index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
455
Network This setting should be used only when the asymmetric routing issue cannot be resolved by ensuring both directions of traffic pass through the FortiGate. When asymmetric routing is enabled and occurs, the FortiGate cannot inspect all traffic. Potentially malicious traffic may pass through and compromise the secu...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
456
Network Routing changes When routing changes occur, routing look-up may occur on an existing session depending on certain configurations. Routing changes without SNAT When a routing change occurs, FortiGate flushes all routing information from the session table and performs new routing look-up for all new packets on ar...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
457
Network next end 2. Configure the route map: config router route-map edit "map1" config rule edit 2 set match-tag 565 set set-metric 2301 next end next end 3. Configure the BGP neighbor: config router bgp config neighbor edit "10.100.1.2" set route-map-out "map1" next end end On its neighbor side, router R1 receives th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
458
Network To configure preferred source IPs for static routes: 1. Configure the static routes: config router static edit 22 set dst 172.17.254.0 255.255.255.0 set gateway 172.16.200.254 set preferred-source 1.1.1.1 set distance 2 set device "port1" next edit 23 set dst 172.17.254.0 255.255.255.0 set gateway 172.16.203.2 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
459
Network # diagnose sniffer packet any "host 172.17.254.148" 4 interfaces=[any] filters=[host 172.17.254.148] 1.319811 port1 out 1.1.1.1.1371 -> 172.17.254.148.53: udp 43 1.320095 port1 in 172.17.254.148.53 -> 1.1.1.1.1371: udp 310 1.921718 port1 out 1.1.1.1.1371 -> 172.17.254.148.53: udp 27 2.031520 port1 in 172.17.254...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
460
Network 3. Configure the following fields: Incoming interface port1 Source Address 0.0.0.0/0.0.0.0 Destination Address 0.0.0.0/0.0.0.0 Protocol TCP Destination ports 21 - 21 Type of service 0x00 Bit Mask 0x00 Outgoing interface Enable and select port4 Gateway address 172.20.120.23 4. Click OK. To configure a policy rou...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
461
Network next end Moving a policy route A routing policy is added to the bottom of the table when it is created. Routing policies can be moved to a different location in the table to change the order of preference. In this example, routing policy 3 will be moved before routing policy 2. To move a policy route in the GUI...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
462
Network ECMP SD-WAN Description GUI CLI source-ip-based Source IP source-ip-based Traffic is divided equally between the interfaces. Sessions that start at the same source IP address use the same path. This is the default selection. weight-based Sessions weight-based The workload is distributed based on the number of s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
463
Network list virtual firewall info: name=root/root index=0 enabled fib_ver=40 use=168 rt_num=46 asym_rt=0 sip_helper=0, sip_nat_ trace=1, mc_fwd=0, mc_ttl_nc=0, tpmc_sk_pl=0 ecmp=source-ip-based, ecmp6=source-ip-based asym_rt6=0 rt6_num=55 strict_src_check=0 dns_ log=1 ses_num=20 ses6_num=0 pkt_num=19154477 To change t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
464
Network Result: Both routes are added to the routing table and load-balanced based on the source IP. Example 2: Same distance, different priority config router static edit 1 set gateway 172.16.151.1 set priority 5 set device "port1" next edit 2 set gateway 192.168.2.1 set device "port2" next end # get router info routi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
465
Network Result: Both routes are added to the routing table, but 80% of the sessions to 10.10.30.0/24 are routed to vpn2HQ1, and 20% are routed to vpn2HQ2. Example 4: Load-balancing BGP routes eBGP routes that are advertised to iBGP neighbors by multiple paths may be aggregated if the tie breakers specified in RFC 4271 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
466
Network This section describes the following dual internet connection scenarios: l Scenario 1: Link redundancy and no load-sharing on page 467 l Scenario 2: Load-sharing and no link redundancy on page 469 l Scenario 3: Link redundancy and load-sharing on page 470 Scenario 1: Link redundancy and no load-sharing Link red...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
467
Network set protocol {ping tcp-echo udp-echo http twamp} set gateway-ip <gateway-IP-address> set interval <seconds> set failtime <retry-attempts> set recoverytime <number-of-successful-responses> set status enable next end Option Description set update-cascade-interface {enable | disable} This option is used in conjunc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
468
Network To configure the routing of the two interfaces using the CLI: config router {static | static6} edit 1 set dst 0.0.0.0 0.0.0.0 set device wan1 set gateway <gateway_address> set distance 10 next edit 2 set dst 0.0.0.0 0.0.0.0 set device wan2 set gateway <gateway_address> set distance 20 next end Security policies...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
469
Network Policy routes By configuring policy routes, you can redirect specific traffic to the secondary WAN interface. This works in this case because policy routes are checked before static routes. Therefore, even though the static route for the secondary WAN is not in the routing table, traffic can still be routed usi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
470
Network the configured routes have equal distance values, with the route with a higher priority being preferred more. This ensures both routes are active in the routing table, but the route with a higher priority will be the best route. Link health monitor Link monitor must be configured for both the primary and the se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
471
Network Dynamic routing Dynamic routing protocols attempt to build a map of the network topology to identify the best routes to reach different destinations. Instead of manually defining static routes, which is not scalable, dynamic routing typically involves defining neighbors and peer routers that share their network...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
472
Network C    172.31.0.0/30 is directly connected, toKVM-MPLS C    172.31.0.1/32 is directly connected, toKVM-MPLS C    192.168.0.0/24 is directly connected, wan1 O    192.168.2.0/24 [110/101] via 10.10.10.11, internal, 00:00:26 S    192.168.20.0/24 [10/0] via 172.31.0.2, toKVM-MPLS [10/0] via 10.10.10.11, internal RIP ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
473
Network 3. Enable/disable Inject Default Route. 4. Click OK. To enable/disable default route injection in the CLI: config router rip set default-information-originate {enable | disable} end Default metric The default metric setting sets the default metric for all redistributed routes. If the default metric is set to fi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
474
Network is reset. The timeout timer should be at least three times longer than the update timer. If routers are not responding to updates in time, increasing the timeout timer can help. A longer timeout timer results in longer update periods, and the FortiGate could wait a considerable amount of time for all of the tim...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
475
Network To configure a key chain with two sequentially valid keys and use it in a RIP interface: config router key-chain edit rip_key config key edit 1 set accept-lifetime 09:00:00 23 02 2020 09:00:00 17 03 2020 set send-lifetime 09:00:00 23 02 2020 09:00:00 17 03 2020 set key-string ********** next edit 2 set accept-l...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
476
Network config interface edit "port1" set auth-mode md5 set auth-string ********** set receive-version 2 set send-version 2 next end end RIP and IPv6 RIP next generation (RIPng) is an extension of RIPv2 that includes support for IPv6. See Basic RIPng example on page 490 and IPv6 tunneling on page 731 for more informati...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
477
Network Router Interface Interface name IP address Router1 port1 LoSales 10.11.101.101 port2 vd12link0 10.11.201.101 port3 vd13link0 10.11.202.101 Router2 port1 vd23link0 10.12.101.102 port2 vd12link1 10.11.201.102 port3 vd42link1 10.14.201.102 port4 vdr2link1 172.20.120.102 Router3 port1 vd23link1 10.12.101.103 port2 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
478
Network d. Click OK. e. Repeat these steps for port3. 5. Under Advanced Options, enable Inject Default Route. This setting allows the ISP router to share its default 0.0.0.0 routes with other routers in the RIP network. 6. Click Apply. To configure the ISP Router in the CLI: config router rip set default-information-or...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
479
Network Router3 10.12.101.0/255.255.255.0 10.11.202.0/255.255.255.0 10.14.202.0/255.255.255.0 172.20.121.0/255.255.255.0 4. Add the interfaces: a. In the Interfaces table, click Create New. b. Set Interface to port1. c. Leave the remaining settings as their default values. d. Click OK. e. Repeat these steps for port2, ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
480
Network To configure Router3 in the CLI: config router rip config network edit 1 set prefix 10.12.101.0 255.255.255.0 next edit 2 set prefix 10.11.202.0 255.255.255.0 next edit 3 set prefix 10.14.202.0 255.255.255.0 next edit 4 set prefix 172.20.121.0 255.255.255.0 next end config interface edit "port1" set receive-ver...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
481
Network Router4 10.14.101.0/255.255.255.0 10.14.201.0/255.255.255.0 10.14.202.0/255.255.255.0 4. Add the interfaces: a. In the Interfaces table, click Create New. b. Set Interface to port1. c. For port1 only, enable Passive. d. Leave the remaining settings as their default values. e. Click OK. f. Repeat these steps for...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
482
Network edit 2 set prefix 10.14.201.0 255.255.255.0 next edit 3 set prefix 10.14.202.0 255.255.255.0 next end set passive-interface "port1" config interface edit "port1" set receive-version 2 set send-version 2 next edit "port2" set receive-version 2 set send-version 2 next edit "port3" set receive-version 2 set send-v...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
483
Network vd42link1 is up, line protocol is up Routing Protocol: RIP Receive RIPv2 packets only Send RIPv2 packets only Passive interface: Disabled Split horizon: Enabled with Poisoned Reversed IP interface address: 10.14.201.102/24 vd23link0 is up, line protocol is up Routing Protocol: RIP Receive RIPv2 packets only Sen...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
484
Network # execute ping-options source 10.11.201.102 # execute ping 8.8.8.8 PING 8.8.8.8 (8.8.8.8): 56 data bytes 64 bytes from 8.8.8.8: icmp_seq=0 ttl=115 time=4.5 ms 64 bytes from 8.8.8.8: icmp_seq=1 ttl=115 time=4.2 ms 64 bytes from 8.8.8.8: icmp_seq=2 ttl=115 time=4.2 ms 64 bytes from 8.8.8.8: icmp_seq=3 ttl=115 tim...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
485
Network # get router info rip database Codes: R - RIP, Rc - RIP connected, Rs - RIP static, K - Kernel, C - Connected, S - Static, O - OSPF, I - IS-IS, B - BGP Network Next Hop Metric From If Time R 0.0.0.0/0 10.11.202.103 3 10.11.202.103 vd13link0 02:35 Rc 10.11.101.0/24 1 LoSales Rc 10.11.201.0/24 1 vd12link0 Rc 10.1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
486
Network # execute ping 8.8.8.8 PING 8.8.8.8 (8.8.8.8): 56 data bytes 64 bytes from 8.8.8.8: icmp_seq=0 ttl=114 time=4.3 ms 64 bytes from 8.8.8.8: icmp_seq=1 ttl=114 time=4.1 ms --- 8.8.8.8 ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max = 4.1/4.2/4.3 ms # execute tra...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
487
Network R 10.11.202.0/24 [120/2] via 10.14.202.103, vd43link0, 02:45:15 R 10.12.101.0/24 [120/2] via 10.14.202.103, vd43link0, 02:45:15 C 10.14.101.0/24 is directly connected, LoAccounting C 10.14.201.0/24 is directly connected, vd42link0 C 10.14.202.0/24 is directly connected, vd43link0 R 172.20.120.0/24 [120/2] via 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
488
Network C 10.14.202.0/24 is directly connected, vd43link0 R 172.20.120.0/24 [120/2] via 10.14.201.102, vd42link0, 02:58:39 # execute traceroute 8.8.8.8 traceroute to 8.8.8.8 (8.8.8.8), 32 hops max, 3 probe packets per hop, 84 byte packets 1 10.14.201.102 0.167 ms 0.063 ms 0.029 ms 2 172.20.120.5 0.117 ms 0.073 ms 0.041...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
489
Network Basic RIPng example In this example, a small network is configured with RIP next generation (RIPng). Two FortiGates are connected to the internal network and the ISP, providing some redundancy to help ensure that the internal network can always reach the internet. The FortiGates are running in NAT mode with VDO...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
490
Network set alias "ISP" config ipv6 set ip6-address 2002:ac14:7865::/0 end next end 2. Configure RIPng: config router ripng config neighbor edit 1 set ip6 2002:a0b:6566:: set interface port1 next edit 2 set ip6 2002:ac14:7805:: set interface port2 next end config interface edit port1 next edit port2 next end end To con...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
491
Network set ip6 2002:a0b:6565:: set interface port1 next edit 2 set ip6 2002:ac14:7805:: set interface port2 next end config interface edit port1 next edit port2 next end end Testing the configuration The following commands can be used to check the RIPng information on the FortiGates, and can help track down issues: To...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
492
Network Option Description Router ID A unique ID to identify your router in the network, typically in the format x.x.x.x. Areas The areas that the router is part of. For each are area, define the Area ID, Type, and Authentication method. Networks The networks that OSPF is enabled in, and the area that they belong to. I...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
493
Network FortiGate Interface IP address Router1 (DR) port1 10.11.101.1 port2 10.11.102.1 port3 192.168.102.1 Router2 (BDR) port1 10.11.101.2 port2 10.11.103.2 port3 192.168.103.2 Router3 (ASBR) port1 10.11.102.3 port2 10.11.103.3 port3 172.20.120.3 l Firewall policies are already configured to allow unfiltered traffic i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
494
Network Area 0.0.0.0 IP/Netmask 192.168.102.0 255.255.255.0 8. Click OK. 9. In the Interfaces table, click Create New and set the following: Name Router1-Internal-DR Interface port1 Cost 0 Priority 255 Authentication None Timers l Hello Interval: 10 l Dead Interval: 40 10. Click OK. 11. In the Interfaces table, click C...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
495
Network end config network edit 1 set prefix 10.11.0.0 255.255.0.0 next edit 2 set prefix 192.168.102.0 255.255.255.0 next end end Router2 To configure Router2 in the GUI: 1. Go to Network > OSPF. 2. Set Router ID to 10.11.101.2. 3. In the Areas table, click Create New and set the following: Area ID 0.0.0.0 Type Regula...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
496
Network 11. In the Interfaces table, click Create New again and set the following: Name Router2-External Interface port2 Cost 0 Authentication None Timers l Hello Interval: 10 l Dead Interval: 40 12. Click OK. 13. Click Apply. To configure Router2 in the CLI: config router ospf set router-id 10.11.101.1 config area edi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
497
Network 4. Enable Redistribute BGP and use the default settings. 5. In the Areas table, click Create New and set the following: Area ID 0.0.0.0 Type Regular Authentication None 6. Click OK. 7. In the Networks table, click Create New and set the following: Area 0.0.0.0 IP/Netmask 10.11.0.0 255.255.0.0 8. Click OK. 9. In...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
498
Network edit "Router3-Internal" set interface "port1" set dead-interval 40 set hello-interval 10 next edit "Router3-Internal2" set interface "port2" set dead-interval 40 set hello-interval 10 next end config network edit 1 set prefix 10.11.0.0 255.255.0.0 next end config redistribute "bgp" set status enable end end To ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
499
Network Router3 # get router info ospf status Routing Process "ospf 0" with ID 10.11.103.3 Process uptime is 18 hours 52 minutes Process bound to VRF default Conforms to RFC2328, and RFC1583Compatibility flag is disabled Supports only single TOS(TOS0) routes Supports opaque LSA Do not support Restarting This router is ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
500
Network Process uptime is 2 hours 53 minutes Process bound to VRF default Conforms to RFC2328, and RFC1583Compatibility flag is disabled Supports only single TOS(TOS0) routes Supports opaque LSA Do not support Restarting SPF schedule delay 5 secs, Hold time between two SPFs 10 secs Refresh timer 10 secs Number of incom...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
501
Network Conforms to RFC2328, and RFC1583Compatibility flag is disabled Supports only single TOS(TOS0) routes Supports opaque LSA Do not support Restarting SPF schedule delay 5 secs, Hold time between two SPFs 10 secs Refresh timer 10 secs Number of incomming current DD exchange neighbors 0/5 Number of outgoing current ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
502
Network C 10.11.103.0/24 is directly connected, port2 C 172.20.120.0/24 is directly connected, port3 O 192.168.102.0/24 [110/3] via 10.11.103.2, port2, 00:00:09 O 192.168.103.0/24 [110/2] via 10.11.103.2, port2, 02:33:45 B 192.168.160.0/24 [20/0] via 172.20.120.5, port3, 19:27:52 B 192.168.170.0/24 [20/0] via 172.20.12...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
503
Network set ipsec-auth-alg {md5 | sha1 | sha256 | sha384 | sha512} set ipsec-enc-alg {null | des | 3des | aes128 | aes192 | aes256} config ipsec-keys edit <spi> set auth-key <string> set enc-key <string> next end next end end To configure an OSPF6 virtual link: config router ospf6 config area edit <id> config virtual-l...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
504
Network CLI command descriptions Command Description <id> Area entry IP address. authentication {none | ah | esp | area} Authentication mode: l none: Disable authentication l ah: Authentication Header l esp: Encapsulating Security Payload l area: Use the routing area authentication configuration key-rollover-interval <...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
505
Network OSPFv3 graceful restart mode upon a topology change can be used in OSPF6: config router ospf6 set restart-on-topology-change {enable | disable} end Example In this example, a restarting router (one of the FG-300Es in the HA cluster) informs its neighbors using grace LSAs before restarting its OSPF process. When...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
506
Network set restart-mode graceful-restart config area edit 0.0.0.0 next end config network edit 1 set prefix 172.16.200.0 255.255.255.0 next edit 2 set prefix 3.3.3.3 255.255.255.255 next end end Testing the configuration Topology change with continuing graceful restart enabled: When restart-on-topology-change is enabl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
507
Network Neighbor ID Pri State Dead Time Address Interface 31.1.1.1 1 Full/DR 00:00:38 172.16.200.31 port1 # get router info routing-table ospf Routing table for VRF=0 O 21.21.21.21/32 [110/300] via 172.16.200.31, port1, 00:10:37 O 31.1.1.1/32 [110/200] via 172.16.200.31, port1, 00:56:13 O 100.21.1.0/24 [110/200] via 17...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
508
Network # get router info routing-table ospf Routing table for VRF=0 O 21.21.21.21/32 [110/300] via 172.16.200.31, port1, 00:04:42 O 31.1.1.1/32 [110/200] via 172.16.200.31, port1, 01:01:59 O 100.21.1.0/24 [110/200] via 172.16.200.31, port1, 00:04:42 OSPF link detection customization OSPF route detection and interface-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
509
Network Option Description Neighbor Groups The neighbor groups that share the same outbound policy configurations. Neighbor Ranges The source address range of BGP neighbors that will be automatically assigned to a neighbor group. Networks The IPv4 networks to be advertised to other BGP routers. Choose from: l IP/Netmas...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
510
Network FGT_A learns routes from ISP2 and redistributes them to FGT_B while preventing any iBGP routes from being advertised. The internal networks behind the FortiGates can communicate with each other, and the internal networks behind FGT_B can traverse FGT_A to reach networks that are advertised by ISP2. l FGT_A and ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
511
Network config neighbor edit "10.100.201.88" set remote-as 64511 set update-source "toFGTB" next end config network edit 1 set prefix 192.168.86.0 255.255.255.0 next end end To configure FGT_B to establish iBGP peering with FGT_A in the GUI: 1. Go to Network > BGP. 2. Set Local AS to 64511 3. Set Router ID to 2.2.2.2. ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
512
Network 2. Check the networks learned from neighbors: # get router info bgp network 3. Check that the routes are added to the routing table: # get router info routing-table all To see the neighborship status, network, and routing table command outputs for the completed example, see Troubleshooting and debugging on page...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
513
Network To configure FGT_A to establish eBGP peering with ISP 2 in the CLI: 1. Configure a route map to prevent advertisement of iBGP routes to ISP 2: config router route-map edit "exclude1" config rule edit 1 set action deny set match-origin igp next end next end 2. Update the BGP configuration: config router bgp conf...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
514
Network To verify that pinging from FGT_B to a subnet in ISP 2 is successful: FGT_B # execute ping-options source 192.168.88.88 FGT_B # execute ping 172.16.201.87 PING 172.16.201.87 (172.16.201.87): 56 data bytes 64 bytes from 172.16.201.87: icmp_seq=0 ttl=254 time=0.6 ms ... --- 172.16.201.87 ping statistics --- 5 pac...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
515
Network Address family IPv4 Unicast: advertised and received Address family IPv6 Unicast: advertised and received Received 513 messages, 1 notifications, 0 in queue Sent 517 messages, 2 notifications, 0 in queue Route refresh request: received 0, sent 0 Minimum time between advertisement runs is 30 seconds For address ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
516
Network 0 announced prefixes Connections established 7; dropped 6 Local host: 10.100.201.86, Local port: 179 Foreign host: 10.100.201.88, Foreign port: 6245 Nexthop: 10.100.201.86 Nexthop interface: toFGTB Nexthop global: :: Nexthop local: :: BGP connection: non shared network Last Reset: 01:54:12, due to BGP Notificat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
517
Network To verify the networks learned from neighbors or a specific network: FGT_A # get router info bgp network VRF 0 BGP table version is 5, local router ID is 1.1.1.1 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, S Stale Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Ho...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
518
Network i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default Routing table for VRF=0 S* 0.0.0.0/0 [10/0] via 172.16.151.1, port1, [5/0] [10/0] via 192.168.2.1, port2, [10/0] C 10.10.101.0/24 is directly connected, wan1 C 10.10.102.0/24 is directly connected, wan2 S 10.10.103.0/...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
519
Network l A company has its own web and email servers in an OSPF area, and needs to advertise routes to these resources to external peers. Users, routers, and other server all reside in the OSPF area. l The FortiGate acts as the BGP border router, redistributing routes from the company's network to its BGP peers. It is...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
520
Network f. Click OK. g. Click OK. 2. Configure BGP: a. Go to Network > BGP. b. Set Local AS to 65001 c. Set Router ID to 10.11.201.110. d. In the Neighbors table, click Create New and set the following: IP 172.21.111.5 Remote AS 65001 e. Click OK. f. In the Neighbors table, click Create New again and set the following:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
521
Network set remote-as 65001 next end config redistribute "ospf" set status enable end end Configuring OSPF In this example, all of the traffic is within the one OSPF area, and there are other OSPF routers in the network. When adjacencies are formed, other routers receive the routes advertised from the FortiGate that ar...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
522
Network next end config network edit 1 set prefix 10.11.201.0 255.255.255.0 next end config redistribute "bgp" set status enable set metric 1 end end Testing the configuration To test this configuration, run the standard connectivity checks, and also make sure that routes are being passed between protocols as expected....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
523
Network Example To see the change in the routing table when the option is enabled: 1. Check the BGP routing table: # get router info routing-table bgp Routing table for VRF=0 B 10.100.1.4/30 [200/0] via 10.100.1.14 (recursive is directly connected, R560), 00:02:06 2. Enable BGP routes for recursive resolution of next h...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
524
Network In this example, there are two static routes. The FortiGate has learned two BGP routes from Router 1 that have the same next hop at 10.100.100.1. The next hop is resolved by the two static routes. To verify that the routes are added to the BGP routing table: 1. Check the two static routes: # get router info rou...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
525
Network config ipv6 set ip6-mode dhcp set ip6-allowaccess ping end next end 2. Configure FGT_B (RA): config system interface edit "agg2" set vdom "root" set ip 172.16.203.2 255.255.255.0 set allowaccess ping https http set bfd disable set type aggregate set member "port4" set alias "To_FGT_A_agg1" set lldp-transmission...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
526
Network i - IS-IS, B - BGP, V - BGP VPNv6 > - selected route, * - FIB route, p - stale info Timers: Uptime Routing table for VRF=0 K * ::/0 via fe80::96f3:92ff:fe15:f7b, agg1, 00:00:20 C *> ::1/128 via ::, root, 00:03:33 O 2000::1:1:1:1/128 [110/0] via ::, loopback1 inactive, 00:03:32, [1024/0] C *> 2000::1:1:1:1/128 v...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
527
Network FGT_A (root)# config router setting set kernel-route-distance 254 end 5. Now there is a kernel route: FGT_A (root)# get router info6 routing-table kernel Routing table for VRF=0 K* ::/0 [254/1024] via fe80::96f3:92ff:fe15:f7b, agg1, 00:01:04 ... BGP conditional advertisement BGP conditional advertisement allows...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
528
Network next end next end 2. Configure the IPv4 route maps: config router route-map edit "2814" config rule edit 1 set match-ip-address "281" next end next edit "2224" config rule edit 1 set match-ip-address "222" next end next edit "2824" config rule edit 1 set match-ip-address "282" next end next end 3. Configure the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
529
Network unset le next end next end 4. Configure the IPv6 route maps: config router route-map edit "map-2226" config rule edit 1 set match-ip6-address "adv-2226" next end next edit "map-2816" config rule edit 1 set match-ip6-address "list6-1" next end next edit "map-2826" config rule edit 1 set match-ip6-address "list6-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
530
Network To verify the IPv4 conditional advertisements: # get router info bgp neighbors 2.2.2.2 ... Conditional advertise-map: Adv-map 2224root 2814root, cond-state 0-1  2824root, cond-state 0-1 ... In this output, the condition is that the routes in route maps 2814 and 2824 do not exist. However, routes for 2814 and 22...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
531
Network l The BGP conditional advertisement condition is set to be true if the condition route map (2003:172:28:1::/64) is not matched (non-exist). To configure BGP conditional advertisement with IPv6: 1. Configure the IPv6 prefix lists: config router prefix-list6 edit "adv-222" config rule edit 1 set prefix6 2003:172:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
532
Network set soft-reconfiguration6 enable set remote-as 65412 set update-source "loopback1" config conditional-advertise6 edit "map-221" set condition-routemap "map-281" set condition-type non-exist next end next edit "2003::3:3:3:3" set soft-reconfiguration6 enable set remote-as 65412 set update-source "loopback1" next...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
533
Network 2. Verify the routing table: # get router info6 routing-table bgp B 2003:172:28:1::/64 [200/0] via 2003::3:3:3:3 (recursive via ****::***:***:****:****, port9), 01:23:45 B 2003:172:28:2::/64 [200/0] via 2003::3:3:3:3 (recursive via ****::***:***:****:****, port9), 23:09:22 When the FortiGate learns 2003:172:28:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
534
Network This example assumes a pure NAT64 design with the following expectations: l IPv4 IP pools would be announced to Internet gateway when IPv6 client subnets learned from IPv6 route. l IPv6 virtual IP addresses (VIPs) (default = 64:ff9b::/96) would be announced to Router 1 when IPv4 default route learned from Inter...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
535
Network The prefixes defined in IPv4 route map 2814 and IPv6 route map map-281 both exist, so the FortiGate advertises the route map prefix in route-map 2224 (172.22.2.0/255.255.255.0) to its BGP neighbor 2.2.2.2. For IPv6 neighbor 2003::2:2:2:2, the prefixes defined in IPv4 route map 2874 and IPv6 route map map-38 bot...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
536
Network next end 2. Configure the IPv6 prefix list: config router prefix-list6 edit "list6-1" config rule edit 1 set prefix6 2003:172:28:1::/64 unset ge unset le next end next end 3. Configure the route maps: config router route-map edit "2814" config rule edit 1 set match-ip-address "281" next end next edit "map-281" ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
537
Network next end 2. Configure the IPv6 prefix lists: config router prefix-list6 edit "list6-38" config rule edit 1 set prefix6 2003:172:38:1::/64 unset ge unset le next end next edit "adv-222" config rule edit 1 set prefix6 2003:172:22:1::/64 unset ge unset le next end next end 3. Configure the route maps: config route...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
538
Network set network-import-check disable set cluster-id 1.1.1.1 set graceful-restart enable set cross-family-conditional-adv enable config neighbor edit "3.3.3.3" set activate6 disable set capability-graceful-restart enable set soft-reconfiguration enable set prefix-list-out "local-out" set remote-as 65412 set route-ma...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
539
Network set remote-as 65412 set route-map-in6 "community-del777" set keep-alive-timer 30 set holdtime-timer 90 set update-source "loopback1" next end config network edit 1 set prefix 172.27.1.0 255.255.255.0 next edit 2 set prefix 172.27.2.0 255.255.255.0 next edit 3 set prefix 172.22.2.0 255.255.255.0 next end config ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
540
Network 10.100.1.1 4 20 100 108 3 0 0 00:43:51 0 10.100.1.5 4 20 53 57 3 0 0 00:43:50 0 2003::2:2:2:2 4 65412 98 118 3 0 0 00:42:25 1 2003::3:3:3:3 4 65412 102 100 2 0 0 00:42:20 3 Total number of neighbors 5 Condition route map: map-38, state 0, use 3 2874, state 0, use 3 To verify the BGP routing table for IPv4 and c...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
541
Network edit "2.2.2.2" config conditional-advertise edit "222v4" set condition-routemap "4-281" "6-281" set condition-type exist next end next end end The FortiGate will only check the IPv4 RIB table to see if there is a matching IP address for each route map. Any IPv6 address under the route map will not get checked i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
542
Network BGP attribute Handling AS 4 path Handled by the attribute discard approach. aggregator Handled by the attribute discard approach. aggregator 4 Handled by the attribute discard approach. next-hop Handled by the treat-as-withdraw approach. multiple exit discriminator Handled by the treat-as-withdraw approach. loc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
543
Network l The loopbacks are exchanged with IKE between the spokes and hubs. They are installed as static routes that are used to provide reachability for establishing BGP neighbors. l The summary BGP routes from the loopback IP address ranges that originated on the hubs are advertised to the spokes for resolving the BG...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
544
Network 172.31.0.0/25 is the loopback IP summary originated by both Hub_1 and Hub_2. The next hop of the PC_4 LAN route is resolved to Hub_1 (H1_T11, H1_T22) and Hub_2 (H2_T11, H2_T22) based on the loopback IP summary route. 2. When connections between Spoke_2 and Hub_1 fails due to the BGP neighbor, tunnels, or physic...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
545
Network Routing entry for 10.0.4.0/24 Known via "bgp", distance 200, metric 0, best Last update 00:01:11 ago * 172.31.0.66, tag 2 (recursive via H2_T11 tunnel 172.31.1.101), tag-match (recursive via H2_T22 tunnel 10.0.0.4), tag-match 5. If traffic is again sent from PC_3 to PC_4, it will go through Hub_2 and reach the ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
546
Network 10.0.0.40), 00:09:22 B 172.31.0.0/25 [200/0] via 172.31.0.1 (recursive via H1_T11 tunnel 172.31.1.1), 03:40:12 (recursive via H1_T22 tunnel 10.0.0.2), 03:40:12 [200/0] via 172.31.0.2 (recursive via H2_T11 tunnel 172.31.1.101), 03:40:12 (recursive via H2_T22 tunnel 10.0.0.4), 03:40:12 S 172.31.0.1/32 [15/0] via ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
547
Network Spoke_1 (root) # get router info routing-table all C 10.0.3.0/24 is directly connected, port4 B 10.0.4.0/24 [200/0] via 172.31.0.66 tag 1 (recursive via H1_T11_0 tunnel 10.0.0.40), 00:18:50 (recursive via H1_T22_0 tunnel 10.0.0.41), 00:18:50 [200/0] via 172.31.0.66 tag 2 (recursive via H1_T11_0 tunnel 10.0.0.40...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
548
Network Service(2): Address Mode(IPV4) flags=0x200 use-shortcut-sla Gen(10), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(sla), sla-compare-order Members(2): 1: Seq_num(6 H2_T11), alive, sla(0x1), gid(0), cfg_order(0), cost(0), selected 2: Seq_num(9 H2_T22), alive, sla(0x1), gid(0), cfg_order(3), cost(0), selected Src add...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
549
Network next end end 2. Configure the R4 router settings: config router bgp config neighbor edit "172.16.201.1" set soft-reconfiguration enable set remote-as 65518 set password ******** next end end Defining a preferred source IP for local-out egress interfaces on BGP routes The preferred source IP can be configured on...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
550
Network set cluster-id 1.1.1.1 set graceful-restart enable config aggregate-address edit 1 set prefix 172.28.0.0 255.255.0.0 set as-set enable set summary-only enable next end config neighbor edit "3.3.3.3" set capability-graceful-restart enable set soft-reconfiguration enable set prefix-list-out "local-out" set remote...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
551
Network by an aggregate.) Not advertised to any peer Original VRF 0 65050, (Received from a RR-client) 3.3.3.3 (metric 11000) from 3.3.3.3 (3.3.3.3) Origin IGP metric 0, localpref 100, valid, internal, best, prefsrc 1.1.1.2 Last update: Wed Jan 25 15:15:48 2023 3. Verify the kernel routing table for 172.28.5.0/24: # ge...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
552
Network Multi-Exit Discriminator (MED) is a BGP path attribute that discriminates among multiple exit or entry points to the same neighboring AS. MED is also known as Optional Non-Transitive path attribute. The lower the MED value, the more preferred the path is to the receiving router. MED is typically utilized when a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
553
Network To configure MED in a dual-homed AS network using the CLI: 1. Configure eBGP peering on FortiGate-A by specifying the BGP neighbors: config router bgp set as 200 set router-id 2.2.2.2 config neighbor edit "13.1.1.1" set remote-as 300 next edit "23.1.1.2" set remote-as 300 next end end 2. Configure eBGP on ISP1 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
554
Network b. Configure ISP2: config router prefix-list edit "ISP2_Prefix_List" config rule edit 1 set prefix 11.11.11.0 255.255.255.0 next end next end 5. Configure route maps and configure the MED value: a. Configure ISP1: config router route-map edit "MED_Route_MAP" config rule edit 1 set match-ip-address "ISP1_Prefix_...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf