Fortinet white logo
Fortinet white logo

Administration Guide

Configuring geo-redundant HA with VRRP failover

Configuring geo-redundant HA with VRRP failover

In the following scenario, HA with VRRP failover is configured for two FortiManager devices in different geographic areas for geo-redundancy using Layer 3.

In this example, FortiManager-A is on the 198.51.100.0/24 subnet and FortiManager-B is on the 203.0.113.0/24 subnet.

This topic includes the following sections:

Configure geo-redundant FortiManager HA with VRRP failover

To configure geo-redundant HA with VRRP failover:
  1. Configure the HA settings on FortiManager-A.

    1. On FortiManager-A, go to System Settings > HA.

    2. Configure the Cluster Settings as follows, and click Apply.

      Failover Mode VRRP
      Peer IP and Peer SN

      Choose the following:

      • IP Type: IPv4

      • Peer IP: Enter the IP address of FortiManager-B (example, 203.0.113.1)

      • Peer SN: Enter the serial number of the peer device.

      VIP

      Enter the VIP address for the cluster (example, 192.0.2.1).

      This is a dummy IP and will not be used for deployment or management.

      The VIP IP MUST be identical in all peers.

      VRRP Interface

      Choose the VRRP interface (example, port1).

      Priority

      200

      Unicast

      On.

      In Geo-HA it is mandatory to use Unicast as peers will not be in the same Layer2.

  2. Configure the HA settings on FortiManager-B.

    1. On FortiManager-B device, go to System Settings > HA.

    2. Configure the Cluster Settings as follows, and click Apply.

      Failover Mode VRRP
      Peer IP and Peer SN

      Choose the following:

      • IP Type: IPv4

      • Peer IP: Enter the IP address of FortiManager-A (example, 198.51.100.1).

      • Peer SN: Enter the serial number of the peer device.

      VIP

      Enter the VIP address for the cluster (example, 192.0.2.1).

      This is a dummy IP and will not be used for deployment or management.

      The VIP IP MUST be identical in all peers.

      VRRP Interface

      Choose the VRRP interface (example, port1).

      Priority

      100

      Unicast

      On.

      In Geo-HA it is mandatory to use Unicast as peers will not be in the same Layer2.

Verifying the HA status

To verify the HA status:
  1. Access both FortiManager-A and FortiManager-B.

  2. Using the GUI, you can view the HA Status on the top-right corner of each FortiManager and from System Settings > HA.

  3. Using the CLI, you can run the following commands to get additional information about the HA status:

    Command

    Description

    get system ha-status Print the HA status.
    diagnose ha stats Diagnose the HA status.
    diagnose sniffer packet <interface> "vrrp"

    Perform a packet sniffer on the port used by the VRRP protocol using "vrrp" as a filter.

    This command can be used to verify that the advertisements are sent using the preferred method when Unicast mode is disabled/enabled.

Additional FortiManager configuration

In this scenario, FortiManager is using 2 IP addresses (198.51.100.1 and 203.0.113.1) to manage FortiGates. It is a best practice to define all FortiManager IPs that will be used to manage FortiGates so that it is reflected in the FortiGate config system central-management settings if FortiGate is added from FortiManager.

Defining FortiManager IPs:
  • Using the FortiManager CLI, you can run the following configuration:

    config system admin setting

    set mgmt-fqdn <FQDN_1 | IP_1> <FQDN_2 | IP_2> ... <FQDN_N | IP_N>

    end

    Tooltip

    You can add up to a total of 10 IP addresses or FQDNs to the mgmt-fqdn attribute.

  • For example, in this scenario it will be as follows:

    config system admin setting

    set mgmt-fqdn 198.51.100.1 203.0.113.1

    end

Adding a managed FortiGate to the FortiManager cluster

To onboard using the FortiManager Device Manager:
  1. On FortiManager-A, go to Device Manager > Device & Groups > Managed FortiGate.

  2. Click Add Device > Discover Device.

  3. Enable Use Legacy Device Login and enter the device IP Address, User Name, and Password.

  4. Click Next, Next, and Import Later.

  5. Run the show system central-management command in the FortiGate CLI to check the management IP addresses:

    show system central-management

    config system central-management

    set type fortimanager

    set fmg "198.51.100.1" "203.0.113.1"

    end

    The IP addresses shown should reflect the IP addresses and FQDNs configured in FortiManager under config system admin setting as explained in the previous section.

To onboard using the Central Management connector on FortiGate:
  1. On FortiGate, go to Security Fabric > Fabric Connectors > Central Management.

  2. Under IP/Domain, click the + button to add more IP addresses.

  3. Enter all of the FortiManager IP addresses and click OK.
    For example, in this scenario the IPs are 198.51.100.1 and 203.0.113.1.

  4. You can authorize the device using the dialog from the FortiGate or from the Device Manager on the Primary FortiManager.

  5. Run show system central-management in the FortiGate CLI to check the management IP addresses. For example:

    show system central-management

    config system central-management

    set type fortimanager

    set fmg "198.51.100.1" "203.0.113.1"

    end

    The IP addresses displayed should match those configured in step 2.

Testing VRRP failover

To test the failover configuration:
  1. On the FortiGate, run the following command in the CLI:

    get system central-management

    In the serial-number field, the serial numbers for both FortiManager-A and FortiManager-B are listed. FortiManager-A is listed first because it is currently acting as the Primary device.

  2. In the CLI for FortiManager-A, run diagnose ha force-vrrp-election which will trigger failover to the FortiManager with the next highest priority.

  3. Refresh the page and you will notice that the HA status of FortiManager-A becomes Secondary.

  4. Go to FortiManager-B, and confirm that the HA status has changed to Primary.

  5. Enter the following command in the CLI to confirm the status of FortiManager-A. FortiManager-A continues to act as the Secondary device until the next VRRP election occurs.

    diagnose ha stats

  6. On the FortiGate, run the following command in the CLI.

    get system central-management

    In the serial-number field, the serial numbers for both FortiManager-A and FortiManager-B are listed. FortiManager-B will be listed first because it is now acting as the Primary device.

Configuring geo-redundant HA with VRRP failover

Configuring geo-redundant HA with VRRP failover

In the following scenario, HA with VRRP failover is configured for two FortiManager devices in different geographic areas for geo-redundancy using Layer 3.

In this example, FortiManager-A is on the 198.51.100.0/24 subnet and FortiManager-B is on the 203.0.113.0/24 subnet.

This topic includes the following sections:

Configure geo-redundant FortiManager HA with VRRP failover

To configure geo-redundant HA with VRRP failover:
  1. Configure the HA settings on FortiManager-A.

    1. On FortiManager-A, go to System Settings > HA.

    2. Configure the Cluster Settings as follows, and click Apply.

      Failover Mode VRRP
      Peer IP and Peer SN

      Choose the following:

      • IP Type: IPv4

      • Peer IP: Enter the IP address of FortiManager-B (example, 203.0.113.1)

      • Peer SN: Enter the serial number of the peer device.

      VIP

      Enter the VIP address for the cluster (example, 192.0.2.1).

      This is a dummy IP and will not be used for deployment or management.

      The VIP IP MUST be identical in all peers.

      VRRP Interface

      Choose the VRRP interface (example, port1).

      Priority

      200

      Unicast

      On.

      In Geo-HA it is mandatory to use Unicast as peers will not be in the same Layer2.

  2. Configure the HA settings on FortiManager-B.

    1. On FortiManager-B device, go to System Settings > HA.

    2. Configure the Cluster Settings as follows, and click Apply.

      Failover Mode VRRP
      Peer IP and Peer SN

      Choose the following:

      • IP Type: IPv4

      • Peer IP: Enter the IP address of FortiManager-A (example, 198.51.100.1).

      • Peer SN: Enter the serial number of the peer device.

      VIP

      Enter the VIP address for the cluster (example, 192.0.2.1).

      This is a dummy IP and will not be used for deployment or management.

      The VIP IP MUST be identical in all peers.

      VRRP Interface

      Choose the VRRP interface (example, port1).

      Priority

      100

      Unicast

      On.

      In Geo-HA it is mandatory to use Unicast as peers will not be in the same Layer2.

Verifying the HA status

To verify the HA status:
  1. Access both FortiManager-A and FortiManager-B.

  2. Using the GUI, you can view the HA Status on the top-right corner of each FortiManager and from System Settings > HA.

  3. Using the CLI, you can run the following commands to get additional information about the HA status:

    Command

    Description

    get system ha-status Print the HA status.
    diagnose ha stats Diagnose the HA status.
    diagnose sniffer packet <interface> "vrrp"

    Perform a packet sniffer on the port used by the VRRP protocol using "vrrp" as a filter.

    This command can be used to verify that the advertisements are sent using the preferred method when Unicast mode is disabled/enabled.

Additional FortiManager configuration

In this scenario, FortiManager is using 2 IP addresses (198.51.100.1 and 203.0.113.1) to manage FortiGates. It is a best practice to define all FortiManager IPs that will be used to manage FortiGates so that it is reflected in the FortiGate config system central-management settings if FortiGate is added from FortiManager.

Defining FortiManager IPs:
  • Using the FortiManager CLI, you can run the following configuration:

    config system admin setting

    set mgmt-fqdn <FQDN_1 | IP_1> <FQDN_2 | IP_2> ... <FQDN_N | IP_N>

    end

    Tooltip

    You can add up to a total of 10 IP addresses or FQDNs to the mgmt-fqdn attribute.

  • For example, in this scenario it will be as follows:

    config system admin setting

    set mgmt-fqdn 198.51.100.1 203.0.113.1

    end

Adding a managed FortiGate to the FortiManager cluster

To onboard using the FortiManager Device Manager:
  1. On FortiManager-A, go to Device Manager > Device & Groups > Managed FortiGate.

  2. Click Add Device > Discover Device.

  3. Enable Use Legacy Device Login and enter the device IP Address, User Name, and Password.

  4. Click Next, Next, and Import Later.

  5. Run the show system central-management command in the FortiGate CLI to check the management IP addresses:

    show system central-management

    config system central-management

    set type fortimanager

    set fmg "198.51.100.1" "203.0.113.1"

    end

    The IP addresses shown should reflect the IP addresses and FQDNs configured in FortiManager under config system admin setting as explained in the previous section.

To onboard using the Central Management connector on FortiGate:
  1. On FortiGate, go to Security Fabric > Fabric Connectors > Central Management.

  2. Under IP/Domain, click the + button to add more IP addresses.

  3. Enter all of the FortiManager IP addresses and click OK.
    For example, in this scenario the IPs are 198.51.100.1 and 203.0.113.1.

  4. You can authorize the device using the dialog from the FortiGate or from the Device Manager on the Primary FortiManager.

  5. Run show system central-management in the FortiGate CLI to check the management IP addresses. For example:

    show system central-management

    config system central-management

    set type fortimanager

    set fmg "198.51.100.1" "203.0.113.1"

    end

    The IP addresses displayed should match those configured in step 2.

Testing VRRP failover

To test the failover configuration:
  1. On the FortiGate, run the following command in the CLI:

    get system central-management

    In the serial-number field, the serial numbers for both FortiManager-A and FortiManager-B are listed. FortiManager-A is listed first because it is currently acting as the Primary device.

  2. In the CLI for FortiManager-A, run diagnose ha force-vrrp-election which will trigger failover to the FortiManager with the next highest priority.

  3. Refresh the page and you will notice that the HA status of FortiManager-A becomes Secondary.

  4. Go to FortiManager-B, and confirm that the HA status has changed to Primary.

  5. Enter the following command in the CLI to confirm the status of FortiManager-A. FortiManager-A continues to act as the Secondary device until the next VRRP election occurs.

    diagnose ha stats

  6. On the FortiGate, run the following command in the CLI.

    get system central-management

    In the serial-number field, the serial numbers for both FortiManager-A and FortiManager-B are listed. FortiManager-B will be listed first because it is now acting as the Primary device.