index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
555 | Network
b. Configure the ISP2 BGP:
config router bgp
set as 300
set router-id 4.4.4.4
config neighbor
edit "23.1.1.3"
set remote-as 200
set route-map-out "MED_Route_MAP_2"
next
end
end
7. Verify that ISP1 is selected as the best path to reach the 11.11.11.0/24 network:
The neighbor that is considered the best, valid ro... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
556 | Network
reliability of BGP connections and contributes to the overall security of the internet.
To set the algorithm to AES-128 CMAC:
config router key-chain
edit <name>
config key
edit <id>
set algorithm cmac-aes128
next
end
next
end
To select the key-chain with the TCP-AO in a neighbor or neighbor group:
config route... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
557 | Network
edit "2.2.2.2"
set auth-options "11"
next
end
end
3. Verify that the router BGP is using the algorithm.
The command output shows that BGP neighbor 2.2.2.2 is using the AES-128 CMAC algorithm.
# diagnose sys tcp-auth-options
VFID=0 send-id=1 recv-id=1 flags=0x784 keylen=6
alg=2(aes128) addr=2.2.2.2
send-begin: ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
558 | Network
To assign multiple remote AS to a single BGP neighbor group in the local hub:
1. Configure the AS path list:
config router aspath-list
edit "aslist1"
config rule
edit 1
set action permit
set regexp "^6550[1-6]$"
next
end
next
end
2. Configure the BGP neighbor group of the hub to point to the AS path list:
confi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
559 | Network
set allow-routing {enable | disable}
next
end
config firewall addrgrp
edit <group>
set allow-routing {enable | disable}
next
end
config router bgp
config network
edit <id>
set prefix-name <address or group>
next
end
end
allow-routing {enable | disable} Enable/disable use of this address/group in routing configu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
560 | Network
config router bgp
...
config network
edit 2
set prefix-name "333"
next
edit 20
set network-import-check disable
set prefix-name "group1"
next
edit 66
set prefix-name "vlan55 address"
next
end
...
end
Troubleshooting BGP
There are some features in BGP that are used to deal with problems that may arise. Typically... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
561 | Network
The first method of dealing with route flap is to check your hardware. If a cable is loose or bad, it can easily be replaced
and eliminate the problem. If an interface on the router is bad, either avoid using that interface or swap in a functioning
router. If the power source is bad on a router, either replace ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
562 | Network
end
end
Dampening
Dampening is a method that's used to limit the amount of network problems due to flapping routes. With dampening, the
flapping still occurs but the peer routers pay less and less attention to that route as it flaps more often. One flap doesn't
start dampening, but the second flap starts a time... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
563 | Network
offline. This way, its neighboring routers don't remove it from their routing tables. However, if that router isn't back online
when expected, the routers will mark it offline. This prevents routing flap and its associated problems.
FortiGate devices support both graceful restart of their own BGP routing softwa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
564 | Network
For more information about BFD, see BFD on page 565.
BGP path selection process
Sometimes the FortiGate may receive multiple BGP paths from neighbors and must decide which is the best path to
take. The following criteria are used to determine the best path.
Consider only routes with no AS loops and a valid next... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
565 | Network
To configure BFD for an interface:
config system interface
edit <interface-name>
set bfd {global | enable | disable}
set bfd-desired-min-tx <ms>
set bfd-required-min-rx <ms>
set bfd-detect-mult <multiplier>
next
end
To configure BFD neighbors:
config router {bfd | bfd6}
config neighbor
edit <IP-address>
set int... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
566 | Network
Example
The following example demonstrates the configuration of static routes between two FortiGates. There is a host behind
FortiGate 2 with an IP address of 1.1.1.1. FortiGate 1 has multiple paths to reach the host.
To configure static routes:
1. Configure FortiGate 1:
config system interface
edit "port1"
set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
567 | Network
set device "port1"
set bfd enable
next
edit 3
set dst 1.1.1.1 255.255.255.255
set gateway 10.180.2.44
set distance 20
set device "port1"
next
end
4. Confirm that BFD neighborship is established:
# get router info bfd neighbor
OurAddress NeighAddress State Interface LDesc/RDesc
10.180.6.237 10.180.4.136 UP port1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
568 | Network
To enable BFD on a specific OSPF interface:
config router {ospf | ospf6}
set bfd enable
config {ospf-interface | ospf6-interface}
edit <ID>
set bfd {global | enable | disable}
set area-id <IP address>
next
end
end
If BFD is configured when OSPF is not, no BFD packets will be sent. When both BFD and OSFP are con... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
569 | Network
set auth-mode {none | md5}
set md5-key <password>
next
end
end
Troubleshooting BFD
You can troubleshoot BFD using the following commands:
# get router {info | info6} bfd neighbor
# get router {info | info6} bfd requests
# diagnose sniffer packet any <filter> <sniffer count>
# diagnose debug application bfdd <de... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
570 | Network
Example
This example includes IPv4 and IPv6 BFD neighbor configurations. The BFD neighbor is also a BGP neighbor that is in a
different AS.
To configure BFD with multihop BGP paths:
1. Enable BFD on all interfaces:
config system settings
set bfd enable
end
2. Enable BFD on port1 and ignore the global configurat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
571 | Network
end
end
5. Configure the IPv6 BFD:
config router bfd6
config multihop-template
edit 1
set src 2000:172:16:200::/64
set dst 2000:172:16:201::/64
next
end
end
Testing the connection
1. Verify the BFD status for IPv4 and IPv6:
# get router info bfd requests
BFD Peer Requests:
client types(ct in 0x): 01=external 02... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
572 | Network
B 172.28.2.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1),
00:54:32
B 172.28.5.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1),
00:54:32
B 172.28.6.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1),
00:54:32
# get router info6 bgp summary
VRF 0 BGP router identi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
573 | Network
2000:172:16:201::2 4 65050 165 167 9 0 0 00:00:12 3
Total number of neighbors 2
5. The BGP routes are learned again, and there are new timers in the route tables:
# get router info routing-table bgp
Routing table for VRF=0
B 172.28.1.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1),
00:00:15
B 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
574 | Network
the configuration. Despite this placement, FortiOS will process the rules in the ascending order of Rule ID number: 10,
15, 20, 30, then 40.
To enhance readability and maintain an organized configuration, it is recommended to arrange the rules sequentially by
their IDs. This can be achieved by deleting and re-a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
575 | Network
To use a route map with OSPF:
config router ospf
set default-information-route-map <string>
set distribute-route-map-in <string>
config redistribute <string>
set routemap <string>
end
end
default-informationroute-map <string>
Enter the default information route map.
distribute-route-map-in
<string>
Enter the r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
576 | Network
route-map-out6 <string> Enter the IPv6 outbound route map filter.
route-map-out6-preferable
<string>
Enter the IPv6 outbound route map filter if the peer is preferred.
route-map-out-vpnv4
<string>
Enter the VPNv4 outbound route map filter.
route-map-out-vpnv4-
preferable <string>
Enter the VPNv4 outbound route ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
577 | Network
To configure an IPv6 access list:
config router access-list6
edit <name>
config rule
edit <id>
set action {permit | deny}
set prefix <IPv6_address>
set exact-match {enable | disable}
next
end
next
end
In RIP, an access list can be used in the distribute-list setting to filter received or advertised routes, or i... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
578 | Network
distribute-list-in
<string>
Enter the filter for incoming routes.
access-list <string> Enter the access list name.
In BGP, an access list can be used to filter updates from a neighbor or to a neighbor.
To use an access list in BGP:
config router bgp
config neighbor
edit <ip>
set distribute-list-in <string>
set ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
579 | Network
match-ip-address <string> Match an IPv4 address permitted by access-list or prefix-list.
match-ip6-address
<string>
Match an IPv6 address permitted by access-list6 or prefix-list6.
match-ip-nexthop <string> Match a next hop IPv4 address passed by access-list or prefix-list.
match-ip6-nexthop
<string>
Match a ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
580 | Network
next
end
end
listname <string> Enter the distribute access or prefix list name.
In OSPF, a prefix list can be used in the distribute-list-in setting to act as a filter to prevent a certain route from
being inserted into the routing table.
To use a prefix list in OSPF:
config router ospf
set distribute-list-in <... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
581 | Network
edit <id>
set match-ip-address <string>
set match-ip6-address <string>
set match-ip-nexthop <string>
set match-ip6-nexthop <string>
next
end
next
end
match-ip-address <string> Match an IPv4 address permitted by access-list or prefix-list.
match-ip6-address
<string>
Match an IPv6 address permitted by access-list... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
582 | Network
filter-list-in6 <string> Enter the BGP filter for IPv6 inbound routes.
filter-list-out <string> Enter the BGP filter for IPv4 outbound routes.
filter-list-out6 <string> Enter the BGP filter for IPv6 outbound routes.
To use an AS path list in a route map:
config router route-map
edit <name>
config rule
edit <id>... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
583 | Network
In an SD-WAN deployment, a remote BGP router or spoke may communicate a preferred
interface or path to route traffic using a community string. See Using BGP tags with SD-WAN
rules on page 1046 and Controlling traffic with BGP route mapping and service rules on page
1051 for examples.
Multicast
The following top... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
584 | Network
When PIM is enabled, the FortiGate allocates memory to manage mapping information. The FortiGate communicates
with neighboring PIM routers to acquire mapping information and, if required, processes the multicast traffic associated
with specific multicast groups.
Instead of sending multiple copies of generated I... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
585 | Network
NPU offloading of VRF multicast traffic on a dynamic IPsec tunnel is not supported.
Example
This example uses the following topology:
In this example, the multicast server:
l Sends out multicast traffic 225.1.1.1 from 22.1.1.22 in VRF1.
l Sends out multicast traffic 225.1.1.2 from 22.1.1.55 in VRF2.
To verify V... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
586 | Network
Configuring multicast forwarding
There is sometimes confusion between the terms forwarding and routing. These two functions should not take place at
the same time. Multicast forwarding should be enabled when the FortiGate is in NAT mode and you want to forward
multicast packets between multicast routers and rec... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
587 | Network
avoid any issues during transmission, you can disable multicast-skip-policy and configure multicast security
policies.
To disable multicast traffic from passing through the FortiGate without a policy check in transparent
mode:
config system settings
set multicast-skip-policy disable
end
Configuring multicast po... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
588 | Network
Name basic
Incoming Interface any
Outgoing Interface any
Source Address all
Destination Address all
3. Click OK.
Sample policy with specific source and destination interfaces
This multicast policy only applies to the source port wan1 and the destination port internal.
To configure the multicast policy in the CL... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
589 | Network
Name SrcDst
Incoming Interface wan1
Outgoing Interface internal
Source Address all
Destination Address all
3. Click OK.
Sample policy with specific source address object
In this policy, packets are allowed to flow from wan1 to internal, and sourced by the address 172.20.120.129, which is
represented by the exam... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
590 | Network
Name SrcAdd
Incoming Interface wan1
Outgoing Interface internal
Source Address example_addr-1
Destination Address all
3. Click OK.
Sample detailed policy
This policy accepts multicast packets that are sent from a PC with IP address 192.168.5.18 to destination address range
239.168.4.0-255. The policy allows the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
591 | Network
To configure multicast policies in the GUI, enable Multicast Policy in System > Feature
Visibility.
Using multi-VDOM mode
When using multi-VDOM mode, it is important to avoid causing a multicast network loop by creating an all-to-all multicast
policy. By default, on models that support NPU virtual links, changi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
592 | Network
next
end
IPv4 and IPv6 multicast policies can be configured in the GUI. Go to System > Feature
Visibility, and enable Multicast Policy and IPv6.
The multicast policy dialog page (Policy & Objects > Multicast Policy) includes a Security Profiles section where you can
enable IPS and apply an IPS profile.
Example
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
593 | Network
next
end
2. Configure the IPS sensor:
config ips sensor
edit "test-meicar-1"
config entries
edit 1
set rule 9999
set status enable
set action block
next
end
next
end
3. Configure the multicast policy:
config firewall multicast-policy
edit 1
set srcintf "port38"
set dstintf "port37"
set srcaddr "all"
set dstaddr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
594 | Network
a. Verify the IPS event log:
# execute log filter category 4
# execute log display
1 logs found.
1 logs returned.
1: date=2023-11-01 time=17:01:43 eventtime=1698883303178500916 tz="-0700"
logid="0419016384" type="utm" subtype="ips" eventtype="signature" level="alert"
vd="vd1" severity="medium" srcip=10.1.100.11... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
595 | Network
Value Description
disable Do not add denied multicast sessions to the session table (default).
enable Include denied multicast sessions in the session table.
Example
In this example, denied multicast sessions are included in the session table of the VDOM. A deny multicast policy is
created and a packet is then ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
596 | Network
FortiExtender
Two configuration modes are available on FortiGate for FortiExtender integration: WAN extension mode and LAN
extension mode.
For information about configuring FortiExtender, see the FortiExtender Admin Guide (FGTManaged) and Admin Guide (Standalone).
WAN extension mode
In WAN extension mode, the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
597 | Network
FortiGate Models WAN LAN
FortiGate 40F series and its variants, FortiGate VM01 2 0
FortiGate 60F, 70F, 80F series and their variants, FortiGate VM02 2 16
FortiGate 100E to 200F series and their variants 2 16
FortiGate 400F to 900G series and their variants, FortiGate VM04 2 32
FortiGate 1000D to 2600F series an... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
598 | Network
7. Click OK.
8. In the extenders list, right-click on the FortiExtender and select Diagnostics and Tools to review the modem and SIM
status, and other details about the FortiExtender.
To create a virtual FortiExtender interface in the CLI:
config system interface
edit "fext"
set vdom "root"
set mode dhcp
set al... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
599 | Network
LTE modems
The following topics include information about configuring and using LTE modems:
l Automatic LTE connection establishment on page 600
l Direct IP support for LTE/4G on page 600
l Cellular interface support for IPv6 on page 603
l Active SIM card switching on page 606
l Airplane mode and LTE/BLE on pag... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
600 | Network
config system lte-modem
set status enable
end
2. Check that the LTE interface was created:
config system interface
edit "wwan"
set vdom "root"
set mode dhcp
set status down
set distance 1
set type physical
set snmp-index 23
next
end
Shortly after the LTE modem joins its carrier network, wwan is enabled and gran... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
601 | Network
Sample LTE interface
When an LTE modem is enabled, you can view the LTE interface in the GUI and check the acquired IP, DNS, and
gateway.
To view the LTE interface in the GUI:
1. Go to Network > Interfaces.
2. Double-click the LTE interface (wwan) to view the properties.
3. Look in the Address section to see th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
602 | Network
Sample FortiGate 30E-3G4G default configuration:
config system lte-modem
set status enable
set extra-init ''
set manual-handover disable
set force-wireless-profile 0
set authtype none
set apn ''
set modem-port 255
set network-type auto
set auto-connect disable
set gpsd-enabled disable
set data-usage-tracking di... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
603 | Network
2. List all profiles.
In the following example, PDP_Type is set to 3 to indicate support for both IPv4 and IPv6.
# execute lte-modem wireless-profile list
ID Type Name APN PDP_Type Authen Username
1 0 ota.bell.ca 3 0
2 0 Bell ota.bell.ca 3 0
Profile Type:
0 ==> QMI_WDS_PROFILE_TYPE_3GPP
Profile P... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
604 | Network
IPv6 GW prefix len: 64
IPv6 PRI DNS: 2605:b100:880:9::1
IPv6 SEC DNS: 2605:b100:680:9::1
MTU: 1500
Link protocol: QMI_WDA_LINK_LAYER_PROTOCOL_RAW_IP
Auto connect: QMI_WDS_AUTOCONNECT_DISABLED
Network type: Unknown WDS Bearer Tech
Network type(last): Unknown WDS Bearer Tech
5. Verify IPv4.
In the following... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
605 | Network
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, B - BGP, V - BGP VPNv6
> - selected route, * - FIB route, p - stale info
Timers: Uptime
Routing table for VRF=0
S *> ::/0 [10/0] via 2605:b100:93b:cf64:60c8:e41d:be4b:eaf5, wwan, 00:09:20, [1024/0]
C *> ::1/128 via ::, root, 00:24:50
C *> 260... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
606 | Network
saturday}
set billing-hour <integer>
set overage {enable | disable}
set iccid <string>
set delay-switch-time <time>
next
end
end
data-usage-tracking
{enable | disable}
Enable tracking of data usage for the LTE modem:
l enable: track data usage.
l disable: do not track data usage.
Must be enabled to configure SI... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
607 | Network
data-limit-alert
<integer>
Specify at what percentage of used data-limit to trigger a log entry (1 - 99).
billing-period {month |
week | day}
Specify the billing period.
billing-date <integer> When billing-period is set to monthly, specify what day of the month the
bill is issued (1 - 31).
billing-weekday {sund... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
608 | Network
7: date=2023-05-02 time=10:41:05 eventtime=1683049264795418820 tz="-0700"
logid="0100046518" type="event" subtype="system" level="information" vd="root"
logdesc="LTE modem active SIM card switch event" msg="LTE modem active SIM card slot
changed to 2 by user."
Example 2
In this example, automatic SIM card switc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
609 | Network
With this configuration, the second SIM card becomes active when the modem cannot establish a connection with
the carrier through the active SIM card. For example, a FortiGate is in a room with poor signal quality. With this
configuration, the SIM card switch is triggered after the modem is detected as disconne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
610 | Network
Service-detect: disable
Diffservcode: 000000
Class-ID: 0
Peer: 8.8.8.8(8.8.8.8)
Source IP(10.192.195.164)
Route: 10.192.195.164->8.8.8.8/32, gwy(10.192.195.165)
protocol: ping, state: dead
Packet lost: 11.667%
MOS: 4.353
Number of out-of-sequence packets: 0
Recovery times(5/8) Fail Times(1/3)
Packet sent: 60, r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
611 | Network
config system lte-modem
config data-plan
edit "1"
set target-sim-slot SIM-slot-1
set data-limit 50
set billing-period monthly
set overage disable
set billing-date 10
next
edit "2"
set target-sim-slot SIM-slot-2
set data-limit 60
set billing-period monthly
set overage disable
set billing-date 1
next
end
end
When... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
612 | Network
Country: Canada
Network: Fido
SIM PIN status: Verified
Airplane mode and LTE/BLE
Airplane mode is supported on FGR-70F-3G4G models to enable/disable radio frequency signals for the internal LTE
modem and Bluetooth Low Energy (BLE) module:
config system global
set airplane-mode {disable | enable}
end
By default ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
613 | Network
diagnose sys lte-modem
data-session-info
Get session information about the LTE modem.
diagnose bluetooth test_
bt_conn
Check the status of the BLE mode.
diagnose bluetooth
status
Check the bluetooth status of the BLE mode.
To enable airplane mode:
1. Enable airplane mode:
config system global
...
set airplane-m... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
614 | Network
9. Check Bluetooth status to confirm that the BLE module is disabled.
# diagnose bluetooth status
Bluetooth Status: RESET BOOTLOADER
Connect State(0): BLE_MODE_DISABLED
Upgrade LTE modem firmware directly from FortiGuard
LTE modem firmware can be upgraded directly from the FortiGuard. This simplifies the proces... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
615 | Network
l Recurring: Schedule a recurring upgrade to the firmware from FortiGuard based on a set Interval, start date,
and start time.
6. Click OK.
To schedule a one time LTE modem firmware upgrade from FortiGuard in the CLI:
config system central-management
set type fortiguard
set ltefw-upgrade-time <YYYY-MM-DD HH:MM:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
616 | Network
LLDP reception
Device detection can scan LLDP as a source for device identification, but the FortiGate does not read or store the full
information. Enabling LLDP reception allows the FortiGate to receive and store LLDP messages, learn about active
neighbors, and makes the LLDP information available via the CLI,... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
617 | Network
To view the received LLDP information in the CLI:
# diagnose user device list
hosts
vd root/0 00:0c:29:1c:03:ca gen 4320 req 0
created 515971s gen 31 seen 28s port1 gen 12
hardware vendor 'Fortinet' src lldp id 4120 weight 255
type 'Router' src lldp id 4120 weight 255
family 'FortiGate' src lldp id 4120 weight ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
618 | Network
"port_desc":"port12",
"system_name":"S124DN3W00000000",
"system_desc":"FortiSwitch-124D v3.6.6,build0416,180515 (GA)",
"ttl":120,
"addresses":[
{
"type":"ipv4",
"address":"192.168.1.99"
}
]
}
],
"vdom":"root",
"path":"network",
"name":"lldp",
"action":"neighbors",
"status":"success",
"serial":"FG201E4Q00000000"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
619 | Network
Up to 512 VRFs can be configured per VDOM for any device, but only ten VDOMs can be configured by default on a
FortiGate (more VDOMs can be configured on larger devices with additional licenses).
l Implementing VRF on page 620
l VRF routing support on page 621
l Route leaking between VRFs with BGP on page 630
l... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
620 | Network
5. To add the VRF column in the interface table, click the gear icon, select VRF, and click Apply.
To configure a VRF ID on an interface in the CLI:
config system interface
edit interface42
...
set vrf 14
next
end
VRF routing support
VRF supports static routing, OSPF, and BGP. Other routing protocols require us... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
621 | Network
To configure the hub:
config router bgp
set as 65000
config neighbor
edit "10.101.101.2"
set soft-reconfiguration enable
set interface "port2"
set remote-as 65101
set update-source "port2"
next
edit "10.102.102.2"
set soft-reconfiguration enable
set interface "port3"
set remote-as 65102
set update-source "port3... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
622 | Network
To verify the BGP neighbors and check the routing table on the hub:
# get router info bgp summary
BGP router identifier 192.168.0.1, local AS number 65000
BGP table version is 2
2 BGP AS-PATH entries
0 BGP community entries
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.101.101.2 4 65101 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
623 | Network
# get router info bgp summary
VRF 10 BGP router identifier 10.101.101.1, local AS number 65000
BGP table version is 1
2 BGP AS-PATH entries
0 BGP community entries
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.101.101.2 4 65101 4 4 2 0 0 00:02:05 3
Total number of neighbors 1
VRF 10 BGP ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
624 | Network
To configure the hub:
1. Allow configuration of subnet overlap:
config system settings
set allow-subnet-overlap enable
end
2. Configure IP addresses on port4 and port5:
config system interface
edit "port4"
set ip 192.168.103.1 255.255.255.0
next
end
config system interface
edit "port5"
set ip 192.168.103.1 255.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
625 | Network
end
end
To verify the routing table before using route-map:
1. Verify that the routing table on Branch 101 displays only BGP routes:
# get router info routing-table bgp
Routing table for VRF=0
B 192.168.103.0/24 [20/0] via 10.102.102.1, port2, 00:17:04, [1/0]
2. Verify that the routing table on Branch 102 displ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
626 | Network
To verify the routing table after using route-map:
1. Verify the routing table on Branch 101:
# get router info routing-table bgp
Routing table for VRF=0
B 192.168.103.0/24 [20/0] via 10.102.102.1, port2, 00:17:04, [1/0]
2. Check the routing table on Branch 102. The routes are not advertised to BGP peer belongi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
627 | Network
next
edit 0
set prefix 10.102.102.0 255.255.255.0
next
edit 0
set prefix 192.168.1.0 255.255.255.0
next
end
end
2. Put the interfaces into VRF:
config system interface
edit port2
set vrf 10
next
edit port3
set vrf 20
next
end
To configure branch 101:
config router ospf
set router-id 101.101.101.101
config area
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
628 | Network
To add a VRF ID in a static route in the GUI:
1. Configure the interface:
a. Go to Network > Interfaces.
b. Click Create New > Interface or Edit an existing interface.
c. Enter a value in the VRF ID field.
d. Configure the other settings as needed.
e. Click OK.
2. Add a static route to VRF. For example, using b... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
629 | Network
set device "vpn1"
set vrf 10
next
end
To check the routing table:
# get router info routing-table static
Route leaking between VRFs with BGP
Route leaking allows you to configure communication between VRFs. If route leaking is not configured, then the VRFs
are isolated. This example shows route leaking with BGP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
630 | Network
config system interface
edit link-10-20-0
set vdom "root"
set vrf 10
set ip 10.1.1.1/30
next
edit link-10-20-1
set vdom "root"
set vrf 20
set ip 10.1.1.2/30
next
end
4. Create the prefix lists:
These objects define the subnet and mask that are leaked.
config router prefix-list
edit VRF10_Route
config rule
edit ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
631 | Network
edit "10"
config leak-target
edit "20"
set route-map "Leak_from_VRF10_to_VRF20"
set interface "link-10-20-0"
next
end
next
edit "20"
config leak-target
edit "10"
set route-map "Leak_from_VRF20_to_VRF10"
set interface "link-10-20-1"
next
end
next
end
end
7. Create policies to allow traffic between the VRFs.
With... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
632 | Network
Logical topology:
In this example, a specific route is leaked from each of the VRFs to each of the other VRFs. VLAN subinterfaces are
created based on VDOM links to connect each VRF to the core VRF router.
NPU inter-VDOM links are used to accelerate traffic between VRFs. The setup could be configured by creatin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
633 | Network
config system settings
set allow-subnet-overlap enable
end
3. Configure the inter-connecting VLAN subinterfaces between VRF based on VDOM-LINK:
config system interface
edit "vlink0_Vlan_10"
set vdom "root"
set vrf 10
set ip 10.1.1.1 255.255.255.252
set allowaccess ping https ssh http
set alias "vlink0_Vlan_10"
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
634 | Network
edit "vlink1_Vlan_12"
set vdom "root"
set vrf 31
set ip 12.1.1.2 255.255.255.252
set allowaccess ping https ssh http
set alias "vlink1_Vlan_12"
set role lan
set interface "npu0_vlink1"
set vlanid 12
next
end
4. Configure a zone to allow intrazone traffic between VLANs in the central VRF:
config system zone
edit... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
635 | Network
set interface "internal"
set vlanid 10
next
edit "Internal_VRF11"
set vdom "root"
set vrf 11
set ip 172.16.11.1 255.255.255.0
set allowaccess ping https ssh http
set alias "Internal_VRF11"
set role lan
set interface "internal"
set vlanid 11
next
edit "Internal_VRF12"
set vdom "root"
set vrf 12
set ip 172.16.12.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
636 | Network
config router static
edit
1
set dst 172.16.10.0 255.255.255.0
set gateway 10.1.1.1
set device "vlink1_Vlan_10"
set comment "VRF31_Core_Router"
next
edit
2
set dst 172.16.11.0 255.255.255.0
set gateway 11.1.1.1
set device "vlink1_Vlan_11"
set comment "VRF31_Core_Router"
next
edit
3
set dst 172.16.12.0 255.255.25... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
637 | Network
edit 10
set gateway 202.100.10.254
set device "wan1_VRF10"
set comment "VRF10_Default_Route"
next
edit 11
set gateway 202.100.11.254
set device "wan1_VRF11"
set comment "VRF11_Default_Route"
next
edit 12
set gateway 202.100.12.254
set device "wan1_VRF12"
set comment "VRF12_Default_Route"
next
end
In the GUI, go... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
638 | Network
set logtraffic all
next
edit
8
set name "VRF_Leaking_Route_to_VRF10"
set srcintf "vlink0_Vlan_10"
set dstintf "Internal_VRF10"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
next
edit
9
set name "VRF11_to_Internet_Policy"
set srcintf "Internal_VR... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
639 | Network
set service "ALL"
set logtraffic all
set nat enable
next
edit 13
set name "VRF12_to_VRF_Leaking_Route"
set uuid 92bccf8e-b27b-51eb-3c56-6d5259af6299
set srcintf "Internal_VRF12"
set dstintf "vlink0_Vlan_12"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set logtraf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
640 | Network
C 11.1.1.0/30 is directly connected, vlink0_Vlan_11
S 172.16.10.0/24 [10/0] via 11.1.1.2, vlink0_Vlan_11
C 172.16.11.0/24 is directly connected, Internal_VRF11
S 172.16.12.0/24 [10/0] via 11.1.1.2, vlink0_Vlan_11
C 202.100.11.0/24 is directly connected, wan1_VRF11
Routing table for VRF=12
S* 0.0.0.0/0 [10/0] vi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
641 | Network
64 bytes from 202.100.10.254: icmp_seq=2 ttl=254 time=0.225 ms
64 bytes from 202.100.10.254: icmp_seq=3 ttl=254 time=0.197 ms
^C
--- 202.100.10.254 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2000ms
rtt min/avg/max/mdev = 0.197/0.238/0.294/0.044 ms
c. Ping the FW11-PC on VRF11 fr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
642 | Network
VRF with IPv6
IPv6 routes support VRF. Static, connected, OSPF, and BGP routes can be isolated in different VRFs. BGP IPv6 routes
can be leaked from one VRF to another.
config router bgp
config vrf6
edit <origin vrf-id>
config leak-target
edit <target vrf-id>
set route-map <route-map>
set interface <interface>
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
643 | Network
set remote-as 20
next
end
end
2. Configure the VLAN interfaces:
config system interface
edit "vlan55"
set vdom "root"
set vrf 10
set ip 55.1.1.1 255.255.255.0
set device-identification enable
set role lan
set snmp-index 51
config ipv6
set ip6-address 2000:55::1/64
end
set interface "npu0_vlink0"
set vlanid 55
n... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
644 | Network
next
end
4. Configure the route maps:
config router route-map
edit "from106"
config rule
edit 1
set match-ip6-address "1"
next
end
next
edit "from206"
config rule
edit 1
set match-ip6-address "2"
next
end
next
end
5. Configure the IPv6 route leaking (leak route 2000:5:5:5::/64 learned from Router 1 to VRF 20, t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
645 | Network
2. Check the routing table after the leak:
# get router info6 routing-table bgp
Routing table for VRF=10
B 2000:5:5:5::/64 [20/0] via fe00::2000:0000:0000:0, R150, 00:25:45
B 2009:3:3:3::/64 [20/0] via fe80::10:0000:0000:4245, vlan55, 00:00:17
Routing table for VRF=20
B 2000:5:5:5::/64 [20/0] via fe80::10:0000:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
646 | Network
To configure this example:
config system interface
edit port1
set vrf 10
next
edit port2
set vrf 20
next
end
config router bgp
config neighbor
edit "192.168.1.1"
set update-source port1
next
edit "192.168.2.1"
set interface port2
next
end
end
Results
Using the above topology:
l Both Router1 and Router2 establis... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
647 | Network
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [5/0] via 10.0.1.254, port9
C 10.0.1.0/24 is directly connected, port9
Routing table for VRF=10
O 10.10.1.0/24 [110/10] via 192.168.1.1, port1, 00:18:31
B 10.10.2.0/24 [20/200] via... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
648 | Network
Example
In this example, there is an NPU inter-VDOM link that is configured on the root VDOM. Two VLANs, vrf10 and vrf20, are
created on either ends of the NPU inter-VDOM link, each belonging to a different VRF.
When pinging from the vrf10 interface in VRF 10 to the destination server 172.16.202.2, since there ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
649 | Network
set snmp-index 14
config ipv6
set ip6-address 2003:172:16:202::1/64
set ip6-allowaccess ping
end
next
end
2. Configure the firewall policy:
config firewall policy
edit 1
set srcintf "vrf20"
set dstintf "port12"
set action accept
set srcaddr "all"
set dstaddr "all"
set srcaddr6 "all"
set dstaddr6 "all"
set sched... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
650 | Network
3.393987 vrf20 out 172.16.202.2 -> 10.32.70.1: icmp: echo reply
3.393988 npu0_vlink1 out 172.16.202.2 -> 10.32.70.1: icmp: echo reply
3.393993 vrf10 in 172.16.202.2 -> 10.32.70.1: icmp: echo reply
4.393941 vrf10 out 10.32.70.1 -> 172.16.202.2: icmp: echo request
4.393942 npu0_vlink0 out 10.32.70.1 -> 172.16.202... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
651 | Network
source-ip <ip> Source IPv4 or IPv6 address, for communication with the NetFlow agent.
source-ip-interface
<name>
Utilize the IP address of the specified interface as the source when sending out
the NetFlow messages. Routing of the messages does not change based on this
setting.
The source-ip-interface is unavai... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
652 | Network
set ip 10.10.10.2 255.255.255.0
set allowaccess ping
set type loopback
next
end
2. Configure the syslog device:
config log syslogd setting
set status enable
set server "172.16.200.55"
set facility local6
set source-ip-interface "loopback"
end
Verification and troubleshooting
If data are not seen on the NetFlow ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
653 | Network
Name Template ID Description
IPV4_NAT 262 Source/Destination NAT IPv4 traffic
IPV4_AF_NAT 263 AF NAT IPv4 traffic (4->6)
IPV6_NAT 264 Source/Destination NAT IPv6 traffic
IPV6_AF_NAT 265 AF NAT IPv6 traffic (6->4)
ICMP4_NAT 266 Source/Destination NAT ICMPv4 traffic
ICMP4_AF_NAT 267 AF NAT ICMPv4 traffic (4->6)
I... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
654 | Network
257 - APP_ID_OPTIONS
Description Application information
Scope Field Count 1
Data Field Count 4
Option Scope Length 4
Option Length 16
Padding 0000
Scope fields
Field # Field Type Length
1 System System (1) 2
Data fields
Field # Field Type Length
1 APPLICATION_ID APPLICATION_ID (95) 9
2 APPLICATION_NAME APPLICA... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.