Firewall Configuration HA - Step by Step
Firewall Configuration HA - Step by Step
Tenancy: megacloud
OCID: ocid1.tenancy.oc1..aaaaaaaatgtslloqpdwk7nv7iv2c2chxatffhb3de2xbuflzi5axx2endtpa
VCN: Firewall_VCN
OCID: ocid1.vcn.oc1.sa-saopaulo-1.amaaaaaa2ooongyaotldfrwwfru2g47sopjjwja7n673udprley4h5edulaa
Servers Details:
VNIC:
VNIC: OCMEGPANFW01 (Primary VNIC) – 192.168.0.10
OCID: ocid1.vnic.oc1.sa-saopaulo-1.abtxeljrdecvyttwd7gvn7y6uqz7keyrf35kej3gpsnqvc236ya4p7tn2j7a
Public IP
Private IP Address Address Row header
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
192.168.1.10 (Prima
(Not Assigned) 1.abtxeljrzbx2lylrertpsv552ez427mgpo3z7nbp33bayvh4gbxvxyg5oe3
ry IP)
a
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
129.151.37.105
192.168.1.30 1.aaaaaaaabhdxp5en2fq2w3fxyptldusxdad6jphfauyodazxww3mpl3zd
(Reserved)
64q
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.183.103
192.168.1.31 1.aaaaaaaay5uuhg4yhirzl4fymoeltr33dgxoqksu4lazybyhixnvoaadxvv
(Reserved)
q
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.237.116
192.168.1.32 1.aaaaaaaa7fvxei5tcbuai7lnqra3ugerha3rig3v7bv33hv5nyoeykhqzey
(Reserved)
a
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.195.11
192.168.1.33 1.aaaaaaaaahfxpolsow5ijlrmvps2qu6uh4hk2skz4ehbu74tssqfi7xc2pr
(Reserved)
q
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
168.138.125.18
192.168.1.34 1.aaaaaaaahaaibe2db2v24tw5wn7jkeirohv2nl64255yabevbi4wfzgxzs
2 (Reserved)
cq
132.226.245.47 Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
192.168.1.35
(Reserved) 1.aaaaaaaanvfjcd3q7lj4rfqsa5uj2w7gnrnkwbhsr6rhecim5m5vxql2j2aa
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
152.67.51.171
192.168.1.36 1.aaaaaaaapdedxlfth36ts7chn4atpsixljesgm2gl4x2db3mikvxdsdmtw6
(Reserved)
q
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.254.105
192.168.1.37 1.aaaaaaaapcut3rmy7yr2w2vlv7mkhpvl56pevifrnya7frtbm3m7sti7bkw
(Reserved)
a
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
129.159.49.167
192.168.1.38 1.aaaaaaaa26hrg5nhybypyk4scmysolmo4xcphka2a43i6qxdd4qm4qa
(Reserved)
frbaa
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
150.230.70.117
192.168.1.39 1.aaaaaaaaqyw6xwfzrywbk5urogu7zrnteptshln6oco6r2cbsy7bzh2du2
(Reserved)
xq
152.70.211.102 Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
192.168.1.40
(Reserved) 1.aaaaaaaaq6gzlwloc6pi3i7nqahlrxthrcixtefnndqygzmsyxbkidb7mi4q
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
168.138.238.16
192.168.1.41 1.aaaaaaaaguu4uldesfporjc3wdon27yksq7oxy22oting4co6kilf6qpmev
1 (Reserved)
q
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
168.138.138.33
192.168.1.42 1.aaaaaaaab57vcnkhtqq77zjqrtqaguacnuguhitjmb3oytr7nw4qskgpe5
(Reserved)
qq
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.133.42
192.168.1.43 1.aaaaaaaa6tcakrteugcfo3t4um4eda3keuq2pjqk5hpgna6rtmhqspfke
(Reserved)
m3a
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.202.219
192.168.1.44 1.aaaaaaaajihjrheolwwuh4i7f7j7mvw2xomsbfc6hxixmxbfmivwbppqcif
(Reserved)
a
144.22.234.217 Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
192.168.1.45
(Reserved) 1.aaaaaaaa6s3wvkjuo6lstskrah6uf72hnplqtwsfz2vjnb3boqc6tu5nxbyq
Row with I.D. ocid1.privateip.oc1.sa-saopaulo-
144.22.145.144
192.168.1.46 1.aaaaaaaalir53qj4xfehblg3drmtbauh2smni3d2qoh5ybe53a37vvck4nl
(Reserved)
q
144.22.169.161
192.168.1.47
(Reserved)
VNIC:
VNIC: OCMEGPANFW02 (Primary VNIC) Subnet - management-subnet – 192.168.0.20
OCID: ocid1.vnic.oc1.sa-saopaulo-1.abtxeljr6ru2kkzbrp4hghyfkhsndc7vkpe5xymqz57jk62evcky2q5akw3a
VNIC: OCMEGPANFW02_HA Subnet - ha-subnet – 192.168.10.20
OCID: ocid1.vnic.oc1.sa-saopaulo-1.abtxeljrznyxmz4giiyau7c5qomumrz7m6xzvz4bawcgbgcddw2hxs2jsbsa
Step 2: Create security rules to allow the HA peers to synchronize data and maintain state information. By default,
OCI allows ICMP traffic only. You must open the necessary HA ports.
1. From the OCI Console, select Networking Virtual Cloud Networks and select your VCN.
2. Select Subnets and select the subnet containing your HA1 interface.
3. Select Security Lists and click the default security list to edit it.
4. Click Add Ingress Rule .
5. Enter the Source CIDR that includes the HA peer HA1 port IP address.
6. Select TCP from the IP Protocol drop-down.
7. Click +Additional Ingress Rule You need to create two additional rules for TCP ports 28260 and 28769.
8. If encryption is enabled on your VM-Series firewall for the HA1 link, create an additional rules for ICMP
and TCP port 28.
9.
Configuration:
1. From the OCI Console, select Networking Virtual Cloud Networks and select your VCN.
2. Select Subnets and select the subnet containing your HA2 interface. Select Security Lists and click
the default security list to edit it.
3. Click Add Ingress Rule .
4. Enter the Source CIDR that includes the HA peer HA2 port IP address.
5. Select UDP or IP from the IP Protocol drop-down.
6. If the transport mode is UDP, enter 29281 into Source Port Name . If the transport mode is IP,
enter 99 into Source Port Name .
7. Click Add Ingress Rules
Configuration:
STEP 3: Add both HA peers to a dynamic group and create policy that allows the HA peers to move the floating IP
address. You must have the OCID of each HA peer instance to build the dynamic group matching rules, so have
those on hand to past into the rule builder.
8.
9. Click Create Dynamic Group .
Configuration:
Rule:
Any {instance.id = 'ocid1.instance.oc1.sa-saopaulo-
1.antxeljr2ooongyczl4qz3cz3ofcu44bcr4szw4253ry3ejbgra7sgjxyx2a',instance.id = 'ocid1.instance.oc1.sa-saopaulo-
1.antxeljr2ooongyc6b6kkgweoo4rykgxpgpnqakewvb5dzkb4oiws45qmp7a'}
3.2: Create the policy rule.
7.
Configuration:
Policy: Allow dynamic-group HA_PALOALTO to use virtual-network-family in compartment Mega_Cloud_Producao
Policy: Allow dynamic-group HA_PALOALTO to use instance-family in compartment Mega_Cloud_Producao
STEP 4: Configure the interfaces on the firewall. You must configure the HA2 data link and at least two Layer 3
interfaces for your untrust and trust interfaces. Complete this workflow on the first HA peer and then repeat the steps
on the second HA peer.
4.2 - (Optional) If you are using the management interface as HA1, you must set the interface IP Type to static and
configure a DNS server.
Not configured.
4.3Select Network Interfaces Ethernet and click on your untrust interface. In this example, the HA2 interface is
1/1, the trust interface is ethernet 1/2, and the untrust interface is ethernet 1/3.
4.4 Click the link for ethernet 1/1 and configure as follows: Interface Type : HÁ
4.5 Click the link for ethernet 1/2 and configure as follows:
FALTANDO IP PRIMÁRIO.
IP ADDRESS: 192.168.2.10 (PRIMARY)
192.168.2.30
4.6 Click the link for ethernet 1/3 and configure as follows:
5.3 Enter the private IP address of the passive peer in the Peer HA1 IP address field .
5.4 Click OK .
5.6 (Optional) Edit the Control Link (HA1). If you do not plan to use the management interface for the control link
and have added an additional interface (for example ethernet 1/4), edit this section to select the interface to
use for HA1 communication. – not configured
5.7 Edit the Data Link (HA2) to use Port ethernet 1/1 and add the IP address of active peer and
the Gateway IP address for the subnet.
5.8 Select IP or UDP from the Transport drop-down. Ethernet is not supported.
5.9 Click OK
STEP 6: Commit
7.3 -Select Network Interfaces Ethernet and click on your untrust interface. In this example, the HA2 interface is
1/1, the trust interface is ethernet 1/2, and the untrust interface is ethernet 1/3.
7.4 Click the link for ethernet 1/1 and configure as follows: Interface Type : HÁ
7.5 Click the link for ethernet 1/2 and configure as follows:
7.6 Click the link for ethernet 1/3 and configure as follows:
Interface Type: Layer3
On the Config tab, assign the interface to the default router.
On the Config tab, expand the Security Zone drop-down and select New Zone . Define a new zone, for
example untrust-zone, and then click OK.
On the IPv4 tab, select either Static.
Click Add in the IP section and enter the primary IP address and network mask for the interface. Make sure
that the IP address matches the IP address that you assigned to the corresponding subnet in VCN. For
example, if you add this interface to your untrust zone, make sure you assign the untrust vNIC IP address
configured in your VCN.
Click Add in the IP section and enter the secondary, floating IP address and network mask.
IP INCORRETO:
VNIC: OCMEGPANFW02_UNTRUST Subnet - untrust_subnet – 192.168.1.20 + IPS SECUNDÁRIOS
STEP 8: After your finish configuring HA on both firewalls, verify that the firewalls are paired in active/passive HA.
8.1 Access the Dashboard on both firewalls and view the High Availability widget.
8.3.1 On the passive firewall: the state of the local firewall should display Passive and
the Running Config should show as Synchronized.
8.3.2 On the active firewall: the state of the local firewall should display Active and the Running
Config should show as Synchronized