Configuring IP Mapping in HA mode
Prerequisites:
Please follow High Availability to make sure native HA mode works in prior to configure in IP Mapping in HA mode.
Configuring IP Mapping in HA mode needs to set up in these systems:
- FortiIsolator configuration
- FortiGate configuration
- Client system configuration
Single-node setting (one-master only)
FortiIsolator configuration
-
set fis-ipmap <port_map_to_443> <port_map_to_8887> <external_IP_address>
-
set fis-ipmap 18443 18887 172.30.147.207
-
-
set fis-ipmap-vip <external IP> <vip_port_map_to_443> <vip_port_map_to_8887>
-
set fis-ipmap-vip 172.30.147.207 12443 12887
-
-
set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:master> <port_map_to_443> <port_map_to_8887>
-
set fis-ipmap-ha 18 172.30.147.207 172.30.157.18 18443 18887
-
FortiGate configuration
Complete the following steps in the FortiGate UI.
- Go to Policy & Objects > Virtual IPs.
- Create two IPv4 virtual IPs with the following information:
-
IP-Mapping-443: external_IP_address -> FIS_IP (TCP: 12443 > 443)
e.g. 172.30.147.207 -> 172.30.157.97 (TCP: 12443 > 443)
-
IP-Mapping-8887: external_IP_address -> FIS_IP (TCP: 12887 > 8887)
e.g. 172.30.147.207 -> 172.30.157.97 (TCP: 128887 > 8887)
In this example, we are using:
- External_IP_address: 172.30.147.207
- FIS HA Virtual IP: 172.30.157.97
- FIS_IP: 172.30.157.18
Settings of IP-Mapping-HA-443:
Settings of IP-Mapping-HA-8887:
-
- Go to Policy & Objects > IPv4 Policy > Create New.
- Create an IPv4 policy that includes the two virtual IPs that you created.
Client system configuration
Complete the following steps on the client system (for example, Windows 10).
- In Windows 10, launch CMD as administrator.
- Use the following commands to add the FortiGate IP address to the routing table on the client system:
- At the command prompt, type
route -p ADD <external_IP_address> Mask 255.255.255.255 <FGT_IP_address>
.For example,
route –p ADD <external_IP_address> MASK 255.255.255.255 172.30.157.48
- To confirm the setup, type
route print
.
- At the command prompt, type
-
To verify that it works in a browser, browse to:
https://<external_IP_address>:<port_map_to_HA_443>/isolator/https://www.fortinet.com
e.g.:
https://172.30.147.207:12443/isolator/https://www.fortinet.com
(It will now redirect to: https://172.30.147.207:18443/isolator/https://www.fortinet.com )
Multiple-nodes setting (one-master-one-Slave)
FortiIsolator configuration
Use the FortiIsolator CLI to configure port forwarding mappings. Use the following commands:
Under FIS Master:
-
set fis-ipmap <port_map_to_443> <port_map_to_8887> <external_IP_address>
-
set fis-ipmap 18443 18887 172.30.147.207
-
-
set fis-ipmap-vip <external IP> <vip_port_map_to_443> <vip_port_map_to_8887>
-
set fis-ipmap-vip 172.30.147.207 12443 12887
-
-
set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:master> <port_map_to_443> <port_map_to_8887>
-
set fis-ipmap-ha 18 172.30.147.207 172.30.157.18 18443 18887
-
-
set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:slave1> <port_map_to_443> <port_map_to_8887>
-
set fis-ipmap-ha 19 172.30.147.207 172.30.157.19 19443 19887
-
-
Under FIS slave
set fis-ipmap <port_map_to_443> <port_map_to_8887> <external_IP_address>
-
set fis-ipmap 19443 19887 172.30.147.207
-
Summary of examples
Master: 172.30.156.18
> set fis-ipmap 18443 18887 172.30.147.207
> set fis-ipmap-vip 172.30.147.207 12443 12887
> set fis-ipmap-ha 18 172.30.147.207 172.30.157.18 18443 18887
> set fis-ipmap-ha 19 172.30.147.207 172.30.157.19 19443 19887
Slave: 172.30.156.19
> set fis-ipmap 19443 19887 172.30.147.207
FortiGate configuration
Follow the FortiGate configuration in Configuring IP Mapping in regular mode to create IPv4 Virtual IP mapping for Slave node under Virtual IPs.
Complete the following steps in the FortiGate UI.
- Go to Policy & Objects > Virtual IPs.
-
Create two IPv4 virtual IPs with the following information:
-
IP-Mapping-HA-443: external_IP_address -> FIS_IP (TCP: 12443 > 443)
e.g. 172.30.147.207 -> 172.30.157.97 (TCP: 12443 > 443)
-
IP-Mapping-HA-8887: external_IP_address -> FIS_IP (TCP: 12887 > 8887)
e.g. 172.30.147.207 -> 172.30.157.97 (TCP: 12887 > 8887)
The example uses the following:
External_IP_address: 172.30.147.207
FIS HA Virtual IP: 172.30.157.97
FIS_IP_Master: 172.30.157.18
FIS_IP_Slave: 172.30.157.19
Settings of IP-Mapping-HA-443:
Settings of IP-Mapping-HA-8887:
-
- Go to Policy & Objects > IPv4 Policy > Create New.
-
Create an IPv4 policy that includes the two more virtual IPs that you created.
Client system configuration
Complete the following steps on the client system (for example, Windows 10).
- In Windows 10, launch CMD as administrator.
-
Use the following commands to add the FortiGate IP address to the routing table on the client system:
-
At the command prompt, type
route –p ADD <external_IP_address> Mask 255.255.255.255 <FGT_IP_address>
For example,
route –p ADD 172.30.147.207 MASK 255.255.255.255 172.30.157.48
- To confirm the setup, type
route print
.
-
-
To verify that it works in a browser, browse to:
https://<external_IP_address>:<port_map_to_HA_443>/isolator/https://www.fortinet.com
e.g.:
https://172.30.147.207:12443/isolator/https://www.fortinet.com
It will now redirect to Master node: https://172.30.147.207:18443/isolator/https://www.fortinet.com
Or, it will redirect to Slave node:
https://172.30.147.207:19443/isolator/https://www.fortinet.com