index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
655 | Network
Field # Field Type Length
7 L4_SRC_PORT L4_SRC_PORT (7) 2
8 L4_DST_PORT L4_DST_PORT (11) 2
9 INPUT_SNMP INPUT_SNMP (10) 2
10 OUTPUT_SNMP OUTPUT_SNMP (14) 2
11 PROTOCOL PROTOCOL (4) 1
12 APPLICATION_ID APPLICATION_ID (95) 9
13 FLOW_FLAGS FLOW_FLAGS (65) 2
14 FORWARDING_STATUS FORWARDING_STATUS (89) 1
15 flowEndR... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
656 | Network
Field # Field Type Length
13 FLOW_FLAGS FLOW_FLAGS (65) 2
14 FORWARDING_STATUS FORWARDING_STATUS (89) 1
15 flowEndReason flowEndReason (136) 1
16 IPV6_SRC_ADDR IPV6_SRC_ADDR (27) 16
17 IPV6_DST_ADDR IPV6_DST_ADDR (28) 16
260 - ICMP4
Description No NAT ICMPv4 traffic
Data Field Count 16
Data fields
Field # Field... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
657 | Network
261 - ICMP6
Description No NAT ICMPv6 traffic
Data Field Count 16
Data fields
Field # Field Type Length
1 BYTES BYTES (1) 8
2 OUT_BYTES OUT_BYTES (23) 8
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 INPUT_SNMP INPUT_SNMP (10) 2
8 OUTPU... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
658 | Network
Field # Field Type Length
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 L4_SRC_PORT L4_SRC_PORT (7) 2
8 L4_DST_PORT L4_DST_PORT (11) 2
9 INPUT_SNMP INPUT_SNMP (10) 2
10 OUTPUT_SNMP OUTPUT_SNMP (14) 2
11 PROTOCOL PROTOCOL (4) 1
12 postI... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
659 | Network
Data fields
Field # Field Type Length
1 BYTES BYTES (1) 8
2 OUT_BYTES OUT_BYTES (23) 8
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 L4_SRC_PORT L4_SRC_PORT (7) 2
8 L4_DST_PORT L4_DST_PORT (11) 2
9 INPUT_SNMP INPUT_SNMP (10) 2
10 OUTPU... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
660 | Network
Data fields
Field # Field Type Length
1 BYTES BYTES (1) 8
2 OUT_BYTES OUT_BYTES (23) 8
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 L4_SRC_PORT L4_SRC_PORT (7) 2
8 L4_DST_PORT L4_DST_PORT (11) 2
9 INPUT_SNMP INPUT_SNMP (10) 2
10 OUTPU... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
661 | Network
Data fields
Field # Field Type Length
1 BYTES BYTES (1) 8
2 OUT_BYTES OUT_BYTES (23) 8
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 L4_SRC_PORT L4_SRC_PORT (7) 2
8 L4_DST_PORT L4_DST_PORT (11) 2
9 INPUT_SNMP INPUT_SNMP (10) 2
10 OUTPU... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
662 | Network
Data fields
Field # Field Type Length
1 BYTES BYTES (1) 8
2 OUT_BYTES OUT_BYTES (23) 8
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 INPUT_SNMP INPUT_SNMP (10) 2
8 OUTPUT_SNMP OUTPUT_SNMP (14) 2
9 ICMP_TYPE ICMP_TYPE (32) 2
10 PROTOCOL... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
663 | Network
Field # Field Type Length
2 OUT_BYTES OUT_BYTES (23) 8
3 PKTS PKTS (2) 4
4 OUT_PKTS OUT_PKTS (24) 4
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 INPUT_SNMP INPUT_SNMP (10) 2
8 OUTPUT_SNMP OUTPUT_SNMP (14) 2
9 ICMP_TYPE ICMP_TYPE (32) 2
10 PROTOCOL PROTOCOL (4) 1
11 APPLICATION_I... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
664 | Network
Field # Field Type Length
5 FIRST_SWITCHED FIRST_SWITCHED (22) 4
6 LAST_SWITCHED LAST_SWITCHED (21) 4
7 INPUT_SNMP INPUT_SNMP (10) 2
8 OUTPUT_SNMP OUTPUT_SNMP (14) 2
9 ICMP_TYPE ICMP_TYPE (32) 2
10 PROTOCOL PROTOCOL (4) 1
11 APPLICATION_ID APPLICATION_ID (95) 9
12 FLOW_FLAGS FLOW_FLAGS (65) 2
13 FORWARDING_STAT... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
665 | Network
Field # Field Type Length
8 OUTPUT_SNMP OUTPUT_SNMP (14) 2
9 ICMP_TYPE ICMP_TYPE (32) 2
10 PROTOCOL PROTOCOL (4) 1
11 APPLICATION_ID APPLICATION_ID (95) 9
12 FLOW_FLAGS FLOW_FLAGS (65) 2
13 FORWARDING_STATUS FORWARDING_STATUS (89) 1
14 flowEndReason flowEndReason (136) 1
15 IPV6_SRC_ADDR IPV6_SRC_ADDR (27) 16
1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
666 | Network
Device index 26 is the FortiExtender interface fext-211.
# diagnose test application sflowd 3
===== Netflow Vdom Configuration =====
Global collector:172.18.60.80:[2055] source ip: 0.0.0.0 active-timeout(seconds):60
inactive-timeout(seconds):600
____ vdom: root, index=0, is master, collector: disabled (use glob... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
667 | Network
To configure a VPN tunnel interface with NetFlow sampling:
1. Configure a VPN interface with NetFlow sampling enabled for both transmitted and received traffic:
config system interface
edit "A-to-B_vpn"
set vdom "vdom1"
set type tunnel
set netflow-sampler both
set snmp-index 42
set interface "port3"
next
end
2.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
668 | Network
set dst-name "A-to-B_vpn_remote"
next
end
3. Check the NetFlow status and configuration:
Device index 52 is the VPN interface A-to-B_vpn.
# diagnose test application sflowd 3
===== Netflow Vdom Configuration =====
Global collector:172.18.60.80:[2055] source ip: 0.0.0.0 active-timeout(seconds):60
inactive-timeou... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
669 | Network
Allow multiple NetFlow collectors
FortiOS can be configured with a maximum of six NetFlow collectors. This also applies to multi-VDOM environments
where a maximum of six NetFlow collectors can be used globally or on a per-VDOMs basis. This feature enables up to a
maximum of six unique parallel NetFlow streams o... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
670 | Network
If the interface-select-method is set to auto, the outgoing interface that is used to send
the sampled NetFlow traffic to the NetFlow collector is decided by the routing table lookup.
Example 1: Multiple NetFlow collectors in a non-VDOM environment
In this example, six NetFlow collectors are configured in a non... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
671 | Network
config system interface
edit port1
set netflow-sampler both
next
end
3. Verify the NetFlow diagnostics.
a. Verify the NetFlow configuration status:
# diagnose test application sflowd 3
===== Netflow Vdom Configuration =====
Global collector(s) active-timeout(seconds):60 inactive-timeout(seconds):15
Collector id... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
672 | Network
To configure multiple NetFlow collectors:
1. Configure the global NetFlow collectors:
config system netflow
config collectors
set active-flow-timeout 60
set template-tx-timeout 60
edit 1
set collector-ip 172.16.200.155
set collector-port 2055
set source-ip 172.16.200.6
set interface-select-method specify
set in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
673 | Network
set collector-ip "172.10.100.103"
set collector-port 2061
next
edit 4
set collector-ip "172.10.100.104"
set collector-port 2062
next
edit 5
set collector-ip "172.10.100.105"
set collector-port 2063
next
edit 6
set collector-ip "172.10.100.106"
set collector-port 2064
next
end
end
3. Configure NetFlow sampling o... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
674 | Network
|_ exported: Bytes:2533746, Packets:3911, Sessions:70 Flows:70
|_ active_intf: 1
|____ interface:port1 sample_direction:both device_index:9 snmp_index:3
____ vdom: vdom1, index=1, is master, collector: enabled
|_ coll_ip:172.10.100.101:2059,src_ip:20.1.100.111
|_ coll_ip:172.10.100.102:2060,src_ip:20.1.100.111
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
675 | Network
In this example, FortiGate is connect on port2 to a NetFlow collector, NetFlow sampling is configured on port2 with a
sampling rate of 100. It is assumed that policies are already configured. Packets are sent that hit the policy. If the number
of packets is less than the sampling, then no flowset is sent to the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
676 | Network
Because this is more than the sample rate of 100, the FortiGate sends one flowset packet to the collector after the
session timeout.
# diagnose sys session list
session info: proto=1 proto_state=00 duration=110 expire=55 timeout=0 refresh_dir=both
flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
origin-shape... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
677 | Network
set source-port <port>
set destination-port <port>
set protocol <protocol_ID>
next
end
end
source-ip <IP_address> Session source address.
destination-ip <IP_
address>
Session destination address.
source-port <port> Session source port number or range.
destination-port <port> Session destination port number or r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
678 | Network
l If there are two IPv4-IPv4 sessions, and only the first one matches filter ID 44:
# diagnose sys session list
session info: proto=1 proto_state=00 duration=17 expire=59 timeout=0 refresh_dir=both
flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
679 | Network
peer=172.16.201.8:1066->172.16.200.55:8 naf=1
hook=pre dir=org act=noop 172.16.201.8:1066->172.16.200.55:8(0.0.0.0:0)
hook=post dir=reply act=noop 172.16.200.55:1066->172.16.201.8:0(0.0.0.0:0)
misc=0 policy_id=4 pol_uuid_idx=8176 auth_info=0 chk_client_info=0 vd=0
serial=0000067e tos=ff/ff ips_view=9572 app_lis... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
680 | Network
l IPv6-IPv4 FlowSets:
Do not receive FlowSets that match exclusion filter ID 64:
Receive FlowSets that do not match any exclusion filters:
FortiOS 7.6.2 Administration Guide 681
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
681 | Network
sFlow
sFlow is a method of monitoring the traffic on your network to identify areas on the network that may impact performance
and throughput. FortiGate supports sFlow v5. sFlow collector software is available from a number of third-party software
vendors. For more information about sFlow, see www.sflow.org.
Th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
682 | Network
set interface-select-method {auto | sdwan | specify}
set interface <interface>
next
end
end
collector-ip <ipv4_
address>
Enter the IPv4 address of the sFlow collector that sFlow agents added to
interfaces in this VDOM send sFlow datagrams to (default = 0.0.0.0).
collector-port <port> Enter the UDP port number u... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
683 | Network
interface-select-method
{auto | sdwan |
specify}
Specify how the outgoing interface to reach the server is selected (default = auto).
interface <interface> Enter the outgoing interface used to reach the server.
This option is only available when interface-select-method is specify.
To configure sFlow on an inter... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
684 | Network
set collector-ip 10.1.1.2
set collector-port 6345
set source-ip 0.0.0.0
set interface-select-method auto
next
edit 3
set collector-ip 10.1.1.3
set collector-port 6346
set source-ip 0.0.0.0
set interface-select-method auto
next
end
end
2. Configure sFlow sampling on wan1:
config system interface
edit wan1
set sf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
685 | Network
Example 2: multiple sFlow collectors in a multi-VDOM environment
In this example, three sFlow collectors are configured in a multi-VDOM environment globally and per VDOM. sFlow
sampling is on the wan1 and dmz interfaces.
To configure multiple sFlow collectors:
1. Configure the global sFlow collectors:
config sy... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
686 | Network
next
end
end
next
end
3. Configure sFlow sampling on wan1 and dmz:
config system interface
edit wan1
set vdom "root"
set sflow-sampler enable
set sample-rate 2000
set polling-interval 20
set sample-direction both
next
edit dmz
set vdom "testvdom"
set sflow-sampler enable
set sample-rate 2000
set polling-interva... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
687 | Network
2023-11-14 16:50:20.198813 dmz out 192.168.1.1.1399 -> 10.1.1.5.6348: udp 144
2023-11-14 16:50:20.198832 dmz out 192.168.1.1.1399 -> 10.1.1.6.6349: udp 144
The outgoing interface that is used to send the sampled sFlow traffic to the sFlow collector
is decided by the routing table lookup.
Link monitor
The link m... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
688 | Network
Example
In this example, the FortiGate has several routes to 23.2.2.2/32 and 172.16.202.2/24, and is monitoring the link agg1 by
pinging the server at 10.1.100.22. The link monitor uses the gateway 172.16.203.2.
When the link monitor fails, only the routes to the specified subnet using interface agg1 and gatewa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
689 | Network
Enable or disable updating policy routes when link health monitor fails
An option has been added to toggle between enabling or disabling policy route updates when a link health monitor fails.
By disabling policy route updates, a link health monitor failure will not cause corresponding policy-based routes to be
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
690 | Network
3. When the health link monitor status is up, verify that the policy route is active.
a. Verify the link health monitor status:
# diagnose sys link-monitor status
Link Monitor: test-1, Status: alive, Server num(1), HA state: local(alive), shared
(alive)
Flags=0x1 init, Create time: Fri May 28 15:20:15 2021
Sour... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
691 | Network
b. Verify the policy route list:
# diagnose firewall proute list
list route policy info(vf=root):
id=1 dscp_tag=0xff 0xff flags=0x0 tos=0x14 tos_mask=0xff protocol=0 sport=0-0 iif=41
dport=0-65535 oif=14(port22) gwy=172.16.202.1
source wildcard(1): 0.0.0.0/0.0.0.0
destination wildcard(1): 172.16.205.10/255.255.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
692 | Network
Examples
In the following topology, there are two detect servers that connect to the FortiGate through a router: server 1
(10.1.100.22) and server 2 (10.1.100.55).
Alive link health monitor
In this configuration, one server is dead and one server alive. The failed server weight is not over the threshold, so the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
693 | Network
Peer: 10.1.100.22(10.1.100.22)
Source IP(172.16.202.2)
Route: 172.16.202.2->10.1.100.22/32, gwy(172.16.202.1)
protocol: ping, state: alive
Latency(Min/Max/Avg): 0.417/0.585/0.530 ms
Jitter(Min/Max/Avg): 0.007/0.159/0.057
Packet lost: 0.000%
Number of out-of-sequence packets: 0
Fail Times(0/3)
Packet sent: 239, ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
694 | Network
Gateway: 172.16.202.1
Interval: 500 ms
Service-detect: disable
Diffservcode: 000000
Class-ID: 0
Fail-weight (40): activated
Peer: 10.1.100.22(10.1.100.22)
Source IP(172.16.202.2)
Route: 172.16.202.2->10.1.100.22/32, gwy(172.16.202.1)
protocol: ping, state: alive
Latency(Min/Max/Avg): 0.393/0.610/0.520 ms
Jitter... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
695 | Network
To configure SLA link health monitoring in dynamic IPsec tunnels:
1. Configure the IPsec phase 1 interface:
config vpn ipsec phase1-interface
edit "for_Branch"
set type dynamic
set interface "port15"
set mode aggressive
set peertype any
set net-device disable
set mode-cfg enable
set proposal aes128-sha256 aes25... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
696 | Network
next
end
4. Add the IPsec dial-up tunnel to the link health monitor:
config system link-monitor
edit "1"
set srcintf "for_Branch"
set server-type dynamic
next
end
5. Once endpoint users have connected using FortiClient, verify the tunnel information:
# get vpn ipsec tunnel summary
'for_Branch_0' 10.1.100.23:0 s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
697 | Network
l DHCP Relay
l DNS
l Static Routes
l Firewall Policy
l NAT
l Addresses
l Virtual IPs
l IP Pools
l IPsec VPN
l GRE over IPsec
This section also contains the following topics:
l IPv6 overview on page 698
l IPv6 quick start on page 699
l Neighbor discovery proxy on page 703
l IPv6 address assignment on page 704
l ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
698 | Network
l Improved security with built-in support for IPsec. IPsec is a security protocol that provides authentication and
encryption for data transmitted over a network.
l IPv6 offers scoped addresses with link-local, unique local, and global address spaces. This allows for more flexible
addressing and improved networ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
699 | Network
Configuring an interface
To configure an interface in the GUI:
1. Go to Network > Interfaces.
2. Select an interface and click Edit.
3. In the Address section, enter the IPv6 Address/Prefix.
4. In the Administrative Access section, select the IPv6 access options as needed (such as PING, HTTPS, and SSH).
5. Clic... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
700 | Network
Configuring the DNS
To configure a DNS domain list in the GUI:
1. Go to Network > DNS.
2. Under IPv6 DNS Settings, configure the primary and secondary DNS servers as needed.
3. Click Apply.
To configure a DNS domain list in the CLI:
config system dns
set ip6-primary <IPv6 address>
set ip6-secondary <IPv6 addres... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
701 | Network
3. Enter a Name for the address object.
4. Select the + in the Members field. The Select Entries pane opens.
5. Select members of the group. It is possible to select more than one entry. Select the x icon in the field to remove an
entry.
6. Enter any additional information in the Comments field.
7. Click OK.
To... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
702 | Network
Neighbor discovery proxy
This feature provides support for proxying the IPv6 Neighbor Discovery Protocol (NDP) to allow the following ICMP
messages to be forwarded between upstream and downstream interfaces.
Message type Function
Router Solicitation (RS) Used by hosts to find any routers in a local segment and ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
703 | Network
In this example, the client is connected to a FortiGate device that is configured as an ND (Neighbor Discovery) proxy.
Port1 is the upstream interface that receives Router Advertisement (RA) traffic, and port5 is the downstream interface
that connects to the client. This setup allows the FortiGate device to fac... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
704 | Network
Method Overview
and a domain name.
IPv6 prefix delegation on page
713
l Enables internet service providers (ISPs) to provide organizations with a
block of addresses that can be distributed throughout their network.
Deciding which method to employ should be based on the requirements of your system and your overa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
705 | Network
a. Go to Network > Interfaces and edit port5.
b. Enable Auto configure IPv6 address. The First Floor FortiGate uses the prefix that it obtains from the Enterprise
Core FortiGate interface, and automatically generates an IPv6 address.
3. Verify that the First Floor FortiGate automatically generated an IPv6 addre... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
706 | Network
Example: basic configuration
In this example, the Enterprise Core FortiGate is connected to the First Floor FortiGate. The Enterprise Core FortiGate
has a stateful DHCPv6 server configured that allows the First Floor FortiGate to automatically obtain an IPv6 address
and DNS server address using the DHCP option.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
707 | Network
next
end
2. Configure the First Floor FortiGate to obtain an IPv6 address using DHCP:
config system interface
edit "port5"
config ipv6
set ip6-mode dhcp
end
next
end
3. Verify that the First Floor FortiGate obtained an IPv6 address and DNS server address from the DHCPv6 server:
# diagnose ipv6 address list | gr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
708 | Network
set ip6 2000:8:8:8::8
next
edit 5
set code 96
set type hex
set value "0000013700084d53465420352e30"
next
end
config ip-range
edit 1
set start-ip 2000:11:1:1::2
set end-ip 2000:11:1:1::10
next
end
next
edit 2
set subnet 2000:10:1:100::/64
set interface "port2"
config ip-range
edit 1
set start-ip 2000:10:1:100::1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
709 | Network
VCI matching in IP ranges
There are three cases:
1. If VCI matching is disabled in the IP range, then the DHCP client can get an IP address. This is the default.
2. If VCI matching is enabled and the VCI value matches the DHCP client, then the DHCP client can get an IP address.
3. If VCI matching is enabled and... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
710 | Network
next
end
next
end
SLAAC with DHCPv6 stateless server
Using Stateless Address Auto Configuration (SLAAC) with a stateless DHCPv6 server provides a solution for obtaining
other host configurations, such as DNS server addresses, while retaining the auto-configuration aspect of SLAAC. This
approach also provides fa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
711 | Network
DHCPv6 Server Enable
DNS service Same as System DNS
Stateful server Disable
c. Click OK.
3. Configure the First Floor FortiGate to automatically obtain an IPv6 address and DNS server address from the
DHCPv6 server:
a. Go to Network > Interfaces and edit port5.
b. Enable Auto configure IPv6 address. The First Fl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
712 | Network
config system dhcp6 server
edit 1
set dns-service default
set interface "port5"
next
end
3. Configure the First Floor FortiGate to obtain an IPv6 address automatically:
config system interface
edit "port5"
config ipv6
set autoconf enable
set dhcp6-information-request enable
end
next
end
4. Verify that the First... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
713 | Network
Using the GUI or CLI to configure a downstream FortiGate to obtain the IPv6 and DNS server address from delegated
interface using DHCP mode requires the following steps:
1. Configure the following items on the Enterprise Core FortiGate:
l Upstream interface
l Downstream interface
l DHCPv6 server on the downstre... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
714 | Network
config system dhcp6 server
edit 1
set delegated-prefix-iaid 1
next
end
f. Enable Stateful server.
g. Set IP mode to Delegated.
h. Click OK.
To configure the First Floor FortiGate:
1. Configure the First Floor FortiGate interface using DHCP mode:
a. Go to Network > Interfaces and edit the port5.
b. Set IPv6 addr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
715 | Network
delegated-prefix iaid 1 : 2001:db8:d0c::/48
preferred-life-time : 4294967295
valid-life-time : 4294967295
delegated-DNS1 : 2001:db8::35
delegated-DNS2 : ::
…
dhcp6-iapd-list:
== [ 1 ]
iaid: 1 prefix-hint: ::/48 prefix-hint-plt: 604800
prefix-hint-vlt: 2592001
3. Configure the downstream interface on the Enterpr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
716 | Network
next
end
2. Verify that the First Floor FortiGate obtained an IPv6 address and DNS server address from the delegated interface:
# diagnose ipv6 address list | grep port5
dev=7 devname=port5 flag=P scope=0 prefix=128 addr=2001:db8:d0c::1 preferred=4294967295
valid=4294967295 cstamp=43208325 tstamp=43208325
# dia... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
717 | Network
a. Go to Network > Interfaces and edit port5. The IPv6 Address/Prefix field is prepopulated.
5. Configure SLAAC on the downstream interface:
config system interface
edit "port5"
config ipv6
set ip6-mode delegated
set ip6-send-adv enable
set ip6-delegated-prefix-iaid 1
set ip6-upstream-interface "port1"
config i... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
718 | Network
Method Overview
NAT66 l NAT66 is used for translating an IPv6 source or destination address to a
different IPv6 source or destination address.
l Not a common method, since most IPv6 networks do not require NAT66.
NAT46 l NAT46 is used to translate IPv4 addresses to IPv6 addresses.
l Enable a client on an IPv4 n... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
719 | Network
3. Enter the following:
Name test-ippool6-1
External IP Range 2000:172:16:101::1-2000:172:16:101::1
4. Click OK.
To use the IPv6 pool in the firewall policy:
1. Go to Policy & Objects > Firewall Policy.
2. Click Create New or edit an existing policy.
3. Configure the required policy parameters.
4. Enable NAT an... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
720 | Network
Sample topology
In this example, an IPv4 client tries to connect to an IPv6 server. A VIP is configured on FortiGate to map the server IPv6
IP address 2000:172:16:200:55 to an IPv4 address 10.1.100.55. On the other side, an IPv6 IP pool is configured
and the source address of packets from client are changed to ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
721 | Network
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Enter the following:
Name policy46-1
Incoming Interface port10
Outgoing Interface port9
Source all
Destination vip46_server
Schedule always
Service ALL
Action ACCEPT
NAT NAT46
IP Pool Configuration client_external
c. Configure the other settin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
722 | Network
4. Configure the firewall policy:
config firewall policy
edit 2
set name "policy46-1"
set srcintf "port10"
set dstintf "port9"
set action accept
set nat46 enable
set srcaddr "all"
set dstaddr "vip46_server"
set srcaddr6 "all"
set dstaddr6 "all"
set schedule "always"
set service "ALL"
set logtraffic all
set auto... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
723 | Network
gw-10.1.100.55 via root"
id=20085 trace_id=1 func=ip4_nat_af_input line=601 msg="nat64 ipv4 received a packet
proto=1"
id=20085 trace_id=1 func=__iprope_check line=2112 msg="gnum-100012, check-ffffffffa0024ebe"
id=20085 trace_id=1 func=__iprope_check_one_policy line=1873 msg="checked gnum-100012
policy-1, ret-m... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
724 | Network
Sample configuration
To configure a NAT64 policy with DNS64 in the GUI:
1. Enable IPv6 and DNS database:
a. Go to System > Feature Visibility.
b. In the Core Features section, enable IPv6.
c. In the Additional Features section, enable DNS Database.
d. Click Apply.
2. Enable DNS proxy on the IPv6 interface:
a. G... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
725 | Network
Type IPv6 Subnet
IP/Netmask 2001:db8:1::/48
c. Click OK.
6. Configure the IP pool containing the IPv4 address that is used as the source address of the packets exiting port9:
a. Go to Policy & Objects > IP Pools and navigate to the IP Pool tab.
b. Click Create new.
c. Enter the following:
Name exit-pool4
Type O... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
726 | Network
config system global
set gui-ipv6 enable
end
config system settings
set gui-dns-database enable
end
2. Enable DNS proxy on the IPv6 interface:
config system dns-server
edit "port10"
set mode forward-only
next
end
3. Configure the IPv6 DHCP server:
config system dhcp6 server
edit 1
set subnet 2001:db8:1::/64
set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
727 | Network
config firewall policy
edit 1
set name "policy64-1"
set srcintf "port10"
set dstintf "port9"
set action accept
set nat64 enable
set srcaddr "all"
set dstaddr "all"
set srcaddr6 internal-net6
set dstaddr6 vip6
set schedule "always"
set service "ALL"
set ippool enable
set poolname "exit-pool4"
next
end
To enable ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
728 | Network
The IPv6 addresses used in this example are for demonstrative purposes only and should not
be used in your environment.
The 2001:db8::/32 prefix is a special IPv6 prefix designated for use in documentation
examples. See RFC 3849 for more information.
To configure PBA for NAT64 on FGT-B:
1. Configure the IP pool... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
729 | Network
set srcaddr6 "all"
set dstaddr6 "vip64-1072390"
set schedule "always"
set service "ALL"
set auto-asic-offload disable
set ippool enable
set poolname "ippool4-1072390-1" "ippool4-1072390-2"
next
end
4. Send IPv6 packets from the client to access the IPv4 server.
5. Verify the NAT64 sessions:
(vdom1) # diagnose s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
730 | Network
DHCPv6 relay
Similar to DHCPv4, DHCPv6 facilitates communication between networks by relaying queries and responses between a
client and a DHCP server on separate networks. The FortiGate device serves as a DHCPv6 relay agent and forwards
DHCPv6 messages between clients and servers. The relay agent receives DHCP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
731 | Network
1. The tunnel entry node creates an encapsulating IPv4 header and transmits the encapsulated packet.
2. The tunnel exit node receives the encapsulated packet.
3. The IPv4 header is removed.
4. The IPv6 header is updated and the IPv6 packet is processed.
There are two types of tunnels in IPv6 tunneling, automati... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
732 | Network
To configure an IPv6 tunnel over IPv4:
config system sit-tunnel
edit <name>
set source <src_IPv4_address>
set destination <dst_IPv4_address>
set interface <src_interface>
set ip6 <tunnel_IPv6_address>
next
end
4in6 tunnel
Conversely, the following tunnel configuration tunnels IPv4 traffic over an IPv6 network.
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
733 | Network
IPv4 over IPv6 The VPN gateways have IPv6 addresses.
The protected networks have IPv4 addresses. The phase 2 configurations at
either end use IPv4 selectors. See Site-to-site IPv4 over IPv6 VPN example on
page 763 for sample configuration.
IPv6 over IPv4 The VPN gateways have IPv4 addresses.
The protected netwo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
734 | Network
To configure Phase 1 and phase 2 settings:
1. Go to VPN > IPsec Wizard.
2. Enter a name and set Template type to Custom.
3. Click Next.
4. Under Network, set IP Version to IPv6 .
5. Configure the rest of phase 1 and phase 2 settings as required and click OK.
IPv6 GRE tunnels
IPv6 addresses can be used at both e... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
735 | Network
config ipv6
set ip6-address 2000:172:16:202::1/64
set ip6-allowaccess ping
end
set mtu-override enable
set mtu 1320
next
end
2. Configure the IPv6 tunnel:
config system ipv6-tunnel
edit "B_2_D"
set source 2000:172:16:202::1
set destination 2000:172:16:202::2
set interface "port5"
next
end
3. Configure the tunne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
736 | Network
stat: rxp=407 txp=417 rxb=66348 txb=65864 rxe=0 txe=61 rxd=0 txd=0 mc=0 collision=60 @
time=1631647126
re: rxl=0 rxo=0 rxc=0 rxf=0 rxfi=0 rxm=0
te: txa=0 txc=0 txfi=0 txh=0 txw=0
misc rxc=0 txc=0
input_type=0 state=3 arp_entry=0 refcnt=25
To verify the MTU for the IPv6 tunnel on FortiGate D:
1. Configure port3:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
737 | Network
4. Verify the interface lists:
# diagnose netlink interface list port3
# diagnose netlink interface list D_2_B
Configuring IPv4 over IPv6 DS-Lite service
IPv4 over IPv6 DS-Lite service can be configured on a virtual network enabler (VNE) tunnel. In addition, VNE tunnel
fixed IP mode supports username and passwo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
738 | Network
To configure a DS-Lite tunnel between the FortiGate and the BR:
1. Configure the IPv6 interface:
config system interface
edit "wan1"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set role wan
set snmp-index 1
config ipv6
set ip6-allowaccess ping
set dhcp6-information-request enable
s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
739 | Network
ip6-extra-addr:
ip6-send-adv : disable
autoconf : enable
prefix : 2001:f70:2880:xxxx::/64
preferred-life-time : 942735360
valid-life-time : 1077411840
unique-autoconf-addr: enable
interface-identifier: ::
dhcp6-relay-service : disable
end
next
end
4. Verify the IPv6 address list:
# diagnose ipv6 address list
de... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
740 | Network
set type physical
set role wan
set snmp-index 1
config ipv6
set ip6-allowaccess ping
set dhcp6-information-request enable
set autoconf enable
end
next
end
2. Configure the VNE tunnel:
config system vne-tunnel
set status enable
set interface "wan1"
set ipv4-address 120.51.xxx.xxx1 255.255.255.255
set br "2001:f6... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
741 | Network
xxxx:fe39:ccd2<BR>UID=xxxxxx.v4v6.xxxxx.jp<BR>Address=2001:f70:2880:xxxx:xxxx:xxxx:fe39:
ccd2<BR><H2>* routerinfo check : OK</H2><H2>* records check : OK</H2><H2>* routerinfo
update : OK</H2><H2>* records update : OK</H2><H2>* DDNS API update : Success [2022-01-
18 18:37:58 1642498678]</H2>
Fixed IP rule client... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
742 | Network
Please note that the IPv6 addresses used in this example are for illustrative purposes only and
should not be used in your environment.
The 2001:db8::/32 prefix is a special IPv6 prefix designated for use in documentation
examples. See RFC 3849 for more information.
To configure SNMP for monitoring interface st... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
743 | Network
next
end
2. Configure the SNMP agent:
config system snmp sysinfo
set status enable
set description Branch
set contact-info "Jane Doe"
set location Burnaby
end
3. Configure an SNMP v3 user:
config system snmp user
edit "Interface_Status"
set notify-hosts6 2001:db8:d0c:2::1
set security-level auth-no-priv
set aut... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
744 | Network
The SNMP v3 trap is observed to be transmitted from port1 to the SNMP manager. It's also noteworthy that the
msgAuthenticationParameters are configured, signifying that authentication is active. However, the absence of
msgPrivacyParameters suggests that encryption is not in place, a fact further corroborated by... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
745 | Network
To view the routing table in the CLI:
# get router info6 routing-table
IPv6 Routing Table
Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF,
IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, B -... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
746 | Network
For IPv6, the main difference in OSPFv3 is that rather than using a network statement to enable OSPFv3 on an
interface, you define OSPF6 (OSPF for IPv6) interfaces, which are bound to the interface and area. This configuration
must be done in the CLI, as follows:
config router ospf6
set router-id <id>
config ar... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
747 | Network
IPv6 quick start example
In this example, a host belonging to a specific range on the internal IPv6 network can communicate exclusively with the
web server and FTP server.
Additionally, all internal clients can access the Internet.
Prerequisites
Before you begin to configure IPv6, go through the following steps... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
748 | Network
Please note that the IPv6 addresses used in this example are for illustrative purposes only and
should not be used in your environment.
The 2001:db8::/32 prefix is a special IPv6 prefix designated for use in documentation
examples. See RFC 3849 for more information.
To configure the example in the GUI:
1. Confi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
749 | Network
c. Fill out the fields with the following information:
Name FTP_Server
Type IPv6 Subnet
IPv6 Address 2001:db8:d0c:3::2/128
d. Select OK.
5. Configure the IPv6 address group, which includes both the Web and FTP servers:
a. Go to Policy & Objects > Addresses and select IPv6 Address Group.
b. Fill out the fields w... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
750 | Network
c. Name the policy and configure the following parameters:
Incoming Interface port2
Outgoing Interface port1
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
d. Click OK.
To configure the example in the CLI:
1. Configure the IPv6 address on port1, port2, and port3:
config system interface
ed... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
751 | Network
config firewall address6
edit "FTP_Server"
set ip6 2001:db8:d0c:3::2/128
next
end
5. Configure the IPv6 address group, which includes for the Web and FTP Servers:
config firewall addrgrp6
edit "Custom_Server"
set member "FTP_Server" "Web_Server"
next
end
6. Configure the IPv6 firewall address for the Internal I... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
752 | Network
Verification
The following commands can be used to verify that IPv6 traffic is entering and leaving the FortiGate as expected. See
Debugging the packet flow on page 4047 for more information.
diagnose debug enable
diagnose debug flow trace start6 200
The output below indicates that hosts belonging to the Intern... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
753 | Network
port3"
id=65308 trace_id=1 func=fw6_forward_handler line=530 msg="Denied by forward policy check"
Internal clients accessing the Internet:
The output below indicates that internal clients can successfully reach the internet.
1. Go to Log & Report > Forward Traffic.
2. View the log details in the GUI, or downloa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
754 | Network
To configure the example in the GUI:
1. Configure the HQ1 FortiGate.
a. Configure the IPv6 address on port2 and port3:
i. Go to Network > Interfaces and edit port2.
ii. Set IPv6 addressing mode to Manual and enter the IPv6 Address/Prefix.
IPv6 Address/Prefix 2001:db8:d0c:1::e/64
iii. Click OK.
iv. Repeat these ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.