External Load Balancer Configuration
This section provides guidance on how to configure FortiWEB load balancer to work with FortiSIEM Active-Active Supervisor cluster. Most load balancers can also be used. For additional information on FortiWEB configuration, see the FortiWeb documentation library. The example configuration here assumes FortiWeb will have at a minimum, two interfaces.
Port1: External network / subnet - This is where collector / user traffic connects to.
Port2: Internal network / subnet - This is where appServers and Workers reside.
In this example, VMware interfaces map to FortiWeb virtual interfaces when you deploy OVF
Virtual interface 1 is port1 in FortiWeb - 172.30.57.88/22 .1 GW
Virtual interface 2 is port2 in FortiWeb - 10.65.148.3/22
The default route: 172.30.56.1
The general configuration step are:
Define Virtual IPs
-
Navigate to Network > Virtual IP.
This is the Load Balancer IPs.
-
Define one unique free IP in the external subnet for AppServer Load Balancer and Worker Load Balancer
-
Click Create New.
-
In the Name field, enter a name, for example, " AppServerLB".
-
In the IPV4 Address field, enter your IP address. In our example, "172.30.57.89/32".
-
In the Interface field, enter/select your port. In our example,"port1".
-
Repeat steps 1 through 7 here in Define Virtual IPs for the Worker Load Balancer, then proceed to Define Virtual Server.
Define Virtual Server
-
Navigate to Server Objects > Server > Virtual Server.
-
Click Create New.
-
In the Name field, enter a name for the virtual server, for example, "AppServer_VS".
-
Click OK.
-
Under this setup, click Create New.
-
Select the Virtual IP that was created earlier.
-
Click OK.
-
In Status select Enable.
-
Leave other options default, and click OK.
Define Supervisor Health Check
-
Navigate to Server Objects > Server > Health Check.
-
Click Create New.
-
In the Name field, enter a name for the Health Check trigger, for example, "AppServerHealthCheck".
-
For Relationship, select And.
-
Click OK.
-
In Rule List, click Create New.
-
For Type, select TCP SSL and leave the options as default.
-
Click OK.
-
In Rule List, click Create New again.
-
For Type, select HTTP.
-
In the URL Path field, enter "/phoenix/login.html"
-
For Method , select GET.
-
For Match Type, select Response Code.
-
For Response Code, enter "200".
-
Click OK on each page.
Define Server Pool
-
Navigate to Server Objects > Server > Server Pool.
-
Click Create New.
-
In the Name field, enter a name for the server pool, for example, "AppServerPool".
-
For Proto , select HTTP.
-
For Type, select Reverse Proxy.
-
For Single Server / Server Balance, select Server Balance.
-
For Server Health Check, from the drop-down list, select the server health check you created in Define Supervisor Health Check.
-
For Load Balancing Algorithm, from the drop-down list, select Least Connection or Round Robin.
-
Click OK.
-
At the bottom of the page, click Create New.
-
For each Server in your server pool, in this example AppServer Pool, do the following.
-
For Status, select Enable.
-
For Server Type, select IP.
-
For IP / Domain, enter the IP address range, for example, "#.#.#.#/32".
-
For Port, enter "443".
-
For SSL, check it, but ignore client certificate.
-
Click OK.
-
Define Server Policy
-
Navigate to Policy > Server Policy.
-
In the Name field, enter a name for the server policy, for example, "AppServerPolicy".
-
For Deployment Mode, select Single Server/Server Balance.
-
For Virtual Server, select the virtual server you created in Define Virtual Server.
-
For Server Pool, select the server pool you created in Define Server Pool.
-
For HTTP Service, select HTTP.
-
For HTTPS Service, select HTTPS.
-
For Monitor Mode, enable it.
-
For Enable Traffic Log, enable it.
-
Click OK.
Define Static Routes in FortiWeb
For FortiWeb to route non HTTP/HTTPS traffic through FortiWeb, create two policy routes.
-
Navigate to Network > Route. (See https://docs.fortinet.com/document/fortiweb/7.0.2/administration-guide/55130/configuring-the-network-settings)
-
Select Policy Route.
-
Configure the following rules to allow non HTTP/HTTPS traffic inbound.
-
For If traffic matches Incoming Interface, select your port.
-
For If traffic matches Source address/mask (IPv4/IPv6), enter the IP range.
-
For If traffic matches Destination address/mask (IPv4/IPv6), enter the IP range.
-
For Force traffic to Action, select Stop Policy Routing.
-
For Force traffic to Priority, enter "200".
-
Click OK.
-
-
Configure the following rules to allow outbound traffic.
-
For If traffic matches Incoming Interface, select your port.
-
For If traffic matches Source address/mask (IPv4/IPv6), enter the IP range.
-
For If traffic matches Destination address/mask (IPv4/IPv6), enter the IP range.
-
For Force traffic to Action, select Stop Policy Routing.
-
For Force traffic to Priority, enter "100".
-
Click OK.
-
For each "AppServerIP" defined in the server pool, a FortiSIEM leader/follower cluster should use those IPs.