This recipe introduces the process of deploying FortiGate Active-Passive High Availability (HA) for AWS. See below for recipes in this process:
- Customize the CFT template
- Check the prerequisites
- Review the network failover diagram
- Invoke the CFT template
- Connect to the FortiGates
- [Connectivity test] Configure FortiGate firewall policy
- [Failover test] Shut down FortiGate A
FortiGate supports Active-Passive HA on AWS, with two FortiGate instances synchronizing configuration and sessions with FortiOS versions 5.4.5 and 5.6.3+. This FortiGate native mechanism achieves HA without using AWS clustering/balancing technologies. One instance runs as the primary/master, while the other runs as the secondary/slave (hereafter referred to as “primary”/”FortiGate A” and “secondary”/”FortiGate B”, respectively). When the primary fails to operate, the secondary automatically promotes itself to the primary.
To deploy this HA, you will generally not subscribe FortiGate EC2 instances from the AWS marketplace portal. Instead, you will kick off deployment using CloudFormation templates (CFT).
See below for FortiGate product listings on AWS:
- BYOL: https://aws.amazon.com/marketplace/pp/B00ISG1GUG
- On-Demand: https://aws.amazon.com/marketplace/pp/B00PCZSWDA