Hi All,
I come from Cisco background and trying to implement something similar to IP SLA and infleunce the outcome of the same to stop propagation of default route to the core switches.
Here is the set up. We have an existing Juniper SSG140 firewall, that runs OSPF with two L3 switches, so each switch learns the default route from the firewall. We have two ISPs on the firewall with IP Tracking ( similar to Cisci IP SLA) running.
Now we want to add a new firewall, so that we have some hardware redundancy as well as ISP circuits redundancy as well. This new firewall will be Fortigate 400A or similar and will terminate a new ISP connection.
So each of the firewall will be running ospf thru the LAN side interface and advertise the default route to the two Core L3 switches, with Juniper being having a higher matric / cost, so that switches will prefer the default route coming in from new Fortigate and thus normally internet bound traffic will be routed thru Fortigate.
I noticed there is a feature under interface, to specify a server IP address that can be on the internet ( something like openDNS, or Google DNS) and if that stops pinging, firewall will shut down that interface. can I implement the same feature on port 1 (LAN, trusted side) so that when ISP circuit is down, port 1 will get isolated (unless the address I specify has to be reachable thru the port 1), and thus core switches will stop receiving the ospf route thru fortigate and switchover the traffic to Juniper?
Or is there another way to achieve this failover?
Also I was looking for Cisco DNS Doctoring type of feature and looks like dnstranslation is it. But I am a bit confused as to what should be exact code to achieve? Assume inside webserver is 192.168.10.25 and mapped address on public side is 64.128.32.25. The public FQDN is webserver.test.com and windows FQDN is webserver.test.local. Because of windows domain name to be test.local, I can not simply add a local Host (A) record in internal domain controller/DNS and hence name resolution for webserver.test.com goes out and comes back as 64.128.32.25. That will make all traffic to always be looped thru firewall.
Appreciate in advance for your support.