To configure FireCluster, you have these options:
- Run the FireCluster Setup Wizard
- Configure FireCluster manually
This topic describes how to use the wizard. For a demonstration of how to use the FireCluster setup wizard to configure an active/passive cluster, see the FireCluster video tutorial (15 minutes).
For information about how to configure FireCluster manually, see Configure FireCluster Manually.
- Make sure you have everything necessary to configure your FireCluster and that you have planned your configuration settings.
For information, see Before You Configure a FireCluster.
- Make sure you understand the limitations of a FireCluster, as described in Features Not Supported for a FireCluster.
- Connect the FireCluster members to each other and to the network, as described in Connect the FireCluster Hardware.
- Make sure you understand how to configure FireCluster models that include modular interfaces.
For information, see About FireCluster with Modular Interfaces
- Make sure you understand how to set up an active/passive FireCluster with FireboxV or XTMv devices.
For information, see Configure a FireCluster on VMware ESXi.
To configure FireCluster:
- In WatchGuard System Manager, connect to the Firebox that has the configuration you want to use for the cluster. After you enable FireCluster, this device becomes the cluster master the first time you save the configuration.
- Click .
Or, select Tools > Policy Manager.
Policy Manager opens the configuration file for the selected device.
- Select FireCluster > Setup.
The FireCluster Setup Wizard starts.
- Click Next.
- Select the type of cluster you want to enable:
Enables the cluster for high availability, but not load sharing. If you select this option, the cluster has an active Firebox that handles all the connections and a passive Firebox that handles connections only if a failover of the first device occurs.
Enables the cluster for high availability and load sharing. If you select this option, the cluster balances incoming connection requests across both devices in the cluster.
For more information about cluster types, see FireCluster Properties.
- Select the Cluster ID.
The cluster ID uniquely identifies this cluster if you set up more than one cluster on the same layer 2 broadcast domain. If you only have one cluster, and your network does not have VRRP devices, you can use the default value.
For an active/passive cluster, the Cluster ID determines the VRRP virtual MAC (VMAC) addresses used by the interfaces of the clustered devices. If you configure more than one active/passive FireCluster on the same subnet, it is important to know how to set the Cluster ID to avoid a possible virtual MAC address conflict.
For more information about the Cluster ID, see FireCluster Properties and Active/Passive Cluster ID and the Virtual MAC Address.
- If you selected Active/Active cluster, select the Load-balance method.
The load-balance method is the method used to balance connections among active cluster members. There are two options:
If you select this option, each new connection is assigned to the active cluster member with the lowest number of open connections. This is the default setting.
If you select this option, new connections are distributed among the active cluster members in round-robin order. The first connection goes to one cluster member. The next connection goes to the other cluster member, and so on.
For more information about the load balance method, see FireCluster Properties.
- Select the Primary and Backup cluster interfaces. The cluster interfaces are dedicated to communication between cluster members and are not used for other network traffic. You must configure the Primary interface. For redundancy, we recommend you also configure the Backup interface.
The device interface that you dedicate to primary communication between the cluster members. Select the interface number that you used to connect the FireCluster devices to each other.
The device interface that you dedicate to communication between the cluster members if the primary interface fails. Select the second interface number that you used to connect the FireCluster devices to each other, if any.
For more information about cluster interfaces, see FireCluster Interfaces.
We recommend that you do not use a switch between each member for the cluster interfaces. If you do use a switch between cluster interfaces, the cluster interfaces must be logically separated from each other on different VLANs.
- Select the Interface for Management IP address. You use this interface to connect directly to FireCluster members for maintenance operations and to send log messages to a local server, such as a Dimension server. This is not a dedicated interface. It also is used for other network traffic. You cannot select an external interface that uses PPPoE as the Interface for Management IP address. We recommend that you select the interface that the management computer usually connects to.
For more information about the interface for Management IP address, see FireCluster Interfaces.
- When prompted by the configuration wizard, add these FireCluster member properties for each device:
For each device, import or download the feature key to enable all features for the device. If you previously imported the feature key in Policy Manager, the wizard automatically uses that feature key for the first device in the cluster.
For more information about the feature key, see Add Cluster Member Feature Key.
The name that identifies each device in the FireCluster configuration.
For more information about the member name, see Add the FireCluster Member ID and Name.
The serial number of the Firebox. The serial number is used as the Member ID in the FireCluster Configuration dialog box. The wizard sets this automatically when you import or download the feature key for the Firebox.
For more information about the serial number, see Add the FireCluster Member ID and Name.
Primary cluster interface IP address
The IP address the cluster members use to communicate with each other over the primary cluster interface. The primary FireCluster IP address for each cluster member must be an IPv4 address on the same subnet.
The cluster member with the greater consolidated index (the combined system health index and interface health index) wins the election to become the cluster master. If the consolidated index for both cluster members is the same, the cluster member with higher primary cluster interface IP address wins the election to become the cluster master.
Backup cluster interface IP address
The IP address the cluster members use to communicate with each other over the backup cluster interface. The backup FireCluster IP address for each cluster member must be an IPv4 address on the same subnet.
Do not set the Primary or Backup cluster IP address to the default IP address of any interface on the Firebox. By default, the Firebox uses 10.0.x.0/24 subnets for interface IP addresses, which means we recommend that you avoid using 10.0.x.0/24 addresses for cluster IP addresses. The Primary and Backup cluster IP addresses must not be used for anything else on your network, such as virtual IP addresses for mobile VPN or the IP addresses used by remote branch office networks. When cluster failover occurs, one cluster member very briefly goes into safe mode before it takes over. If your cluster interface is configured to use one of the factory-default interface IP addresses, a conflict can occur during this brief period, which can cause the failover to fail.
Management IP address
A unique IP address that you can use to connect to an individual Firebox while it is configured as part of a cluster. You must specify a different management IP address for each cluster member. If the interface you chose as the Interface for management IP address has IPv6 enabled, you can optionally configure an IPv6 management IP address.
The IPv4 management IP address can be any unused IP address. We recommend that you use an IP address on the same subnet as the interface you select as the Interface for management IP address. This is to make sure that the address is routable. The management IP address must be on the same subnet as the Dimension Server or syslog server that your FireCluster sends log messages to.
The IPv6 management IP address must be an unused IP address. We recommend that you use an IPv6 address with the same prefix as an IPv6 address assigned to the interface you selected as the Interface for management IP address. This is to make sure that the IPv6 address is routable.
For more information, see About FireCluster Management IP Addresses.
- Review the configuration summary on the final screen of the FireCluster Setup Wizard. The configuration summary includes the options you selected and which interfaces are monitored for link status.
- Click Finish.
The FireCluster Configuration dialog box appears.
- In the Interface Settings section, review the list of monitored interfaces.
The list of monitored interfaces does not include the interfaces you configured as the Primary and Backup cluster interfaces. FireCluster monitors the link status for all enabled interfaces by default. If the cluster master detects loss of link on a monitored interface, the cluster master starts the failover process for that device.
For an active/passive cluster, you can select which of the active interfaces to monitor. If you do not want to monitor the link status of an enabled interface as a criteria for failover, clear the check box for that interface in the Monitor Link column.
We recommend that you configure the FireCluster to monitor the link status of all enabled interfaces.
For an active/active FireCluster, you must disable any interfaces that are not connected to your network before you save the FireCluster configuration to the Firebox. To disable an interface:
- In Policy Manager, select Network > Configuration.
- Double-click the interface that you want to disable, and set the Interface Type to Disabled.
If you want the second device to be automatically discovered and added to the cluster, do not save the configuration file until you start the second device in a factory-default state.
- Start the second Firebox with factory-default settings.
Use the reset instructions for your Firebox model. For more information, see Reset a Firebox.
For any XTM device with an LCD screen, start the device in safe mode
To start in safe mode, press and hold the down arrow button on the device front panel while you power on the device. Continue to hold the down arrow button until Safe Mode Starting... appears on the LCD display. When the device is in safe mode, the model number followed by the word safe appears on the LCD display.
If you use the command line interface (CLI), you can use the restore factory-default command to quickly reset the second device to factory-default settings without a reboot.
- Save the configuration to the cluster master.
The cluster is built. The cluster master automatically discovers the other device with the serial number that matches the serial number in the feature key you added to the cluster configuration.
After the cluster is active, you can monitor the status of the cluster members on the Firebox System Manager Front Panel tab.
For more information, see Monitor and Control FireCluster Members.
If you save the configuration to the cluster master before you start the second device in safe mode, the cluster master does not automatically discover the second device. If the second device is not automatically discovered, you can use Firebox System Manager to manually trigger device discovery as described in Discover a Cluster Member.