Redundancy:: o Redundancy, Failover, High Availability, Clustering, RAID and Fault-Tolerance
Redundancy:: o Redundancy, Failover, High Availability, Clustering, RAID and Fault-Tolerance
Active-Active:
o Active-Active deployment, both firewalls in the pair are active and processing traffic.
o Use an Active-Active setup to load balance TCP sessions across multiple Firewall units.
o UDP, ICMP, multicast, and broadcast traffic remains only on the primary Firewall unit.
o The primary FortiGate unit Firewall distributes the TCP sessions to all other Firewalls.
o Active-active High Availability provides session failover protection for all TCP sessions.
o Active-active HA does not provide session failover for UDP, ICMP, multicast & broadcast.
o Active-Active High Availability is less session fail-over resilient than Active-Passive mode.
o Active-Active does not provide load-balancing for all sessions enable profiles & proxy.
o Active-active HA load balancing distributes proxy-based security profile processing to all.
Heartbeat Messages:
o Hello Messages, are send from one peer to the other to verify the state of the firewall.
o The Heartbeat is an non-TCP packets to the HA peer over the High Availability HA Link .
o Firewalls use hello message and heartbeats to verify that the peer firewall is responsive.
o Firewalls use hello message and heartbeats to verify that the peer firewall is operational.
o Hello messages are sent from one peer to other at the configured Hello Interval to verify.
o Peer responds to non-TCP packets to establish that firewalls are connected and responsive.
o By default, In FortiGate Network Firewall the interval for the heartbeat is 200 milliseconds.
o If 6 heartbeat packets are not received from unit then cluster unit is considered to failed.
Link Monitoring:
o Physical interfaces to be monitored are grouped into a link group and their state is monitor.
o FortiGate Network Firewall, link group can contain one or more physical interfaces or links.
o A FG Firewall failure is triggered when any or all of the interfaces or link in the group fail.
o Default behavior is failure of any one link in the link group will cause the firewall to change.
o You configure monitored the interfaces also called interface monitoring or port monitoring.
Priority:
o When two FortiGate Networks firewalls are deployed in the active-passive cluster.
o It is mandatory to configure device priority higher priority for Master low for Slave.
o Firewall with high numerical value & therefore higher priority, is designated as Master.
o The device priority decides which FortiGate firewall will preferably take the Master role.
o Which FortiGate firewall will take over the Slave role when both the firewalls boot up.
Session-Pickup:
o When it is enabled, FGCP synchronizes primary unit's TCP session table to all cluster units.
o As new TCP session is added to primary unit session table, session is synchronized to all.
o This synchronization happens as quickly as possible to keep the session tables synchronized.
o If primary fails, new primary unit uses synchronized session table to resume all TCP session.
o That were being processed by the former primary unit firewall with only minimum time.
Unicast HA Heartbeat:
o In the virtual machine (VM) environments that do not support broadcast communication.
o You can set up unicast High Availability (HA) heartbeat when configuring High Availability.
o Setting up unicast HA heartbeat consists of enabling feature and adding a peer IP address.
o Peer IP address is IP address of HA heartbeat interface of other FortiGate VM in HA cluster.
o You can enable unicast High Availability heartbeat from the GUI by going to System > HA.
o Enabling Unicast heartbeat & adding an Peer IP, which is address of heartbeat interface.
Change Hostname:
Now, you should login to MASTER Firewall, I recommend changing the hostname before login,
this will improve the ability to identify the different FortiGate Unit Firewall.
Configure Interfaces:
Go to Network>Interfaces select port1 Click Edit. In Alias type WAN, change the Address Mode
to Manual type IP/Netmask 192.168.122.100/24, in Administrative access leave all the rest of
configuration default and press OK button. The firewall will be disconnected login with new
Management IP address which is the WAN IP address as well.
Change Hostname:
Now, you should login to SLAVE Firewall, I recommend changing the hostname before login,
this will improve the ability to identify the different FortiGate Unit Firewall.
HA Active-Passive Configuration:
Same as master, Go to System > HA Select the Active-Passive mode. Give Device Priority to
SLAVE Firewall a lower number than the Master one (50). Set the same group name and same
password for the cluster which already set on MASTER Firewall. Enable Session Pickup: Enable
this option to sync master to backup machine. Check the interface you want to monitor
normally internet. Enable two heartbeat to create a stable HA.
Failover Verification:
Lets put continue ping from any LAN PC.
Let’s powered off the primary Firewall you will be logging into the backup FortiGate.
Check the host name to verify the FortiGate that you have logged into. The FortiGate continues
to operate in HA mode.