Historically, I have always used a direct Ethernet cable (crossover in the old days - standard Ethernet now of course).
it has been bugging me in recent times as Heiko stated that the remaining firewall goes ‘active attention’ when its partner is down. Even more than this, the alert emails (and logs too) can be confusing for the network admin who sees ‘errors’ coming from both firewalls.
So, I have been requesting a switch to put between the two firewalls, but of course this actually creates a new point of failure that didn’t exist in the simple direct-connect method...
Therefore: I think there’s only one ‘perfect’ solution that ticks all boxes: A pair of switches trunked together with a two cable Ether-channel, and a pair of bonded interfaces on each firewall connected to these switches.
We did this recently on a client site by VLANing off a few ports from the switches being used to aggregate the Internet-side routers. This saves rack-space, power etc. and made life easy while achieving what we wanted.
Using this two-switch, bonded interfaces method we introduce no extra single points of failure but also have no errors on the primary when rebooting secondary (or vice versa), however there remain two questions for me...
1. Which is ‘better’: Each firewall’s primary interface to the same switch or crisscross firewall-1, primary interface to switch a and firewall-2, primary interface to switch b? Pros and cons?
2. This is a bit of an issue for me generally as well as for this conversation: if using a bonded interface and we lose either the primary or secondary interface of the bond (switch, cable or interface failure) then we won’t get an alert because while an interface has gone down and resilience is reduced) the bond remains up and so nothing is logged or alerted.