IPS processing in an HA cluster
IPS processing in an HA cluster is no different than with a single FortiGate unit, from the point of view of the network user. The difference appears when a secondary unit takes over from the primary, and what happens depends on the HA mode.
Active-passive
In an active-passive HA cluster, the primary unit processes all traffic just as it would in a stand-alone configuration. Should the primary unit fail, a secondary unit will assume the role of the primary unit and begin to process network traffic. By default, the state of active communication sessions are not shared with secondary units and will not survive the fail-over condition. Once the sessions are reestablished however, traffic processing will continue as normal.
If your network requires that active sessions are taken over by the new primary unit, select Enable Session Pick-up in your HA configuration. Because session information must be sent to all subordinate units on a regular basis, session pick-up is a resource-intensive feature and is not enabled by default.
Configure IPS options
Active-active
The fail-over process in an active-active cluster is similar to an active-passive cluster. When the primary unit fails, a secondary unit takes over and traffic processing continues. The load-balancing schedule used to distribute sessions to the cluster members is used by the new primary unit to redistribute sessions among the remaining subordinate units. If session pick-up is not enabled, the sessions active on the failed primary are lost, and the sessions redistributed among the secondary units may also be lost. If session pick-up is enabled, all sessions are handled according to their last-known state.
Configure IPS options
The following IPS configuration options are available:
l Malicious URL database for drive-by exploits detection l Customizable replacement message when IPS blocks traffic l Hardware acceleration l Extended IPS database l Configuring the IPS engine algorithm l Configuring the IPS engine-count l Configuring fail-open l Configuring the session count accuracy l Configuring IPS intelligence l Configuring the IPS buffer size l Configuring protocol decoders l Configuring security processing modules l IPS signature rate count threshold l Geographic location filter
Malicious URL database for drive-by exploits detection
This feature uses a local malicious URL database on the FortiGate to assist in drive-by exploits detection. The database contains all malicious URLs active in the last one month, and all drive-by exploit URLs active in the last three months. The number of URLs controlled are in the one million range.
config ips sensor edit <profile> set block-malicious-url [enable | disable]
next
end