Configuring active-passive HA cluster that includes aggregate interfaces – CLI

To view cluster status

Use the following steps to view cluster status from the CLI.

1. Log into the CLI.

2. Enter get system status to verify the HA status of the cluster unit that you logged into. Look for the following information in the command output.

 

 

Current master

 

HA

 

mode:

 

a-a,

The cluster units are operating as a cluster and you have connected to th primary unit.
 

Current backup

 

HA

 

mode:

 

a-a,

The cluster units are operating as a cluster and you have connected to a subordinate unit.

 

Current HA mode: standalone

The cluster unit is not operating in HA mode

3. Enter the following command to confirm the HA configuration of the cluster:

get system ha status

Model: XXXX Mode: a-a Group: 0

Debug: 0

ses_pickup: disable

Master:128 FGT_ha_2 FG600B3908600825 0

Slave :128 FGT_ha_1 FG600B3908600705 1 number of vcluster: 1

vcluster 1: work 169.254.0.1

Master:0 FG600B3908600825

Slave :1 FG600B3908600705

The command output shows both cluster units, their host names, their roles in the cluster, and their priorities. You can use this command to confirm that the cluster is operating normally. For example, if the command shows only one cluster unit then the other unit has left the cluster for some reason.

 

To troubleshoot the cluster configuration

See FGCP HA with 802.3ad aggregated interfaces on page 1401 to troubleshoot the cluster.

 

To add basic configuration settings and the aggregate interfaces

Use the following steps to add a few basic configuration settings and the aggregate interfaces.

1. Add a password for the admin administrative account.

config system admin edit admin

set password <psswrd>

end

 

2. Temporarily delete the default route.

You cannot add an interface to an aggregate interface if any settings (such as the default route) are configured for it. In this example the index of the default route is 1.

config router static delete 1

end

 

3. Add the aggregate interfaces:

config system interface edit Port1_Port2

set type aggregate

set lacp-ha-slave disable set member port1 port2

set ip 172.20.120.141/24 set vdom root

next

edit Port3_Port4

set type aggregate

set lacp-ha-slave disable set member port3 port4

set ip 10.11.101.100/24 set vdom root

end

The virtual MAC addresses of the FortiGate interfaces change to the following. Note that port1 and port2 both have the port1 virtual MAC address and port3 and port4 both have the port3 virtual MAC address:

  • port1 interface virtual MAC: 00-09-0f-09-00-00
  • port10 interface virtual MAC: 00-09-0f-09-00-01 l  port11 interface virtual MAC: 00-09-0f-09-00-02 l  port12 interface virtual MAC: 00-09-0f-09-00-03 l  port13 interface virtual MAC: 00-09-0f-09-00-04 l  port14 interface virtual MAC: 00-09-0f-09-00-05 l  port15 interface virtual MAC: 00-09-0f-09-00-06 l  port16 interface virtual MAC: 00-09-0f-09-00-07 l  port17 interface virtual MAC: 00-09-0f-09-00-08 l  port18 interface virtual MAC: 00-09-0f-09-00-09 l  port19 interface virtual MAC: 00-09-0f-09-00-0a
  • port2 interface virtual MAC: 00-09-0f-09-00-00 (same as port1)
  • port20 interface virtual MAC: 00-09-0f-09-00-0c
  • port3 interface virtual MAC: 00-09-0f-09-00-0d
  • port4 interface virtual MAC: 00-09-0f-09-00-0d (same as port3)
  • port5 interface virtual MAC: 00-09-0f-09-00-0f l  port6 interface virtual MAC: 00-09-0f-09-00-10 l  port7 interface virtual MAC: 00-09-0f-09-00-11 l  port8 interface virtual MAC: 00-09-0f-09-00-12 l  port9 interface virtual MAC: 00-09-0f-09-00-13

4. Add the default route.

config router static edit 1

set dst 0.0.0.0 0.0.0.0 set gateway 172.20.120.2 set device Port1_Port2

end

 

To configure HA port monitoring for the aggregate interfaces

1. Configure HA port monitoring for the aggregate interfaces.

config system ha

set monitor Port1_Port2 Port3_Port4 end


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

This entry was posted in FortiOS 5.4 Handbook and tagged on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.