Fortinet white logo
Fortinet white logo

Handbook

6.0.0

FGSP example

FGSP example

The following example shows how to configure basic FGSP for the two peer FortiGates shown below.

  • The host names of the peers are peer_1 and peer_2.
  • Both peers are configured with two virtual domains: root and vdom_1.
  • All sessions processed by vdom_1 are synchronized.
  • The synchronization link interface is port3, which is in the root virtual domain.
  • The IP address of port3 on peer_1 is 10.10.10.1.
  • The IP address of port3 on peer_2 is 10.10.10.2.

Also on both peers, port1 and port2 are added to vdom_1. On peer_1 the IP address of port1 is set to 192.168.20.1, and the IP address of port2 is set to 172.110.20.1. On peer_2 the IP address of port1 is set to 192.168.20.2 ,and the IP address of port2 is set to 172.110.20.2.

Example FGSP network configuration

To configure FGSP:
  1. Configure the load balancer or router to send all sessions to peer_1.
  2. Configure the load balancer or router to send all traffic to peer_2 if peer_1 fails.
  3. Use normal FortiGate configuration steps on peer_1:

    • Enable virtual domain configuration.
    • Add the vdom_1 virtual domain.
    • Add port1 and port2 to the vdom_1 virtual domain and configure these interfaces.
    • Set the IP address of port1 to 192.168.20.1.
    • Set the IP address of port2 to 172.110.20.1.
    • Set the IP address of port3 to 10.10.10.1.
    • Add route mode security policies between port1 and port2 to vdom_1.
  4. Enter the following command to configure session synchronization for peer_1:

    config system cluster-sync

    edit 1

    set peerip 10.10.10.2

    set peervd root

    set syncvd vdom_1

    end

  5. Use normal FortiGate configuration steps on peer_2:

    • Enable virtual domain configuration.
    • Add the vdom_1 virtual domain.
    • Add port1 and port2 to the vdom_1 virtual domain and configure these interfaces.
    • Set the IP address of port1 to 192.168.20.2.
    • Set the IP address of port2 to 172.110.20.2.
    • Set the IP address of port3 to 10.10.10.2.
    • Add route mode security policies between port1 and port2 to vdom_1.
  6. Enter the following command to configure session synchronization for peer_1:

    config system cluster-sync

    edit 1

    set peerip 10.10.10.1

    set peervd root

    set syncvd vdom_1

    end

To add filters:

You can add a filter to this basic configuration if you only want to synchronize some TCP sessions. For example, enter the following to add a filter so that only HTTP sessions are synchronized:

config system cluster-sync

edit 1

config filter

set service HTTP

end

end

You can also add a filter to control the source and destination addresses of the IPv4 packets that are synchronized. For example, enter the following to add a filter so that only sessions with source addresses in the range 10.10.10.100 to 10.10.10.200 are synchronized:

config system cluster-sync

edit 1

config filter

set srcaddr 10.10.10.100 10.10.10.200

end

end

You can also add a filter to control the source and destination addresses of the IPv6 packets that are synchronized. For example, enter the following to add a filter so that only sessions with destination addresses in the range 2001:db8:0:2::/64 are synchronized:

config system cluster-sync

edit 1

config filter

set dstaddr6 2001:db8:0:2::/64

end

end

To synchronize TCP sessions:

Enter the following to synchronize TCP sessions:

config system ha

set session-pickup enable

end

To synchronize UDP and ICMP sessions:

Enter the following to add synchronization of UDP and ICMP sessions to this configuration:

config system ha

set session-pickup enable

set session-pickup-connectionless enable

end

To synchronize sessions over redundant L2 connections:

Enter the following to specify the interfaces used to synchronize sessions in layer 2 instead of layer 3. When session-sync-dev is configured, the FortiGate will try to communicate over the first defined interface. If that interface is down, it will try to communicate over the second defined interface.

config system ha

set session-sync-dev "port4" "port5"

end

In case both interfaces are down, it falls back to L3 communication between the peer interface (interface in which the peer IP is defined).

FGSP example

FGSP example

The following example shows how to configure basic FGSP for the two peer FortiGates shown below.

  • The host names of the peers are peer_1 and peer_2.
  • Both peers are configured with two virtual domains: root and vdom_1.
  • All sessions processed by vdom_1 are synchronized.
  • The synchronization link interface is port3, which is in the root virtual domain.
  • The IP address of port3 on peer_1 is 10.10.10.1.
  • The IP address of port3 on peer_2 is 10.10.10.2.

Also on both peers, port1 and port2 are added to vdom_1. On peer_1 the IP address of port1 is set to 192.168.20.1, and the IP address of port2 is set to 172.110.20.1. On peer_2 the IP address of port1 is set to 192.168.20.2 ,and the IP address of port2 is set to 172.110.20.2.

Example FGSP network configuration

To configure FGSP:
  1. Configure the load balancer or router to send all sessions to peer_1.
  2. Configure the load balancer or router to send all traffic to peer_2 if peer_1 fails.
  3. Use normal FortiGate configuration steps on peer_1:

    • Enable virtual domain configuration.
    • Add the vdom_1 virtual domain.
    • Add port1 and port2 to the vdom_1 virtual domain and configure these interfaces.
    • Set the IP address of port1 to 192.168.20.1.
    • Set the IP address of port2 to 172.110.20.1.
    • Set the IP address of port3 to 10.10.10.1.
    • Add route mode security policies between port1 and port2 to vdom_1.
  4. Enter the following command to configure session synchronization for peer_1:

    config system cluster-sync

    edit 1

    set peerip 10.10.10.2

    set peervd root

    set syncvd vdom_1

    end

  5. Use normal FortiGate configuration steps on peer_2:

    • Enable virtual domain configuration.
    • Add the vdom_1 virtual domain.
    • Add port1 and port2 to the vdom_1 virtual domain and configure these interfaces.
    • Set the IP address of port1 to 192.168.20.2.
    • Set the IP address of port2 to 172.110.20.2.
    • Set the IP address of port3 to 10.10.10.2.
    • Add route mode security policies between port1 and port2 to vdom_1.
  6. Enter the following command to configure session synchronization for peer_1:

    config system cluster-sync

    edit 1

    set peerip 10.10.10.1

    set peervd root

    set syncvd vdom_1

    end

To add filters:

You can add a filter to this basic configuration if you only want to synchronize some TCP sessions. For example, enter the following to add a filter so that only HTTP sessions are synchronized:

config system cluster-sync

edit 1

config filter

set service HTTP

end

end

You can also add a filter to control the source and destination addresses of the IPv4 packets that are synchronized. For example, enter the following to add a filter so that only sessions with source addresses in the range 10.10.10.100 to 10.10.10.200 are synchronized:

config system cluster-sync

edit 1

config filter

set srcaddr 10.10.10.100 10.10.10.200

end

end

You can also add a filter to control the source and destination addresses of the IPv6 packets that are synchronized. For example, enter the following to add a filter so that only sessions with destination addresses in the range 2001:db8:0:2::/64 are synchronized:

config system cluster-sync

edit 1

config filter

set dstaddr6 2001:db8:0:2::/64

end

end

To synchronize TCP sessions:

Enter the following to synchronize TCP sessions:

config system ha

set session-pickup enable

end

To synchronize UDP and ICMP sessions:

Enter the following to add synchronization of UDP and ICMP sessions to this configuration:

config system ha

set session-pickup enable

set session-pickup-connectionless enable

end

To synchronize sessions over redundant L2 connections:

Enter the following to specify the interfaces used to synchronize sessions in layer 2 instead of layer 3. When session-sync-dev is configured, the FortiGate will try to communicate over the first defined interface. If that interface is down, it will try to communicate over the second defined interface.

config system ha

set session-sync-dev "port4" "port5"

end

In case both interfaces are down, it falls back to L3 communication between the peer interface (interface in which the peer IP is defined).