Configuring High Availability for Embedded NGX Gateways in SmartCenter



Similar documents
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Best Practices: Pass-Through w/bypass (Bridge Mode)

Firewall Defaults and Some Basic Rules

Configuring a customer owned router to function as a switch with Ultra TV

SSL-VPN 200 Getting Started Guide

WAN Failover Scenarios Using Digi Wireless WAN Routers

Using SonicWALL NetExtender to Access FTP Servers

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

Experiment # 6 Remote Access Services

EXINDA NETWORKS. Deployment Topologies

Route Based Virtual Private Network

Using Cisco UC320W with Windows Small Business Server

Electromeet Participant Guide Optimising Your Internet Connection

Wireless G Broadband quick install

How do I configure multi-wan in Routing Table mode?

Deploying Windows Streaming Media Servers NLB Cluster and metasan

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

Chapter 4 Customizing Your Network Settings

1. Hardware Installation

VPN-1 VE Evaluation Guide

Configuring WAN Failover & Load-Balancing

Balancing and Gateway Failover

SonicOS Enhanced Release Notes

Remote Desktop Services Overview. Prerequisites. Additional References

MN-700 Base Station Configuration Guide

GlobalSCAPE DMZ Gateway, v1. User Guide

VPN Only Connection Information and Sign up

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Using a VPN with Niagara Systems. v0.3 6, July 2013

Firewall VPN Router. Quick Installation Guide M73-APO09-380

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Clustering. Configuration Guide IPSO 6.2

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Chapter 3 Security and Firewall Protection

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

BROADBAND INTERNET ROUTER USER S MANUAL. Version Page 1 of 13 -

Setting the Management IP Address

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Guideline for setting up a functional VPN

VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS

Chapter 15: Advanced Networks

VMware vcloud Air Networking Guide

Wireless Router Quick Start Guide Rev. 1.0a Model: WR300NQ

Deployment Guide: Transparent Mode

Chapter 12 Supporting Network Address Translation (NAT)

UIP1868P User Interface Guide

Global VPN Client Getting Started Guide

Chapter 1 Configuring Basic Connectivity

Using a VPN with CentraLine AX Systems

Basic IPv6 WAN and LAN Configuration

Chapter 2 Connecting the FVX538 to the Internet

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Barracuda Link Balancer

High Availability Branch Office VPN

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

your Gateway Windows network installationguide b wireless series Router model WBR-100 Configuring Installing

How To Configure SSL VPN in Cyberoam

TW100-BRV204 VPN Firewall Router

VPN Wizard Default Settings and General Information

Wave SIP Trunk Configuration Guide FOR BROADVOX

Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0

A. Hot-Standby mode and Active-Standby mode in High Availability

IP Address and Pre-configuration Information

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Edgewater Routers User Guide

Top-Down Network Design

Basic Exchange Setup Guide

Getting Started Guide

ewon-vpn - User Guide Virtual Private Network by ewons

Appendix C Network Planning for Dual WAN Ports

F-Secure Messaging Security Gateway. Deployment Guide

Broadband Router ALL1294B

Scenario 1: One-pair VPN Trunk

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Contents. Platform Compatibility. SonicOS

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

Network Load Balancing

Multi-Homing Dual WAN Firewall Router

Chip PC Thin-Clients Solutions for Remote Home/Business Connectivity Using PPTP ADSL Modem

LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0

Understand Wide Area Networks (WANs)

WatchGuard Mobile User VPN Guide

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

Chapter 3 LAN Configuration

TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub

Global VPN Client Getting Started Guide

nexvortex Setup Template

Edgewater Routers User Guide

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

WAN Traffic Management with PowerLink Pro100

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

DSL-2600U. User Manual V 1.0

Installing GFI MailEssentials

Network Monitoring User Guide Pulse Appliance

Transcription:

Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008

Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and Passive Gateway States...2 Priority...2 Heartbeats and Synchronization Interface...4 Virtual IP Address...5 High Availability Configuration Types...6 How High Availability Works...9 Prerequisites...9 Workflows...10 Gateway High Availability Workflow...10 WAN High Availability Workflow...11 WAN High Availability with Virtual WAN IP Address Workflow...12 Adding UTM-1 Edge Appliances to SmartCenter...13 Configuring the LAN Network's Encryption Domain...15 Configuring a Backup Gateway...17 Configuring VPN Communities for Permanent Tunnels...18 Simple High Availability Configuration Scenarios...19 Scenario 1: Simple Gateway and WAN HA Configuration with Two Gateways...19 Scenario 2: Gateway and WAN HA Configuration with Two Gateways Including Backup Internet Connection...22 Scenario 3: Gateway and WAN HA Configuration using a Shared WAN Virtual IP Address...25 Introduction i

Active and Passive Gateway States Introduction It is a well-known fact that in order to keep business transactions working smoothly, it is necessary to have a reliable Internet connection, and keep the network downtime to a minimum, since a period with no Internet connection or access to critical business network resources means loss of business, money, and worker productivity. Therefore, it is important to ensure that your Internet connection is working at all times. The Check Point UTM-1 Edge appliance's High Availability (HA) feature enables you to create a HA cluster consisting of multiple UTM-1 Edge appliances. All network traffic is routed through one appliance in the cluster, while the rest of the appliances act as backups, so that if the Internet connection fails, the network remains protected and connected to the Internet. Configuring a HA cluster enables you to: Keep your network protected, even in the event of a hardware malfunction Ensure that the connection to your email provider is working at all times Ensure that remote users and mobile workers have reliable access to internal network resources for business information and transaction Allow external users from the Internet to access to your internal Web servers and ASP applications This document explains how to configure High Availability for a cluster of UTM-1 Edge appliances that are managed by SmartCenter. Note: This document refers to Check Point UTM-1 Edge appliances version 7.0 or later. Introduction 1

Active and Passive Gateway States High Availability Basics and Terminology This section introduces the terms used to discuss HA and explains how HA works. Active and Passive Gateway States HA requires the configuration of at least two of identical UTM-1 Edge security appliances. At any given time, one UTM-1 Edge security appliance is in active state, and the other UTM-1 Edge security appliances are in passive state. The currently active appliance is called the Active Gateway, and the currently passive appliances are called Passive Gateways. A gateway's current state determines its roles: The Active Gateway is responsible for processing the current connections and networking tasks. There can be only one Active Gateway in a HA cluster at any given time. A Passive Gateway remains in a standby state until the current Active Gateway fails. It then may take over the failed gateway's roles, becoming the new Active Gateway. The gateways in a HA configuration are collectively called a HA cluster. Priority Each UTM-1 Edge security appliance in a HA cluster is configured with a priority: a value that determines whether the gateway is active or passive at a given time. The live gateway with the highest priority on the network is automatically elected as the Active Gateway. If this gateway fails, the gateway with the next-highest priority gateway is elected as the new Active Gateway. The following table lists the various values that influence a gateway's priority. 2 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Priority Table 1: Values Influencing the Gateway Priority Value Description Priority My Priority This value represents the priority you assigned to a particular gateway. This must be an integer between 1 and 255. Internet Connection Tracking Values Internet-Primary This value is the amount that will be deducted from the My Priority value if the primary Internet connection goes down. This must be an integer between 0 and 255. Internet-Secondary If you configured the gateway with a secondary Internet connection, then this value is the amount that will be deducted from the My Priority value if the secondary Internet connection goes down. This must be an integer between 0 and 255. Port Tracking Values LAN1/LAN2/LAN3/L AN4 This value is the amount that will be deducted from the My Priority value if the relevant LAN port's Ethernet link is lost. This must be an integer between 0 and 255. DMZ This value is the amount that will be deducted from the My Priority value if the DMZ port's Ethernet link is lost. This must be an integer between 0 and 255. High Availability Basics and Terminology 3

Heartbeats and Synchronization Interface Normally, the gateway's priority is equal to the My Priority value. However, if one or both of the following things happens: The primary and/or secondary Internet connection goes down. One or more LAN ports and/or the DMZ port stops responding. Then the gateway's priority is calculated as follows: Priority = My Priority - (Internet-Primary + Internet- Secondary) - (LAN1 + LAN2 + LAN3 + LAN4 + DMZ) Note: The appliance detects loss of Internet connectivity based on the Dead Connection Detection (DCD) methods configured for each Internet connection. Heartbeats and Synchronization Interface The Active Gateway sends periodic signals, or heartbeats, to the internal network via a synchronization interface. The synchronization interface can be any of the following, except the WLAN (Wireless LAN) interface: LAN interface DMZ interface VLAN interface Bridge port The UTM-1 Edge security appliances' synchronization interface ports must be connected to each other, either directly, or via a hub or a switch. For example, in a HA configuration where the LAN is the synchronization interface, the appliance's LAN ports must be connected to each other. Heartbeats from the Active Gateway will not reach the internal network, or the Active Gateway will stop sending heartbeats if: The Active Gateway is not powered on. The Active Gateway is not responding, due to a hardware failure. The synchronization interface is disconnected or not working. The Active Gateway's priority changed (that is, it was lowered). 4 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Virtual IP Address A gateway with a higher priority was added to the network and connected to the synchronization interface. Virtual IP Address Normally, all enabled interfaces of a UTM-1 Edge appliance in a HA cluster are assigned a dedicated unique IP address. In addition, cluster gateways can share a virtual IP address (VIP) for each internal interface. The Active Gateway in the cluster always uses virtual IP addresses in the following manner: The virtual IP address shared by the internal network interfaces is used as the default gateway for the internal network hosts. The virtual IP address assigned to the primary Internet connection is used by the Active Gateway in the cluster to connect to the Internet through the interface assigned to the primary Internet connection. The virtual IP address assigned to the secondary Internet connection is used by the Active Gateway in the cluster to connect to the Internet through the interface assigned to the secondary Internet connection. High Availability Basics and Terminology 5

High Availability Configuration Types High Availability Configuration Types The UTM-1 Edge security appliance allows the following types of High Availability cluster configurations: Table 2: High Availability Configuration Types Type Gateway High Availability Description Hosts on the internal UTM-1 Edge appliance networks use the Active Gateway in the HA cluster as the default gateway to the Internet and other subnets. Advantages: If the Active Gateway fails, a Passive Gateway will take control of the virtual IP address and become the new Active Gateway. Thus this configuration provides full redundancy to the Internet and UTM-1 Edge appliance subnets. Disadvantages: The new Active Gateway cannot take over the previous Active Gateway s WAN IP address, because although the previous Active Gateway is now passive, its WAN Internet connection remains active. Therefore, the new Active Gateway will have a different WAN IP address than the old Active Gateway, and external users will be unable to access internal servers at UTM-1 Edge appliance networks without knowing the WAN IP address of the new Active Gateway. 6 Configuring High Availability for Embedded NGX Gateways in SmartCenter

High Availability Configuration Types Type WAN High Availability Description Only the Active Gateway in the HA cluster is connected to the Internet. Passive Gateways will not connect to the Internet, unless their status changes to Active. Advantages: Allows using a single WAN IP address for all gateways in the HA cluster without IP conflicts. Inbound communications are enabled through a single IP address, which is handled by the current Active Gateway. Therefore, changes in cluster gateways' status (active or passive) are transparent to external users. Disadvantages: Since only the Active Gateway is connected to the Internet, Passive Gateways are not dynamically updated by SmartCenter in real time. They are only updated when their status changes to active, and they obtain an Internet connection. Passive Gateways cannot be remotely configured through the Internet. High Availability Basics and Terminology 7

High Availability Configuration Types Type WAN High Availability with Virtual IP Address Description All gateways in the HA cluster share an additional virtual IP address on the WAN interface. The Active Gateway uses the WAN virtual IP address for Internet connections, while the Passive Gateways use their original IP addresses. Advantages: All cluster gateways can connect to the Internet simultaneously. Inbound communications are enabled through a single IP address, which is handled by the current Active Gateway. Therefore, changes in cluster gateways' status (active or passive) are transparent to external users. Passive Gateways can be reached via their original IP addresses. Cluster gateways remain connected to SmartCenter and therefore are always updated with the latest software versions, security policies, and SmartDefense signatures. Disadvantages: Requires an additional IP address as the shared WAN virtual IP address. This option is supported only when the UTM-1 Edge appliance is configured with an Internet connection of the Local Area Network (LAN) type. 8 Configuring High Availability for Embedded NGX Gateways in SmartCenter

High Availability Configuration Types How High Availability Works High Availability works as follows: 1. Each gateway is assigned a priority, which determines the gateway's state (active or passive). 2. The Active Gateway sends heartbeats to the network via the synchronization interface. 3. If the heartbeat from the Active Gateway stops (indicating that the Active Gateway has failed), the Passive Gateway with the next-highest priority becomes the new Active Gateway and takes over the virtual IP address. 4. When a gateway that was offline comes back online, or a gateway's priority changes, that gateway sends a heartbeat notifying the other gateways in the cluster. 5. If the gateway's priority is now the highest, it becomes the Active Gateway. 6. Internet connection on each of the cluster gateways behaves according to the WAN HA configuration. In any case, traffic to the Internet will flow through the available Internet connection defined on the current Active Gateway. Prerequisites Before configuring HA, the following requirements must be met: You must have at least two identical UTM-1 Edge security appliances. The UTM-1 Edge security appliances must have identical firmware versions and firewall rules. The UTM-1 Edge security appliances' internal networks must be the same. The UTM-1 Edge security appliances' Internet IP addresses must be different, but they must share the same virtual IP address. Each internal network segment must be connected to a separate hub or switch. In other words, the Active and Passive Gateways' LAN segments must be How High Availability Works 9

Gateway High Availability Workflow connected to one hub/switch, and the Active and Passive Gateways' DMZ segments must be connected to another hub/switch, and so on. The UTM-1 Edge security appliances' synchronization interface ports must be connected either directly, or via a hub or a switch. For example, if the DMZ is the synchronization interface, then the DMZ/WAN2 ports on the appliances must be connected to each other. The UTM-1 Edge security appliances must use the same credentials to connect to SmartCenter. Workflows Gateway High Availability Workflow To configure Gateway HA 1. Configure the UTM-1 Edge appliances for Gateway HA. For information, refer to the User Guide. 2. Add each UTM-1 Edge appliance to SmartCenter as a gateway object with a static IP address. See Adding UTM-1 Edge Appliances to SmartCenter on page 13. 3. Configure each gateway object with the same LAN network encryption domain. See Configuring the LAN Network's Encryption Domain on page 15. 4. On each gateway object, configure the other gateway object as the backup gateway. See Configuring a Backup Gateway on page 17. 5. Add the gateway objects as satellites in a single VPN community. For information, refer to SmartCenter documentation. 10 Configuring High Availability for Embedded NGX Gateways in SmartCenter

WAN High Availability Workflow WAN High Availability Workflow To configure WAN HA 1. Configure the UTM-1 Edge appliances for WAN HA, by doing the following: a. Configure the UTM-1 Edge appliances for Gateway HA. b. In the Passive Gateway's Network > Internet > Internet Setup page, select the Do not connect if this gateway is in passive state check box. For information, refer to the User Guide. 2. Add a single gateway object to SmartCenter, with either a static or dynamic IP address. See Adding UTM-1 Edge Appliances to SmartCenter on page 13. 3. Configure the gateway object's LAN network encryption domain. See Configuring the LAN Network's Encryption Domain on page 15. 4. Add the gateway object as a satellite in a VPN community. For information, refer to SmartCenter documentation. Workflows 11

WAN High Availability with Virtual WAN IP Address Workflow WAN High Availability with Virtual WAN IP Address Workflow To configure WAN HA with virtual WAN IP address 1. Configure the UTM-1 Edge appliances for WAN HA with a Virtual WAN IP Address, by doing the following: a. Configure the UTM-1 Edge appliances for Gateway HA. b. In each appliance's Setup > High Availability page, in the Virtual IP field next to the desired Internet connection, type the shared virtual IP address. For information, refer to the User Guide. 2. Add each UTM-1 Edge appliance to SmartCenter as a gateway object with a dynamic IP address. See Adding UTM-1 Edge Appliances to SmartCenter on page 13. 3. Configure each gateway object with the same LAN network encryption domain. See Configuring the LAN Network's Encryption Domain on page 15. 4. On each gateway object, configure the other gateway object as the backup gateway. See Configuring a Backup Gateway on page 17. 5. Add the gateway objects as satellites in a single VPN community. For information, refer to SmartCenter documentation. 6. Configure the VPN community for permanent tunnels. See Configuring VPN Communities for Permanent Tunnels on page 18. 12 Configuring High Availability for Embedded NGX Gateways in SmartCenter

WAN High Availability with Virtual WAN IP Address Workflow Adding UTM-1 Edge Appliances to SmartCenter To add a UTM-1 Edge appliance to SmartCenter as a gateway object 1. In SmartDashboard, in the left pane under Network Objects, right-click on Check Point and select New Check Point > VPN-1 UTM Edge Gateway. The VPN-1 UTM Edge Gateway window opens displaying the General Properties node. 2. In the Name field, type a name for the gateway object that will represent the UTM-1 Edge appliance. Adding UTM-1 Edge Appliances to SmartCenter 13

WAN High Availability with Virtual WAN IP Address Workflow 3. Do one of the following: To configure a static IP address, in the IP Address field, type the static IP address of the UTM-1 Edge appliance. To configure a dynamic IP address, select the Dynamic Address check box. Reminder: For Gateway HA, you must configure a static IP address. For WAN HA, you can configure either a static or dynamic IP address. For WAN HA with Virtual IP Address, you must configure a dynamic IP address. 4. Select the VPN check box. 5. Complete the rest of the fields as desired. For information, refer to SmartCenter documentation. 6. To close the gateway object, click OK. 14 Configuring High Availability for Embedded NGX Gateways in SmartCenter

WAN High Availability with Virtual WAN IP Address Workflow Configuring the LAN Network's Encryption Domain Note: When configuring Gateway HA or WAN HA with Virtual WAN IP Address, the gateway objects' LAN networks must have the same encryption domain. To configure the encryption domain of a gateway object's LAN network 1. In SmartDashboard, in the desired gateway object, click the Topology node. The Topology node appears. 2. In the table, double-click on LAN. Configuring the LAN Network's Encryption Domain 15

WAN High Availability with Virtual WAN IP Address Workflow The Interface Properties dialog box appears displaying the General tab. 3. In the IP Address field, type the LAN network's internal IP address. 4. In the Net Mask field, type the LAN network's subnet mask. 5. Click the Topology tab. The Topology tab appears. 6. Click Network defined by the interface IP and Net Mask. 16 Configuring High Availability for Embedded NGX Gateways in SmartCenter

WAN High Availability with Virtual WAN IP Address Workflow 7. Click OK. 8. To close the gateway object, click OK. Configuring a Backup Gateway To configure a backup gateway 1. In SmartDashboard, in the desired gateway object, click the VPN node. The VPN node appears. 2. Select the Use Backup Gateway check box. 3. In the Use Backup Gateway drop-down list, select the other gateway object. 4. Click OK. Configuring a Backup Gateway 17

WAN High Availability with Virtual WAN IP Address Workflow Configuring VPN Communities for Permanent Tunnels To configure VPN community for permanent tunnels 1. In SmartDashboard, in the desired VPN community, click the Tunnel Management node. The Tunnel Management node appears. 2. Select the Set Permanent Tunnels check box. Do not change the other settings. 3. Click OK. 18 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Scenario 1: Simple Gateway and WAN HA Configuration with Two Gateways Simple High Availability Configuration Scenarios Scenario 1: Simple Gateway and WAN HA Configuration with Two Gateways Figure 1: Simple Gateway and WAN HA Configuration Simple High Availability Configuration Scenarios 19

Scenario 1: Simple Gateway and WAN HA Configuration with Two Gateways GOAL OF THIS CONFIGURATION The goal of this configuration is to ensure the following: The internal networks always have an accessible default gateway for outbound Internet communications, in case the Active Gateway fails (for example, due to a hardware problem). Any failure on the Active Gateway is transparent to external users, and access to the internal networks is available at all times through a single IP address Ensure only the Active Gateway is connected to the Internet and using the allocated WAN IP address. IMPLEMENTING THIS SCENARIO To implement this scenario 1. Configure Gateway HA. See Gateway High Availability Workflow on page 10 2. Configure WAN HA on the Passive Gateway. See WAN High Availability Workflow on page 11 CONFIGURATION NOTES In this configuration, the Passive and Active Gateways can share the same Internet (WAN) IP address. The assumption in this configuration is that only a single WAN IP address can be allocated by the ISP for the cluster gateways to allow Internet connection. WHAT WE WANT TO HAPPEN A failover will take place in the following cases: The Active Gateway fails to generate heartbeats to the internal network. The Active Gateway's Internet connection is detected as down, causing the gateway's priority to decrease. Only the Active Gateway is connected to the Internet at a given time. 20 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Scenario 1: Simple Gateway and WAN HA Configuration with Two Gateways SAMPLE CONFIGURATION PARAMETERS Table 3: Simple Gateway and WAN HA Configuration Parameters Active Gateway Passive Gateway LAN Network IP Address 192.168.10.1 / 255.255.255.0 192.168.10.100 / 255.255.255.0 LAN Shared Virtual IP Address DMZ Network IP Address DMZ Shared Virtual IP Address 192.168.10.254 / 255.255.255.0 192.168.10.254 / 255.255.255.0 192.168.20.1 / 255.255.255.0 192.168.20.100 / 255.255.255.0 192.168.10.254 / 255.255.255.0 192.168.10.254 / 255.255.255.0 Actual WAN IP Address 62.90.31.1 62.90.31.1 WAN Shared Virtual IP Address n/a n/a My Priority 30 20 Track Primary Internet 20 0 Track Secondary Internet 0 0 Don't connect to the Internet if passive Unchecked Checked Synchronization Interface LAN Interface Simple High Availability Configuration Scenarios 21

Scenario 2: Gateway and WAN HA Configuration with Two Gateways Including Backup Internet Connection Scenario 2: Gateway and WAN HA Configuration with Two Gateways Including Backup Internet Connection Figure 2: Gateway and WAN HA Configuration with Backup ISP on Each Gateway 22 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Scenario 2: Gateway and WAN HA Configuration with Two Gateways Including Backup Internet Connection GOAL OF THIS CONFIGURATION The goal of this configuration is to ensure the following: The internal networks always have an accessible default gateway for outbound Internet communications, in case the Active Gateway fails (for example, due to a hardware problem). The internal networks are connected to the Internet using the broadband lines as much as possible, and the cheap and slow dialup connection is used only if all broadband connections are down. Any failure on the Active Gateway is transparent to external users, and access to the internal networks is available at all times. IMPLEMENTING THIS SCENARIO To implement this scenario 1. Configure Gateway HA. See Gateway High Availability Workflow on page 10. 2. Configure WAN HA on the Passive Gateway. See WAN High Availability Workflow on page 11. 3. Configure a secondary Internet connection for the Active and Passive Gateways, using dialup, ISDN, or GPRS modems to serve as a backup. Refer to the UTM-1 Edge appliance's User Guide. WHAT WE WANT TO HAPPEN A failover will take place immediately if the Active Gateway fails to generate heartbeats to the internal network. In this case, all connections will revert to the Passive Gateway, until the Active Gateway is available again. If the Active Gateway's primary Internet connection fails, a failover to the Passive Gateway will take place, and its broadband primary connection will be used. So long as the broadband primary Internet connection on the Active Gateway has not recovered, the following things will happen: Simple High Availability Configuration Scenarios 23

Scenario 2: Gateway and WAN HA Configuration with Two Gateways Including Backup Internet Connection If the Passive Gateway's broadband primary Internet connection also fails, then the Passive Gateway will use its backup dialup Internet connection. If the Passive Gateway's dialup backup Internet connection fails, a failover to the Active Gateway will take place, and its dialup backup Internet connection will be used. SAMPLE CONFIGURATION PARAMETERS Table 4: Gateway and WAN HA with Backup ISP Configuration Parameters Active Gateway LAN Network IP Address 192.168.10.1 / 255.255.255.0 Passive Gateway 192.168.10.100 / 255.255.255.0 LAN Shared Virtual IP Address 192.168.10.254 / 255.255.255.0 192.168.10.254 / 255.255.255.0 DMZ Network IP Address 192.168.20.1 / 255.255.255.0 192.168.20.100 / 255.255.255.0 DMZ Shared Virtual IP Address 192.168.10.254 / 255.255.255.0 192.168.10.254 / 255.255.255.0 Actual WAN IP Address 62.90.31.1 62.90.31.1 Shared WAN Virtual IP Address n/a n/a My Priority 100 45 Track Primary Internet 80 20 Track Secondary Internet 30 10 24 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Scenario 3: Gateway and WAN HA Configuration using a Shared WAN Virtual IP Address Don't connect to the Internet if passive Unchecked Checked Synchronization Interface LAN Interface Scenario 3: Gateway and WAN HA Configuration using a Shared WAN Virtual IP Address Figure 3: Gateway and WAN HA Configuration with Backup ISP on Each Gateway Simple High Availability Configuration Scenarios 25

Scenario 3: Gateway and WAN HA Configuration using a Shared WAN Virtual IP Address GOAL OF THIS CONFIGURATION The goal of this configuration is to ensure the following: The internal networks always have an accessible default gateway for outbound Internet communications, in case the Active Gateway fails (for example, due to a hardware problem). Enable sharing the same IP address on the WAN interface of active and passive gateways with no IP conflicts. Enable inbound communications for VPN and internal Web server access from the Internet for external users and teleworkers through a single IP address. Any failure on the Active Gateway is transparent to external users, and access to the internal networks is available at all times. All cluster gateways must be connected to a SMART management server to get security and software updates. IMPLEMENTING THIS SCENARIO To implement this scenario 1. Configure Gateway HA. See Gateway High Availability Workflow on page 10. 2. Configure WAN HA with Virtual IP Address. See WAN High Availability with Virtual WAN IP Address Workflow on page 12. WHAT WE WANT TO HAPPEN A failover will take place immediately if the Active Gateway fails to generate heartbeats to the internal network. In this case, all connections will revert to the Passive Gateway, until the Active Gateway is available again. Only the active gateway answers the virtual shared WAN IP address, enabling the passive gateway to remain connected to the Internet, for central management and updating. 26 Configuring High Availability for Embedded NGX Gateways in SmartCenter

Scenario 3: Gateway and WAN HA Configuration using a Shared WAN Virtual IP Address SAMPLE CONFIGURATION PARAMETERS Table 5: Gateway and WAN HA with Backup ISP Configuration Parameters Active Gateway LAN Network IP Address 192.168.10.1 / 255.255.255.0 Passive Gateway 192.168.10.100 / 255.255.255.0 LAN Shared Virtual IP Address 192.168.10.254 / 255.255.255.0 192.168.10.254 / 255.255.255.0 DMZ Network IP Address 192.168.20.1 / 255.255.255.0 192.168.20.100 / 255.255.255.0 DMZ Shared Virtual IP Address 192.168.10.254 / 255.255.255.0 192.168.10.254 / 255.255.255.0 Actual WAN IP Address 62.90.31.1 62.90.31.1 Shared WAN Virtual IP Address 62.90.31.3 62.90.31.3 My Priority 30 20 Track Primary Internet 0 0 Track Secondary Internet 0 0 Don't connect to the Internet if passive Unchecked Unchecked Synchronization Interface LAN Interface Simple High Availability Configuration Scenarios 27