Forcepoint NGFW High Availability with Azure Resource Manager

This section provides detailed instructions to deploy and configure Forcepoint Next Generation Firewall using a high availability topology (Active-Active mode) in Azure. This deployment is done using an Azure Resource Manager (ARM) template.

Forcepoint-VM for Azure supports active/passive high availability (HA) configuration. When the Forcepoint-VM detects a failure, the passive firewall instance becomes active and uses Azure API calls to configure its interfaces/ports.

This Azure Resource Manager (ARM) template lets system administrators to automatically:

  • Deploy two standalone Forcepoint Next Generation Firewall engines.
  • Configure engines to operate in Active-Active mode and to report to an existing Forcepoint Security Management Center (SMC).
  • Deploy and configure all Azure network components involved in the stack.

The ARM template is designed to deploy and configure the following resources within the Azure account of the user:

  • External Load Balancer (Internet-facing).
  • Internal Load Balancer.
  • Virtual Networks (if not already existing) with 3 subnets: subnet-0-security, subnet-1-front and subnet-2-back.

    Subnets subnet-1-front and subnet-2-back are used to connect user workloads.

  • Two instances of Forcepoint Next Generation Firewall engines either in the same Availability Zone using Availability Sets, or into two different Availability Zones.
  • Two NICs one for each Forcepoint Next Generation Firewall engine.
  • Azure components instrumental to operate the entire stack: Storage accounts, Route Tables, Security Groups and Public IP addresses

The following diagram provides a description of the workflow between the components involved in this solution: