Fortinet 800F manual Group ID MAC Address

Page 52

High availability configuration settings

 

High availability installation

 

 

 

 

 

Table 10: High availability settings

 

 

 

 

 

 

Active-Active

Load balancing and failover HA. Each FortiGate unit in the

 

 

 

HA cluster actively processes connections and monitors the

 

 

 

status of the other FortiGate units in the cluster. The

 

 

 

primary FortiGate unit in the cluster controls load balancing.

 

Mode

 

 

 

Active-Passive

Failover HA. The primary FortiGate unit in the cluster

 

 

 

processes all connections. All other FortiGate units in the

 

 

 

cluster are passively monitor the cluster status and remain

 

 

 

synchronized with the primary FortiGate unit.

 

 

 

 

 

 

All members of

the HA cluster must be set to the same HA mode.

 

 

 

 

 

The group ID range is from 0 to 63. All members of the HA cluster must have

 

 

the same group ID.

 

 

When the FortiGate units in the cluster are switched to HA mode, all of the

 

 

interfaces of all of the units in the cluster get the same virtual MAC address.

 

 

This virtual MAC address is set according to the group ID.

 

 

 

 

 

 

Group ID

MAC Address

 

 

 

 

 

 

0

00-09-0f-06-ff-00

 

 

 

 

 

Group ID

1

00-09-0f-06-ff-01

 

 

 

 

2

00-09-0f-06-ff-02

 

 

 

 

 

 

 

 

3

00-09-0f-06-ff-03

 

 

 

 

 

 

 

 

 

 

 

 

 

63

00-09-0f-06-ff-3f

 

 

 

 

 

 

If you have more

than one HA cluster on the same network, each cluster

 

 

should have a different group ID. If two clusters on the same network have

 

 

same group ID, the duplicate MAC addresses cause addressing conflicts on

 

 

the network.

 

 

 

 

 

 

The unit with the highest priority becomes the primary unit in the cluster. The

 

 

unit priority range is 0 to 255. The default unit priority is 128.

 

Unit priority

Set the unit priority to a higher value if you want the FortiGate unit to be the

 

primary cluster unit. Set the unit priority to a lower value if you want the

 

 

FortiGate unit to be a subordinate unit in the cluster. If all units have the

 

 

same priority, the FortiGate unit with the highest serial number becomes the

 

 

primary cluster unit.

 

 

 

 

Override

You can configure a FortiGate unit to always become the primary unit in the

 

Master

cluster by giving it a high priority and by selecting Override master.

 

 

 

 

52

01-28006-0024-20041026

Fortinet Inc.

Image 52
Contents Installation Guide October 01-28006-0024-20041026Trademarks Regulatory ComplianceTable of Contents Index Secure installation, configuration, and management IntroductionCommand line interface Web-based managerSetup wizard Document conventionsFortiGate Installation Guide FortiGate documentationRelated documentation FortiManager documentationFortiClient documentation FortiMail documentationFortiLog documentation Comments on Fortinet technical documentationCustomer service and technical support Comments on Fortinet technical documentation Getting started Package contents Mounting Connecting to the web-based manager Turning the FortiGate unit power on and offTo power off the FortiGate unit Connecting to the command line interface CLI To connect to the web-based managerTo connect to the CLI WelcomeFactory default FortiGate configuration settings Factory default NAT/Route mode network configurationFactory default Transparent mode network configuration Network SettingsFactory default firewall configuration Factory default protection profilesWeb protection profile settings Planning the FortiGate configuration NAT/Route modeNAT/Route mode with multiple external network connections Transparent modeWeb-based manager and setup wizard Configuration optionsFront control buttons and LCD Next steps NAT/Route mode installation Preparing to configure the FortiGate unit in NAT/Route modeDhcp or PPPoE configuration DMZConfiguring basic settings Using the web-based managerTo configure interfaces Go to System Network Interface Using the front control buttons and LCD To configure DNS server settings Go to System Network DNSTo add a default route Go to System Router StaticUsing the command line interface Configuring the FortiGate unit to operate in NAT/Route modeTo add a default gateway to an interface To add/change the administrator passwordTo configure interfaces ExampleTo configure DNS server settings Get system interfaceUsing the setup wizard On page 28 and on page 29 for other settingsStarting the setup wizard Dhcp serverFortiGate-800 Connecting the FortiGate unit to the networksFortiGate-800F To connect the FortiGate unit running in NAT/Route mode To connect to FortiGate-800/800F user-defined interfacesConfiguring the networks To set the date and time Go to System Config TimeTo register the FortiGate unit To configure virus, attack, and spam definition updates Go to System Maintenance Update CenterTransparent mode installation Preparing to configure Transparent modeTo change the Management IP Go to System Network Management Reconnecting to the web-based manager To change the management IP address and netmaskTo change to Transparent mode using the CLI To add a default gatewayTo configure the management IP address To configure the default gateway EndConnecting the FortiGate unit to your network To start the setup wizardFortiGate-800F Internal Network Other Network To register your FortiGate unit Reconnecting to the web-based manager High availability installation Configuring FortiGate units for HA operationHigh availability configuration settings Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address High availability settings Schedule To change the FortiGate unit host nameConfiguring FortiGate units for HA using the CLI Config system global Set hostname namestr endConnecting the cluster to your networks To configure the FortiGate unit for HA operationTo connect the cluster Installing and configuring the cluster Internal NetworkConfiguring FortiGate units for HA using the CLI Index CLIIndex 01-28006-0024-20041026

800F, 800 specifications

Fortinet, a leader in cybersecurity solutions, has made significant strides in fortifying enterprise networks with its FortiGate 800 and 800F series. These next-generation firewalls are designed to deliver high performance and security for organizations seeking to protect their critical assets while ensuring optimal network efficiency.

The FortiGate 800 and 800F series are built on Fortinet's proprietary Security Fabric architecture, which provides a consolidated approach to security. This architecture allows organizations to leverage seamless integration across various security solutions and services, enhancing visibility and control. With a focus on scalability, these models support various deployment scenarios—from branch offices to data centers—making them versatile options for organizations of any size.

One of the standout features of the FortiGate 800 and 800F series is their robust threat intelligence capabilities. Powered by FortiGuard Labs, these firewalls provide real-time threat intelligence that enables proactive threat mitigation and incident response. This not only helps to defend against known threats but also enhances the firewall’s ability to identify emerging threats, ensuring comprehensive protection.

The series boasts impressive performance metrics. The FortiGate 800F can process up to 20 Gbps of firewall throughput and 1.5 million concurrent sessions, making it a suitable choice for high-performance environments. Additionally, the built-in SSL inspection capabilities allow organizations to decrypt and inspect encrypted traffic, which is crucial for detecting hidden threats.

The FortiGate 800 and 800F also feature advanced security technologies, including Intrusion Prevention System (IPS), antivirus, web filtering, and application control, all managed through a unified interface. This centralization simplifies management and reduces administrative overhead, allowing IT teams to focus on strategic initiatives.

Another significant characteristic of the FortiGate 800F is its energy efficiency. The design includes hardware optimizations that not only enhance performance but also reduce power consumption, aligning with the growing emphasis on sustainability practices.

In summary, the Fortinet FortiGate 800 and 800F series are comprehensive network security solutions that leverage advanced technologies to provide organizations with the security, performance, and flexibility necessary in today's threat landscape. With their robust threat intelligence and high throughput capabilities, these firewalls are well-suited for enterprises looking to fortify their defenses against an ever-evolving array of cyber threats.