Got it

Understand Firewall Hot Standby Using the CLI - In Practice

Latest reply: Feb 22, 2022 01:18:15 534 19 21 0 0

Understand Firewall Hot Standby Using the CLI - In Practice

Hello guys!


Today, I would like to present an introduction to Firewall Hot Standby.


About This Experiment


In this experiment, two or more firewalls are deployed at the egress of the network to ensure communication between the intranet and Internet.


Objectives:


  • Understand the basic principle of hot standby.

  • Understand the VGMP and HRP protocols.

  • Configure firewall hot standby on the CLI and web UI.


Ps: All addresses used in the example are false and used only in a lab environment for study purposes.


Experiment Networking


1


Experiment Planning


Security devices USGs are deployed on a service node. Upstream and downstream devices are switches. FW1 and FW2 work in active/standby mode.


Device NamePort
IP Address
Zone
FW1G1/0/110.1.2.1Trust
G1/0/330.1.1.1DMZ
G1/0/440.1.1.1Untrust
FW2G1/0/110.1.2.2Trust
G1/0/330.1.1.2DMZ
G1/0/440.1.1.2Untrust
PC1E0/0/110.1.2.100Trust
PC2E0/0/12.2.2.2Untrust

Table 1 - Port addresses and zones


Experiment Tasks


No.TaskSubtaskDescription
1Complete basic configurations.Configure security zones.Add interfaces to security zones.
2
Configure host standby.Configure host standby.Set the hot standby mode to active/standby. USG6330-1 is active, and USG6330-2 is standby.
Configure virtual IP addresses.Create VRRP groups 1 and 2.
3
Configure a security policy.Configure an interzone security policy.Permit the packets from the Trust zone to the Untrust zone.


Experiment Task Configuration


Configuration Roadmap


1. Configure IP addresses for interfaces and add the interfaces to security zones. Configure a security policy to permit packets from the Trust zone to the Untrust zone.

2. Configure hot standby in active/standby mode. FW1 is active, and FW2 is standby.


Configuration Roadmap


Step 1 Complete the configuration of the upstream and downstream service interfaces on FW1. Configure IP addresses for the interfaces and add the interfaces to security zones.


2


Create VRRP group 1 on GigabitEthernet1/0/4, and add it to the active VGMP group.


3


Create VRRP group 2 on GigabitEthernet1/0/1, and add it to the active VGMP group.


4


Step 2 Configure the heartbeat link on FW1.


Configure an IP address for GigabitEthernet1/0/3.


5


Add GigabitEthernet1/0/3 to the DMZ.


6


Specify GigabitEthernet1/0/3 as the heartbeat interface.


7


Step 3 Configure a security policy to permit packets from the Trust zone to the Untrust zone.


8


Step 4 Enable HRP.


9


Step 5 Configure USG6330-2.


The configurations on FW2 are the same as those on FW1, except that:


1. The IP addresses of the interfaces on FW2 are different from those on FW1.


2. Add service interfaces GigabitEthernet1/0/1 and GigabitEthernet1/0/4 of USG6330-2 to the standby VGMP group.


Step 6 Configure the switches.


Add the three interfaces of each switch to the same VLAN (default VLAN). For configuration commands, refer to the relevant switch documents.


Verification


Checking the "display hrp"


11


With that our practical example was completed.


Cheers,





Important content, thanks
View more
  • x
  • convention:

andersoncf1
andersoncf1 Created Feb 3, 2022 16:24:42 (0) (0)
thank you  
Very good post, thank you for sharing.
View more
  • x
  • convention:

Thanks for sharing
View more
  • x
  • convention:

Good Share
View more
  • x
  • convention:

zaheernew
MVE Author Created Feb 3, 2022 23:21:46

Useful info
View more
  • x
  • convention:

WELL DONE, FRIEND
View more
  • x
  • convention:

An interesting experiment to experience!
View more
  • x
  • convention:

Thanks for sharing
View more
  • x
  • convention:

Useful CLI LAB on Firewall Hot Standby.
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.