High Availability (HA) in FortiManager ensures that if one FortiManager fails, another takes over seamlessly. This prevents service interruptions and ensures continuous network management.
FortiManager supports Active-Passive HA, which includes:
| HA Mode | Description |
|---|---|
| Active-Passive | One primary FortiManager (active) handles management. A secondary FortiManager (passive) takes over if the active unit fails. |
Key HA Features:
Log in to FortiManager CLI.
Enter HA configuration mode:
config system ha
set mode a-p
set group-name FMG-HA
set priority 200
set peer-ip <Secondary_FortiManager_IP>
set sync-interface port1
end
mode a-p – Sets HA mode to Active-Passive.group-name – Defines HA group name.priority – Higher value means higher priority (Primary Unit).peer-ip – IP address of the Secondary FortiManager.sync-interface – The interface used for configuration synchronization.Log in to Secondary FortiManager CLI.
Run the following commands:
config system ha
set mode a-p
set group-name FMG-HA
set priority 100
set peer-ip <Primary_FortiManager_IP>
set sync-interface port1
end
diagnose system ha status
HA Mode: Active-Passive
Primary: 192.168.1.1
Secondary: 192.168.1.2
Sync Status: Synchronized
execute ha synchronize
SNMP (Simple Network Management Protocol) allows external monitoring tools to collect FortiManager health and performance data.
FMG-SNMP).192.168.1.100).192.168.1.200).Expected Outcome:
snmpwalk -v 2c -c FMG-SNMP <FortiManager_IP>
SNMPv2-MIB::sysName.0 = STRING: "FortiManager-HA"
SNMPv2-MIB::sysUpTime.0 = Timeticks: 12345678
The FortiManager REST API allows administrators to automate firewall policies, device management, and configuration changes.
Run the following curl command:
curl -k -X POST "https://<FortiManager_IP>/api/v2/cmdb/firewall/policy/" \
-H "Authorization: Bearer <API_KEY>" \
-H "Content-Type: application/json" \
-d '{
"name": "Allow_Web_Traffic",
"srcintf": [{"name": "port1"}],
"dstintf": [{"name": "port2"}],
"srcaddr": [{"name": "all"}],
"dstaddr": [{"name": "all"}],
"service": [{"name": "HTTP"}, {"name": "HTTPS"}],
"action": "accept"
}'
Expected Outcome:
Answer:
diagnose system ha status
Explanation:
Answer:
execute ha synchronize
Explanation:
If the secondary unit is not taking over after a primary failure:
Answer:
diagnose system ha status
show system ha
diagnose netlink interface list | grep sync
execute ha failover set 1
Answer:
diagnose test application snmpd 1
Explanation:
Answer:
snmpwalk -v 2c -c <community_name> <FortiManager_IP>
Explanation:
Answer:
show system snmp sysinfo
show system snmp community
Check if SNMP traffic is being blocked by the firewall.
Restart the SNMP service if needed:
execute restart snmpd
```</ANSWER>
Answer:
curl -k -X GET "https://<FortiManager_IP>/api/v2/cmdb/system/status" \
-H "Authorization: Bearer <API_KEY>"
Explanation:
Answer:
Verify that the API key is correct and has sufficient permissions.
Check that the API admin account has REST API access enabled.
Ensure that API requests are made to the correct URL format:
https://<FortiManager_IP>/api/v2/
Answer:
diagnose debug enable
diagnose debug application restapi -1
Explanation:
Answer:
Ensure both FortiManager devices are running the same firmware version.
Use a dedicated sync interface for fast failover.
Set different priority values to define the primary and secondary devices.
Regularly test failover to ensure HA is working as expected.
Monitor HA sync status using:
diagnose system ha status
```</ANSWER>
Answer:
Use SNMPv3 for better security.
Restrict SNMP access to trusted IP addresses.
Enable SNMP traps for critical events like:
snmpwalk -v 2c -c <community_name> <FortiManager_IP>
```</ANSWER>
Answer:
Use API keys instead of passwords for authentication.
Limit API access to trusted IPs for security.
Use FortiManager logs to monitor API activity:
diagnose debug application restapi -1
What is the main purpose of FortiManager HA?
To provide management-plane redundancy so FortiManager services remain available if the primary unit fails.
FortiManager HA is about keeping the management platform available, not load-balancing policy installs. In an HA cluster, the primary and backup units exchange heartbeat traffic and synchronize the FortiManager database and configuration. The admin guide states that HA heartbeat monitoring and database/configuration synchronization occur between cluster members, and that heartbeat uses TCP port 5199. In exam terms, the key idea is: HA protects centralized management continuity and preserves the management database during failover. A common mistake is confusing FortiManager HA with FortiGate traffic HA. FortiManager HA protects the manager itself; it does not forward user traffic.
Demand Score: 84
Exam Relevance Score: 91
What should an administrator verify first when configuring a FortiManager HA cluster?
That the participating FortiManager units are configured consistently for HA and can communicate with each other over the required HA links.
The FortiManager admin guide describes HA setup as configuring the primary and backup units for HA, ensuring the units can communicate, then connecting them to their networks and completing the cluster settings. Fortinet’s HA troubleshooting article also notes that HA settings must match across the cluster members. For the exam, the operational takeaway is that HA failures are often caused by mismatched HA settings or broken connectivity between units rather than policy issues. A common trap is jumping straight to device-registration troubleshooting when the HA peers themselves are not correctly synchronized or cannot exchange heartbeat traffic.
Demand Score: 81
Exam Relevance Score: 88
Why would an organization configure FortiManager as a local FortiGuard Distribution Server (FDS)?
To let FortiManager download FortiGuard updates once and then distribute them to managed devices, reducing Internet dependency and update overhead.
The FortiManager administration guide states that when FortiManager acts as a local FDS, it synchronizes update packages with the FortiGuard Distribution Network and then provides those updates and lookup replies to internal FortiGate devices. The guide also notes that this can reduce Internet connection load and speed frequent update distribution across many devices. This is a classic exam concept because it combines centralized management with centralized update distribution. The mistake candidates make is thinking FortiManager only manages configuration and policy; it can also play a FortiGuard distribution role in the environment.
Demand Score: 76
Exam Relevance Score: 90
Can FortiManager be used to configure HA on real FortiGate devices?
No. FortiManager can manage HA cluster objects and model HA behavior, but it does not configure HA on real FortiGate devices.
The Fortinet documentation page on configuring model HA cluster members explicitly says you cannot use FortiManager to configure HA on real FortiGate devices. That distinction matters in exam scenarios. FortiManager can add and manage FortiGate HA clusters, track members, and apply device or policy changes to managed clusters, but the actual FortiGate HA formation/configuration is not something you build on real devices from FortiManager. A common exam trap is mixing up “manage an HA cluster in FortiManager” with “create the FortiGate HA relationship from FortiManager.” Those are not the same thing.
Demand Score: 73
Exam Relevance Score: 89