This article describes how to adjust the AZURE Internal Load balancer algorithm to achieve successful failover in an HA deployment of FortiGate in Azure
Fortigate HA (active/passive) deployed in AZURE:
When an endpoint in the Protected A network is trying to reach out of the VNET through the FortiGate firewalls, it hits the FGT-A with NIC (.69) and is forwarded out.
When the FGT-A becomes unavailable, the traffic should be then forwarded by the Internal Load Balancer to the NIC (.70) attached to the FGT-B but, the load balancer still persists with the session and keeps on forwarding the traffic towards FGT-A even though the probes to the FGT-A have died.
Make sure to choose the scope and specify the same probe as seen in step 2:
Also, run the following on both the active and the secondary unit:
diagnose sniffer packet any ‘port 8008’ 4 0 1
This will verify the probes are working. On the active one, an output like this should appear:
On the secondary firewall, the output should look like this:
Refer to the Microsoft Learn article on distribution mode concepts.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.