FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
JaskiratM
Staff
Staff
Article Id 252514
Description

 

This article describes how to adjust the AZURE Internal Load balancer algorithm to achieve successful failover in an HA deployment of FortiGate in Azure

 

Scope

 

Fortigate HA (active/passive) deployed in AZURE:

 
 
 

JaskiratM_3-1681662269148.png

 

 

When an endpoint in the Protected A network is trying to reach out of the VNET through the FortiGate firewalls, it hits the FGT-A with NIC (.69) and is forwarded out.

When the FGT-A becomes unavailable, the traffic should be then forwarded by the Internal Load Balancer to the NIC (.70) attached to the FGT-B but, the load balancer still persists with the session and keeps on forwarding the traffic towards FGT-A even though the probes to the FGT-A have died.

 

Solution

 

1) Access the Internal Load Balancer from the Resource Group Section of the AZURE Environment:

JaskiratM_4-1681662315158.png

 

2) On Opening the Internal Load Balancer, check if the probes have been set up by going to the HEALTH-PROBE section of the load balancer:

JaskiratM_5-1681662315160.png

 

 

3) Once the Health-Probe is configured, check if it is working on the Azure Load-Balancer by selecting  the METRICS section inside the load-balancer:

 

JaskiratM_6-1681662315165.png

 

Make sure to choose the scope and specify the same probe as seen in step 2:

 

JaskiratM_7-1681662315166.png

 

4) Verify the Probe Response under Administrative access is enabled and working on the FortiGate.

 

JaskiratM_8-1681662315168.png

 

Also, run on both the active and the secondary unit:


# diag sniffer packet any ‘port 8008’ 4 0 1

 

This will verify the probes are working. On the active one, an output like this should appear:

 

JaskiratM_10-1681662438373.png

 

On the secondary firewall, the output should look like this:

 

JaskiratM_11-1681662438379.png

 

5) Check the load balancing rule on the Internal Load Balancer and verify that the session persistence is set to none (5 tuples).

 

JaskiratM_12-1681662438382.png

 

Refer to the link below from Microsoft:
https://learn.microsoft.com/en-us/azure/load-balancer/distribution-mode-concepts

Contributors