Fortinet 127, FORTIGATE, 500A, Network Router manual Group ID MAC Address

Page 46

High availability configuration settings

 

High availability installation

 

 

 

 

 

Table 9: High availability settings

 

 

 

 

 

 

Active-Active

Load balancing and failover HA. Each FortiGate unit in the

 

 

 

HA cluster actively processes connections and monitors the

 

 

 

status of the other FortiGate units in the cluster. The

 

 

 

primary FortiGate unit in the cluster controls load balancing.

 

Mode

 

 

 

Active-Passive

Failover HA. The primary FortiGate unit in the cluster

 

 

 

processes all connections. All other FortiGate units in the

 

 

 

cluster are passively monitor the cluster status and remain

 

 

 

synchronized with the primary FortiGate unit.

 

 

 

 

 

 

All members of

the HA cluster must be set to the same HA mode.

 

 

 

 

 

The group ID range is from 0 to 63. All members of the HA cluster must have

 

 

the same group ID.

 

 

When the FortiGate units in the cluster are switched to HA mode, all of the

 

 

interfaces of all of the units in the cluster get the same virtual MAC address.

 

 

This virtual MAC address is set according to the group ID.

 

 

 

 

 

 

Group ID

MAC Address

 

 

 

 

 

 

0

00-09-0f-06-ff-00

 

 

 

 

 

Group ID

1

00-09-0f-06-ff-01

 

 

 

 

2

00-09-0f-06-ff-02

 

 

 

 

 

 

 

 

3

00-09-0f-06-ff-03

 

 

 

 

 

 

 

 

 

 

 

 

 

63

00-09-0f-06-ff-3f

 

 

 

 

 

 

If you have more

than one HA cluster on the same network, each cluster

 

 

should have a different group ID. If two clusters on the same network have

 

 

same group ID, the duplicate MAC addresses cause addressing conflicts on

 

 

the network.

 

 

 

 

 

 

The unit with the highest priority becomes the primary unit in the cluster. The

 

 

unit priority range is 0 to 255. The default unit priority is 128.

 

Unit priority

Set the unit priority to a higher value if you want the FortiGate unit to be the

 

primary cluster unit. Set the unit priority to a lower value if you want the

 

 

FortiGate unit to be a subordinate unit in the cluster. If all units have the

 

 

same priority, the FortiGate unit with the highest serial number becomes the

 

 

primary cluster unit.

 

 

 

 

Override

You can configure a FortiGate unit to always become the primary unit in the

 

Master

cluster by giving it a high priority and by selecting Override master.

 

 

 

 

46

01-28005-0101-20041015

Fortinet Inc.

Image 46
Contents Installation Guide October 01-28005-0101-20041015Trademarks Regulatory ComplianceTable of Contents Index Introduction Reliability demanded by large enterprisesSecure installation, configuration, and management Web-based managerSetup wizard Command line interfaceDocument conventions Set allowaccess ping https ssh snmp http telnet Fortinet documentation Comments on Fortinet technical documentationCustomer service and technical support Getting started Package contents MountingEnvironmental specifications Turning the FortiGate unit power on and offPower requirements Air flowTo power off the FortiGate unit Connecting to the web-based managerTo connect to the web-based manager Connecting to the command line interface CLI To connect to the CLIBits per second 9600 Data bits Parity Factory default FortiGate configuration settingsStop bits Flow control Account Factory default NAT/Route mode network configurationNetwork Settings PortFactory default Transparent mode network configuration Factory default firewall configurationScan Factory default protection profilesStrict WebPlanning the FortiGate configuration NAT/Route modeNAT/Route mode with multiple external network connections Example NAT/Route mode network configurationConfiguration options Transparent modeFortiGate-500A Unit Management IP in Transparent mode Web-based manager and setup wizard Next stepsConfiguration options Getting started 01-28005-0101-20041015 NAT/Route mode installation Preparing to configure the FortiGate unit in NAT/Route modeDhcp or PPPoE configuration PPPoE settings User name PasswordTo configure interfaces Go to System Network Interface Using the web-based managerConfiguring basic settings To configure DNS server settings Go to System Network DNSGo to System Router Static Using the front control buttons and LCDTo add a default route To change the IP address and netmask of an interfaceTo add a default gateway to an interface Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode To add/change the administrator passwordExample To configure DNS server settings Using the setup wizard Starting the setup wizard Setup wizard settings AntivirusTo connect the FortiGate unit running in NAT/Route mode Connecting the FortiGate unit to the networksPort 1 Port Go to System Config Time Configuring the networksTo set the date and time Go to System Maintenance Update Center To configure virus, attack, and spam definition updatesTo register the FortiGate unit Transparent mode installation Preparing to configure Transparent modeDNS Settings Transparent mode settings Administrator PasswordTo change the Management IP Go to System Network Management To add a default gateway Reconnecting to the web-based managerTo change the management IP address and netmask To change to Transparent mode using the CLI To configure the management IP addressTo configure the default gateway ExampleConnecting the FortiGate unit to your network To start the setup wizardFortiGate-500A PortTo register your FortiGate unit High availability configuration settings High availability installationConfiguring FortiGate units for HA operation Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address To change the FortiGate unit host name Configuring FortiGate units for HA using the CLI Config system global Set hostname namestr endConnecting the cluster to your networks To configure the FortiGate unit for HA operationHA network configuration To connect the clusterInstalling and configuring the cluster Configuring FortiGate units for HA using the CLI Index CLIIndex 01-28005-0101-20041015

500A, Network Router, 127, FORTIGATE specifications

Fortinet FortiGate 127 is an advanced network security appliance designed to deliver comprehensive protection to organizations while ensuring seamless network performance. As a part of Fortinet's leading next-generation firewall (NGFW) offerings, the FortiGate 127 integrates various essential features and technologies that are critical for modern network security.

One of the standout features of the FortiGate 127 is its ability to perform deep packet inspection. This technology enables the device to analyze and filter network traffic, identifying and mitigating threats such as malware, viruses, and intrusions in real-time. With a robust Threat Intelligence system, FortiGate utilizes FortiGuard Labs to provide continuous updates on emerging threats, equipping organizations with the necessary defense against sophisticated cyberattacks.

Another key technology included in the FortiGate 127 is integrated secure SD-WAN functionality. This feature allows organizations to optimize their wide-area network (WAN) connections, enhancing performance and reducing costs through intelligent traffic routing and real-time application visibility. By leveraging software-defined capabilities, businesses can ensure efficient use of their bandwidth, prioritize critical applications, and maintain high levels of uptime.

The FortiGate 127 also excels in providing advanced VPN support. With multiple VPN protocols such as IPsec and SSL, users can establish secure remote connections, facilitating safe access to corporate resources from anywhere. This is particularly important in today's remote work environment, where secure connectivity is essential for maintaining productivity while protecting sensitive data.

In terms of performance, the FortiGate 127 is equipped with high throughput capabilities, ensuring it can handle extensive network traffic without compromising speed or efficiency. Its multi-core architecture allows for parallel processing, which enhances overall performance and responsiveness.

Additionally, the device features an intuitive and user-friendly interface, enabling IT teams to easily manage and configure network policies. With centralized management options, administrators can efficiently oversee multiple FortiGate devices within their network, ensuring optimal visibility and control.

Overall, the Fortinet FortiGate 127 Network Router is a powerful solution for organizations seeking to bolster their security posture. With its combination of deep packet inspection, integrated SD-WAN functionality, advanced VPN support, and high-performance capabilities, it stands out as a vital asset in the modern cybersecurity landscape. It is an ideal choice for businesses aiming to protect their networks from the ever-evolving threat landscape while maintaining operational efficiency.