FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
juvan
Staff
Staff
Article Id 308556
Description

This article describes two important facts that need to be considered when working within an active-active load balance sandwich scenario.

Scope FortiGate, Public Cloud.
Solution

sandwich AZ.png

 

  1.  It is recommended to enable NAT on FortiGate policies. This is because the Azure load balancer uses a hash-based algorithm to distribute traffic to the FortiGate instances, and it relies on the source and destination IP addresses and ports of the packets. If NAT is not enabled, the source IP address of the packets will be the same as the load balancer’s frontend IP address, which will result in uneven distribution of traffic and possible asymmetric routing issues. Therefore, it is recommended to enable NAT on the FortiGate policies to preserve the source IP address of the packets and ensure optimal load balancing and routing.

 

  1. Session synchronization is supported for handling asynchronous traffic. This means that the FortiGate instances can synchronize their session tables with each other so that they can handle traffic that does not follow the same path as the initial packet of a session. For example, if a TCP SYN packet is sent to FortiGate A, but the TCP SYN-ACK packet is sent to FortiGate B: FortiGate B can forward the packet to FortiGate A by looking up the session table. This feature allows the FortiGate instances to handle asymmetric traffic that may occur due to the Azure load balancer’s hash-based algorithm or other factors.