- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Fortigates in line Transparent HA mode
We are planning to put two Fortigate in line in HA active passive and transparent mode behind existing Cisco firewalls to inspect traffic.
I was wondering if there are features not supported under this configuration?
Can the incoming ports on fortigates be directly connected to firewall ports without going to a switch first? Firewalls are in HA as well. If it fails over, how will the Fortigates know to fail over to the other unit?
If we turn on deep inspection, what kind of certificates are required and where should they be installed? Is it internal sub-root CA? For incoming traffic? For Outgoing traffic?
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
the following articles lists the features that are not supported in transparent mode:
I personally used transparent mode in production and I confirm it is very helpful when you don't want to change L3 topology.
If I understand your question about connecting Cisco FW directly to FGT without switch, I'd say yes you can, but in that case for the fail-over to operate correctly you will need to connect each Cisco firewall to both FortiGates, the active and the passive one.
For deep inspection, you have two choices:
- Either use the FGT embedded certificate and install the related CA cert on all Corp clients via GPO
- Or install on your FGT a subordinate CA issued from your Corp root CA.
Ref: https://docs.fortinet.com/document/fortigate/6.2.16/cookbook/680736/microsoft-ca-deep-packet-inspect...
It is usually for outgoing traffic. For incoming traffic you use server certificate in the server certificate.
Hope it helps.
