Related Topics
Quick Start — Set Up a FireCluster
You can configure two Fireboxes of the same model as a FireCluster. There are two FireCluster configuration options: active/passive and active/active. To add redundancy, configure an active/passive cluster. To add both redundancy and load sharing, configure an active/active cluster.
This topic summarizes how to plan and configure a FireCluster. If you are not familiar with FireCluster, we recommend you read these topics as an introduction before you begin.
If the Fireboxes you want to include in a cluster have modular interfaces or a model upgrade, see these topics for specific requirements:
Use these steps to plan and configure your FireCluster.
Before you configure a FireCluster, make sure that you have these components:
- Two activated Fireboxes with the same model number
- The same version of Fireware installed on each Firebox
- The same interface modules installed on each Firebox (M4600 and M5600 only)
- The feature key for each Firebox, saved in a local file; for more information, see Get a Firebox Feature Key
- One crossover cable (red) for each cluster interface (If you configure a backup cluster interface, you must use two crossover cables.)
- One network switch for each enabled trusted, optional, custom, or external interface
- Ethernet cables to connect the interfaces of both devices to the network switches
To make sure that both Fireboxes run the same version of Fireware OS, it might be necessary to set up the second Firebox separately with a basic configuration, add the feature key, and upgrade Fireware OS to the same version as the first Firebox. When you form the cluster, you reset the second device to factory-default settings. The reset process resets the configuration to factory-default settings and removes the feature key, but does not change the installed version of Fireware OS.
Before you enable FireCluster, you configure one Firebox with the network and policy settings you want the cluster to use. Make sure the configuration settings meet the requirements for the type of FireCluster you want to enable.
- The Firebox must have at least one unused interface to use as the dedicated cluster interface.
- The Firebox must be configured in Mixed Routing Mode or Drop-In mode.
- The external interface must have a static IP address, or be configured for PPPoE. In Fireware v11.12 or higher, the external interface can be configured for DHCP.
- All unused interfaces must be disabled.
- The Firebox must have at least one unused interface to use as the cluster interface.
- The Firebox must be configured in Mixed Routing Mode.
- The external interface must have a static IP address.
- All unused interfaces must be disabled.
- Wireless must be disabled on the Firebox. (you can use a connected WatchGuard wireless AP device)
- Switches and routers must be configured to route traffic with multicast MAC addresses. For more information, see Switch and Router Requirements for an Active/Active FireCluster.
- If required by your switches, add static ARP entries to the Firebox configuration for each layer 3 network switch. For more information, see Add Static ARP Entries for an Active/Active FireCluster .
- Subscription services must be activated for both cluster members. For more information, see About Feature Keys and FireCluster.
There are a few configuration limitations for a FireCluster. Before you enable a FireCluster, see Features Not Supported for a FireCluster.
Identify the cluster ID, interfaces, and IP addresses you will use in the FireCluster configuration.
- Cluster ID — For each FireCluster, you must configure a Cluster ID. For an active/passive FireCluster, the Cluster ID is used to generate virtual MAC addresses for the interfaces. If your network has more than one FireCluster, or has devices that use HSRP or VRRP, make sure to select a Cluster ID that does not create a MAC address conflict. For more information, see Active/Passive Cluster ID and the Virtual MAC Address.
- Cluster Interfaces — Identify which interfaces to use as primary and backup cluster interfaces. Each cluster interface is dedicated to communication between the cluster members. The backup cluster interface is optional. For each cluster interface, you configure an IP address on the same subnet for each cluster member. We recommend you assign IP addresses on a dedicated private subnet, or use link-local IP addresses. You might find it useful to define your cluster interfaces with link-local IP addresses like this: 169.254.<interface number>.<member number>/24
- Cluster Management Interfaces — Identify the interface you usually use to connect to the Firebox for management. Often this is a trusted interface. For each cluster member, you must configure a Management IP address for that interface. We recommend you select IP addresses on the same subnet as the interface IP address.
The cluster management interfaces are used by the cluster master to manage the cluster. Make sure the cluster management interface of both cluster members are connected to a common switch at all times. For more information, see About FireCluster Management IP Addresses.
As an example, your planned FireCluster configuration settings could look like this:
Planned FireCluster Configuration Settings | |||
---|---|---|---|
Cluster ID: 10 | Interface # | IP address for Member 1 | IP address for Member 2 |
Primary cluster interface | 5 | 169.254.5.1/24 | 169.254.5.2/24 |
Backup cluster interface | 6 | 169.254.6.1/24 | 169.254.6.2/24 |
Management interface (IP address: 10.0.10.1) |
1 | 10.0.10.101/24 | 10.0.10.102/24 |
For more information about these settings, see Before You Begin.
With the second device powered off, connect the two devices to each other and to your network switches. This diagram shows connections for a FireCluster with one cluster interface, one trusted interface, and one external interface.
To connect your FireCluster hardware:
- Power off the Firebox you want to add to the cluster.
- Use a crossover Ethernet cable (red) to connect the primary cluster interface on one Firebox to the primary cluster interface on the other Firebox.
- If you plan to enable a backup cluster interface, use a second crossover Ethernet cable to connect the backup cluster interfaces.
- Connect the external interface of each Firebox to a network switch or VLAN. If you use Multi-WAN, connect the second external interface of each Firebox to another network switch.
- Connect the trusted interface of each Firebox to an internal network switch or VLAN.
- Connect each of the other enabled trusted or optional network interfaces on each Firebox to a network switch or VLAN.
You must connect each pair of enabled interfaces to a separate switch. - Connect your computer to the switch on the trusted network.
If interface 1 has the default IP address 10.0.1.1, do not connect interface 1 of the second device to the switch until after the cluster is successfully formed. This avoids a temporary IP address conflict when you start the second device with factory-default settings.
Use the FireCluster Setup Wizard in Policy Manager to enable FireCluster and configure your planned settings. Make sure you have the feature key for both devices in a text file before you start the wizard.
- In WatchGuard System Manager, connect to the configured Firebox that you want enable as the first FireCluster member.
- Start Policy Manager.
- Select FireCluster > Setup to start the FireCluster Setup Wizard.
- Select the type of cluster you want to enable (Active/Active or Active/Passive)
- Select the Cluster ID.
- If you selected Active/Active, select the Load-balance method.
- Least connection assigns new connections to the member with the lowest number of connections.
- Round-robin assigns new connections alternately to each of the two members.
- Select the interfaces to use as the Primary and Backup cluster interfaces.
These are the interfaces you directly connected with the crossover cable. - Select the Interface for Management IP address.
- For each Firebox, configure these properties, that are unique to each member:
- Feature Key — For the first member, the device feature key is included automatically. For the second device, paste the feature key text into the wizard.
- Member Name — Identifies each device. The default names are Member1 and Member2
- IP addresses — Use the cluster interface and management IP addresses you planned earlier.
- Click Finish.
The FireCluster Configuration dialog box appears. - In the Interface Settings section, review the list of monitored interfaces.
We recommend that you monitor the link status of all enabled interfaces. - For an active/active FireCluster, disable any interfaces that are not connected to your network.
Do not save the configuration to the Firebox yet.
For the cluster master to discover the second Firebox, you must reset the second Firebox to factory-default settings. The reset process resets the configuration and removes the feature key, but does not change the installed version of Fireware OS.
- Power off the Firebox.
- Press and hold the Reset button on the back of the Firebox.
- While you continue to hold the Reset button, power on the Firebox.
- Continue to press the Reset button until the Attn indicator begins to flash.
- Release the Reset button. Do not power off the Firebox yet.
- Wait for the reset process to complete. This can take as long as 70 seconds. When the reset is complete, the Attn indicator stays lit and does not flash.
- Power off the Firebox.
- Power on the Firebox.
The Firebox restarts with factory-default settings.
- Power on the Firebox.
- Wait until the Arm indicator ( ) is green.
- Press and hold the Reset button on the front of the device.
After five seconds, the Arm indicator is red. - Continue to hold the Reset button while the Arm indicator is red or is not lit.
After 40 seconds, the Arm indicator starts to flash green. - Continue to hold the Reset button while the Arm indicator flashes green once per second.
- After the Arm indicator starts to flash green twice per second, release the Reset button.
- Wait until the Arm indicator starts to flash red.
- Press and hold the Reset button for five seconds to reboot the device.
The Firebox restarts with factory-default settings.
Before you reset a Firebox M5600, make sure you have an interface module installed in slot A. For more information, see About Modular Interfaces.
- Power on the Firebox.
- Wait until the Arm indicator ( ) is green.
- Press and hold the Power button on the front of the device for five seconds to power it off.
- Press and hold the Reset button on the front left of the device, and briefly press the Power button on the front of the device to power it on.
The Arm indicator is red. - Continue to hold the Reset button while the Arm indicator is red.
The Arm indicator starts to flash green. - Continue to hold the Reset button while the Arm indicator flashes green once per second.
- After the Arm indicator starts to flash green twice per second, release the Reset button.
- Wait until the Arm indicator starts to flash red.
- Press and hold the Power button for five seconds to power off the device.
- Briefly press the Power button on the front of the device to power it on.
The Firebox restarts with factory-default settings.
- Power on the Firebox.
- Wait until the Arm indicator ( ) is green.
- Press and hold the Power button on the front of the device for three seconds to power it off.
- Press and hold the Reset button on the front left of the device, and briefly press the Power button on the front of the device to power it on.
- Continue to hold the Reset button until the Attn indicator begins to flash.
- Release the Reset button.
- Wait until the Attn indicator stays lit and does not flash.
- Press and hold the Power button for three seconds to power off the device.
- Briefly press the Power button on the front of the device to power it on.
The Firebox restarts with factory-default settings.
- Power off the XTM device.
- Press and hold the down arrow button on the device front panel while you power on the device.
- Continue to press the down arrow button until the message Safe Mode starting appears on the LCD display.
When an XTM device is started in safe mode, the LCD display shows the model number followed by the word safe. When you start a device in safe mode:
- The device temporarily uses the factory-default network and security settings. In safe mode, the IP address of interface 1 is 10.0.1.1.
- The current feature key is not removed. If you run the Quick Setup Wizard to create a new configuration, the wizard uses the feature key previously installed on the device.
- Your current configuration is deleted only when you save a new configuration file to the XTM device. If you restart the device before you save a new configuration, the device uses your current configuration
- Disconnect the power supply.
- Press and hold the Reset button on the back of the device.
- While you continue to hold the Reset button, reconnect the power supply or power on the device.
- Continue to press the Reset button for one minute, or until the Attn indicator begins to flash. Then release the button. Do not disconnect the power to the device yet.
For some XTM 2 Series devices, the Attn indicator does not flash. - Wait three minutes for the reset process to complete. When the reset is complete, the Attn indicator stays lit and does not flash.
- Disconnect the power supply.
- Reconnect the power supply.
The Firebox restarts with factory-default settings.
- Disconnect the power supply.
- Press and hold the Reset button on the back of the device.
- While you continue to hold the Reset button, reconnect the power supply or power on the device.
- Continue to press the Reset button for 30 seconds, or until the Attn indicator begins to flash. Then release the button. Do not disconnect the power to the device yet.
For some XTM 2 Series devices, the Attn indicator does not flash. - Wait two minutes for the reset process to complete. When the reset is complete, the Attn indicator stays lit and does not flash.
- Disconnect the power supply.
- Reconnect the power supply.
The Firebox restarts with factory-default settings.
- Disconnect the power supply.
- Press and hold the Reset button on the back of the device.
- While you continue to hold the Reset button, reconnect the power supply or power on the device.
- Continue to press the Reset button for 30 seconds, or until the Attn indicator begins to flash. Then release the button. Do not disconnect the power to the device yet.
For some XTM 33 devices, the Attn indicator does not flash. - Wait three and a half minutes for the reset process to complete. When the reset is complete, the Attn indicator stays lit and does not flash.
- Disconnect the power supply.
- Reconnect the power supply.
The Firebox restarts with factory-default settings.
For any XTM device that has an LCD screen, start the device in safe mode.
- Press and hold the down arrow button on the device front panel while you power on the XTM device.
- Continue to hold the down arrow button until Safe Mode Starting... appears on the LCD display.
When the XTM device is in safe mode, the model number followed by the word safe appears on the LCD display.
In Policy Manager, select File > Save > To Firebox.
When you save the configuration with FireCluster enabled to the Firebox, that Firebox becomes the cluster master. When FireCluster is first enabled, the cluster master uses the cluster interface to automatically discover the other cluster member.
When the cluster master discovers a connected device with factory-default settings, it verifies that the serial number matches the serial number in the FireCluster configuration, and then sends the cluster configuration to the second device. The second device then joins the cluster and synchronizes all cluster status with the cluster master.
After you enable FireCluster, use Firebox System Manager to verify the status of cluster members. If necessary, you can manually trigger discovery of the second cluster member.
- Connect to the cluster with Firebox System Manager.
- On the Front Panel tab, expand the cluster to see the status of cluster members. For more information, see Monitor and Control FireCluster Members.
If the second Firebox is not automatically added to the cluster:
- Make sure the primary cluster interfaces of both devices are connected.
- Make sure the second Firebox is started with factory-default settings.
- Select Tools > Cluster > Discover Member to manually trigger discovery of the second cluster member. For more information, see Discover a Cluster Member.