the license for the Primary/Active firewall unit. The Secondary/Standby unit will inherit the Primary license when it becomes Active.

I also confirmed with Cisco TAC that a 20-Security Context license ASA5500-SC-20 (vs L-ASA-SC-20) will work on a Cisco ASA 5500-X platform.

You can optionally skip the standby IP address under the context configuration and failover (and routing) would still work. For example, if you've got limited public IP address range, you can just configure the 'outside' interface with a single public IP address. The standby keyword is normally used in Active-Active failover where each context monitors its interface and activates failover if it multiple failed interfaces were detected. I explictily configure the standby IP address on the 'inside' interface since we're doing HSRP and allocate a /29 subnet.

ASA01/pri/act(config-if)# ip address 202.78.4.6 255.255.255.128
WARNING: Failover is enabled but standby IP address is not configured for this interface.


ASA-1

ciscoasa# show version

Cisco Adaptive Security Appliance Software Version 9.4(2)11
Device Manager Version 7.1(3)

Compiled on Mon 22-Feb-16 22:54 PST by builders
System image file is "disk0:/asa942-11-smp-k8.bin"
Config file at boot was "startup-config"

ciscoasa up 1 hour 45 mins

Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)
            ASA: 4096 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 8192MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             Boot microcode        : CNPx-MC-BOOT-2.00
                             SSL/IKE microcode     : CNPx-MC-SSL-SB-PLUS-0005
                             IPSec microcode       : CNPx-MC-IPSEC-MAIN-0026
                             Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4


 0: Int: Internal-Data0/0    : address is 00fe.c8e5.10ac, irq 11
 1: Ext: GigabitEthernet0/0  : address is 00fe.c8e5.10b1, irq 5
 2: Ext: GigabitEthernet0/1  : address is 00fe.c8e5.10ad, irq 5
 3: Ext: GigabitEthernet0/2  : address is 00fe.c8e5.10b2, irq 10
 4: Ext: GigabitEthernet0/3  : address is 00fe.c8e5.10ae, irq 10
 5: Ext: GigabitEthernet0/4  : address is 00fe.c8e5.10b3, irq 5
 6: Ext: GigabitEthernet0/5  : address is 00fe.c8e5.10af, irq 5
 7: Ext: GigabitEthernet0/6  : address is 00fe.c8e5.10b4, irq 10
 8: Ext: GigabitEthernet0/7  : address is 00fe.c8e5.10b0, irq 10
 9: Int: Internal-Data0/1    : address is 0000.0001.0002, irq 0
10: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
11: Int: Internal-Data0/2    : address is 0000.0001.0003, irq 0
12: Ext: Management0/0       : address is 00fe.c8e5.10ac, irq 0

Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      perpetual
Maximum VLANs                     : 200            perpetual
Inside Hosts                      : Unlimited      perpetual
Failover                          : Active/Active  perpetual
Encryption-DES                    : Enabled        perpetual
Encryption-3DES-AES               : Enabled        perpetual
Security Contexts                 : 2              perpetual
GTP/GPRS                          : Disabled       perpetual
AnyConnect Premium Peers          : 2              perpetual
AnyConnect Essentials             : Disabled       perpetual
Other VPN Peers                   : 750            perpetual
Total VPN Peers                   : 750            perpetual
Shared License                    : Disabled       perpetual
AnyConnect for Mobile             : Disabled       perpetual
AnyConnect for Cisco VPN Phone    : Disabled       perpetual
Advanced Endpoint Assessment      : Disabled       perpetual
Total UC Proxy Sessions           : 2              perpetual
Botnet Traffic Filter             : Disabled       perpetual
IPS Module                        : Disabled       perpetual
Cluster                           : Enabled        perpetual
Cluster Members                   : 2              perpetual

This platform has an ASA5525 VPN Premium license.

Serial Number: FCH1949123
Running Permanent Activation Key: 0xcb10d26a 0xa440851c 0xc9326500 0xdaa01818 0xc325eabc
Configuration register is 0x1

Image type          : Release
Key version         : A

Configuration has not been modified since last system restart.

ciscoasa# configure terminal
ciscoasa(config)#

***************************** NOTICE *****************************

Help to improve the ASA platform by enabling anonymous reporting,
which allows Cisco to securely receive minimal error and health
information from the device. To learn more about this feature,
please visit: http://www.cisco.com/go/smartcall

Would you like to enable anonymous error reporting to help improve

the product? [Y]es, [N]o, [A]sk later:

ciscoasa(config)# activation-key d02ad148 f05363e7 5563850c c6d844bc 401fdxxx
Validating activation key. This may take a few minutes...
Both Running and Flash permanent activation key was updated with the requested key.

ciscoasa(config)# show version

Cisco Adaptive Security Appliance Software Version 9.4(2)11
Device Manager Version 7.1(3)

Compiled on Mon 22-Feb-16 22:54 PST by builders
System image file is "disk0:/asa942-11-smp-k8.bin"
Config file at boot was "startup-config"

ciscoasa up 1 hour 50 mins

Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)
            ASA: 4096 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 8192MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             Boot microcode        : CNPx-MC-BOOT-2.00
                             SSL/IKE microcode     : CNPx-MC-SSL-SB-PLUS-0005
                             IPSec microcode       : CNPx-MC-IPSEC-MAIN-0026
                             Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4


 0: Int: Internal-Data0/0    : address is 00fe.c8e5.10ac, irq 11
 1: Ext: GigabitEthernet0/0  : address is 00fe.c8e5.10b1, irq 5
 2: Ext: GigabitEthernet0/1  : address is 00fe.c8e5.10ad, irq 5
 3: Ext: GigabitEthernet0/2  : address is 00fe.c8e5.10b2, irq 10
 4: Ext: GigabitEthernet0/3  : address is 00fe.c8e5.10ae, irq 10
 5: Ext: GigabitEthernet0/4  : address is 00fe.c8e5.10b3, irq 5
 6: Ext: GigabitEthernet0/5  : address is 00fe.c8e5.10af, irq 5
 7: Ext: GigabitEthernet0/6  : address is 00fe.c8e5.10b4, irq 10
 8: Ext: GigabitEthernet0/7  : address is 00fe.c8e5.10b0, irq 10
 9: Int: Internal-Data0/1    : address is 0000.0001.0002, irq 0
10: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
11: Int: Internal-Data0/2    : address is 0000.0001.0003, irq 0
12: Ext: Management0/0       : address is 00fe.c8e5.10ac, irq 0

Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      perpetual
Maximum VLANs                     : 200            perpetual
Inside Hosts                      : Unlimited      perpetual
Failover                          : Active/Active  perpetual
Encryption-DES                    : Enabled        perpetual
Encryption-3DES-AES               : Enabled        perpetual
Security Contexts                 : 10             perpetual
GTP/GPRS                          : Disabled       perpetual
AnyConnect Premium Peers          : 2              perpetual
AnyConnect Essentials             : Disabled       perpetual
Other VPN Peers                   : 750            perpetual
Total VPN Peers                   : 750            perpetual
Shared License                    : Disabled       perpetual
AnyConnect for Mobile             : Disabled       perpetual
AnyConnect for Cisco VPN Phone    : Disabled       perpetual
Advanced Endpoint Assessment      : Disabled       perpetual
Total UC Proxy Sessions           : 2              perpetual
Botnet Traffic Filter             : Disabled       perpetual
IPS Module                        : Disabled       perpetual
Cluster                           : Enabled        perpetual
Cluster Members                   : 2              perpetual

This platform has an ASA5525 VPN Premium license.

Serial Number: FCH19497123
Running Permanent Activation Key: 0xd02ad148 0xf05363e7 0x5563850c 0xc6d844bc 0x401fdabc
Configuration register is 0x1

Image type          : Release
Key version         : A

Configuration last modified by enable_15 at 20:36:32.329 UTC Mon Apr 25 2016

ciscoasa# configure terminal
ciscoasa(config)#

***************************** NOTICE *****************************

Help to improve the ASA platform by enabling anonymous reporting,
which allows Cisco to securely receive minimal error and health
information from the device. To learn more about this feature,
please visit: http://www.cisco.com/go/smartcall

Would you like to enable anonymous error reporting to help improve

the product? [Y]es, [N]o, [A]sk later: mod

ciscoasa(config)# mode ?

configure mode commands/options:
  multiple   Multiple mode; mode with security contexts
  noconfirm  Do not prompt for confirmation
  single     Single mode; mode without security contexts

ciscoasa(config)# mode multiple
WARNING: This command will change the behavior of the device
WARNING: This command will initiate a Reboot
Proceed with change mode? [confirm]
Convert the system configuration? [confirm]
!
The old running configuration file will be written to flash

Converting the configuration - this may take several minutes for a large configuration

The admin context configuration will be written to flash

The new running configuration file was written to flash
Security context mode: multiple

ciscoasa(config)#


***
*** --- START GRACEFUL SHUTDOWN ---
***
*** Message to all terminals:
***
***   change mode
Shutting down isakmp
Shutting down sw-module
Shutting down License Controller
Shutting down File system


***
*** --- SHUTDOWN NOW ---
***
*** Message to all terminals:
***
***   change mode
Process shutdown finished


<OUTPUT TRUNCATED>


ciscoasa# show context
Context Name      Class      Interfaces           Mode         URL
*admin            default                         Routed       disk0:/admin.cfg

Total active Security Contexts: 1

ciscoasa#

ciscoasa# show run
: Saved

:
: Serial Number: FCH19497123
: Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)
:
ASA Version 9.4(2)11 <system>
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
no mac-address auto
!
interface GigabitEthernet0/0
 shutdown
!
interface GigabitEthernet0/1
 shutdown
!
interface GigabitEthernet0/2
 shutdown
!
interface GigabitEthernet0/3
 shutdown
!
interface GigabitEthernet0/4
 shutdown
!
interface GigabitEthernet0/5
 shutdown
!
interface GigabitEthernet0/6
 shutdown
!
interface GigabitEthernet0/7
 shutdown
!
interface Management0/0
 shutdown
!
class default
  limit-resource All 0
  limit-resource Mac-addresses 16384
  limit-resource ASDM 5
  limit-resource SSH 5
  limit-resource Telnet 5
!

boot system disk0:/asa942-11-smp-k8.bin
ftp mode passive
pager lines 24
no failover
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
ssh stricthostkeycheck
console timeout 0

admin-context admin
context admin
  config-url disk0:/admin.cfg
!

prompt hostname context
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly 20
  subscribe-to-alert-group configuration periodic monthly 20
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:95676559a4c86494b73ae26e690ba578
: end



ASA-2

ciscoasa# show version

Cisco Adaptive Security Appliance Software Version 9.4(2)11
Device Manager Version 7.1(3)

Compiled on Mon 22-Feb-16 22:54 PST by builders
System image file is "disk0:/asa942-11-smp-k8.bin"
Config file at boot was "startup-config"

ciscoasa up 2 hours 4 mins

Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2393 MHz, 1 CPU (4 cores)
            ASA: 4096 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 8192MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             Boot microcode        : CNPx-MC-BOOT-2.00
                             SSL/IKE microcode     : CNPx-MC-SSL-SB-PLUS-0005
                             IPSec microcode       : CNPx-MC-IPSEC-MAIN-0026
                             Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4


 0: Int: Internal-Data0/0    : address is 00fe.c8e5.1e75, irq 11
 1: Ext: GigabitEthernet0/0  : address is 00fe.c8e5.1e7a, irq 5
 2: Ext: GigabitEthernet0/1  : address is 00fe.c8e5.1e76, irq 5
 3: Ext: GigabitEthernet0/2  : address is 00fe.c8e5.1e7b, irq 10
 4: Ext: GigabitEthernet0/3  : address is 00fe.c8e5.1e77, irq 10
 5: Ext: GigabitEthernet0/4  : address is 00fe.c8e5.1e7c, irq 5
 6: Ext: GigabitEthernet0/5  : address is 00fe.c8e5.1e78, irq 5
 7: Ext: GigabitEthernet0/6  : address is 00fe.c8e5.1e7d, irq 10
 8: Ext: GigabitEthernet0/7  : address is 00fe.c8e5.1e79, irq 10
 9: Int: Internal-Data0/1    : address is 0000.0001.0002, irq 0
10: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
11: Int: Internal-Data0/2    : address is 0000.0001.0003, irq 0
12: Ext: Management0/0       : address is 00fe.c8e5.1e75, irq 0

Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      perpetual
Maximum VLANs                     : 200            perpetual
Inside Hosts                      : Unlimited      perpetual
Failover                          : Active/Active  perpetual
Encryption-DES                    : Enabled        perpetual
Encryption-3DES-AES               : Enabled        perpetual
Security Contexts                 : 2              perpetual
GTP/GPRS                          : Disabled       perpetual
AnyConnect Premium Peers          : 2              perpetual
AnyConnect Essentials             : Disabled       perpetual
Other VPN Peers                   : 750            perpetual 
Total VPN Peers                   : 750            perpetual
Shared License                    : Disabled       perpetual
AnyConnect for Mobile             : Disabled       perpetual
AnyConnect for Cisco VPN Phone    : Disabled       perpetual
Advanced Endpoint Assessment      : Disabled       perpetual
Total UC Proxy Sessions           : 2              perpetual
Botnet Traffic Filter             : Disabled       perpetual
IPS Module                        : Disabled       perpetual
Cluster                           : Enabled        perpetual
Cluster Members                   : 2              perpetual

This platform has an ASA5525 VPN Premium license.

Serial Number: FCH19497456
Running Permanent Activation Key: 0x633bf67e 0xe0b086c6 0xcd4085cc 0xf1247860 0xcd13fdef
Configuration register is 0x1

Image type          : Release
Key version         : A

Configuration has not been modified since last system restart.

ciscoasa#
ciscoasa# configure terminal
ciscoasa(config)#

***************************** NOTICE *****************************

Help to improve the ASA platform by enabling anonymous reporting,
which allows Cisco to securely receive minimal error and health
information from the device. To learn more about this feature,
please visit: http://www.cisco.com/go/smartcall

Would you like to enable anonymous error reporting to help improve

the product? [Y]es, [N]o, [A]sk later:

ciscoasa(config)# activation-key e30af474 6cd49223 a19229c8 f72074f0 4506dyyy
Validating activation key. This may take a few minutes...
Both Running and Flash permanent activation key was updated with the requested key.

ciscoasa(config)# show version

Cisco Adaptive Security Appliance Software Version 9.4(2)11
Device Manager Version 7.1(3)

Compiled on Mon 22-Feb-16 22:54 PST by builders
System image file is "disk0:/asa942-11-smp-k8.bin"
Config file at boot was "startup-config"

ciscoasa up 2 hours 5 mins

Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2393 MHz, 1 CPU (4 cores)
            ASA: 4096 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 8192MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             Boot microcode        : CNPx-MC-BOOT-2.00
                             SSL/IKE microcode     : CNPx-MC-SSL-SB-PLUS-0005
                             IPSec microcode       : CNPx-MC-IPSEC-MAIN-0026
                             Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4


 0: Int: Internal-Data0/0    : address is 00fe.c8e5.1e75, irq 11
 1: Ext: GigabitEthernet0/0  : address is 00fe.c8e5.1e7a, irq 5
 2: Ext: GigabitEthernet0/1  : address is 00fe.c8e5.1e76, irq 5
 3: Ext: GigabitEthernet0/2  : address is 00fe.c8e5.1e7b, irq 10
 4: Ext: GigabitEthernet0/3  : address is 00fe.c8e5.1e77, irq 10
 5: Ext: GigabitEthernet0/4  : address is 00fe.c8e5.1e7c, irq 5
 6: Ext: GigabitEthernet0/5  : address is 00fe.c8e5.1e78, irq 5
 7: Ext: GigabitEthernet0/6  : address is 00fe.c8e5.1e7d, irq 10
 8: Ext: GigabitEthernet0/7  : address is 00fe.c8e5.1e79, irq 10
 9: Int: Internal-Data0/1    : address is 0000.0001.0002, irq 0
10: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
11: Int: Internal-Data0/2    : address is 0000.0001.0003, irq 0
12: Ext: Management0/0       : address is 00fe.c8e5.1e75, irq 0

Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      perpetual
Maximum VLANs                     : 200            perpetual
Inside Hosts                      : Unlimited      perpetual
Failover                          : Active/Active  perpetual
Encryption-DES                    : Enabled        perpetual
Encryption-3DES-AES               : Enabled        perpetual
Security Contexts                 : 10             perpetual
GTP/GPRS                          : Disabled       perpetual
AnyConnect Premium Peers          : 2              perpetual
AnyConnect Essentials             : Disabled       perpetual
Other VPN Peers                   : 750            perpetual  
Total VPN Peers                   : 750            perpetual
Shared License                    : Disabled       perpetual
AnyConnect for Mobile             : Disabled       perpetual
AnyConnect for Cisco VPN Phone    : Disabled       perpetual
Advanced Endpoint Assessment      : Disabled       perpetual
Total UC Proxy Sessions           : 2              perpetual
Botnet Traffic Filter             : Disabled       perpetual
IPS Module                        : Disabled       perpetual
Cluster                           : Enabled        perpetual
Cluster Members                   : 2              perpetual

This platform has an ASA5525 VPN Premium license.

Serial Number: FCH19497456
Running Permanent Activation Key: 0xe30af474 0x6cd49223 0xa19229c8 0xf72074f0 0x4506ddef
Configuration register is 0x1

Image type          : Release
Key version         : A

Configuration last modified by enable_15 at 20:43:43.989 UTC Mon Apr 25 2016


ciscoasa# configure terminal
ciscoasa(config)#

***************************** NOTICE *****************************

Help to improve the ASA platform by enabling anonymous reporting,
which allows Cisco to securely receive minimal error and health
information from the device. To learn more about this feature,
please visit: http://www.cisco.com/go/smartcall

Would you like to enable anonymous error reporting to help improve

the product? [Y]es, [N]o, [A]sk later: mode

ciscoasa(config)# mode multiple
WARNING: This command will change the behavior of the device
WARNING: This command will initiate a Reboot
Proceed with change mode? [confirm]
Convert the system configuration? [confirm]
!
The old running configuration file will be written to flash

Converting the configuration - this may take several minutes for a large configuration

The admin context configuration will be written to flash

The new running configuration file was written to flash
Security context mode: multiple

ciscoasa(config)#


***
*** --- START GRACEFUL SHUTDOWN ---
***
*** Message to all terminals:
***
***   change mode
Shutting down isakmp
Shutting down sw-module
Shutting down License Controller
Shutting down File system


***
*** --- SHUTDOWN NOW ---
***
*** Message to all terminals:
***
***   change mode
Process shutdown finished
Rebooting.....


<OUTPUT TRUNCATED>


ciscoasa# show run
: Saved

:
: Serial Number: FCH19497456
: Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2393 MHz, 1 CPU (4 cores)
:
ASA Version 9.4(2)11 <system>
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
no mac-address auto
!
interface GigabitEthernet0/0
 shutdown
!
interface GigabitEthernet0/1
 shutdown
!
interface GigabitEthernet0/2
 shutdown
!
interface GigabitEthernet0/3
 shutdown
!
interface GigabitEthernet0/4
 shutdown
!
interface GigabitEthernet0/5
 shutdown
!
interface GigabitEthernet0/6
 shutdown
!
interface GigabitEthernet0/7
 shutdown
!
interface Management0/0
 shutdown
!
class default
  limit-resource All 0
  limit-resource Mac-addresses 16384
  limit-resource ASDM 5
  limit-resource SSH 5
  limit-resource Telnet 5
!

boot system disk0:/asa942-11-smp-k8.bin
ftp mode passive  
pager lines 24
no failover
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
ssh stricthostkeycheck
console timeout 0

admin-context admin
context admin
  config-url disk0:/admin.cfg
!

prompt hostname context
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly 15   
  subscribe-to-alert-group configuration periodic monthly 15
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:e2c26c30eeb21bfeedab14fc04378836
: end


ASA-1

ciscoasa# configure terminal
ciscoasa(config)# hostname ASA01
ASA01(config)# mac-address auto
INFO: Converted to mac-address auto prefix 7797
ASA01(config)# interface GigabitEthernet0/0
ASA01(config-if)#  description ### WAN TRUNK ###
ASA01(config)# interface GigabitEthernet0/1
ASA01(config-if)#  description ### LAN TRUNK ###
ASA01(config-if)#  no shutdown
ASA01(config-if)# interface GigabitEthernet0/1.400
ASA01(config-subif)#  description ### INSIDE VLAN ###
ASA01(config-subif)#  vlan 400
ASA01(config-subif)# interface Management0/0
ASA01(config-if)# no shutdown
ASA01(config-if)# interface GigabitEthernet0/6
ASA01(config-if)#  description ### LAN FAILOVER ###
ASA01(config-if)#  no shutdown
ASA01(config-if)# interface GigabitEthernet0/7
ASA01(config-if)#  description ### STATEFUL FAILOVER ###
ASA01(config-if)#  no shutdown
ASA01(config-if)# class ?

configure mode commands/options:
  WORD  Symbolic name of the class

ASA01(config-if)# class IPSEC-VPN

ASA01(config-class)# ?

Class configuration commands:
  limit-resource  Configure the resource limits
  no              Negate a command or set its defaults

ASA01(config-class)# limit-resource ?

class mode commands/options:
  rate           Enter this keyword to specify a rate/sec
Following resources available:
  ASDM           ASDM Connections
  All            All Resources
  Conns          Connections
  Hosts          Hosts
  Mac-addresses  MAC Address table entries
  Routes         Routing Table Entries
  SSH            SSH Sessions
  Telnet         Telnet Sessions
  VPN            VPN resources
  Xlates         XLATE Objects

ASA01(config-class)# limit-resource VPN ?

class mode commands/options:
  Burst  Burst limit over the configured limit. This burst limit is not
         guaranteed. The context may take this resource if it is available on
         the device at run time.
  Other  Other VPN sessions which include Site-to-Site, IKEv1 RA and L2tp
         Sessions. These are guaranteed for a context and shouldn't exceed the
         system capacity when combined across all contexts.
  ikev1  Configure IKEv1 specific resources.

ASA01(config-class)# limit-resource VPN Other ?

class mode commands/options:
  WORD  Value of resource limit (in <value> or <value>%)

ASA01(config-class)# limit-resource VPN Other 10
ASA01(config-class)# context admin
ASA01(config-ctx)# ?

Context configuration commands:
  allocate-interface   Allocate interface to context
  allocate-ips         Allocate IPS virtual sensor to context
  config-url           Configure URL for a context configuration
  description          Provide a description of the context
  exit                 Exit from context configuration mode
  help                 Interactive help for context subcommands
  join-failover-group  Join a context to a failover group
  member               Configure class membership for a context
  no                   Negate a command
  scansafe             Enable scansafe inspection in this context

ASA01(config-ctx)# member ?

context mode commands/options:
  WORD  Class name

ASA01(config-ctx)# member IPSEC-VPN
ASA01(config-ctx)#  allocate-interface GigabitEthernet0/0
ASA01(config-ctx)#  allocate-interface GigabitEthernet0/1.400
ASA01(config-ctx)#  allocate-interface Management0/0
ASA01(config)# failover lan unit primary ?

configure mode commands/options:
  primary    Configure the unit as primary
  secondary  Configure the unit as secondary

ASA01(config)# failover lan unit primary
ASA01(config)# failover ?

configure mode commands/options:
  group             Configure/Enable failover group
  interface         Configure the IP address to be used for failover and/or
                    stateful update information
  interface-policy  Set the policy for failover due to interface failures
  ipsec             Configure the use of IPSec tunnel for failover
  key               Configure the failover shared secret or key
  lan               Specify the unit as primary or secondary or configure the
                    interface and vlan to be used for failover communication
  link              Configure the interface and vlan to be used as a link for
                    stateful update information
  mac               Specify the virtual mac address for a physical interface
  mac-notification  Configure failover MAC address movement notification
                    settings
  polltime          Configure failover poll interval
  replication       Enable HTTP (port 80) connection replication
  standby           Execute command in  standby
  timeout           Specify the failover reconnect timeout value for
                    asymmetrically routed sessions
  <cr>

exec mode commands/options:
  active          Make this system to be the active unit of the failover pair
  exec            Execute command on the designated unit
  reload-standby  Force standby unit to reboot
  reset           Force a unit or failover group to an unfailed state

ASA01(config)# failover lan ?

configure mode commands/options:
  interface  Configure the interface and vlan to be used for failover
             communication
  unit       Configure the unit as primary or secondary

ASA01(config)# failover lan interface ?

configure mode commands/options:
  WORD  Specify the interface name

ASA01(config)# failover lan interface LANFO ?

configure mode commands/options:
  WORD  Specify physical or sub interface
  <cr>

ASA01(config)# failover lan interface LANFO GigabitEthernet0/6
INFO: Non-failover interface config is cleared on GigabitEthernet0/6 and its sub-interfaces

ASA01(config)# failover interface ?

configure mode commands/options:
  ip  Configure the IP address and mask after this keyword

ASA01(config)# failover interface ip ?

configure mode commands/options:
Current available interface(s):
  LANFO  Name of interface GigabitEthernet0/6

ASA01(config)# failover interface ip LANFO ?

configure mode commands/options:
  Hostname or A.B.C.D  Specify the IP address
  X:X:X:X::X/<0-128>   Specify the IPv6 prefix

ASA01(config)# failover interface ip LANFO 172.27.24.237 ?

configure mode commands/options:
  A.B.C.D  Specify the mask for the IP address

ASA01(config)# failover interface ip LANFO 172.27.24.237 255.255.255.252 ?

configure mode commands/options:
  standby  Configure the standby IP address after this keyword

ASA01(config)# failover interface ip LANFO 172.27.24.237 255.255.255.252 standby ?

configure mode commands/options:
  Hostname or A.B.C.D  Specify the IP address

ASA01(config)# failover interface ip LANFO 172.27.24.237 255.255.255.252 standby 172.27.24.238
ASA01(config)# failover key ?

configure mode commands/options:
  0     Specifies an UNENCRYPTED password will follow
  8     Specifies an ENCRYPTED password will follow
  WORD  Failover shared secret
  hex   Enter 32-character key in hexadecimal format

ASA01(config)# failover key cisco

ASA01(config)# failover link ?

configure mode commands/options:
  WORD  Specify the interface name

ASA01(config)# failover link STATEFO ?

configure mode commands/options:
  WORD  Specify physical or sub interface
  <cr>

ASA01(config)# failover link STATEFO GigabitEthernet0/7
INFO: Non-failover interface config is cleared on GigabitEthernet0/7 and its sub-interfaces

ASA01(config)# failover interface ip ?

configure mode commands/options:
Current available interface(s):
  LANFO    Name of interface GigabitEthernet0/6
  STATEFO  Name of interface GigabitEthernet0/7

ASA01(config)# failover interface ip STATEFO ?

configure mode commands/options:
  Hostname or A.B.C.D  Specify the IP address
  X:X:X:X::X/<0-128>   Specify the IPv6 prefix

ASA01(config)# failover interface ip STATEFO 172.27.24.241 ?

configure mode commands/options:
  A.B.C.D  Specify the mask for the IP address

ASA01(config)# failover interface ip STATEFO 172.27.24.241 255.255.255.252 ?

configure mode commands/options:
  standby  Configure the standby IP address after this keyword

ASA01(config)# failover interface ip STATEFO 172.27.24.241 255.255.255.252 ?

configure mode commands/options:
  Hostname or A.B.C.D  Specify the IP address

ASA01(config)# failover interface ip STATEFO 172.27.24.241 255.255.255.252 standby 172.27.24.242

ASA01(config)# prompt ?

configure mode commands/options:
  cluster-unit     Display the cluster unit name in the session prompt
  context          Display the context in the session prompt (multimode only)
  domain           Display the domain in the session prompt
  hostname         Display the hostname in the session prompt
  management-mode  Display management mode
  priority         Display the priority in the session prompt
  state            Display the traffic passing state in the session prompt

ASA01(config)# prompt hostname ?

configure mode commands/options:
  cluster-unit     Display the cluster unit name in the session prompt
  context          Display the context in the session prompt (multimode only)
  domain           Display the domain in the session prompt
  management-mode  Display management mode
  priority         Display the priority in the session prompt
  state            Display the traffic passing state in the session prompt
  <cr>

ASA01(config)# prompt hostname priority ?

configure mode commands/options:
  cluster-unit     Display the cluster unit name in the session prompt
  context          Display the context in the session prompt (multimode only)
  domain           Display the domain in the session prompt
  management-mode  Display management mode
  state            Display the traffic passing state in the session prompt
  <cr>

ASA01(config)# prompt hostname priority state    // TO SHOW DEVICE IF IT'S PRIMAY OR SECONDARY and ACTIVE OR STANDBY

ASA01/pri/actNoFailover(config)# failover   // ACTIVATE FAILOVER

ASA01/pri/act(config)# show failover
Failover On
Failover unit Primary
Failover LAN Interface: LANFO GigabitEthernet0/6 (down)
Reconnect timeout 0:00:00
Unit Poll frequency 1 seconds, holdtime 15 seconds
Interface Poll frequency 5 seconds, holdtime 25 seconds
Interface Policy 1
Monitored Interfaces 0 of 216 maximum
MAC Address Move Notification Interval not set
Version: Ours 9.4(2)11, Mate Unknown
Last Failover at: 20:48:44 UTC Apr 25 2016
    This host: Primary - Negotiation
        Active time: 0 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)
    Other host: Secondary - Not Detected    // ASA-2 NOT YET CONFIGURED
        Active time: 0 (sec)

Stateful Failover Logical Update Statistics
    Link : STATEFO GigabitEthernet0/7 (down)
    Stateful Obj     xmit       xerr       rcv        rerr     
    General        0          0          0          0        
    sys cmd      0          0          0          0        
    up time      0          0          0          0        
    RPC services      0          0          0          0        
    TCP conn     0          0          0          0        
    UDP conn     0          0          0          0        
    ARP tbl      0          0          0          0        
    Xlate_Timeout      0          0          0          0        
    IPv6 ND tbl      0          0          0          0        
    VPN IKEv1 SA     0          0          0          0        
    VPN IKEv1 P2     0          0          0          0        
    VPN IKEv2 SA     0          0          0          0        
    VPN IKEv2 P2     0          0          0          0        
    VPN CTCP upd     0          0          0          0        
    VPN SDI upd     0          0          0          0        
    VPN DHCP upd     0          0          0          0        
    SIP Session     0          0          0          0        
    SIP Tx     0          0          0          0        
    SIP Pinhole     0          0          0          0        
    Route Session     0          0          0          0        
    Router ID     0          0          0          0        
    User-Identity     0          0          0          0        
    CTS SGTNAME     0          0          0          0        
    CTS PAC     0          0          0          0        
    TrustSec-SXP     0          0          0          0        
    IPv6 Route     0          0          0          0        
    STS Table     0          0          0          0        

    Logical Update Queue Information
              Cur     Max     Total
    Recv Q:     0     0     0
    Xmit Q:     0     0     0


Configure the LAN-based failover (G0/6) and Stateful failover (G0/7) interfaces on ASA-2.

ciscoasa(config)# interface g0/0       // WAN/OUTSIDE INTERFACE
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# interface g0/1      // LAN/INSIDE INTERFACE
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# interface g0/6    // LAN FO INTERFACE
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# interface g0/7   // STATEFUL FO INTERFACE
ciscoasa(config-if)# no shutdown

ciscoasa(config-if)# failover lan  unit secondary
ciscoasa(config)# failover pre-shared-key cisco
ciscoasa(config-if)# failover lan interface LANFO GigabitEthernet0/6
INFO: Non-failover interface config is cleared on GigabitEthernet0/6 and its sub-interfaces
ciscoasa(config)# failover interface ip LANFO 172.27.24.237 255.255.255.252 standby 172.27.24.238
ciscoasa(config)# failover    // ONCE failover KEYWORD IS TYPED, ASA-2 SYNC WITH ASA-1
ciscoasa(config)# .

    Detected an Active mate
Beginning configuration replication from mate.
Removing context 'admin' (1)... Done

INFO: Admin context is required to get the interfaces
INFO: Admin context is required to get the interfaces
Creating context 'admin'... Done. (2)

WARNING: Skip fetching the URL disk0:/admin.cfg
INFO: Admin context will take some time to come up .... please wait.
End configuration replication from mate.


ASA01/sec/stby(config)# show failover    // HOSTNAME IMMEDIATELY CHANGED TO ASA01
Failover On
Failover unit Secondary
Failover LAN Interface: LANFO GigabitEthernet0/6 (up)
Reconnect timeout 0:00:00
Unit Poll frequency 1 seconds, holdtime 15 seconds
Interface Poll frequency 5 seconds, holdtime 25 seconds
Interface Policy 1
Monitored Interfaces 0 of 216 maximum
MAC Address Move Notification Interval not set
Version: Ours 9.4(2)11, Mate 9.4(2)11
Last Failover at: 20:41:57 UTC Apr 25 2016
    This host: Secondary - Standby Ready
        Active time: 0 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)
    Other host: Primary - Active
        Active time: 313 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)

Stateful Failover Logical Update Statistics
    Link : STATEFO GigabitEthernet0/7 (up)
    Stateful Obj     xmit       xerr       rcv        rerr     
    General        5          0          6          0        
    sys cmd      5          0          5          0        
    up time      0          0          0          0        
    RPC services      0          0          0          0        
    TCP conn     0          0          0          0        
    UDP conn     0          0          0          0        
    ARP tbl      0          0          0          0        
    Xlate_Timeout      0          0          0          0        
    IPv6 ND tbl      0          0          0          0        
    VPN IKEv1 SA     0          0          0          0        
    VPN IKEv1 P2     0          0          0          0        
    VPN IKEv2 SA     0          0          0          0        
    VPN IKEv2 P2     0          0          0          0        
    VPN CTCP upd     0          0          0          0        
    VPN SDI upd     0          0          0          0        
    VPN DHCP upd     0          0          0          0        
    SIP Session     0          0          0          0        
    SIP Tx     0          0          0          0        
    SIP Pinhole     0          0          0          0        
    Route Session     0          0          0          0        
    Router ID     0          0          0          0        
    User-Identity     0          0          1          0        
    CTS SGTNAME     0          0          0          0        
    CTS PAC     0          0          0          0        
    TrustSec-SXP     0          0          0          0        
    IPv6 Route     0          0          0          0        
    STS Table     0          0          0          0         
    Logical Update Queue Information
              Cur     Max     Total
    Recv Q:     0     14     170
    Xmit Q:     0     1     7


ASA01/sec/stby(config)# show failover history
==========================================================================
From State                 To State                   Reason
==========================================================================
20:42:02 UTC Apr 25 2016
Not Detected               Disabled                   No Error

21:56:46 UTC Apr 25 2016
Disabled                   Negotiation                Set by the config command

21:56:47 UTC Apr 25 2016
Negotiation                Cold Standby               Detected an Active mate

21:56:49 UTC Apr 25 2016
Cold Standby               Sync Config                Detected an Active mate

21:56:58 UTC Apr 25 2016
Sync Config                Sync File System           Detected an Active mate

21:56:58 UTC Apr 25 2016
Sync File System           Bulk Sync                  Detected an Active mate

21:57:11 UTC Apr 25 2016
Bulk Sync                  Standby Ready              Detected an Active mate

==========================================================================

ASA01/sec/stby(config)# show failover state

               State          Last Failure Reason      Date/Time
This host  -   Secondary
               Standby Ready  None
Other host -   Primary
               Active         None

====Configuration State===
    Sync Done - STANDBY
====Communication State===


ASA01/sec/stby(config)#  show failover statistics
    tx:277
    rx:232

ASA01/sec/stby(config)# show run    // ASA-2 SYNC ITS CONFIG WITH ASA-1
: Saved

:
: Serial Number: FCH19497456
: Hardware:   ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)
:
ASA Version 9.4(2)11 <system>
!
hostname ASA01
enable password 8Ry2YjIyt7RRXU24 encrypted
mac-address auto prefix 7797
!
interface GigabitEthernet0/0
 description ### WAN TRUNK ###
!
interface GigabitEthernet0/1
 description ### LAN TRUNK ###
!
interface GigabitEthernet0/1.400
 description ### INSIDE VLAN ###
 vlan 400
!
interface GigabitEthernet0/2
 shutdown

interface GigabitEthernet0/3
 shutdown
!
interface GigabitEthernet0/4
 shutdown
!
interface GigabitEthernet0/5
 shutdown
!
interface GigabitEthernet0/6
 description ### LAN FAILOVER ###
!
interface GigabitEthernet0/7
 description ### STATEFUL FAILOVER ###
!
interface Management0/0
!
class default
  limit-resource All 0
  limit-resource Mac-addresses 16384
  limit-resource ASDM 5
  limit-resource SSH 5
  limit-resource Telnet 5
!
class IPSEC-VPN
  limit-resource VPN Other 10
!

boot system disk0:/asa942-11-smp-k8.bin
ftp mode passive
pager lines 24
failover
failover lan unit secondary
failover lan interface LANFO GigabitEthernet0/6
failover key *****
failover link STATEFO GigabitEthernet0/7
failover interface ip LANFO 172.27.24.237 255.255.255.252 standby 172.27.24.238
failover interface ip STATEFO 172.27.24.241 255.255.255.252 standby 172.27.24.242
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
ssh stricthostkeycheck
console timeout 0

admin-context admin
context admin
  member IPSEC-VPN      
  allocate-interface GigabitEthernet0/0
  allocate-interface GigabitEthernet0/1.400
  allocate-interface Management0/0
  config-url disk0:/admin.cfg
!

prompt hostname priority state
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly 15
  subscribe-to-alert-group configuration periodic monthly 15
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:950c07895d257c4358b90a99c3c8a2d7
: end

ASA01/sec/stby(config)#


ASA-1

ASA01/pri/act# show failover ?

  descriptor  Show failover interface descriptors. Two numbers are shown for
              each interface. When exchanging information regarding a
              particular interface, this unit uses the first number in messages
              it sends to its peer. And it expects the second number in
              messages it receives from its peer. For trouble shooting, collect
              the show output from both units and verify that the numbers
              match.
  exec        Show failover command execution information
  group       Show failover group information
  history     Show failover switching history
  interface   Show failover command interface information
  state       Show failover internal state information
  statistics  Show failover command interface statistics information
  |           Output modifiers
  <cr>

ASA01/pri/act# show failover history
==========================================================================
From State                 To State                   Reason
==========================================================================
20:48:49 UTC Apr 25 2016
Not Detected               Disabled                   No Error

21:51:01 UTC Apr 25 2016
Disabled                   Negotiation                Set by the config command

21:51:46 UTC Apr 25 2016
Negotiation                Just Active                No Active unit found

21:51:46 UTC Apr 25 2016
Just Active                Active Drain               No Active unit found

21:51:46 UTC Apr 25 2016
Active Drain               Active Applying Config     No Active unit found

21:51:46 UTC Apr 25 2016
Active Applying Config     Active Config Applied      No Active unit found

21:51:46 UTC Apr 25 2016
Active Config Applied      Active                     No Active unit found

==========================================================================

ASA01/pri/act# show failover interface
    interface LANFO GigabitEthernet0/6
        System IP Address: 172.27.24.237 255.255.255.252
        My IP Address    : 172.27.24.237
        Other IP Address : 172.27.24.238
    interface STATEFO GigabitEthernet0/7
        System IP Address: 172.27.24.241 255.255.255.252
        My IP Address    : 172.27.24.241
        Other IP Address : 172.27.24.242

ASA01/pri/act# show failover state

               State          Last Failure Reason      Date/Time
This host  -   Primary
               Active         None
Other host -   Secondary
               Standby Ready  Comm Failure             21:52:01 UTC Apr 25 2016

====Configuration State===
    Sync Done
====Communication State===


To test failover, I've disconnected the LAN FO port G0/6 on ASA-1 and the Secondary ASA unit took over as the Active firewall.


ASA01/sec/act#

ASA01/sec/act# Failover LAN became OK
Switchover enabled
Beginning configuration replication: Sending to mate.
End Configuration Replication to mate
 
ASA01/sec/act# show failover
Failover On
Failover unit Secondary
Failover LAN Interface: LANFO GigabitEthernet0/6 (up)
Reconnect timeout 0:00:00
Unit Poll frequency 1 seconds, holdtime 15 seconds
Interface Poll frequency 5 seconds, holdtime 25 seconds
Interface Policy 1
Monitored Interfaces 2 of 216 maximum
MAC Address Move Notification Interval not set
Version: Ours 9.4(2)11, Mate 9.4(2)11
Last Failover at: 22:29:46 UTC Apr 25 2016
    This host: Secondary - Active
        Active time: 541 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)
          admin Interface inside (172.27.24.4): Normal (Monitored)
          admin Interface outside (202.78.4.6): Normal (Monitored)
    Other host: Primary - Standby Ready
        Active time: 0 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)
          admin Interface inside (172.27.24.5): Normal (Monitored)
          admin Interface outside (202.78.4.5): Normal (Monitored)

Stateful Failover Logical Update Statistics
    Link : STATEFO GigabitEthernet0/7 (up)
    Stateful Obj     xmit       xerr       rcv        rerr     
    General        293        0          303        8             sys cmd      292        0          292        0        
    up time      0          0          0          0        
    RPC services      0          0          0          0        
    TCP conn     0          0          0          0        
    UDP conn     0          0          0          0        
    ARP tbl      0          0          0          0        
    Xlate_Timeout      0          0          0          0        
    IPv6 ND tbl      0          0          0          0        
    VPN IKEv1 SA     0          0          0          0        
    VPN IKEv1 P2     0          0          0          0        
    VPN IKEv2 SA     0          0          0          0        
    VPN IKEv2 P2     0          0          0          0        
    VPN CTCP upd     0          0          0          0        
    VPN SDI upd     0          0          0          0        
    VPN DHCP upd     0          0          0          0        
    SIP Session     0          0          0          0        
    SIP Tx     0          0          0          0        
    SIP Pinhole     0          0          0          0        
    Route Session     0          0          10         8        
    Router ID     0          0          0          0        
    User-Identity     1          0          1          0        
    CTS SGTNAME     0          0          0          0        
    CTS PAC     0          0          0          0        
    TrustSec-SXP     0          0          0          0        
    IPv6 Route     0          0          0          0        
    STS Table     0          0          0          0        

    Logical Update Queue Information
              Cur     Max     Total
    Recv Q:     0     17     4666
    Xmit Q:     0     165     689


I've issued the no failover active command to give back ASA-1 the Active role again.


ASA01/sec/act#  no failover ?

  active  Make this system to be the active unit of the failover pair

ASA01/sec/act#  no failover active

ASA01/sec/act#
    Switching to Standby


ASA01/sec/stby# show failover      // I HAD MY CONSOLE CABLE TO ASA-2
Failover On
Failover unit Secondary
Failover LAN Interface: LANFO GigabitEthernet0/6 (up)
Reconnect timeout 0:00:00
Unit Poll frequency 1 seconds, holdtime 15 seconds
Interface Poll frequency 5 seconds, holdtime 25 seconds
Interface Policy 1
Monitored Interfaces 2 of 216 maximum
MAC Address Move Notification Interval not set
Version: Ours 9.4(2)11, Mate 9.4(2)11
Last Failover at: 22:50:51 UTC Apr 25 2016
    This host: Secondary - Standby Ready
        Active time: 1264 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)
          admin Interface inside (172.27.24.5): Normal (Waiting)
          admin Interface outside (202.78.4.5): Normal (Waiting)
    Other host: Primary - Active
        Active time: 10 (sec)
        slot 0: ASA5525 hw/sw rev (1.0/9.4(2)11) status (Up Sys)
          admin Interface inside (172.27.24.4): Normal (Waiting)
          admin Interface outside (202.78.4.6): Normal (Waiting)

Stateful Failover Logical Update Statistics
    Link : STATEFO GigabitEthernet0/7 (up)
    Stateful Obj     xmit       xerr       rcv        rerr     
    General        391        0          405        12            sys cmd      390        0          390        0        
    up time      0          0          0          0        
    RPC services      0          0          0          0        
    TCP conn     0          0          0          0        
    UDP conn     0          0          0          0        
    ARP tbl      0          0          0          0        
    Xlate_Timeout      0          0          0          0        
    IPv6 ND tbl      0          0          0          0        
    VPN IKEv1 SA     0          0          0          0        
    VPN IKEv1 P2     0          0          0          0        
    VPN IKEv2 SA     0          0          0          0        
    VPN IKEv2 P2     0          0          0          0        
    VPN CTCP upd     0          0          0          0        
    VPN SDI upd     0          0          0          0        
    VPN DHCP upd     0          0          0          0        
    SIP Session     0          0          0          0        
    SIP Tx     0          0          0          0        
    SIP Pinhole     0          0          0          0        
    Route Session     0          0          14         12       
    Router ID     0          0          0          0        
    User-Identity     1          0          1          0        
    CTS SGTNAME     0          0          0          0        
    CTS PAC     0          0          0          0        
    TrustSec-SXP     0          0          0          0        
    IPv6 Route     0          0          0          0        
    STS Table     0          0          0          0        

    Logical Update Queue Information
              Cur     Max     Total
    Recv Q:     0     17     5523
    Xmit Q:     0     165     1522

ASA01/sec/stby# show failover history
==========================================================================
From State                 To State                   Reason
==========================================================================
20:42:02 UTC Apr 25 2016
Not Detected               Disabled                   No Error

21:56:46 UTC Apr 25 2016
Disabled                   Negotiation                Set by the config command

21:56:47 UTC Apr 25 2016
Negotiation                Cold Standby               Detected an Active mate

21:56:49 UTC Apr 25 2016
Cold Standby               Sync Config                Detected an Active mate

21:56:58 UTC Apr 25 2016
Sync Config                Sync File System           Detected an Active mate

21:56:58 UTC Apr 25 2016
Sync File System           Bulk Sync                  Detected an Active mate

21:57:11 UTC Apr 25 2016
Bulk Sync                  Standby Ready              Detected an Active mate

22:29:46 UTC Apr 25 2016
              Standby Ready              Just Active                HELLO not heard from mate

22:29:46 UTC Apr 25 2016
Just Active                Active Drain               HELLO not heard from mate

22:29:46 UTC Apr 25 2016
Active Drain               Active Applying Config     HELLO not heard from mate

22:29:46 UTC Apr 25 2016
Active Applying Config     Active Config Applied      HELLO not heard from mate

22:29:46 UTC Apr 25 2016
Active Config Applied      Active                     HELLO not heard from mate

22:50:51 UTC Apr 25 2016
Active                     Standby Ready              Set by the config command

==========================================================================

ASA01/sec/stby# show failover interface
    interface LANFO GigabitEthernet0/6
        System IP Address: 172.27.24.237 255.255.255.252
        My IP Address    : 172.27.24.238
        Other IP Address : 172.27.24.237
    interface STATEFO GigabitEthernet0/7
        System IP Address: 172.27.24.241 255.255.255.252
        My IP Address    : 172.27.24.242
        Other IP Address : 172.27.24.241

ASA01/sec/stby# show failover state

               State          Last Failure Reason      Date/Time
This host  -   Secondary
               Standby Ready  None
Other host -   Primary
               Active         Comm Failure             22:29:46 UTC Apr 25 2016

====Configuration State===
    Sync Done
    Sync Done - STANDBY
====Communication State===
    Mac set