<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - FireCluster — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Sat, 11 Apr 2026 21:19:18 +0000</pubDate>
        <language>en</language>
            <description>Firebox - FireCluster — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-firecluster/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>OpenVPN for MacOS Tahoe</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4468/openvpn-for-macos-tahoe</link>
        <pubDate>Mon, 01 Dec 2025 20:41:03 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>MarcC</dc:creator>
        <guid isPermaLink="false">4468@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all.</p>

<p>Has anyone successfully configured an OVPN file for use with OpenVPN on MacOS Tahoe. For us, name resolution will not work unless we manually enter DNS servers and domain name search in MacOS settings. And even then, browsing SMB shares is iffy. Previous MacOS versions work without issue using the Watchguard SSL VPN client. We moved to OpenVPN for our Tahoe user as the Watchguard client just would not work.</p>

<p>Thanks.</p>
]]>
        </description>
    </item>
    <item>
        <title>Firecluster with Multiwan - Layer 2 switch recommendations</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4420/firecluster-with-multiwan-layer-2-switch-recommendations</link>
        <pubDate>Tue, 30 Sep 2025 20:31:30 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>MarcC</dc:creator>
        <guid isPermaLink="false">4420@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello all.</p>

<p>I have a primary and backup ISP, 2x M390s in a Firecluster configuration and want to introduce 2x layer-2 switches ahead of the Firecluster. This will allow me to patch both primary and backup ISP into each M390 (right now both ISPs are patched into the primary M390 directly which doesn't do us much good in the event of a failover).</p>

<p><strong>Question is, has anyone else actually implemented this and do you have any recommendations for a solid but cost effective layer-2 switch? Note that I need 3x SFP+ ports.</strong></p>

<p>Many thanks.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg 2000w, https://us.v-cdn.net/6029905/uploads/editor/fh/bzriw5pjdyvk.jpg" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Failed update, adding back to the cluster</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4437/failed-update-adding-back-to-the-cluster</link>
        <pubDate>Wed, 22 Oct 2025 13:35:42 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>ANicholls</dc:creator>
        <guid isPermaLink="false">4437@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, i have a ticket open but seems to get responses late in the afternoon, i tried update 2 m470 yesterday, from 12.11.2 to 12.11.4 first box got stuck in recovery mode only. Support has told me to factory reset as it didn’t boot back in to normally operation. Also to update to the latest version if its not already on it. it’s on the latest version, but my cluster currently has  the only member is still on 12.11.2, can I add it back in to the cluster then update the one of old version to the latest?</p>
]]>
        </description>
    </item>
    <item>
        <title>FireCluster Certificate Unmatched</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4412/firecluster-certificate-unmatched</link>
        <pubDate>Fri, 19 Sep 2025 14:50:57 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>phanaaekIT</dc:creator>
        <guid isPermaLink="false">4412@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>In the Web UI under System Status &gt; FireCluster, there are green checkmarks, but on the File Object tab, the Certificate is listed as unmatched while everything else is matched. This setup is an active-passive cluster running version 12.11.4. What steps could resolve this issue?</p>
]]>
        </description>
    </item>
    <item>
        <title>static wan VRRP</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4109/static-wan-vrrp</link>
        <pubDate>Thu, 12 Dec 2024 08:42:12 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>XYLITOL</dc:creator>
        <guid isPermaLink="false">4109@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello.</p>

<p>I have a vrrp redundant configuration with watchguard. Is it possible to have each watchguard configured with a different IP address?<br />
Is it ok to use the same global IP address for static WAN?</p>
]]>
        </description>
    </item>
    <item>
        <title>interface type Cluster?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4089/interface-type-cluster</link>
        <pubDate>Mon, 02 Dec 2024 00:58:14 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>XYLITOL</dc:creator>
        <guid isPermaLink="false">4089@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello.</p>

<p>In the Watchguard interface, the setting is type[Cluster],<br />
I could not change the settings in the WebGUI.</p>

<p>I installed WSM and saw that I could change the settings,<br />
However, I could not log in.</p>

<p>What is the username and password for logging in with WSM?<br />
I tried the following</p>

<p>(1)<br />
PC:10.0.1.2<br />
login IP:10.0.1.1<br />
username:admin<br />
password:Same password as WebGUI</p>

<p>(2)<br />
PC:10.0.1.2<br />
login IP:10.0.1.1<br />
username:status<br />
password:readwrite</p>

<p>(3)<br />
PC:DHCP<br />
login IP:IP to enter WebGUI<br />
username:admin<br />
password:Same password as WebGUI</p>

<p>(4) <br />
PC: DHCP<br />
login IP: IP to enter WebGUI<br />
username:status<br />
password:readwrite</p>
]]>
        </description>
    </item>
    <item>
        <title>No configured BOVPNs or VPNs shown in WatchGuard Cloud under LiveStatus/VPN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3963/no-configured-bovpns-or-vpns-shown-in-watchguard-cloud-under-livestatus-vpn</link>
        <pubDate>Mon, 02 Sep 2024 10:27:28 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>HN13</dc:creator>
        <guid isPermaLink="false">3963@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello Community,</p>

<p>from last week on i cannot see any confugured BOVPNs or VPNs.in WatchGuard Cloud under LiveStatus for my WG Cluster- The page shows not data, no connections, no tunnels. . In WSM i only see the configured gateways, tunnels are not shown anyway . On WSM i alos cannot see any VPN connections as well.<br />
This i very strange. Only way i can see valid data is when in connect via Web UI on the cluster.<br />
Any Ideas what caused the problem?</p>

<p>On other Fireboxes everything is fine, i see connections.</p>

<p>Greetings</p>

<p>HN</p>
]]>
        </description>
    </item>
    <item>
        <title>Connecting a Cisco router to the FireCluster</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3915/connecting-a-cisco-router-to-the-firecluster</link>
        <pubDate>Tue, 30 Jul 2024 10:34:50 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>eldon118</dc:creator>
        <guid isPermaLink="false">3915@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have connected a Cisco 2800 router, running IOS 15.0, to two Watchguard M270s, running 12.10.4, configured as fireclusters. To ensure the high availability features are properly setup, is it necessary to bridge the two ethernet ports of the Cisco router and connect one of them to the master M270 and the other to the standby M270?</p>

<p>However, I found from the manual that "FireCluster does not support bridge mode." Would it be a problem connecting the bridged Cisco ports to the firecluster?</p>

<p>Can I setup the Cisco router using the following configuration:</p>

<p>bridge irb<br />
!<br />
interface FastEthernet0/0<br />
 no ip address<br />
 bridge-group 1<br />
!<br />
interface FastEthernet0/1<br />
 no ip address<br />
 bridge-group 1<br />
!<br />
interface BVI1<br />
 ip address 192.168.0.1 255.255.255.252<br />
!<br />
bridge 1 protocol ieee<br />
bridge 1 route ip</p>
]]>
        </description>
    </item>
    <item>
        <title>Firecluster Config with VLAN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3901/firecluster-config-with-vlan</link>
        <pubDate>Thu, 18 Jul 2024 13:55:46 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>BryceGiroux</dc:creator>
        <guid isPermaLink="false">3901@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>I've been struggling the last few days with trying to setup a pair of T85s in an active/passive cluster.</p>

<p>I've setup several other Watchguards in a cluster config before, and it all went fairly smoothly.  The only difference is, they were on a flat network, and I really don't have much experience with setting up VLANs.</p>

<p>The new site we acquired has 2 VLANs setup, one untagged for the corporate network, and one tagged for the guest network.</p>

<p>I am able to access the management interface on the primary FW, but I'm not able to access the interface on the secondary FW...I can't even ping it.  I tried to do a fail-over, just to check, and it did grab the external IP and the gateway IP, but no one was able to access the Internet.</p>

<p>I have the ports on the switches for both the primary and secondary FW adapters linked to both the untagged VLAN and the tagged public VLAN.</p>
]]>
        </description>
    </item>
    <item>
        <title>Changing Management IPs</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3837/changing-management-ips</link>
        <pubDate>Sun, 02 Jun 2024 17:21:14 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>bhx90</dc:creator>
        <guid isPermaLink="false">3837@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>I've recently upgraded to a pair of M590 (12.10.2) devices for my A/P FireCluster and I'm looking to implement some network segmentation for additional security.</p>

<p>We currently have a very flat 192.168 subnet with PCs, Servers and printers all on vlan1.</p>

<p>To ensure I don't introduce any bottle necks I would like to move the vlan1 subnet from the trusted interface to an untagged vlan on a 10G interface.</p>

<p>I realise that i will need to change the trusted interface to another subnet but when I try and create a vlan called VLAN1 on the Watchgaurd, I get the following error.</p>

<p>"The FireCluster management IP address 192.168....  cannot be on the same subnet as the primary IP of interface VLAN1"</p>

<p>Am I able to change the FireCluster management IP addresses to move them to a different subnet and interface, so they are not on the same subnet as vlan1.  Or is there a better way to achieve what I need?</p>

<p>Any advise would be welcome.</p>

<p>Thanks</p>

<p>Phil</p>
]]>
        </description>
    </item>
    <item>
        <title>Get ping and SNMP stats from BOVPN</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3761/get-ping-and-snmp-stats-from-bovpn</link>
        <pubDate>Fri, 12 Apr 2024 14:01:38 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>BryceGiroux</dc:creator>
        <guid isPermaLink="false">3761@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hopefully someone can help out.</p>

<p>We are setting up a new monitoring tool in our environment.  We have several sites that are connected to our main site with a BOVPN connection.  I'd like to be able to monitor the active and passive firewalls for port status, ping status, and the like.</p>

<p>I can, right now, access the gateway and get the stats from the firewall (10.0.0.1) from our hub office.  I can also get the status from the firewall that's currently acting as the master (10.0.0.2).  However, I cannot get the stats from the firewall that's the backup (10.0.0.3).</p>

<p>I can ping it and get the info from the 10.0.0.1 network, but not from the other network.</p>

<p>It would be helpful to know if the secondary firewall is up and alive from a remote site.</p>
]]>
        </description>
    </item>
    <item>
        <title>Cluster Backup member not joining after power maintenance #7979</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3694/cluster-backup-member-not-joining-after-power-maintenance-7979</link>
        <pubDate>Thu, 29 Feb 2024 01:14:26 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>RafaelFerreira</dc:creator>
        <guid isPermaLink="false">3694@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi guys,</p>

<p>we have an A/P Cluster of XTM330s 12.1.3 B608021 and it's around third time we had a schedule power maintenance and when power backups up, one of the members (Firewall "A") don't sync back to the cluster, it stays "inactive". Strangely, we'd go to connect to that member on FSM, the member status appears "idle". We use WSM 12.5.1 to manage those appliances.</p>

<p>THE FIRST TIME, besides having an inactive member, Cluster would operate fine, despite having this look on FSM, unable to login in Web UI.<br /><a href="https://snipboard.io/LvVhse.jpg" rel="nofollow">https://snipboard.io/LvVhse.jpg</a></p>

<p>After some back and forth, we realized the inactive member was able to play as master after getting it apart from the network and managing it individually. Since this member showing as "inactive" inside the cluster was not showing same strange behahior as Firewall "A", then we grab all network cords and plugged them to this device - Firewall "B".</p>

<p>Somehow Firewall "A" was glitching FSM, even 'thou it wasn't playing as master member.</p>

<p>On firewall A we completely default factory it, re-applied 12.1.3 B60821 (to match what we have in this cluster scenario), put it safe mode and cluster were once again synced fine.</p>

<p>THE SECOND TIME, it was a bit nasty, but we were lucky, this time after power maintenance and power backup up, Firewall "A" did not synced, same status as "inactive". Strangely, we'd go to connect to that member on FSM, the member status appears "idle" again.</p>

<p>There's no glitch on FSM not showing no status at all, neither Web UI giving HTTP Server error. After some back and forth, we discover the management IP address for Firewall "A" was responding to another host in the network. Since local network manager wasn't aware of each host it was, we decide to grab a a newer used IP address for management IP for this Firewall "A" member. Firewalls were synced after that, nice!</p>

<p>Now, we are on the THIRD TIME, it seems, we do not have an IP conflict this time, once again, there's no glitch on FSM/Web UI, but a power maintenance, when power went back up, Firewall "A" once again did not synced to the cluster, remaining as "inactive" state. Strangely, we'd go to connect to that member on FSM, the member status appears "idle" again. I am starting to think it's just a normal regular behavior this one.</p>

<p>We put Firewall "A" into safe mode and the rejoined it to the Cluster sucessfully. Rebooting Firewall "A" or asking for Discover member, even if we've got a successful message on FSM, the member would sit "inactive" until we forced it into safe mode.</p>

<p>This next sunday we'll have another power maintenance, it seems a routine task and we're waiting cluster to not go back normal after power backs up.</p>

<p>Things i am researching right now:<br />
1) WatchGuard Fórum<br />
I haven't found similar issue here, that's because i'm posting my own.</p>

<p>2) UserMac log<br />
We have several logs with following pattern, that i'm clueless about<br />
024-01-17 11:17:57 Secundario firewall sess_event: Session event "Add" has no "UserMac" parameter      Debug 2024-01-17 11:17:57 Secundario firewall sess_event: Session event "Del" has no "UserMac" parameter</p>

<p>3) I've seen, we are using ID 5 for Cluster<br />
Where standard is 1. I'll ask if there's another MAC multicast in the network, i don't recall why it's set to 5</p>

<p>4) Strange local subnetting<br />
Firewall management interface and local network is 10.0.0.1/23, but when i access some local computers that are on 10.0.0.0/24 or 10.0.1.0/24 subnet - i don't recall applying this strange setting to stations, where firewall could just have secondary networks, if they are willing to avoid brodcast storms, but need more local IPs and don't want to deal with VLANs</p>

<p>5) Cluster log messages<br />
The first three times, i did a look at event logs next to the incident hour, but reviewing firewall log settings, Cluster logs were off, i've set them to error now.<br />
I'm also tried letting an ongoing tcpdump with Wireshark over CLI saving packets to files filtering DHCP logs (their DHCP sedrver or another one in the network may be leasing IPs that would conflict with management IPs?) and trying to see on dump IP conflict (i still have to try it out, to see which pattern should i look for within Wireshark to filter that), but for some reason, local network manager has not allowed me to run this dump capture from a local computer, i'll see how good could it be running this from firewall perspective, since at least DHCP logs that i want to grab will be (at least some of them) be broadcasted so i can grab them without port mirroring or similar feature</p>

<p>6) Look for cluster bugs in upcoming Fireware versions</p>

<p>At last, but not least, i'll look through release notes for cluster bugs in upcoming Fireware versions that could match what i'm experiencing right here. I know XTM330 is EOL, but if there an uncorrect bug like this, it'll help an ongoing work this network to update their hardware. But they are considering openning a new office, this old Cluster could be reallocated there and new one would stay in the HQ.</p>

<p>Any hint, guys?</p>

<p>Regards,<br />
Rafael da Costa</p>
]]>
        </description>
    </item>
    <item>
        <title>Both Firecluster Members have the same license expiration date.</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3627/both-firecluster-members-have-the-same-license-expiration-date</link>
        <pubDate>Mon, 15 Jan 2024 22:58:44 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>Zed</dc:creator>
        <guid isPermaLink="false">3627@/watchguard-community/discussions</guid>
        <description><![CDATA[I have two M470s in Active/Passive Mode. The license of both devices will expire at the same time. My question is, how do I re-apply the feature keys for both of the devices?<br /><br /> Should I disable the cluster first? Or can i just reapply the feature keys in sequence (Primary first, then secondary next) ?]]>
        </description>
    </item>
    <item>
        <title>Firecluster update failure</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3537/firecluster-update-failure</link>
        <pubDate>Tue, 21 Nov 2023 15:16:30 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>D4rkSeven</dc:creator>
        <guid isPermaLink="false">3537@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Early this morning I programmed a firecluster to update from version 12.8.2 to version 12.9.4. The upgrade was partially failed, apparently only one of the members upgraded correctly and the other one failed. Now I have the problem that since the members are running different firmware versions, the cluster no longer works. The firebox that is working is the one with firmware 12.8.2.</p>

<p>Is there any way to get the cluster working remotely?</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/7a/wcothky9fheo.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/7a/wcothky9fheo.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/7a/wcothky9fheo.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/7a/wcothky9fheo.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/7a/wcothky9fheo.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/7a/wcothky9fheo.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/7a/wcothky9fheo.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/7a/wcothky9fheo.png" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Building Firecluster retrospectively with one existing node already active</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3461/building-firecluster-retrospectively-with-one-existing-node-already-active</link>
        <pubDate>Mon, 25 Sep 2023 14:57:21 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>GrahamD</dc:creator>
        <guid isPermaLink="false">3461@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have a single M370 Firebox currently in service and have purchased a second M370 to make a cluster. Are there any simple instructions on how to create the cluster using the config on the existing in-service node as is ( apart from adding some cluster interfaces to go between the fireboxes.)?</p>

<p>...or am I going to have to rebuild the cluster from scratch?  (using Policy Manager - which we dont use currently)</p>

<p>Just wondered if anyone had any experience of building the cluster retrospectively like this?</p>

<p>Thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>Cloud logning retension period</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3439/cloud-logning-retension-period</link>
        <pubDate>Fri, 08 Sep 2023 16:45:00 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>Robert_Vilhelmsen</dc:creator>
        <guid isPermaLink="false">3439@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>On a cluster with one unit having total security and the other having standard support there is different retension time for the logning.</p>

<p>One has 365 days, the other 0.</p>

<p>Is this a cloud bug?</p>

<p>Webshop-HA2<br />
Standard SupportStatusValidExpiration2023-10-08Log Data Retention0 DayReport Data Retention0 Day</p>

<p>Webshop-HA1<br />
Total Security SuiteStatusValidExpiration2023-10-08Log Data Retention365 DaysReport Data Retention30 Days</p>

<p>/Robert</p>
]]>
        </description>
    </item>
    <item>
        <title>Messanger::processMessage(XmlRpcException) - Connection refused (500)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3440/messanger-processmessage-xmlrpcexception-connection-refused-500</link>
        <pubDate>Fri, 08 Sep 2023 17:08:00 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>Robert_Vilhelmsen</dc:creator>
        <guid isPermaLink="false">3440@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>M370 cluster A/P running 12.9.4</p>

<p>Been running for a very long time with current setup.<br />
Both units has been rebooted.<br />
No Nic CRC errors<br />
Cluster status is all good.</p>

<p>When using FSM i get a lot of disconnects and reconnect a the below log shows.<br />
This is more prone in front panel and status report.</p>

<p>Any good ideas why i get  connection refused?</p>

<p>It seems it only happens when the cluster is healthy running a/p. If i power of one of the units i do not see this issue.</p>

<p>09/08/23 18:45:57[Thread-5] VclassMessenger : (2.2.2.2) java.io.IOException: Message processing timeout. Please try again.<br />
09/08/23 18:45:57[Thread-5] java.io.IOException: Message processing timeout. Please try again.</p>

<p>09/08/23 18:56:01[Thread-11] VclassMessenger : (2.2.2.2) ProcessMessage --------<br />
09/08/23 18:56:01[Thread-11] VclassMessenger : (2.2.2.2) ProcessMessageXmlRpc --------<br />
09/08/23 18:56:01[Thread-11] VclassMessenger : (2.2.2.2) XML-RPC Sent (timeout=30)(sid=0F9EF6624807634B95ECC3174CBBC2A2D04E7E0E): /agent/status (status=/cluster/member_8013049EB4D39/syslog/xml) [seq=-1, cnt=-1] <br />
09/08/23 18:56:04[..Thread (xmlrpc)] code=500; message=org.apache.xmlrpc.XmlRpcException: Connection refused<br />
09/08/23 18:56:04[..Thread (xmlrpc)] Exception: org.apache.xmlrpc.XmlRpcException: Connection refused<br />
09/08/23 18:56:04[Thread-11] VclassMessenger : (2.2.2.2) Messanger::processMessage(XmlRpcException) - Connection refused (500)<br />
09/08/23 18:56:04[Thread-11] org.apache.xmlrpc.XmlRpcException: Connection refused<br />
    at org.apache.xmlrpc.client.XmlRpcStreamTransport.readResponse(XmlRpcStreamTransport.java:186)<br />
    at org.apache.xmlrpc.client.XmlRpcStreamTransport.sendRequest(XmlRpcStreamTransport.java:145)<br />
    at org.apache.xmlrpc.client.XmlRpcHttpTransport.sendRequest(XmlRpcHttpTransport.java:94)<br />
    at org.apache.xmlrpc.client.XmlRpcSunHttpTransport.sendRequest(XmlRpcSunHttpTransport.java:44)<br />
    at org.apache.xmlrpc.client.XmlRpcClientWorker.execute(XmlRpcClientWorker.java:53)<br />
    at org.apache.xmlrpc.client.XmlRpcClient.execute(XmlRpcClient.java:166)<br />
    at org.apache.xmlrpc.client.XmlRpcClient.execute(XmlRpcClient.java:136)<br />
    at org.apache.xmlrpc.client.XmlRpcClient.execute(XmlRpcClient.java:125)<br />
    at com.watchguard.util.comm.cmm.HttpConnect.sendXmlRpc(Unknown Source)<br />
    at com.watchguard.util.comm.cmm.TimedProcessMessageThread.run(Unknown Source)</p>

<p>/Robert</p>
]]>
        </description>
    </item>
    <item>
        <title>License renewal</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3442/license-renewal</link>
        <pubDate>Mon, 11 Sep 2023 17:39:15 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>KellyL</dc:creator>
        <guid isPermaLink="false">3442@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have an M470 pair in A/P high availability. It's time to renew the licenses. What is the correct SKU to keep the passive box licensed correctly. I've renewed live security for 3 years, but it still shows the passive box about to expire.</p>
]]>
        </description>
    </item>
    <item>
        <title>Interpretation of  FireCluster Diagnostics Page in Web UI</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3431/interpretation-of-firecluster-diagnostics-page-in-web-ui</link>
        <pubDate>Wed, 30 Aug 2023 12:40:21 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>LauriAlo</dc:creator>
        <guid isPermaLink="false">3431@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello !</p>

<p>In the web documentation <a href="https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/ha/cluster_diagnostics.html" rel="nofollow">https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/ha/cluster_diagnostics.html</a><br />
 is written<br />
To quickly determine whether cluster operations are normal, look for these color-coded icons on tabs and sections:</p>

<p>Green check mark icon — A green check mark indicates normal operation.<br />
Red X icon — A red "x" indicates an issue that requires your attention.</p>

<p>My FireCluster View the FireCluster Diagnostics Page in Web UI there  red X icons in diagnostcs view  Is there problem and where to look what is the problem</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/em/ge4bq6jww0qk.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/em/ge4bq6jww0qk.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/em/ge4bq6jww0qk.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/em/ge4bq6jww0qk.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/em/ge4bq6jww0qk.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/em/ge4bq6jww0qk.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/em/ge4bq6jww0qk.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/em/ge4bq6jww0qk.png" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>FireCluster</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3421/firecluster</link>
        <pubDate>Mon, 21 Aug 2023 09:35:33 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>Bek</dc:creator>
        <guid isPermaLink="false">3421@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Could you please advise if I have 2 devices M390, one of them is already fully configured, now we have a passive device for the cluster, is it possible to set up the cluster? Or should both devices be in default state or the configuration should be the same?"</p>
]]>
        </description>
    </item>
    <item>
        <title>Proxy Auth certificates in a firecluster?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3287/proxy-auth-certificates-in-a-firecluster</link>
        <pubDate>Wed, 31 May 2023 15:40:33 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>~Jon S</dc:creator>
        <guid isPermaLink="false">3287@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I cannot find a definitive answer as to which proxy authority certificate is used in a fire cluster.   If I am going to distribute via AD GPO, do I need to distribute both or just the primary?   We always use active\passive, so there is always a primary box.</p>

<p>Thanks!<br />
~Jon</p>
]]>
        </description>
    </item>
    <item>
        <title>License update on A/P cluster</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3118/license-update-on-a-p-cluster</link>
        <pubDate>Wed, 22 Feb 2023 15:16:24 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>BarryG</dc:creator>
        <guid isPermaLink="false">3118@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Quick sanity check. Docs state you can not update (renew) a license on a FireCluster via Web UI. I did on the Active member then rolled them over, but it borks on fetching the other (now new primary box). So is the only way I can do this is via a WSM server and Policy Manager connecting to the IP address. Cut and Paste the new License key?</p>

<p>That's the way I use to do it before the Web UI and Cloud ctlr came along? If so I'll have to build out a new WSM Server.</p>
]]>
        </description>
    </item>
    <item>
        <title>Clusters not syncing?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2832/clusters-not-syncing</link>
        <pubDate>Tue, 20 Sep 2022 02:37:46 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>tantony</dc:creator>
        <guid isPermaLink="false">2832@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have 2 Fireboxes in cluster.  Are the cluster members supposed to mirror / sync each other?  Because I created a new network on cluster member B, on port 4.  When I connected my laptop to member B port 4, I got the correct network DHCP.</p>

<p>But when I connected my laptop to member A port 4, I don't get any DHCP.  Is this supposed to be this way?  I thought the point of cluster is to be redundant.</p>
]]>
        </description>
    </item>
    <item>
        <title>New Mult-WAN setup</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2779/new-mult-wan-setup</link>
        <pubDate>Fri, 26 Aug 2022 17:02:52 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>shaazaminator</dc:creator>
        <guid isPermaLink="false">2779@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Looking to create a firecluster with a multi-wan configuration.</p>

<p>Presently I have an M470 which I will need to replace with either two M390's or M590's<br />
as the 470's are no longer made. I'm thinking M390's, but that's another discussion.</p>

<p>Anyhow, my question is for the switch on the WAN (External) interface side should I use one switch or two?</p>

<p>I'm thinking one would work best and just create two VLAN's on that switch with each VLAN being Untagged (Aruba / HP lingo there) and each VLAN using the same IP Subnet as the FB external interfaces.<br />
This setup may also alleviate any potential issues with the ISP hardware only wanting to connect to a single device.</p>

<p>This I realize still does not eliminate the single point of failure, just moves it upstream a bit, but it's cleaner and easy to implement.</p>

<p>What does the community think? Pro's, Con's?</p>

<p>Thanks!</p>

<ul><li>Doug</li>
</ul>]]>
        </description>
    </item>
    <item>
        <title>Active/Passive Cluster Behavior</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2726/active-passive-cluster-behavior</link>
        <pubDate>Wed, 27 Jul 2022 22:17:13 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>SDR</dc:creator>
        <guid isPermaLink="false">2726@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi to all,<br />
I have to create an active/passive firecluster with two T80. My configuration is this:<br />
4 WAN (2 of these will be discontinued shortly)<br />
1 trusted<br />
1 DMZ<br />
1 stack consisting of 2 switches<br />
Each device is connected to both switches in the stack,except firewalls. ISP says their routers don't support LAGs so I'll have to enable STP to avoid loops.<br />
Here is a simple wiring diagram (I didn't drawn down the DMZ):</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/td/9e7ly3sia73r.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/td/9e7ly3sia73r.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/td/9e7ly3sia73r.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/td/9e7ly3sia73r.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/td/9e7ly3sia73r.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/td/9e7ly3sia73r.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/td/9e7ly3sia73r.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/td/9e7ly3sia73r.png" sizes="100vw" /></p>

<p>My question is: if the switch to which the active firewall is connected goes faultly, would the cluster activate the passive node even if it continues to hear the other node via heartbeat? if not, my network will be isolated.</p>

<p>Since each firewall is connected to only one switch, how can I configure the infrastructure to support the faults of a switch? Do I connect the heartbeat interfaces to the switches so that if they fail, the firewalls can't hear anymore?</p>

<p>Thanks a lot<br />
Paolo</p>
]]>
        </description>
    </item>
    <item>
        <title>Policy manager bug viewing management ip address</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2613/policy-manager-bug-viewing-management-ip-address</link>
        <pubDate>Thu, 26 May 2022 06:19:16 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>rv@kaufmann.dk</dc:creator>
        <guid isPermaLink="false">2613@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>WSM 12.8</p>

<p>If you modify a existing cluster policy and want to view or modify one of the ha members then when you click ok you get a message saying:</p>

<p><em>The Firecluster management IP address x.x.x.x cannot be on the same subnet as the primary IP address of interface xxx</em></p>

<p>The same message pop ups if you fiddle around with the management interface under network configuration.</p>

<p>Even for fun if you assign secondary ip addresses to the interface holding the management for vrrp you will get the same result using secondary addresses.</p>

<p>/Robert</p>
]]>
        </description>
    </item>
    <item>
        <title>Disabled Management Policies on Cluster</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2519/disabled-management-policies-on-cluster</link>
        <pubDate>Wed, 06 Apr 2022 17:07:49 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>justanotheruser</dc:creator>
        <guid isPermaLink="false">2519@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Let's say I have accidentally disabled the two management policies on my cluster, I know there's a way to regain admin access using a serial connection and CLI, but is it also possible to do the following?</p>

<ol><li>take the passive member offline, reset to factory default, reload it with the existing XML</li>
<li>does the passive member have to rejoin the cluster?</li>
<li>will there be downtime if I regain admin access this way?</li>
</ol>]]>
        </description>
    </item>
    <item>
        <title>Correct setup for firecluster?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2486/correct-setup-for-firecluster</link>
        <pubDate>Mon, 21 Mar 2022 11:11:03 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>Maarten</dc:creator>
        <guid isPermaLink="false">2486@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all</p>

<p>I've been trying to figure out the correct hardware configuration for our new firecluster. I'm pretty new to this, so wanted to ask for some feedback.</p>

<p>I want to set up a new active/active cluster. I'm pretty much there to make sure the cluster on itself works in a test setup, but of course it needs to go to our datacenter, where we have two IP adresses for our use. I tried to make up some scheme about what I think it will look like.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/4p/6el41ibtq2x2.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/4p/6el41ibtq2x2.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/4p/6el41ibtq2x2.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/4p/6el41ibtq2x2.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/4p/6el41ibtq2x2.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/4p/6el41ibtq2x2.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/4p/6el41ibtq2x2.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/4p/6el41ibtq2x2.png" sizes="100vw" /></p>

<p>Can I have some feedback on how the external interfaces (int 1 and int 2 on each firewall) should be configured and if this is pretty much the right thing to do? My thoughts on the interfaces is this:<br />
0. Management IP<br />
1. IP address of external IP 1<br />
2. IP address of external IP 2<br />
3. 192.168.45.254<br />
4. 192.168.45.254 -&gt; I don't think this is possible though. So I guess better 192.168.45.253?<br />
5. disabled -&gt; not needed<br />
6. and 7 as said in the drawing.</p>

<p>I guess Both members of the cluster will have the exact copy (apart from cluster interfaces).</p>

<p>Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>IKEv2 muvpn drops on cluster member reboot</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2392/ikev2-muvpn-drops-on-cluster-member-reboot</link>
        <pubDate>Fri, 11 Feb 2022 16:31:27 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>Alanon2</dc:creator>
        <guid isPermaLink="false">2392@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I am wondering if I'm missing a setting somewhere.  We have a lot of users on IKEv2, and a few on IPsec (using shrew client) MUPVN, whenever I upgrade the firewall, all of them are disconnected.   The people on SSL MUVPN do not get dropped.</p>

<p>I had to move one of the firewalls to another circuit and the same thing happened.</p>

<p>The only thing different between the users is the SSL users use an LDAP server, the other users use the firewall database.</p>
]]>
        </description>
    </item>
    <item>
        <title>Creating a cluster across the network</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2352/creating-a-cluster-across-the-network</link>
        <pubDate>Wed, 26 Jan 2022 16:22:01 +0000</pubDate>
        <category>Firebox - FireCluster</category>
        <dc:creator>RossAppleby</dc:creator>
        <guid isPermaLink="false">2352@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,<br />
We currently have two M370 fireboxes that are located next to each other with a single ethernet cable connecting the cluster interfaces.<br />
We wish to move one of the fireboxes into a different server room at the other end of the premises but still wish for them operate as a cluster.<br />
I have found the following advice (from: <a href="https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/ha/cluster_hardware_setup_wsm.html" rel="nofollow">https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/ha/cluster_hardware_setup_wsm.html</a><br />
)<br />
"We recommend that you do not use a switch between each member for the cluster interfaces. If you do use a switch between cluster interfaces, the cluster interfaces must be logically separated from each other on different VLANs."</p>

<p>However, is this worded correctly? Surely it means that the cluster interfaces must be connected by their own VLAN, separate from all other interfaces? Because otherwise how would the fireboxes communicate across the cluster interfaces?</p>

<p>Many thanks,<br />
Ross</p>
]]>
        </description>
    </item>
   </channel>
</rss>
