Fortinet white logo
Fortinet white logo

GCP Administration Guide

FGCP in public cloud

FGCP in public cloud

The FortiGate clustering protocol (FGCP) is a proprietary protocol used to create high availability clusters in hardware and virtual FortiGate deployments. Due to the way cloud networks work, you cannot take full advantage of the protocol capabilities and must use its unicast version, limiting the functionality to an active-passive cluster of two instances.

FGCP provides automatic synchronization of connection tables as well as synchronization of configuration from the primary to the secondary instance. You must apply all configuration changes to the primary instance. Using the priority option to statically assign the primary and secondary roles in the cluster is recommended.

For a more detailed description of the architecture, see GitHub.

The following provides the configuration steps for this deployment:

  1. Predeployment steps
  2. Reserving internal addresses
  3. Deploying FortiGate-VM instances
  4. Creating instance groups
  5. Creating the external LB
  6. Creating the internal LB and custom route
  7. Configure FortiGates networking
  8. Configuring FortiGate clustering
  9. Configure health check probe responders
  10. Best practices and next steps

FGCP in public cloud

FGCP in public cloud

The FortiGate clustering protocol (FGCP) is a proprietary protocol used to create high availability clusters in hardware and virtual FortiGate deployments. Due to the way cloud networks work, you cannot take full advantage of the protocol capabilities and must use its unicast version, limiting the functionality to an active-passive cluster of two instances.

FGCP provides automatic synchronization of connection tables as well as synchronization of configuration from the primary to the secondary instance. You must apply all configuration changes to the primary instance. Using the priority option to statically assign the primary and secondary roles in the cluster is recommended.

For a more detailed description of the architecture, see GitHub.

The following provides the configuration steps for this deployment:

  1. Predeployment steps
  2. Reserving internal addresses
  3. Deploying FortiGate-VM instances
  4. Creating instance groups
  5. Creating the external LB
  6. Creating the internal LB and custom route
  7. Configure FortiGates networking
  8. Configuring FortiGate clustering
  9. Configure health check probe responders
  10. Best practices and next steps