透明模式的 HA

高可用性

 

 

SNMP 允许一个远程 SNMP 管理者连接到此接口并请求 SNMP 管理信息。

TELNET 允许通过此接口建立到 CLI 的 Telnet 连接。Telnet 连接并不安全,有可能被第三 方截获。

4 根据需要修改 IP 地址和子网掩码。

5 可以选择配置其他接口的管理访问方式。

6 单击应用。

现在您已经完成了对 HA 接口的配置,可以进入下一步 配置 HA 簇

配置 HA

在将 HA 簇连接到您的网络之前,按照如下步骤为每个 FortiGate 设备配置 HA。

注意:以下操作叙述了在将 HA 簇连接到您的网络之前如何配置 HA 簇中的每个 FortiGate 设备。 您还可以使用 第 67 页 将 HA 簇连接到您的网络中中的步骤先将 HA 簇连接到您的网络。

1 连接到 FortiGate 设备并登录进基于 Web 的管理程序。

2 进入 系统 > 配置 > HA

3 单击 HA

4 选择 HA 模式。

选择 主动 - 被动模式 可以创建一个主动 - 被动的 HA 组。HA 组中的一台 FortiGate 处 于主动模式,处理所有的连接,其它的 FortiGate 处于被动模式,监视主动 FortiGate 的状态并保持与主动设备同步。

选择主动 - 主动模式可以创建一个主动 - 主动的 HA 组。在这个 HA 组中,每一台 FortiGate 都主动地处理连接并监视其它的 FortiGate 的状态。

在这个 HA 簇中的全部 FortiGate 设备的 HA 模式必须相同。

5 为这个 HA 簇设置一个密码。

在这个 HA 簇中,所有的密码必须相同。

6 为这个 HA 簇选择一个组 ID。

在这个 HA 中的所有 FortiGate 必须使用相同的组 ID。

7 如果您将设备配置为以主动 - 主动 HA 模式工作,选择一个负载均衡算法。

算法控制主动 - 主动 HA 簇中的 FortiGate 设备之间的负载均衡。在这个 HA 簇中的所 有 FortiGate 设备的负载均衡算法必须相同。

无负载均衡。当 HA 簇接口连接到负载均衡交换机上时使用此选项。

集线器

用于集线器的负载均衡。当 HA 簇接口连接到集线器上时使用此选项。根

 

据包的源 IP 和目的 IP 地址将通讯分配到同一簇的不同设备上。

最小连接

最小连接负载均衡。如果 FortiGate 设备使用交换机连接,选择最小连

 

接负载均衡可以将通讯分配到同一簇的不同设备中,使得每个设备上所

 

承担的连接最少。

循环负载均衡。如果 FortiGate 设备使用交换机连接,选择循环负载均

 

衡可以依次将每个通讯分配到 HA 簇中的一个设备上。

加权

加权循环负载均衡。类似于循环算法,但是为 HA 簇中的每个设备根据他

 

们的容量和他们当前处理的连接数计权。例如,主设备应该具有最低的

 

权重,因为它要负责处理和分配通讯连接。加权循环负载均衡能够将通

 

讯分配得更加均匀,因为处理的通讯少的设备将比任务重的设备更容易

 

被分配到通讯连接。

66

美国飞塔有限公司

Page 78
Image 78
Fortinet 500 manual 在将 HA 簇连接到您的网络之前,按照如下步骤为每个 FortiGate 设备配置 HA。, 连接到 FortiGate 设备并登录进基于 Web 的管理程序。

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.