| Description |
This article describes how to re-assign multiple secondary public IPs when FortiGate HA failover in an AWS between multiple zones environment. |
| Scope | FortiGate HA in AWS. |
| Solution |
In the AWS multiple zones environment, the FortiGate HA A-P has different IP address ranges, so the failover differs from that of a one-zone environment, especially when the FortiGate has multiple public IPs mapping to private IPs.
The below shows the FortiGate HA had two secondary IPs and public IPs.
Those secondary IPs are also configured on both FortiGate:
The secondary FortiGate:
The primary FortiGate's secondary IPs must be allocated with the public IPs:
The IP mapping is also attached to the network interfaces of primary FortiGate:
The secondary FortiGate does not need public IP mapping. It will happen when the HA failover:
The failover debug logs showed:
AWS-HA-Passive # diagnose debug application awsd -1 AWS-HA-Passive #
The public IP mapping is by sequence and must be considered before applying.
Related document: Deploying FortiGate-VM active-passive HA AWS between multiple zones. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.