Created on 10-05-2017 07:09 PM Edited on 10-26-2024 08:11 AM By Stephen_G
Description
This article describes the scope of a FortiAuthenticator HA cluster.
Scope
FortiAuthenticator.
Solution
FortiAuthenticator can work as a cluster offering redundancy and, in some configurations, balancing charges.
The configuration can be made on an L2 (Active/Passive) layer or an L3 (Active/Active) layer.
The following prerequisites must be achieved:
Active/Passive:
Note: Backup units cannot allow configuration changes.
Active/Active (GEO HA):
Running the capture generates output similar to the following:
execute tcpdump -i port3 port 720
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on port3, link-type EN10MB (Ethernet), snapshot length 262144 bytes
14:20:29.130045 IP 169.254.0.1.720 > helium-san.fortilab.net.720: UDP, length 200
14:20:29.455460 IP 169.254.0.2.720 > helium-san.fortilab.net.720: UDP, length 200
14:20:30.137985 IP 169.254.0.1.720 > helium-san.fortilab.net.720: UDP, length 200
14:20:30.452354 IP 169.254.0.2.720 > helium-san.fortilab.net.720: UDP, length 200
Technical Tip: How to configure FortiAuthenticator HA A-P cluster
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.