Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
This should allow you to use a single route to the HSRP VIP and no matter if the traffic goes through the primary or secondary, traffic will be routed to the virtual IP of the connected Provider router. Just monitor the provider uplinks on the FG cluster and let them handle failover, do not worry about ECMP.I would highly disagree on doing that. Your circumventing the " redundant" part of HSRP and if the provider up-path is broken, you just potentially black-holed your traffic to a primary VIP in that standby-group. Also if you have HA interface monitoring going on, you just damage that part of the FGT-HA. Also, most providers are doing some type of interface and/or protocol traffic to decrement the priority on a up-path failure. If the OP is looking at using both " providers" , than my earlier suggestion of routing to the " real-interfaces" ip_address and not the VIP. This would not require any changes, break any HSRP standby group or anything else as far as that go. Than with ECMP routes on the FGT and dead-gateway detect, you could managed your uplink path So let' s say SP#1 10.10.0.1 SP#2 10.10.0.2 VIP 10.10.0.254 You just apply two equal static routes to 10.10.0.1 and 10.10.0.2 and now you have ECMP between the 2 SPs and no others problems with asymmetrical routing, HA intf-monitor, or disruption of the SP stand-by master/standby relation. I guess you could also add a 3rd route to the VIP ( 10.10.0.254 ) , it would do some strange things with weighting traffic loads 2 to router 1 ( 10.10.0.1 and 10.10.0.254 ) 1 to router 2 ( 10.10.0.2 ) YMMV play around and see what it does and if it achieves what you want.
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.