High Availability Architecture for Fortinet

Understanding High Availability Setups for Fortinet Device Pairs

Here I am at my desk — the 3rd cup of coffee just now taking hold — and I am pondering high availability (HA) setups for Fortinet device pairs. It’s amazing how something as simple as redundancy will either save your bacon or deprive you of sleep. But I’ve been in networks one way or another since ’93 as a network admin, and I’ve gone from PSTN muxes doing voice and data (yes, those things) to sidestepping chaos when the Slammer worm ran amok (and once previously when I naively assumed I could never see a failover failure). That’s not just rhetorical hyperbole when, at P J Networks, a cybersecurity-focused VAR that deals every day with firewalls, servers, and routers, HA is no longer just a buzzword — it’s a matter of life or death.

Let’s strip down High Availability architecture for FortiGate, FortiAuthenticator, and FortiAP devices for a moment – because, believe me, if your fortinet environment isn’t sound then what you think you know about security can indeed be dangerous. Spoiler: I have recently worked with 3 banks to redesign their zero trust architecture and what surprised me was the frequency that HA configurations went totally ignored or just not fully baked. That’s a risk you don’t want.

HA Concepts – When to Consider High Availability

For those who are not clear on what HA stands for in the Fortinet world, here is a quick run down. Basically, High Availability means that your system continues to operate–even in the case where some part of your system breaks (fails). No downtime, no service outages, no pointing fingers at the network guy when your app is down. This is vitally important when dealing with banks, large enterprises, or any business in which risk equals real money.

HA is a feature for Fortinet where we try to reduce the downtime for the firewalls, while the primary firewall fails. A FortiGate firewall processing your traffic, a FortiAuthenticator managing your identity, or FortiAPs providing wifi—HA makes sure that even if any one of those devices takes a tumble, the others keep standing.

The two most common HA modes you will hear about

Active-Passive vs Active-Active: What to choose?

Here’s the deal — active-active is the shiny sports car we all want, but active-passive is that dependable truck that simply does the job without the fanfare.

Active-Passive

Active-Active

For FortiGates PJ Networks typically sells active-passive for the majority of the clients. Without the engineering firepower and time for complex riggings, it’s thus the more rugged and practical option. It is worth noting that the banks I have been working with recently, particularly in a zero trust world, are pushing hard for active-active to squeeze the absolute maximum performance from everything everywhere all the time without any downtime — very impressive, but not for the faint-hearted.

For FortiAuthenticator, and FortiAPs, typically active-passive will be best – these are authentication, identity and wireless type devices so maintaining service availability without session switchovers is a lot more important than raw throughput.

Setup Process The Nuts and Bolts

(Updated Dec 26, comments at bottom) So, you want to make an HA Fortinet configuration. Here is a distilled version of PJ Networks’ method — honed over years of maintenance, on-the-job repairs:

  1. Assess Redundancy Needs
    • Not every site needs full HA, as a hot-standby might suffice
    • Depth is important: FortiGate HA, FortiAuthenticator clustering, and FortiAP redundancy all do their own thing
  2. Network Topology Design
    • HA topology design done by PJ Networks based on your traffic, zones and VLANs
    • Employ dedicated HA Links between devices—do not mix admin data with HA heartbeats.
    • Add anot_admin<long_timeout> option to firewall policies — accounts for failures.
  3. FortiGate HA settings configuration
    • Have same version of firmware (mismatches can lead to subtle bugs)
    • Set up the heartbeat interfaces (select at least two for redundancy)
    • Sync device configurations and session tables (active-active is why this is important)
  4. FortiAuthenticator HA Setup
    • Primary and Secondary installation with user credentials and authentication policies kept in real-time sync.
    • Set up internal “heartbeat monitors
  5. FortiAP Redundancy
    • It’s the APs themselves that won’t provide active-passive, but you architect wireless controllers with HA built-in The wireless implementation business is the same – I saw a presentation once and was flabbergasted.
    • Make sure that roaming and failover settings are snug
  6. Failover Scripts & NOC Alerting
    • PJ Networks writes scripts that automate failover and link monitoring.
    • Instant alert to NOC on failover or degradation.
  7. Firmware Updates for the Camera and the Disk Drive Regularly and Maintaining Them
    • Tag and release of firmware and patches on a quarterly basis ensuring first tested on dark lab setups
    • Downtimes are well planned – HA means less, but still present

Failover Testing – Don’t Set It and Forget It

Setup! = success. Testing failover cases is also where many engineers get lazy or take shortcuts.

PJ Networks requires quarterly failover exercises. That means:

Here’s the rub — the timing of failover does matter. Too slow and users will notice; too fast and you will introduce instability. I’ve seen a customer personally freak out when failover flaps back and forth for a while due to someone f5’ing all the timers without reading what they do.

Bottom line: break your HA set up deliberately and learn from your mistakes.

If PJ Networks SLA: Our Promises to You

At P J Networks we take HA seriously because we have to. Our customers — banks, retail chains, large businesses — they need rock-solid uptime.

Our SLAs are a testament to that:

What we’ve learned is that even the best hardware and HA architecture will break if you aren’t maintaining it. Phones ring at 3 AM when someone ignored the persistent alert or postponed applying firmware patches. Done that, and learned a few things the hard way.

Best Practice: You HA It Right

Here’s my somewhat judgmental list—because I loathe cliché advice, and most security pros skip the small stuff:

Quick Take

What if you’re in a hurry and just want my quick take:

Conclusion

I just got back from DefCon. Fresh from the hardware hacking village, I can tell you that whether it’s a Fortinet firewall or a locked-down embedded gizmo, they’ll find their way in sooner or later, if you don’t architect for HA and resilience from Day 1. That’s my takeaway. Hope you’ll find something you can use, either if you are an experienced admin or a startup CIO just trying to find the right way to operate.

Sanjay Seth
P J Networks Pvt Ltd
Cybersecurity consultant since 2000 (network admin since 1993, Slammer worm survivor of the mayhem)

Exit mobile version