I wonder in what order the configuration is restored in the HA cluster.
From what I found in the documentation "When restoring the configuration of a cluster, cluster unity reboot to install the new configuration. This may result in a brief traffic interruption as all cluster units map restart at the same time."
Is it true that both nodes can restart at the same time, or is there a gradual: first on the master, then on the slave, or in reverse?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
It is not possible to only restore the config on one unit at a time, it will always restore the config to both.
You can separate the cluster then restore the config on each one.
I may have expressed myself incorrectly, difficulties with translation((
Obviously, the configuration will be restored on both cluster devices at a time, I wanted to clarify exactly the moment of switching between devices during recovery.
That is, does it not happen that in a couple of minutes of the entire procedure, the configuration is restored on the first device while the second one is working, then the first one becomes active, and the configuration is restored on the second?
It turns out that at the time of restoring the configuration, both devices are not functioning.
Thanks
Hi
I have issue with sync on HA. is permanently out-of-sync. I have a backup from backup unit and I would like to restore HA using this config file. Can I load this file via GUI. What should I change it.
If the config file is loaded to both units at the same time, what about the parameter "set priority" and Host name and Alias. ?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.