index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
455 | Network
This setting should be used only when the asymmetric routing issue cannot be resolved by ensuring both directions of
traffic pass through the FortiGate.
When asymmetric routing is enabled and occurs, the FortiGate cannot inspect all traffic. Potentially malicious traffic may
pass through and compromise the secu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
456 | Network
Routing changes
When routing changes occur, routing look-up may occur on an existing session depending on certain configurations.
Routing changes without SNAT
When a routing change occurs, FortiGate flushes all routing information from the session table and performs new routing
look-up for all new packets on ar... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
457 | Network
next
end
2. Configure the route map:
config router route-map
edit "map1"
config rule
edit 2
set match-tag 565
set set-metric 2301
next
end
next
end
3. Configure the BGP neighbor:
config router bgp
config neighbor
edit "10.100.1.2"
set route-map-out "map1"
next
end
end
On its neighbor side, router R1 receives th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
458 | Network
To configure preferred source IPs for static routes:
1. Configure the static routes:
config router static
edit 22
set dst 172.17.254.0 255.255.255.0
set gateway 172.16.200.254
set preferred-source 1.1.1.1
set distance 2
set device "port1"
next
edit 23
set dst 172.17.254.0 255.255.255.0
set gateway 172.16.203.2
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
459 | Network
# diagnose sniffer packet any "host 172.17.254.148" 4
interfaces=[any]
filters=[host 172.17.254.148]
1.319811 port1 out 1.1.1.1.1371 -> 172.17.254.148.53: udp 43
1.320095 port1 in 172.17.254.148.53 -> 1.1.1.1.1371: udp 310
1.921718 port1 out 1.1.1.1.1371 -> 172.17.254.148.53: udp 27
2.031520 port1 in 172.17.254... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
460 | Network
3. Configure the following fields:
Incoming interface port1
Source Address 0.0.0.0/0.0.0.0
Destination Address 0.0.0.0/0.0.0.0
Protocol TCP
Destination ports 21 - 21
Type of service 0x00
Bit Mask 0x00
Outgoing interface Enable and select port4
Gateway address 172.20.120.23
4. Click OK.
To configure a policy rou... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
461 | Network
next
end
Moving a policy route
A routing policy is added to the bottom of the table when it is created. Routing policies can be moved to a different
location in the table to change the order of preference. In this example, routing policy 3 will be moved before routing
policy 2.
To move a policy route in the GUI... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
462 | Network
ECMP
SD-WAN
Description
GUI CLI
source-ip-based Source IP source-ip-based
Traffic is divided equally between the
interfaces. Sessions that start at the same
source IP address use the same path.
This is the default selection.
weight-based Sessions weight-based
The workload is distributed based on the
number of s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
463 | Network
list virtual firewall info:
name=root/root index=0 enabled fib_ver=40 use=168 rt_num=46 asym_rt=0 sip_helper=0, sip_nat_
trace=1, mc_fwd=0, mc_ttl_nc=0, tpmc_sk_pl=0
ecmp=source-ip-based, ecmp6=source-ip-based asym_rt6=0 rt6_num=55 strict_src_check=0 dns_
log=1 ses_num=20 ses6_num=0 pkt_num=19154477
To change t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
464 | Network
Result:
Both routes are added to the routing table and load-balanced based on the source IP.
Example 2: Same distance, different priority
config router static
edit 1
set gateway 172.16.151.1
set priority 5
set device "port1"
next
edit 2
set gateway 192.168.2.1
set device "port2"
next
end
# get router info routi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
465 | Network
Result:
Both routes are added to the routing table, but 80% of the sessions to 10.10.30.0/24 are routed to vpn2HQ1, and
20% are routed to vpn2HQ2.
Example 4: Load-balancing BGP routes
eBGP routes that are advertised to iBGP neighbors by multiple paths may be aggregated if the
tie breakers specified in RFC 4271 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
466 | Network
This section describes the following dual internet connection scenarios:
l Scenario 1: Link redundancy and no load-sharing on page 467
l Scenario 2: Load-sharing and no link redundancy on page 469
l Scenario 3: Link redundancy and load-sharing on page 470
Scenario 1: Link redundancy and no load-sharing
Link red... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
467 | Network
set protocol {ping tcp-echo udp-echo http twamp}
set gateway-ip <gateway-IP-address>
set interval <seconds>
set failtime <retry-attempts>
set recoverytime <number-of-successful-responses>
set status enable
next
end
Option Description
set update-cascade-interface {enable |
disable}
This option is used in conjunc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
468 | Network
To configure the routing of the two interfaces using the CLI:
config router {static | static6}
edit 1
set dst 0.0.0.0 0.0.0.0
set device wan1
set gateway <gateway_address>
set distance 10
next
edit 2
set dst 0.0.0.0 0.0.0.0
set device wan2
set gateway <gateway_address>
set distance 20
next
end
Security policies... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
469 | Network
Policy routes
By configuring policy routes, you can redirect specific traffic to the secondary WAN interface. This works in this case
because policy routes are checked before static routes. Therefore, even though the static route for the secondary WAN
is not in the routing table, traffic can still be routed usi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
470 | Network
the configured routes have equal distance values, with the route with a higher priority being preferred more. This ensures
both routes are active in the routing table, but the route with a higher priority will be the best route.
Link health monitor
Link monitor must be configured for both the primary and the se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
471 | Network
Dynamic routing
Dynamic routing protocols attempt to build a map of the network topology to identify the best routes to reach different
destinations. Instead of manually defining static routes, which is not scalable, dynamic routing typically involves defining
neighbors and peer routers that share their network... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
472 | Network
C 172.31.0.0/30 is directly connected, toKVM-MPLS
C 172.31.0.1/32 is directly connected, toKVM-MPLS
C 192.168.0.0/24 is directly connected, wan1
O 192.168.2.0/24 [110/101] via 10.10.10.11, internal, 00:00:26
S 192.168.20.0/24 [10/0] via 172.31.0.2, toKVM-MPLS
[10/0] via 10.10.10.11, internal
RIP
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
473 | Network
3. Enable/disable Inject Default Route.
4. Click OK.
To enable/disable default route injection in the CLI:
config router rip
set default-information-originate {enable | disable}
end
Default metric
The default metric setting sets the default metric for all redistributed routes. If the default metric is set to fi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
474 | Network
is reset. The timeout timer should be at least three times longer than the update timer.
If routers are not responding to updates in time, increasing the timeout timer can help. A longer timeout timer results in
longer update periods, and the FortiGate could wait a considerable amount of time for all of the tim... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
475 | Network
To configure a key chain with two sequentially valid keys and use it in a RIP interface:
config router key-chain
edit rip_key
config key
edit 1
set accept-lifetime 09:00:00 23 02 2020 09:00:00 17 03 2020
set send-lifetime 09:00:00 23 02 2020 09:00:00 17 03 2020
set key-string **********
next
edit 2
set accept-l... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
476 | Network
config interface
edit "port1"
set auth-mode md5
set auth-string **********
set receive-version 2
set send-version 2
next
end
end
RIP and IPv6
RIP next generation (RIPng) is an extension of RIPv2 that includes support for IPv6. See Basic RIPng example on page
490 and IPv6 tunneling on page 731 for more informati... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
477 | Network
Router Interface Interface name IP address
Router1
port1 LoSales 10.11.101.101
port2 vd12link0 10.11.201.101
port3 vd13link0 10.11.202.101
Router2
port1 vd23link0 10.12.101.102
port2 vd12link1 10.11.201.102
port3 vd42link1 10.14.201.102
port4 vdr2link1 172.20.120.102
Router3
port1 vd23link1 10.12.101.103
port2 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
478 | Network
d. Click OK.
e. Repeat these steps for port3.
5. Under Advanced Options, enable Inject Default Route.
This setting allows the ISP router to share its default 0.0.0.0 routes with other routers in the RIP network.
6. Click Apply.
To configure the ISP Router in the CLI:
config router rip
set default-information-or... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
479 | Network
Router3
10.12.101.0/255.255.255.0
10.11.202.0/255.255.255.0
10.14.202.0/255.255.255.0
172.20.121.0/255.255.255.0
4. Add the interfaces:
a. In the Interfaces table, click Create New.
b. Set Interface to port1.
c. Leave the remaining settings as their default values.
d. Click OK.
e. Repeat these steps for port2, ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
480 | Network
To configure Router3 in the CLI:
config router rip
config network
edit 1
set prefix 10.12.101.0 255.255.255.0
next
edit 2
set prefix 10.11.202.0 255.255.255.0
next
edit 3
set prefix 10.14.202.0 255.255.255.0
next
edit 4
set prefix 172.20.121.0 255.255.255.0
next
end
config interface
edit "port1"
set receive-ver... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
481 | Network
Router4
10.14.101.0/255.255.255.0
10.14.201.0/255.255.255.0
10.14.202.0/255.255.255.0
4. Add the interfaces:
a. In the Interfaces table, click Create New.
b. Set Interface to port1.
c. For port1 only, enable Passive.
d. Leave the remaining settings as their default values.
e. Click OK.
f. Repeat these steps for... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
482 | Network
edit 2
set prefix 10.14.201.0 255.255.255.0
next
edit 3
set prefix 10.14.202.0 255.255.255.0
next
end
set passive-interface "port1"
config interface
edit "port1"
set receive-version 2
set send-version 2
next
edit "port2"
set receive-version 2
set send-version 2
next
edit "port3"
set receive-version 2
set send-v... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
483 | Network
vd42link1 is up, line protocol is up
Routing Protocol: RIP
Receive RIPv2 packets only
Send RIPv2 packets only
Passive interface: Disabled
Split horizon: Enabled with Poisoned Reversed
IP interface address:
10.14.201.102/24
vd23link0 is up, line protocol is up
Routing Protocol: RIP
Receive RIPv2 packets only
Sen... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
484 | Network
# execute ping-options source 10.11.201.102
# execute ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=115 time=4.5 ms
64 bytes from 8.8.8.8: icmp_seq=1 ttl=115 time=4.2 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=115 time=4.2 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=115 tim... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
485 | Network
# get router info rip database
Codes: R - RIP, Rc - RIP connected, Rs - RIP static, K - Kernel,
C - Connected, S - Static, O - OSPF, I - IS-IS, B - BGP
Network Next Hop Metric From If Time
R 0.0.0.0/0 10.11.202.103 3 10.11.202.103 vd13link0 02:35
Rc 10.11.101.0/24 1 LoSales
Rc 10.11.201.0/24 1 vd12link0
Rc 10.1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
486 | Network
# execute ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=114 time=4.3 ms
64 bytes from 8.8.8.8: icmp_seq=1 ttl=114 time=4.1 ms
--- 8.8.8.8 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max = 4.1/4.2/4.3 ms
# execute tra... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
487 | Network
R 10.11.202.0/24 [120/2] via 10.14.202.103, vd43link0, 02:45:15
R 10.12.101.0/24 [120/2] via 10.14.202.103, vd43link0, 02:45:15
C 10.14.101.0/24 is directly connected, LoAccounting
C 10.14.201.0/24 is directly connected, vd42link0
C 10.14.202.0/24 is directly connected, vd43link0
R 172.20.120.0/24 [120/2] via 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
488 | Network
C 10.14.202.0/24 is directly connected, vd43link0
R 172.20.120.0/24 [120/2] via 10.14.201.102, vd42link0, 02:58:39
# execute traceroute 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 32 hops max, 3 probe packets per hop, 84 byte packets
1 10.14.201.102 0.167 ms 0.063 ms 0.029 ms
2 172.20.120.5 0.117 ms 0.073 ms 0.041... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
489 | Network
Basic RIPng example
In this example, a small network is configured with RIP next generation (RIPng). Two FortiGates are connected to the
internal network and the ISP, providing some redundancy to help ensure that the internal network can always reach the
internet.
The FortiGates are running in NAT mode with VDO... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
490 | Network
set alias "ISP"
config ipv6
set ip6-address 2002:ac14:7865::/0
end
next
end
2. Configure RIPng:
config router ripng
config neighbor
edit 1
set ip6 2002:a0b:6566::
set interface port1
next
edit 2
set ip6 2002:ac14:7805::
set interface port2
next
end
config interface
edit port1
next
edit port2
next
end
end
To con... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
491 | Network
set ip6 2002:a0b:6565::
set interface port1
next
edit 2
set ip6 2002:ac14:7805::
set interface port2
next
end
config interface
edit port1
next
edit port2
next
end
end
Testing the configuration
The following commands can be used to check the RIPng information on the FortiGates, and can help track down
issues:
To... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
492 | Network
Option Description
Router ID A unique ID to identify your router in the network, typically in the format x.x.x.x.
Areas The areas that the router is part of. For each are area, define the Area ID, Type,
and Authentication method.
Networks The networks that OSPF is enabled in, and the area that they belong to.
I... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
493 | Network
FortiGate Interface IP address
Router1 (DR)
port1 10.11.101.1
port2 10.11.102.1
port3 192.168.102.1
Router2 (BDR)
port1 10.11.101.2
port2 10.11.103.2
port3 192.168.103.2
Router3 (ASBR)
port1 10.11.102.3
port2 10.11.103.3
port3 172.20.120.3
l Firewall policies are already configured to allow unfiltered traffic i... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
494 | Network
Area 0.0.0.0
IP/Netmask 192.168.102.0 255.255.255.0
8. Click OK.
9. In the Interfaces table, click Create New and set the following:
Name Router1-Internal-DR
Interface port1
Cost 0
Priority 255
Authentication None
Timers l Hello Interval: 10
l Dead Interval: 40
10. Click OK.
11. In the Interfaces table, click C... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
495 | Network
end
config network
edit 1
set prefix 10.11.0.0 255.255.0.0
next
edit 2
set prefix 192.168.102.0 255.255.255.0
next
end
end
Router2
To configure Router2 in the GUI:
1. Go to Network > OSPF.
2. Set Router ID to 10.11.101.2.
3. In the Areas table, click Create New and set the following:
Area ID 0.0.0.0
Type Regula... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
496 | Network
11. In the Interfaces table, click Create New again and set the following:
Name Router2-External
Interface port2
Cost 0
Authentication None
Timers l Hello Interval: 10
l Dead Interval: 40
12. Click OK.
13. Click Apply.
To configure Router2 in the CLI:
config router ospf
set router-id 10.11.101.1
config area
edi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
497 | Network
4. Enable Redistribute BGP and use the default settings.
5. In the Areas table, click Create New and set the following:
Area ID 0.0.0.0
Type Regular
Authentication None
6. Click OK.
7. In the Networks table, click Create New and set the following:
Area 0.0.0.0
IP/Netmask 10.11.0.0 255.255.0.0
8. Click OK.
9. In... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
498 | Network
edit "Router3-Internal"
set interface "port1"
set dead-interval 40
set hello-interval 10
next
edit "Router3-Internal2"
set interface "port2"
set dead-interval 40
set hello-interval 10
next
end
config network
edit 1
set prefix 10.11.0.0 255.255.0.0
next
end
config redistribute "bgp"
set status enable
end
end
To ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
499 | Network
Router3 # get router info ospf status
Routing Process "ospf 0" with ID 10.11.103.3
Process uptime is 18 hours 52 minutes
Process bound to VRF default
Conforms to RFC2328, and RFC1583Compatibility flag is disabled
Supports only single TOS(TOS0) routes
Supports opaque LSA
Do not support Restarting
This router is ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
500 | Network
Process uptime is 2 hours 53 minutes
Process bound to VRF default
Conforms to RFC2328, and RFC1583Compatibility flag is disabled
Supports only single TOS(TOS0) routes
Supports opaque LSA
Do not support Restarting
SPF schedule delay 5 secs, Hold time between two SPFs 10 secs
Refresh timer 10 secs
Number of incom... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
501 | Network
Conforms to RFC2328, and RFC1583Compatibility flag is disabled
Supports only single TOS(TOS0) routes
Supports opaque LSA
Do not support Restarting
SPF schedule delay 5 secs, Hold time between two SPFs 10 secs
Refresh timer 10 secs
Number of incomming current DD exchange neighbors 0/5
Number of outgoing current ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
502 | Network
C 10.11.103.0/24 is directly connected, port2
C 172.20.120.0/24 is directly connected, port3
O 192.168.102.0/24 [110/3] via 10.11.103.2, port2, 00:00:09
O 192.168.103.0/24 [110/2] via 10.11.103.2, port2, 02:33:45
B 192.168.160.0/24 [20/0] via 172.20.120.5, port3, 19:27:52
B 192.168.170.0/24 [20/0] via 172.20.12... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
503 | Network
set ipsec-auth-alg {md5 | sha1 | sha256 | sha384 | sha512}
set ipsec-enc-alg {null | des | 3des | aes128 | aes192 | aes256}
config ipsec-keys
edit <spi>
set auth-key <string>
set enc-key <string>
next
end
next
end
end
To configure an OSPF6 virtual link:
config router ospf6
config area
edit <id>
config virtual-l... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
504 | Network
CLI command descriptions
Command Description
<id> Area entry IP address.
authentication {none | ah | esp |
area}
Authentication mode:
l none: Disable authentication
l ah: Authentication Header
l esp: Encapsulating Security Payload
l area: Use the routing area authentication configuration
key-rollover-interval <... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
505 | Network
OSPFv3 graceful restart mode upon a topology change can be used in OSPF6:
config router ospf6
set restart-on-topology-change {enable | disable}
end
Example
In this example, a restarting router (one of the FG-300Es in the HA cluster) informs its neighbors using grace LSAs
before restarting its OSPF process. When... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
506 | Network
set restart-mode graceful-restart
config area
edit 0.0.0.0
next
end
config network
edit 1
set prefix 172.16.200.0 255.255.255.0
next
edit 2
set prefix 3.3.3.3 255.255.255.255
next
end
end
Testing the configuration
Topology change with continuing graceful restart enabled:
When restart-on-topology-change is enabl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
507 | Network
Neighbor ID Pri State Dead Time Address Interface
31.1.1.1 1 Full/DR 00:00:38 172.16.200.31 port1
# get router info routing-table ospf
Routing table for VRF=0
O 21.21.21.21/32 [110/300] via 172.16.200.31, port1, 00:10:37
O 31.1.1.1/32 [110/200] via 172.16.200.31, port1, 00:56:13
O 100.21.1.0/24 [110/200] via 17... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
508 | Network
# get router info routing-table ospf
Routing table for VRF=0
O 21.21.21.21/32 [110/300] via 172.16.200.31, port1, 00:04:42
O 31.1.1.1/32 [110/200] via 172.16.200.31, port1, 01:01:59
O 100.21.1.0/24 [110/200] via 172.16.200.31, port1, 00:04:42
OSPF link detection customization
OSPF route detection and interface-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
509 | Network
Option Description
Neighbor Groups The neighbor groups that share the same outbound policy configurations.
Neighbor Ranges The source address range of BGP neighbors that will be automatically assigned
to a neighbor group.
Networks The IPv4 networks to be advertised to other BGP routers. Choose from:
l IP/Netmas... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
510 | Network
FGT_A learns routes from ISP2 and redistributes them to FGT_B while preventing any iBGP routes from being
advertised.
The internal networks behind the FortiGates can communicate with each other, and the internal networks behind FGT_B
can traverse FGT_A to reach networks that are advertised by ISP2.
l FGT_A and ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
511 | Network
config neighbor
edit "10.100.201.88"
set remote-as 64511
set update-source "toFGTB"
next
end
config network
edit 1
set prefix 192.168.86.0 255.255.255.0
next
end
end
To configure FGT_B to establish iBGP peering with FGT_A in the GUI:
1. Go to Network > BGP.
2. Set Local AS to 64511
3. Set Router ID to 2.2.2.2.
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
512 | Network
2. Check the networks learned from neighbors:
# get router info bgp network
3. Check that the routes are added to the routing table:
# get router info routing-table all
To see the neighborship status, network, and routing table command outputs for the completed example, see
Troubleshooting and debugging on page... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
513 | Network
To configure FGT_A to establish eBGP peering with ISP 2 in the CLI:
1. Configure a route map to prevent advertisement of iBGP routes to ISP 2:
config router route-map
edit "exclude1"
config rule
edit 1
set action deny
set match-origin igp
next
end
next
end
2. Update the BGP configuration:
config router bgp
conf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
514 | Network
To verify that pinging from FGT_B to a subnet in ISP 2 is successful:
FGT_B # execute ping-options source 192.168.88.88
FGT_B # execute ping 172.16.201.87
PING 172.16.201.87 (172.16.201.87): 56 data bytes
64 bytes from 172.16.201.87: icmp_seq=0 ttl=254 time=0.6 ms
...
--- 172.16.201.87 ping statistics ---
5 pac... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
515 | Network
Address family IPv4 Unicast: advertised and received
Address family IPv6 Unicast: advertised and received
Received 513 messages, 1 notifications, 0 in queue
Sent 517 messages, 2 notifications, 0 in queue
Route refresh request: received 0, sent 0
Minimum time between advertisement runs is 30 seconds
For address ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
516 | Network
0 announced prefixes
Connections established 7; dropped 6
Local host: 10.100.201.86, Local port: 179
Foreign host: 10.100.201.88, Foreign port: 6245
Nexthop: 10.100.201.86
Nexthop interface: toFGTB
Nexthop global: ::
Nexthop local: ::
BGP connection: non shared network
Last Reset: 01:54:12, due to BGP Notificat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
517 | Network
To verify the networks learned from neighbors or a specific network:
FGT_A # get router info bgp network
VRF 0 BGP table version is 5, local router ID is 1.1.1.1
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal,
S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Ho... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
518 | Network
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [10/0] via 172.16.151.1, port1, [5/0]
[10/0] via 192.168.2.1, port2, [10/0]
C 10.10.101.0/24 is directly connected, wan1
C 10.10.102.0/24 is directly connected, wan2
S 10.10.103.0/... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
519 | Network
l A company has its own web and email servers in an OSPF area, and needs to advertise routes to these resources
to external peers. Users, routers, and other server all reside in the OSPF area.
l The FortiGate acts as the BGP border router, redistributing routes from the company's network to its BGP peers. It
is... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
520 | Network
f. Click OK.
g. Click OK.
2. Configure BGP:
a. Go to Network > BGP.
b. Set Local AS to 65001
c. Set Router ID to 10.11.201.110.
d. In the Neighbors table, click Create New and set the following:
IP 172.21.111.5
Remote AS 65001
e. Click OK.
f. In the Neighbors table, click Create New again and set the following:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
521 | Network
set remote-as 65001
next
end
config redistribute "ospf"
set status enable
end
end
Configuring OSPF
In this example, all of the traffic is within the one OSPF area, and there are other OSPF routers in the network. When
adjacencies are formed, other routers receive the routes advertised from the FortiGate that ar... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
522 | Network
next
end
config network
edit 1
set prefix 10.11.201.0 255.255.255.0
next
end
config redistribute "bgp"
set status enable
set metric 1
end
end
Testing the configuration
To test this configuration, run the standard connectivity checks, and also make sure that routes are being passed
between protocols as expected.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
523 | Network
Example
To see the change in the routing table when the option is enabled:
1. Check the BGP routing table:
# get router info routing-table bgp
Routing table for VRF=0
B 10.100.1.4/30 [200/0] via 10.100.1.14 (recursive is directly connected, R560),
00:02:06
2. Enable BGP routes for recursive resolution of next h... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
524 | Network
In this example, there are two static routes. The FortiGate has learned two BGP routes from Router 1 that have the same
next hop at 10.100.100.1. The next hop is resolved by the two static routes.
To verify that the routes are added to the BGP routing table:
1. Check the two static routes:
# get router info rou... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
525 | Network
config ipv6
set ip6-mode dhcp
set ip6-allowaccess ping
end
next
end
2. Configure FGT_B (RA):
config system interface
edit "agg2"
set vdom "root"
set ip 172.16.203.2 255.255.255.0
set allowaccess ping https http
set bfd disable
set type aggregate
set member "port4"
set alias "To_FGT_A_agg1"
set lldp-transmission... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
526 | Network
i - IS-IS, B - BGP, V - BGP VPNv6
> - selected route, * - FIB route, p - stale info
Timers: Uptime
Routing table for VRF=0
K * ::/0 via fe80::96f3:92ff:fe15:f7b, agg1, 00:00:20
C *> ::1/128 via ::, root, 00:03:33
O 2000::1:1:1:1/128 [110/0] via ::, loopback1 inactive, 00:03:32, [1024/0]
C *> 2000::1:1:1:1/128 v... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
527 | Network
FGT_A (root)# config router setting
set kernel-route-distance 254
end
5. Now there is a kernel route:
FGT_A (root)# get router info6 routing-table kernel
Routing table for VRF=0
K* ::/0 [254/1024] via fe80::96f3:92ff:fe15:f7b, agg1, 00:01:04
...
BGP conditional advertisement
BGP conditional advertisement allows... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
528 | Network
next
end
next
end
2. Configure the IPv4 route maps:
config router route-map
edit "2814"
config rule
edit 1
set match-ip-address "281"
next
end
next
edit "2224"
config rule
edit 1
set match-ip-address "222"
next
end
next
edit "2824"
config rule
edit 1
set match-ip-address "282"
next
end
next
end
3. Configure the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
529 | Network
unset le
next
end
next
end
4. Configure the IPv6 route maps:
config router route-map
edit "map-2226"
config rule
edit 1
set match-ip6-address "adv-2226"
next
end
next
edit "map-2816"
config rule
edit 1
set match-ip6-address "list6-1"
next
end
next
edit "map-2826"
config rule
edit 1
set match-ip6-address "list6-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
530 | Network
To verify the IPv4 conditional advertisements:
# get router info bgp neighbors 2.2.2.2
...
Conditional advertise-map:
Adv-map 2224root 2814root, cond-state 0-1
2824root, cond-state 0-1
...
In this output, the condition is that the routes in route maps 2814 and 2824 do not exist. However, routes for 2814 and
22... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
531 | Network
l The BGP conditional advertisement condition is set to be true if the condition route map (2003:172:28:1::/64) is not
matched (non-exist).
To configure BGP conditional advertisement with IPv6:
1. Configure the IPv6 prefix lists:
config router prefix-list6
edit "adv-222"
config rule
edit 1
set prefix6 2003:172:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
532 | Network
set soft-reconfiguration6 enable
set remote-as 65412
set update-source "loopback1"
config conditional-advertise6
edit "map-221"
set condition-routemap "map-281"
set condition-type non-exist
next
end
next
edit "2003::3:3:3:3"
set soft-reconfiguration6 enable
set remote-as 65412
set update-source "loopback1"
next... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
533 | Network
2. Verify the routing table:
# get router info6 routing-table bgp
B 2003:172:28:1::/64 [200/0] via 2003::3:3:3:3 (recursive via
****::***:***:****:****, port9), 01:23:45
B 2003:172:28:2::/64 [200/0] via 2003::3:3:3:3 (recursive via
****::***:***:****:****, port9), 23:09:22
When the FortiGate learns 2003:172:28:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
534 | Network
This example assumes a pure NAT64 design with the following expectations:
l IPv4 IP pools would be announced to Internet gateway when IPv6 client subnets learned
from IPv6 route.
l IPv6 virtual IP addresses (VIPs) (default = 64:ff9b::/96) would be announced to Router 1
when IPv4 default route learned from Inter... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
535 | Network
The prefixes defined in IPv4 route map 2814 and IPv6 route map map-281 both exist, so the FortiGate advertises the
route map prefix in route-map 2224 (172.22.2.0/255.255.255.0) to its BGP neighbor 2.2.2.2.
For IPv6 neighbor 2003::2:2:2:2, the prefixes defined in IPv4 route map 2874 and IPv6 route map map-38 bot... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
536 | Network
next
end
2. Configure the IPv6 prefix list:
config router prefix-list6
edit "list6-1"
config rule
edit 1
set prefix6 2003:172:28:1::/64
unset ge
unset le
next
end
next
end
3. Configure the route maps:
config router route-map
edit "2814"
config rule
edit 1
set match-ip-address "281"
next
end
next
edit "map-281"
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
537 | Network
next
end
2. Configure the IPv6 prefix lists:
config router prefix-list6
edit "list6-38"
config rule
edit 1
set prefix6 2003:172:38:1::/64
unset ge
unset le
next
end
next
edit "adv-222"
config rule
edit 1
set prefix6 2003:172:22:1::/64
unset ge
unset le
next
end
next
end
3. Configure the route maps:
config route... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
538 | Network
set network-import-check disable
set cluster-id 1.1.1.1
set graceful-restart enable
set cross-family-conditional-adv enable
config neighbor
edit "3.3.3.3"
set activate6 disable
set capability-graceful-restart enable
set soft-reconfiguration enable
set prefix-list-out "local-out"
set remote-as 65412
set route-ma... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
539 | Network
set remote-as 65412
set route-map-in6 "community-del777"
set keep-alive-timer 30
set holdtime-timer 90
set update-source "loopback1"
next
end
config network
edit 1
set prefix 172.27.1.0 255.255.255.0
next
edit 2
set prefix 172.27.2.0 255.255.255.0
next
edit 3
set prefix 172.22.2.0 255.255.255.0
next
end
config ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
540 | Network
10.100.1.1 4 20 100 108 3 0 0 00:43:51 0
10.100.1.5 4 20 53 57 3 0 0 00:43:50 0
2003::2:2:2:2 4 65412 98 118 3 0 0 00:42:25 1
2003::3:3:3:3 4 65412 102 100 2 0 0 00:42:20 3
Total number of neighbors 5
Condition route map:
map-38, state 0, use 3
2874, state 0, use 3
To verify the BGP routing table for IPv4 and c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
541 | Network
edit "2.2.2.2"
config conditional-advertise
edit "222v4"
set condition-routemap "4-281" "6-281"
set condition-type exist
next
end
next
end
end
The FortiGate will only check the IPv4 RIB table to see if there is a matching IP address for each route map. Any IPv6
address under the route map will not get checked i... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
542 | Network
BGP attribute Handling
AS 4 path Handled by the attribute discard approach.
aggregator Handled by the attribute discard approach.
aggregator 4 Handled by the attribute discard approach.
next-hop Handled by the treat-as-withdraw approach.
multiple exit discriminator Handled by the treat-as-withdraw approach.
loc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
543 | Network
l The loopbacks are exchanged with IKE between the spokes and hubs. They are installed as static routes that are
used to provide reachability for establishing BGP neighbors.
l The summary BGP routes from the loopback IP address ranges that originated on the hubs are advertised to the
spokes for resolving the BG... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
544 | Network
172.31.0.0/25 is the loopback IP summary originated by both Hub_1 and Hub_2. The next hop of the PC_4 LAN
route is resolved to Hub_1 (H1_T11, H1_T22) and Hub_2 (H2_T11, H2_T22) based on the loopback IP summary
route.
2. When connections between Spoke_2 and Hub_1 fails due to the BGP neighbor, tunnels, or physic... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
545 | Network
Routing entry for 10.0.4.0/24
Known via "bgp", distance 200, metric 0, best
Last update 00:01:11 ago
* 172.31.0.66, tag 2 (recursive via H2_T11 tunnel 172.31.1.101), tag-match
(recursive via H2_T22 tunnel 10.0.0.4), tag-match
5. If traffic is again sent from PC_3 to PC_4, it will go through Hub_2 and reach the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
546 | Network
10.0.0.40), 00:09:22
B 172.31.0.0/25 [200/0] via 172.31.0.1 (recursive via H1_T11 tunnel 172.31.1.1),
03:40:12
(recursive via H1_T22 tunnel 10.0.0.2), 03:40:12
[200/0] via 172.31.0.2 (recursive via H2_T11 tunnel 172.31.1.101), 03:40:12
(recursive via H2_T22 tunnel 10.0.0.4), 03:40:12
S 172.31.0.1/32 [15/0] via ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
547 | Network
Spoke_1 (root) # get router info routing-table all
C 10.0.3.0/24 is directly connected, port4
B 10.0.4.0/24 [200/0] via 172.31.0.66 tag 1 (recursive via H1_T11_0 tunnel
10.0.0.40), 00:18:50
(recursive via H1_T22_0 tunnel 10.0.0.41), 00:18:50
[200/0] via 172.31.0.66 tag 2 (recursive via H1_T11_0 tunnel 10.0.0.40... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
548 | Network
Service(2): Address Mode(IPV4) flags=0x200 use-shortcut-sla
Gen(10), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(sla), sla-compare-order
Members(2):
1: Seq_num(6 H2_T11), alive, sla(0x1), gid(0), cfg_order(0), cost(0), selected
2: Seq_num(9 H2_T22), alive, sla(0x1), gid(0), cfg_order(3), cost(0), selected
Src add... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
549 | Network
next
end
end
2. Configure the R4 router settings:
config router bgp
config neighbor
edit "172.16.201.1"
set soft-reconfiguration enable
set remote-as 65518
set password ********
next
end
end
Defining a preferred source IP for local-out egress interfaces on BGP routes
The preferred source IP can be configured on... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
550 | Network
set cluster-id 1.1.1.1
set graceful-restart enable
config aggregate-address
edit 1
set prefix 172.28.0.0 255.255.0.0
set as-set enable
set summary-only enable
next
end
config neighbor
edit "3.3.3.3"
set capability-graceful-restart enable
set soft-reconfiguration enable
set prefix-list-out "local-out"
set remote... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
551 | Network
by an aggregate.)
Not advertised to any peer
Original VRF 0
65050, (Received from a RR-client)
3.3.3.3 (metric 11000) from 3.3.3.3 (3.3.3.3)
Origin IGP metric 0, localpref 100, valid, internal, best, prefsrc 1.1.1.2
Last update: Wed Jan 25 15:15:48 2023
3. Verify the kernel routing table for 172.28.5.0/24:
# ge... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
552 | Network
Multi-Exit Discriminator (MED) is a BGP path attribute that discriminates among multiple exit or entry points to the same
neighboring AS. MED is also known as Optional Non-Transitive path attribute. The lower the MED value, the more
preferred the path is to the receiving router.
MED is typically utilized when a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
553 | Network
To configure MED in a dual-homed AS network using the CLI:
1. Configure eBGP peering on FortiGate-A by specifying the BGP neighbors:
config router bgp
set as 200
set router-id 2.2.2.2
config neighbor
edit "13.1.1.1"
set remote-as 300
next
edit "23.1.1.2"
set remote-as 300
next
end
end
2. Configure eBGP on ISP1 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
554 | Network
b. Configure ISP2:
config router prefix-list
edit "ISP2_Prefix_List"
config rule
edit 1
set prefix 11.11.11.0 255.255.255.0
next
end
next
end
5. Configure route maps and configure the MED value:
a. Configure ISP1:
config router route-map
edit "MED_Route_MAP"
config rule
edit 1
set match-ip-address "ISP1_Prefix_... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.