<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>HA Pair Template - FortiGate Terraform Web UI</title><link>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/index.html</link><description>Introduction The ha_pair template deploys a FortiGate Active-Passive High Availability pair using FortiGate Clustering Protocol (FGCP) in AWS. Unlike the autoscale_template which uses Gateway Load Balancer for elastic scaling, the HA Pair provides a fixed-capacity deployment with native FortiOS failover capabilities.
Key Features Active-Passive HA: One FortiGate active, one standby with automatic failover Session Synchronization: Maintains TCP sessions during failover for stateful inspection FGCP (FortiGate Clustering Protocol): Industry-standard clustering with unicast heartbeat AWS Native Failover: Automatic EIP and ENI reassignment via AWS API No GWLB Required: Uses native AWS routing without additional load balancer costs VPC Endpoint: Private AWS API access for failover operations Transit Gateway Integration: Automatic TGW route table updates Prerequisites Warning The ha_pair template requires existing_vpc_resources to be deployed first with HA Pair Deployment mode enabled.</description><generator>Hugo</generator><language>en-US</language><atom:link href="https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/index.xml" rel="self" type="application/rss+xml"/><item><title>UI Deployment</title><link>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_1_ha_pair.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_1_ha_pair.html</guid><description>Overview This guide walks you through configuring the ha_pair template using the Web UI. This template deploys a FortiGate Active-Passive HA pair using FGCP (FortiGate Clustering Protocol).
Warning Prerequisites:
Deploy existing_vpc_resources first with HA Pair Deployment mode enabled Record the cp, env, and tgw_name values from existing_vpc_resources outputs Step 1: Select Template Open the UI at http://localhost:3000 In the Template dropdown at the top, select ha_pair The form will load with inherited values from existing_vpc_resources {{% notice note %}} TODO: Add diagram - template-dropdown-ha</description></item><item><title>Deployment Guide</title><link>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_2_manual_deployment.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_2_manual_deployment.html</guid><description>Deployment Workflow Step 1: Deploy existing_vpc_resources cd terraform/aws/existing_vpc_resources # Copy and edit configuration cp terraform.tfvars.example terraform.tfvars # IMPORTANT: Set deployment mode to HA Pair # edit terraform.tfvars: enable_autoscale_deployment = false enable_ha_pair_deployment = true # Deploy terraform init terraform plan terraform apply # Save outputs terraform output Key Outputs to Note:
ha_sync_subnet_az1_id - HA sync subnet in AZ1 ha_sync_subnet_az2_id - HA sync subnet in AZ2 attach_to_tgw_name - Transit Gateway name fortimanager_private_ip - FortiManager IP (if enabled) fortianalyzer_private_ip - FortiAnalyzer IP (if enabled) Step 2: Configure ha_pair Template cd terraform/aws/ha_pair # Copy example configuration cp terraform.tfvars.example terraform.tfvars # Edit terraform.tfvars # REQUIRED: Match these values with existing_vpc_resources aws_region = "us-west-2" # MUST MATCH availability_zone_1 = "a" # MUST MATCH availability_zone_2 = "c" # MUST MATCH cp = "acme" # MUST MATCH env = "test" # MUST MATCH # Configure FortiGate keypair = "my-keypair" fortigate_admin_password = "SecureP@ssw0rd!" ha_password = "HASecretPass!" ha_group_name = "ha-cluster" # Choose licensing mode license_type = "payg" # or "byol" or "fortiflex" # Optional: FortiManager integration enable_fortimanager = true fortimanager_ip = "10.3.0.10" # From existing_vpc_resources output # Optional: Management EIP enable_management_eip = true Step 3: Deploy HA Pair # Initialize Terraform terraform init # Review plan terraform plan # Deploy terraform apply # Save outputs terraform output &gt; ha_pair_outputs.txt Deployment Time: ~15-20 minutes</description></item><item><title>Operations &amp; Testing</title><link>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_3_operations.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_3_operations.html</guid><description>Transit Gateway Routing Two-Stage Routing Approach The ha_pair template implements automatic TGW route updates:
Stage 1: After existing_vpc_resources deployment
East/West spoke VPC default routes –&gt; Management VPC attachment Allows spoke instances to bootstrap via jump box NAT Stage 2: After ha_pair deployment
ha_pair template deletes old default routes from east/west TGW route tables Creates new default routes –&gt; Inspection VPC attachment Traffic now flows through FortiGate HA pair Management VPC routes remain for ongoing access This two-stage approach is handled automatically by tgw_routes.tf.</description></item><item><title>Troubleshooting &amp; Comparison</title><link>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_4_troubleshooting.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortinet-ui-terraform/3_example_templates/3_3_ha_pair/3_4_troubleshooting.html</guid><description>Troubleshooting HA Pair Not Forming Symptoms: FortiGates don’t see each other in HA status
Checks:
# Verify HA sync connectivity execute ping-options source &lt;port3-ip&gt; execute ping &lt;peer-port3-ip&gt; # Check HA configuration show system ha # Check security group rules # Ensure UDP 23/703 and all TCP allowed on HA sync subnet Resolution:
Verify HA sync subnets were created Check security group allows all traffic between HA sync IPs Verify unicast heartbeat configuration matches AWS API Calls Failing Symptoms: Failover doesn’t update EIPs or routes</description></item></channel></rss>