HA独立管理口可以简单的理解是一个轻量级的VDOM隔离,而HA独立管理VDOM则是一个完完全全的真实VDOM隔离。如果需要将HA-Cluster的管理和业务彻底隔离开,则建议使用HA独立管理VDOM。
HA独立管理口+配置了set ha-direct enable 其实实现了一部分的独立管理VDOM的功能,但是还是不够彻底,比如fortigaurd更新等需求,因此这就是独立管理VDOM存在的原因。
优点:
完全的管理和业务独立,管理是管理VDOM,业务是业务VDOM,完全隔离,最符合隔离管理的需求。
缺点:
缺点是需要开启VDOM特性,配置相对会复杂一些。
独立管理VDOM的配置:
1.首先需要开启VDOM特性,
FGT101E_Master_379 # config system global
FGT101E_Master_379 (global) # set vdom-admin enable
FGT101E_Master_379 (global) # end
You will be logged out for the operation to take effect
Do you want to continue? (y/n)y
Auto backup config ...
exit
FGT101E_Master_379 login:
FGT101E_Master_379 login: admin
Password: ********
Welcome !
FGT101E_Master_379 #
2.创建新的MGMT独立管理VDOM

命令行创建VDOM:
FGT101E_Master_379 # config vdom
FGT101E_Master_379 (vdom) # edit MGMT
FGT101E_Master_379 (MGMt) # end
FGT101E_Master_379 #
3.将MGMT独立管理VDOM修改为管理VDOM(只能命令行修改)
FGT101E_Master_379 (vdom) # end
FGT101E_Master_379 # config global
FGT101E_Master_379 (global) # config system global
FGT101E_Master_379 (global) # set management-vdom
<string> please input string value
MGMT vdom
root vdom
FGT101E_Master_379 (global) # set management-vdom MGMT
FGT101E_Master_379 (global) # end
FGT101E_Master_379 (global) # end
4.HA里面指定MGMT VDOM为独立管理VDOM
FGT101E_Master_379 # config global
FGT101E_Master_379 (global) # config system ha
FGT101E_Master_379 (ha) # set standalone-mgmt-vdom enable \\ (此配置HA的主备同步,在主设备配置会自动同步到备设备上)
FGT101E_Master_379 (ha) # end
FGT101E_Master_379 (global) # config system ha
FGT101E_Master_379 (ha) # show
config system ha
set group-id 30
set group-name "FGT-101E"
set mode a-p
set password ENC 6NEF2ju60YG/UTJdCcPb/zuCvcqAvBz6nSfBihvkRE0ORog3e8XvP8RU1RLEYaFoBm07Z5aEAS0QitmhXuCJK+V1FYkTk9YcVOazbmJI4+H61xkzNhYM35Pf3ecCfkkY//UPUG/kfhZJTROkuSoWkqKDrvKIgnWwFquGq+uz/tTqFAtYu4O4/ECh3oQuKPSGHLThAg==
set hbdev "ha2" 50 "ha1" 50
set session-pickup enable
set standalone-mgmt-vdom enable
set override disable
set priority 150
set monitor "port1" "wan1" "wan2"
end
FGT101E_Master_379 (ha) # end
FGT101E_Master_379 (global) # end
5.将mgmt接口加入到MGMT VDOM中,并配置上管理IP和默认路由:
先配置主防火墙的mgmt接口:
命令行:
配置mgmt加入到VDOM-MGMT以及配置管理IP地址:
FGT101E_Master_379 # config global
FGT101E_Master_379 (global) # config system interface
FGT101E_Master_379 (interface) # edit mgmt
FGT101E_Master_379 (mgmt) # set vdom MGMT
FGT101E_Master_379 (mgmt) # set ip 192.168.91.21/24
FGT101E_Master_379 (mgmt) # set alias "HA_Dedicated_MGMT"
FGT101E_Master_379 (mgmt) # show
config system interface
edit "mgmt"
set vdom "MGMT"
set ip 192.168.91.21 255.255.255.0
set allowaccess ping https ssh http
set type physical
set alias "HA_Dedicated_MGMT"
set role lan
set snmp-index 2
next
end
FGT101E_Master_379 (mgmt) # end
FGT101E_Master_379 (global) # end
FGT101E_Master_379 #
配置默认路由:
FGT101E_Master_379 # config vdom
FGT101E_Master_379 (vdom) # edit MGMT
current vf=MGMT:1
FGT101E_Master_379 (MGMT) # config router static
FGT101E_Master_379 (static) #
FGT101E_Master_379 (static) # edit 0
new entry '0' added
FGT101E_Master_379 (0) # set gateway 192.168.91.254
FGT101E_Master_379 (0) # set device mgmt
FGT101E_Master_379 (0) # show
config router static
edit 1
set gateway 192.168.91.254
set device "mgmt"
next
end
FGT101E_Master_379 (0) # end
FGT101E_Master_379 (MGMT) #
FGT101E_Master_379 (MGMT) # execute ping 192.168.91.254
PING 192.168.91.254 (192.168.91.254): 56 data bytes
64 bytes from 192.168.91.254: icmp_seq=0 ttl=255 time=0.2 ms
64 bytes from 192.168.91.254: icmp_seq=1 ttl=255 time=0.1 ms
64 bytes from 192.168.91.254: icmp_seq=2 ttl=255 time=0.1 ms
64 bytes from 192.168.91.254: icmp_seq=3 ttl=255 time=0.1 ms
64 bytes from 192.168.91.254: icmp_seq=4 ttl=255 time=0.1 ms
--- 192.168.91.254 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.1/0.1/0.2 ms
FGT101E_Master_379 (MGMT) #
FGT101E_Master_379 (MGMT) # end
FGT101E_Master_379 #
主机配置完毕。
此时备机是无法WEB/SSH登陆的需要通过主机的命令(或者Console线)连到备机的命令行界面:
FGT101E_Master_379 # config global
FGT101E_Master_379 (global) # execute ha manage
<id> please input peer box index.
<1> Subsidary unit FG101E4Q17000045
FGT101E_Master_379 (global) # execute ha manage 1 \\ 从主机登陆到备机的命令行
FGT101E_Slave_045 login: admin
Password: ********
Welcome !
FGT101E_Slave_045 $
FGT101E_Slave_045 $
备防火墙那边会自动同步VDOM和mgmt加入到MGMT的配置(如果配置同步不正常,可以将备机重启,并等待配置同步完成,再操作),而独立管理MGMT-VDOM内部的配置是不会同步的,因此只需要修改备防火墙的mgmt的接口IP和路由即可:
FGT101E_Slave_045 $ config vdom
FGT101E_Slave_045 (vdom) $ edit MGMT
current vf=MGMT:1
FGT101E_Slave_045 (MGMT) $ config system interface
FGT101E_Slave_045 (interface) $ edit mgmt
FGT101E_Slave_045 (mgmt) $ set ip 192.168.91.22/24
FGT101E_Slave_045 (mgmt) $ set allowaccess https http ping ssh
FGT101E_Slave_045 (mgmt) $ set alias "HA_Dedicated_MGMT"
FGT101E_Slave_045 (mgmt) $ show
config system interface
edit "mgmt"
set vdom "MGMT"
set ip 192.168.91.22 255.255.255.0
set allowaccess ping https ssh http
set type physical
set alias "HA_Dedicated_MGMT"
set role lan
set snmp-index 2
next
end
FGT101E_Slave_045 (mgmt) $ end
FGT101E_Slave_045 (MGMT) $ config router static
FGT101E_Slave_045 (static) $ edit 0
new entry '0' added
FGT101E_Slave_045 (0) $ set device mgmt
FGT101E_Slave_045 (0) $ set gateway 192.168.91.254
FGT101E_Slave_045 (0) $ end
FGT101E_Slave_045 (MGMT) $ execute ping 192.168.91.254
PING 192.168.91.254 (192.168.91.254): 56 data bytes
64 bytes from 192.168.91.254: icmp_seq=0 ttl=255 time=0.2 ms
64 bytes from 192.168.91.254: icmp_seq=1 ttl=255 time=0.1 ms
64 bytes from 192.168.91.254: icmp_seq=2 ttl=255 time=0.1 ms
64 bytes from 192.168.91.254: icmp_seq=3 ttl=255 time=0.1 ms
64 bytes from 192.168.91.254: icmp_seq=4 ttl=255 time=0.1 ms
--- 192.168.91.254 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.1/0.1/0.2 ms
FGT101E_Slave_045 (MGMT) $ end
FGT101E_Slave_045 $
FGT101E_Slave_045 $ exit
Auto backup config ...
FGT101E_Master_379 (global) #
FGT101E_Master_379 (global) #
备机也配置完毕。
这个时候可以通过GUI登录到备机,查看备机的GUI配置:
这时候可以通过192.168.91.21和192.168.91.22分别管理到主防火墙和备防火墙了。
此时所有的SNMP/Radius/SYSLOG/DNS/FORTGUARD都是通过MGMT这个VDOM进行更新的,完全独立于root业务VDOM,彻底的管理是管理,业务是业务。这是HA独立管理的终极解决方案。
越完美的方案,有时候也就是意味着越复杂,实际部署中需按照个人需求进行选择如何管理HA-Cluster。
最终总结注意事项:
FortiManger管理HA-Cluster的时候只能通过业务接口进行管理,不能通过独立管理口或者独立管理VDOM进行管理。