{"id":204,"date":"2022-03-11T04:24:02","date_gmt":"2022-03-11T09:24:02","guid":{"rendered":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/high-availability\/"},"modified":"2023-08-29T16:27:05","modified_gmt":"2023-08-29T20:27:05","slug":"high-availability","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/high-availability\/","title":{"raw":"6.1 High Availability","rendered":"6.1 High Availability"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n \t<li class=\"hanging-indent\">Configure HA (Active-Passive) between two firewalls<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: In this lab, we are going to have two firewalls. One of them is Primary or Active and the other one is Secondary or Passive. We are going to have High Availability between these two firewalls and if we shut down one of them, the other one will be Primary.<\/div>\n\n[caption id=\"attachment_194\" align=\"aligncenter\" width=\"1111\"]<img class=\"wp-image-194 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6.jpg\" alt=\"High Availability main scenario\" width=\"1111\" height=\"501\"> Figure 6.1: Main scenario[\/caption]\n\n<div align=\"left\">\n<table class=\"aligncenter\" style=\"width: 100%;\"><caption>Table 6.1: Devices configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 165px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 227px;\" scope=\"col\">IP address<\/th>\n<th style=\"width: 209px;\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">WebTerm1<\/td>\n<td style=\"width: 227px;\">192.168.1.2\/24<\/td>\n<td style=\"width: 209px;\">-<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">WebTerm2<\/td>\n<td style=\"width: 227px;\">192.168.10.2\/24<\/td>\n<td style=\"width: 209px;\">-<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">EthernetSwitch1<\/td>\n<td style=\"width: 227px;\">-<\/td>\n<td style=\"width: 209px;\">-<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">EthernetSwitch2<\/td>\n<td style=\"width: 227px;\">-<\/td>\n<td style=\"width: 209px;\">-<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">FG-Primary<\/td>\n<td style=\"width: 227px;\">Port 1: 192.168.1.1\/24\n\nPort 5: 192.168.10.1\/24<\/td>\n<td style=\"width: 209px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">FG-Secondary<\/td>\n<td style=\"width: 227px;\">Port 1: 192.168.1.1\/24\n\nPort 5: 192.168.10.1\/24<\/td>\n<td style=\"width: 209px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<ol>\n \t<li>CLI Configuration for Primary and Secondary:\n<div class=\"textbox shaded\">\n\n<strong>FG-Primary<\/strong>\n\n<em>FortiGate-VM64-KVM # config system global<\/em>\n<em>FortiGate-VM64-KVM (global) # set hostname FG-Primary<\/em>\n<em>FortiGate-VM64-KVM (global) # end<\/em>\n<div><\/div>\n<div><em>FG-Primary # config system interface<\/em><\/div>\n<div><em>FG-Primary (interface) # edit port1<\/em><\/div>\n<div><em>FG-Primary (port1) # set mode static<\/em><\/div>\n<div><em>FG-Primary (port1) # set ip 192.168.1.1\/24<\/em><\/div>\n<div><em>FG-Primary (port1) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Primary (port1) # end<\/em><\/div>\n<div><\/div>\n<div><em>FG-Primary # config system interface<\/em><\/div>\n<div><em>FG-Primary (interface) # edit port5<\/em><\/div>\n<div><em>FG-Primary (port5) # set ip 192.168.10.1\/24<\/em><\/div>\n<div><em>FG-Primary (port5) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Primary (port5) # end<\/em><\/div>\n<\/div>\n<div class=\"textbox shaded\">\n\n<strong>FG-Secondary<\/strong>\n\n<em>FortiGate-VM64-KVM # config system global<\/em>\n<em>FortiGate-VM64-KVM (global) # set hostname FG-Secondary<\/em>\n<em>FortiGate-VM64-KVM (global) # end<\/em>\n<div><\/div>\n<div><em>FG-Secondary # config system interface<\/em><\/div>\n<div><em>FG-Secondary(interface) # edit port1<\/em><\/div>\n<div><em>FG-Secondary (port1) # set mode static<\/em><\/div>\n<div><em>FG-Secondary (port1) # set ip 192.168.1.1\/24<\/em><\/div>\n<div><em>FG-Secondary (port1) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Secondary (port1) # end<\/em><\/div>\n<div><\/div>\n<div><em>FG-Secondary # config system interface<\/em><\/div>\n<div><em>FG-Secondary (interface) # edit port5<\/em><\/div>\n<div><em>FG-Secondary (port5) # set ip 192.168.10.1\/24<\/em><\/div>\n<div><em>FG-Secondary (port5) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Secondary (port5) # end<\/em><\/div>\n<\/div><\/li>\n \t<li>Go to <strong>System &gt; HA in the FG-Primary<\/strong>:\n<ul>\n \t<li>Select the Mode: <strong>Active-Passive<\/strong><\/li>\n \t<li>Device Priority: <strong>128<\/strong> (The higher priority is primary)<\/li>\n \t<li>Group Name: <strong>HRT<\/strong> (The Group name between Primary and Secondary should be the same)<\/li>\n \t<li>Password:<strong> Set a password<\/strong> (The Password between Primary and Secondary should be the same)<\/li>\n \t<li>Monitor Interface: <strong>Port 3<\/strong><\/li>\n \t<li>Heartbeat Interface: <strong>Port 4<\/strong><\/li>\n<\/ul>\n[caption id=\"attachment_196\" align=\"aligncenter\" width=\"729\"]<img class=\"wp-image-195 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2.jpg\" alt=\"HA primary configuration\" width=\"729\" height=\"417\"> Figure 6.2: HA primary configuration[\/caption]\n\nDo the same configuration in the FG-Secondary but set the Device priority to 50.\n\n[caption id=\"attachment_196\" align=\"aligncenter\" width=\"729\"]<img class=\"wp-image-196 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3.jpg\" alt=\"HA secondary configuration\" width=\"729\" height=\"438\"> Figure 6.3: HA secondary configuration[\/caption]<\/li>\n \t<li>After setting secondary device, no longer be able to access secondary device. Go to <strong>FG-Primary<\/strong> &gt; <strong>System<\/strong> &gt; <strong>HA<\/strong> and evaluate your result.\n\n[caption id=\"attachment_198\" align=\"aligncenter\" width=\"1010\"]<img class=\"wp-image-197 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4.jpg\" alt=\"HA status\" width=\"1010\" height=\"568\"> Figure 6.4: HA status[\/caption]\n\nTwo devices will be synchronized after a while.\n\n[caption id=\"attachment_198\" align=\"aligncenter\" width=\"942\"]<img class=\"wp-image-198 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4.jpg\" alt=\"HA Synchronized Status\" width=\"942\" height=\"438\"> Figure 6.5: HA Synchronized status[\/caption]<\/li>\n \t<li>Now, connect other interfaces like Figure 6.6.\n\n[caption id=\"attachment_202\" align=\"aligncenter\" width=\"1149\"]<img class=\"wp-image-199 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3.jpg\" alt=\"main scenario\" width=\"1149\" height=\"475\"> Figure 6.6: Main scenario[\/caption]\n\nTry to Stop FG-Primary and go to WebTerm1. Can you reach the firewall?\n\n[caption id=\"attachment_202\" align=\"aligncenter\" width=\"1100\"]<img class=\"wp-image-200 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2.jpg\" alt=\"Stopping FG-Primary\" width=\"1100\" height=\"468\"> Figure 6.7: Stopping FG-Primary[\/caption]\n\n[caption id=\"attachment_202\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-201\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3.jpg\" alt=\"Verify connectivity to the firewall\" width=\"400\" height=\"246\"> Figure 6.8: Verify connectivity to the firewall[\/caption]\n\n[caption id=\"attachment_202\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-202\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2.jpg\" alt=\"Verify firewall role after stopping FG-Primary\" width=\"500\" height=\"298\"> Figure 6.9: Verify firewall role after stopping FG-Primary[\/caption]<\/li>\n \t<li>Go to <strong>Log &amp; Report<\/strong> &gt; <strong>Events<\/strong> &gt; <strong>HA Events<\/strong> and download the log. Verify your result.\n\n[caption id=\"attachment_203\" align=\"aligncenter\" width=\"550\"]<img class=\"wp-image-203\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3.jpg\" alt=\"HA Events\" width=\"550\" height=\"308\"> Figure 6.10: HA Events[\/caption]<\/li>\n<\/ol>","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li class=\"hanging-indent\">Configure HA (Active-Passive) between two firewalls<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: In this lab, we are going to have two firewalls. One of them is Primary or Active and the other one is Secondary or Passive. We are going to have High Availability between these two firewalls and if we shut down one of them, the other one will be Primary.<\/div>\n<figure id=\"attachment_194\" aria-describedby=\"caption-attachment-194\" style=\"width: 1111px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-194 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6.jpg\" alt=\"High Availability main scenario\" width=\"1111\" height=\"501\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6.jpg 1111w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6-300x135.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6-1024x462.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6-768x346.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6-65x29.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6-225x101.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/1-6-350x158.jpg 350w\" sizes=\"auto, (max-width: 1111px) 100vw, 1111px\" \/><figcaption id=\"caption-attachment-194\" class=\"wp-caption-text\">Figure 6.1: Main scenario<\/figcaption><\/figure>\n<div style=\"text-align: left;\">\n<table class=\"aligncenter\" style=\"width: 100%;\">\n<caption>Table 6.1: Devices configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 165px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 227px;\" scope=\"col\">IP address<\/th>\n<th style=\"width: 209px;\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">WebTerm1<\/td>\n<td style=\"width: 227px;\">192.168.1.2\/24<\/td>\n<td style=\"width: 209px;\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">WebTerm2<\/td>\n<td style=\"width: 227px;\">192.168.10.2\/24<\/td>\n<td style=\"width: 209px;\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">EthernetSwitch1<\/td>\n<td style=\"width: 227px;\">&#8211;<\/td>\n<td style=\"width: 209px;\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">EthernetSwitch2<\/td>\n<td style=\"width: 227px;\">&#8211;<\/td>\n<td style=\"width: 209px;\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">FG-Primary<\/td>\n<td style=\"width: 227px;\">Port 1: 192.168.1.1\/24<\/p>\n<p>Port 5: 192.168.10.1\/24<\/td>\n<td style=\"width: 209px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 165px;\">FG-Secondary<\/td>\n<td style=\"width: 227px;\">Port 1: 192.168.1.1\/24<\/p>\n<p>Port 5: 192.168.10.1\/24<\/td>\n<td style=\"width: 209px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<ol>\n<li>CLI Configuration for Primary and Secondary:\n<div class=\"textbox shaded\">\n<p><strong>FG-Primary<\/strong><\/p>\n<p><em>FortiGate-VM64-KVM # config system global<\/em><br \/>\n<em>FortiGate-VM64-KVM (global) # set hostname FG-Primary<\/em><br \/>\n<em>FortiGate-VM64-KVM (global) # end<\/em><\/p>\n<div><\/div>\n<div><em>FG-Primary # config system interface<\/em><\/div>\n<div><em>FG-Primary (interface) # edit port1<\/em><\/div>\n<div><em>FG-Primary (port1) # set mode static<\/em><\/div>\n<div><em>FG-Primary (port1) # set ip 192.168.1.1\/24<\/em><\/div>\n<div><em>FG-Primary (port1) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Primary (port1) # end<\/em><\/div>\n<div><\/div>\n<div><em>FG-Primary # config system interface<\/em><\/div>\n<div><em>FG-Primary (interface) # edit port5<\/em><\/div>\n<div><em>FG-Primary (port5) # set ip 192.168.10.1\/24<\/em><\/div>\n<div><em>FG-Primary (port5) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Primary (port5) # end<\/em><\/div>\n<\/div>\n<div class=\"textbox shaded\">\n<p><strong>FG-Secondary<\/strong><\/p>\n<p><em>FortiGate-VM64-KVM # config system global<\/em><br \/>\n<em>FortiGate-VM64-KVM (global) # set hostname FG-Secondary<\/em><br \/>\n<em>FortiGate-VM64-KVM (global) # end<\/em><\/p>\n<div><\/div>\n<div><em>FG-Secondary # config system interface<\/em><\/div>\n<div><em>FG-Secondary(interface) # edit port1<\/em><\/div>\n<div><em>FG-Secondary (port1) # set mode static<\/em><\/div>\n<div><em>FG-Secondary (port1) # set ip 192.168.1.1\/24<\/em><\/div>\n<div><em>FG-Secondary (port1) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Secondary (port1) # end<\/em><\/div>\n<div><\/div>\n<div><em>FG-Secondary # config system interface<\/em><\/div>\n<div><em>FG-Secondary (interface) # edit port5<\/em><\/div>\n<div><em>FG-Secondary (port5) # set ip 192.168.10.1\/24<\/em><\/div>\n<div><em>FG-Secondary (port5) # set allowaccess http https ping<\/em><\/div>\n<div><em>FG-Secondary (port5) # end<\/em><\/div>\n<\/div>\n<\/li>\n<li>Go to <strong>System &gt; HA in the FG-Primary<\/strong>:\n<ul>\n<li>Select the Mode: <strong>Active-Passive<\/strong><\/li>\n<li>Device Priority: <strong>128<\/strong> (The higher priority is primary)<\/li>\n<li>Group Name: <strong>HRT<\/strong> (The Group name between Primary and Secondary should be the same)<\/li>\n<li>Password:<strong> Set a password<\/strong> (The Password between Primary and Secondary should be the same)<\/li>\n<li>Monitor Interface: <strong>Port 3<\/strong><\/li>\n<li>Heartbeat Interface: <strong>Port 4<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_196\" aria-describedby=\"caption-attachment-196\" style=\"width: 729px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-195 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2.jpg\" alt=\"HA primary configuration\" width=\"729\" height=\"417\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2.jpg 729w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2-300x172.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2-65x37.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2-225x129.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-2-350x200.jpg 350w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><figcaption id=\"caption-attachment-196\" class=\"wp-caption-text\">Figure 6.2: HA primary configuration<\/figcaption><\/figure>\n<p>Do the same configuration in the FG-Secondary but set the Device priority to 50.<\/p>\n<figure id=\"attachment_196\" aria-describedby=\"caption-attachment-196\" style=\"width: 729px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-196 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3.jpg\" alt=\"HA secondary configuration\" width=\"729\" height=\"438\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3.jpg 729w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3-300x180.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3-65x39.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3-225x135.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-3-350x210.jpg 350w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><figcaption id=\"caption-attachment-196\" class=\"wp-caption-text\">Figure 6.3: HA secondary configuration<\/figcaption><\/figure>\n<\/li>\n<li>After setting secondary device, no longer be able to access secondary device. Go to <strong>FG-Primary<\/strong> &gt; <strong>System<\/strong> &gt; <strong>HA<\/strong> and evaluate your result.<br \/>\n<figure id=\"attachment_198\" aria-describedby=\"caption-attachment-198\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-197 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4.jpg\" alt=\"HA status\" width=\"1010\" height=\"568\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4.jpg 1010w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4-300x169.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4-768x432.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4-65x37.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4-225x127.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-4-350x197.jpg 350w\" sizes=\"auto, (max-width: 1010px) 100vw, 1010px\" \/><figcaption id=\"caption-attachment-198\" class=\"wp-caption-text\">Figure 6.4: HA status<\/figcaption><\/figure>\n<p>Two devices will be synchronized after a while.<\/p>\n<figure id=\"attachment_198\" aria-describedby=\"caption-attachment-198\" style=\"width: 942px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-198 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4.jpg\" alt=\"HA Synchronized Status\" width=\"942\" height=\"438\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4.jpg 942w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4-300x139.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4-768x357.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4-65x30.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4-225x105.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-4-350x163.jpg 350w\" sizes=\"auto, (max-width: 942px) 100vw, 942px\" \/><figcaption id=\"caption-attachment-198\" class=\"wp-caption-text\">Figure 6.5: HA Synchronized status<\/figcaption><\/figure>\n<\/li>\n<li>Now, connect other interfaces like Figure 6.6.<br \/>\n<figure id=\"attachment_202\" aria-describedby=\"caption-attachment-202\" style=\"width: 1149px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-199 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3.jpg\" alt=\"main scenario\" width=\"1149\" height=\"475\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3.jpg 1149w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3-300x124.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3-1024x423.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3-768x317.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3-65x27.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3-225x93.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/5-3-350x145.jpg 350w\" sizes=\"auto, (max-width: 1149px) 100vw, 1149px\" \/><figcaption id=\"caption-attachment-202\" class=\"wp-caption-text\">Figure 6.6: Main scenario<\/figcaption><\/figure>\n<p>Try to Stop FG-Primary and go to WebTerm1. Can you reach the firewall?<\/p>\n<figure id=\"attachment_202\" aria-describedby=\"caption-attachment-202\" style=\"width: 1100px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-200 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2.jpg\" alt=\"Stopping FG-Primary\" width=\"1100\" height=\"468\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2.jpg 1100w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2-300x128.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2-1024x436.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2-768x327.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2-65x28.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2-225x96.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/7-2-350x149.jpg 350w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\" \/><figcaption id=\"caption-attachment-202\" class=\"wp-caption-text\">Figure 6.7: Stopping FG-Primary<\/figcaption><\/figure>\n<figure id=\"attachment_202\" aria-describedby=\"caption-attachment-202\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-201\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3.jpg\" alt=\"Verify connectivity to the firewall\" width=\"400\" height=\"246\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3.jpg 974w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3-300x184.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3-768x472.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3-65x40.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3-225x138.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-3-350x215.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-202\" class=\"wp-caption-text\">Figure 6.8: Verify connectivity to the firewall<\/figcaption><\/figure>\n<figure id=\"attachment_202\" aria-describedby=\"caption-attachment-202\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-202\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2.jpg\" alt=\"Verify firewall role after stopping FG-Primary\" width=\"500\" height=\"298\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2.jpg 982w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2-300x179.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2-768x458.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2-65x39.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2-225x134.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-2-350x209.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-202\" class=\"wp-caption-text\">Figure 6.9: Verify firewall role after stopping FG-Primary<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Log &amp; Report<\/strong> &gt; <strong>Events<\/strong> &gt; <strong>HA Events<\/strong> and download the log. Verify your result.<br \/>\n<figure id=\"attachment_203\" aria-describedby=\"caption-attachment-203\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-203\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3.jpg\" alt=\"HA Events\" width=\"550\" height=\"308\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3.jpg 974w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3-300x168.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3-768x430.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3-65x36.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3-225x126.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/9-3-350x196.jpg 350w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><figcaption id=\"caption-attachment-203\" class=\"wp-caption-text\">Figure 6.10: HA Events<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n","protected":false},"author":124,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-204","chapter","type-chapter","status-publish","hentry"],"part":193,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/124"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/204\/revisions"}],"predecessor-version":[{"id":205,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/204\/revisions\/205"}],"part":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/193"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/204\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=204"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=204"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=204"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}