FortiGate HA Config
FortiGate HA Config
Now let’s talk about what is HA and why it is required for our organization.
HA – High availability
1. High availability is one kind of mechanism that’s provides redundancy in the network If in case
of primary device goes down then secondary device will come up without any delay or
interruptions. Or you can say that it provides redundancy in the Network.
2. HA functions similar to VRRP, but one of the main differences is that you absolutely must have
two same FortiGate models to achieve HA.
3. Fortigate uses FGCP (Fortigate Clustering protocol) When fortigate sync their configurations
with the clusters.
4. HA failover must be deployed in our organization if we want redundancy.
5. If there is single fortigate firewall deployed in your network so mode will be always –
Standalone. For verification you check by – get system status.
Now let’s put on one glimpse on standalone mode using below the topology.
What will happen If this standalone fortigate firewall get down, all the traffic will come to the firewall
and simply will be dropped.
Fortigate HA configuration
To achieve redundancy we deploy either A-P mode or A-A mode. Now in this article I am going to discuss
only A-P mode. Will discuss for A-P next article.
Before to begin A-P mode configuration there are few prerequisites that fortigate recommends us to
follow.
1. Make sure your FortiGate interfaces are configured with static IP addresses. If any interface gets
its address using DHCP or PPPoE you should temporarily switch it to a static address and enable
DHCP or PPPoE after the cluster has been established.
2. Make sure the FortiGates are running the same FortiOS firmware version.
3. All the FortiGates in a cluster must have the same level of licensing.
Now I am about to show you Fortigate HA (A-P) mode using the below topology.
Let me show you what I have done in this topology to achieve redundancy.
Fortigate HA configuration
Configuration road map – At Switch
There are two vlans one is Vlan 10 and another one is Vlan 20 which belongs to App and IT respectively.
Switch(config)#interface e 0/2
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config)#interface e 0/3
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 20
ISP(config)#interface G 3/0
ISP (config-if)#ip address 192.168.50.1 255.255.255.0
ISP (config-if)#no shutdown
ISP(config)#interface G 1/0
ISP (config-if)#ip address 192.168.99.1 255.255.255.248
ISP (config-if)#no shutdown
ISP(config)#interface G 2/0
ISP (config-if)#ip address 192.168.98.1 255.255.255.248
ISP (config-if)#no shutdown
Now here we have to configure interesting traffic that is called ACL and NAT needs to be configured.
edit "port2"
set ip 192.168.98.2 255.255.255.0
set allowaccess ping
set type physical
set alias "TCL_Port2"
set role wan
next
end
edit "Port4_Vlan10"
set ip 10.1.1.1 255.255.255.0
set allowaccess ping https ssh snmp
set alias "Port4_Vlan10_App"
set role lan
set interface "port4"
set vlanid 10
next
Fortigate HA configuration
edit "Port4_Vlan20"
set ip 10.1.2.1 255.255.255.0
set allowaccess ping https ssh snmp
set alias "Port4_Vlan20_IT"
set role lan
set interface "port4"
set vlanid 20
next
end
Note – I have configured SDWAN as well in this topology but at this time I will show you only for HA (A-P
mode) in this article.
Fortigate HA configuration
Now lets move towards HA configuration on primary firewall.
For this topology I have taken only single HA links but you can choose as per your requirements but I will
recommend you choose two heartbeat interfaces.
At Primary HA Firewall -
config system ha
set group-id 10
set group-name HA_cluster
set mode a-p
set password admin@54321
set priority 200
set hbdev port3 0
set session-pickup enable
set override enable
set override-wait-time 5
end
At Secondary HA Firewall –
Make sure we only have to configure host name & HA configuration along with change priority of slave
device that’s it.
config system ha
set group-id 10
set group-name HA_cluster
set mode a-p
set password admin@54321
set priority 150
set hbdev port3 0
set session-pickup enable
set override enable
set override-wait-time 5
end
Fortigate HA configuration
let’s verified ha configuration using # get system ha status command.
HA Health Status: OK
Model: FortiGate-VM64-KVM
Mode: HA A-P
Group: 10
Debug: 0
<2022/05/23 00:06:51> FGVMEVTIWWWKMM48 is selected as the master because it has the largest
value of override priority.
<2022/05/22 23:42:29> FGVMEVTIWWWKMM48 is selected as the master because it's the only
member in the cluster.
override: enable
Configuration Status:
HBDEV stats:
Fortigate HA configuration
FGVMEVTIWWWKMM48(updated 2 seconds ago):
number of vcluster: 1
FGT_Primary #
# get system ha
FGT_Primary # get system ha
group-id : 10
group-name : HA_cluster
mode : a-p
sync-packet-balance : disable
password :*
hbdev : "port3" 0
session-sync-dev :
route-ttl : 10
route-wait :0
route-hold : 10
Fortigate HA configuration
multicast-ttl : 600
sync-config : enable
encryption : disable
authentication : disable
hb-interval :2
hb-lost-threshold : 20
hello-holddown : 20
gratuitous-arps : enable
arps :5
arps-interval :8
session-pickup : enable
session-pickup-connectionless: disable
session-pickup-expectation: disable
session-pickup-delay: disable
link-failed-signal : disable
uninterruptible-upgrade: enable
ha-mgmt-status : disable
ha-eth-type : 8890
hc-eth-type : 8891
l2ep-eth-type : 8893
ha-uptime-diff-margin: 300
vcluster2 : disable
vcluster-id :1
override : enable
Fortigate HA configuration
priority : 200
override-wait-time : 5
monitor :
pingserver-monitor-interface:
vdom : "root"
ssd-failover : disable
memory-compatible-mode: disable
inter-cluster-session-sync: disable
unicast-hb : disable
logical-sn : disable
FGT_Primary #
In order to verify I am going to check from the IT admin which belongs into Vlan 20.
As you can see that traffic is going through primary foritgate firewall. Now I am going to down
primary fortigate firewall
We can also verify from the GUI also that secondary Firewall is up & working fine once primary
firewall goes down right.
Fortigate HA configuration
Please see the below Final High availability cluster topology between two FortiGate units.
Point to be remembered – whenever you are going to deploy HA in your topology you must
terminate your WAN/LAN links through switch.
Note – I will discuss all the HA configuration in details with wire shark in upcoming notes It was
just for demonstration purpose only.
I will request you all please do like, share & comment, If there are miner mistake please let me
so that I can improve my tech skills.
Thank you.
Umesh Prajapati
Email – [email protected]