动 - 动 HA

高可用性

 

 

主 FortiGate 设备通过 FortiGate HA 接口向附属设备发送会话信息。在同一个 HA 簇中的所有设备共同维护所有的会话信息。如果主 FortiGate 设备失效了,附属设备 会互相协商选出一个新的主设备。新的主设备负责恢复所有已经建立的连接。

在失效恢复期间,HA 组会通知附近的网络设备,以使得整个网络可以迅速地转换 到新的数据路径中。新的主设备还会将 HA 簇中发生的变动通知管理员。它会在它自己 的事件日志中写入一条消息,发送一个 SNMP 陷阱 (如果启用了 SNMP),并且发送一个 报警邮件。

如果一个附属的 FortiGate 设备失效了,主 FortiGate 设备会在它自己的事件日志 中写入一条消息,发送一个 SNMP 陷阱和一个报警邮件。主 FortiGate 设备还将调整 HA 簇中剩下的设备的优先级。

动 - 动 HA

主动 - 主动 (A-A)HA 为同一个 HA 簇中的所有 FortiGate 设备提供负载均衡。一 个主动 - 主动 HA 簇包括一个主动 FortiGate 设备和一个或多个附属 FortiGate 设备, 所有设备全都参与通讯的处理。主 FortiGate 设备使用一个负载均衡算法将会话分配 到 HA 簇中的每个 FortiGate 设备中去。

在主动 - 主动 HA 模式下,主设备使用下面所列出的算法之一在 HA 簇的成员设备中 分配网络会话。

表 16: 主动 - 主动 HA 负载均衡算法

算法

说明

 

 

无负载均衡。当 HA 簇接口连接到负载均衡交换机上时使用此选项。

 

 

集线器

当 HA 簇接口连接到集线器上时使用此选项。根据包的源 IP 和目的 IP

 

地址将通讯分配到同一簇的不同设备上。

 

 

最小连接

将通讯分配到同一簇的不同设备中,使得每个设备上所承担的连接最

 

少。

 

 

循环

依次将每个通讯分配到 HA 簇中的一个设备上。

 

 

加权循环

类似于循环算法,但是为 HA 簇中的每个设备根据他们的容量计权。例

 

如,主设备应该具有最低的权重,因为它要负责处理和分配通讯连接。

 

 

随机

将通讯随机分配到 HA 簇中的设备上。

 

 

IP

根据包的源 IP 地址和目的 IP 地址将通讯分配到 HA 簇的设备上。

 

 

IP 端口

根据包的源 IP 地址、目的 IP 地址、源端口、目的端口将通讯分配到

 

HA 簇的设备上。

 

 

HA 簇的成员在启动过程中协商推选出主设备。主设备可以允许其他 FortiGate 设 备作为附属设备加入这个 HA 簇,并为每个附属设备分配优先权。

FortiGate 设备通过 FortiGate HA 接口传输状态和会话信息。在同一个 HA 簇中的 所有设备共同维护所有的会话信息。在使用负载均衡的工作模式下,主 FortiGate 设 备将数据包转发到附属设备,它将数据包从收到数据包的那个接口发送到附属 FortiGate 设备的对应的接口上。

如果主设备失效,在已经失效的主设备上注册的第一个附属设备将成为新的主设 备。新的主设备会通知其他的 FortiGate 设备它已经成为主设备,并重新设置剩下的 附属设备的优先级。新的主设备还将重新分配 HA 簇中的每个设备所负担的通讯会话。

60

美国飞塔有限公司

Page 72
Image 72
Fortinet 500 manual 在主动 主动 Ha 模式下,主设备使用下面所列出的算法之一在 Ha 簇的成员设备中 分配网络会话。

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.