index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
755
Network iii. Name the policy and configure the following parameters: Incoming Interface port3 Outgoing Interface to_HQ2 Source all Destination all Schedule always Service ALL Action ACCEPT iv. Click OK. d. Configure the IPv6 firewall policy to allow IPv6 traffic from the IPsec interface to port3: i. Go to Policy & Obje...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
756
Network vii. Repeat the first two steps and configure the following settings for the blackhole route: Destination 2001:db8:d0c:3::/64 Interface Blackhole Administrative Distance 254 viii. Select OK. 2. Configure the HQ2 FortiGate: a. Configure the IPv6 address on port2 and port3: i. Go to Network > Interfaces and edit ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
757
Network iii. Name the policy and configure the following parameters: Incoming Interface port3 Outgoing Interface to_HQ1 Source all Destination all Schedule always Service ALL Action ACCEPT iv. Click OK. d. Configure the IPv6 firewall policy to allow IPv6 traffic from the IPsec interface to port3: i. Go to Policy & Obje...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
758
Network vii. Repeat the first two steps and configure the following settings for the blackhole route: Destination 2001:db8:d0c:4::/64 Interface Blackhole Administrative Distance 254 viii. Select OK. To configure the example in the CLI: 1. Configure the HQ1 FortiGate. a. Configure the IPv6 address on port2 and port3: co...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
759
Network set dstaddr6 "all" set action accept set schedule "always" set service "ALL" set logtraffic "all" next edit 2 set srcintf "to_HQ2" set dstintf "port3" set srcaddr6 "all" set dstaddr6 "all" set action accept set schedule "always" set service "ALL" set logtraffic "all" next end d. Configure the static routes: con...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
760
Network set ip-version 6 set peertype any set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1 set remote-gw6 2001:db8:d0c:1::e set psksecret sample next end config vpn ipsec phase2-interface edit "to_HQ2" set phase1name "to_HQ1" set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
761
Network next end Verification The following commands are useful to check IPsec phase1/phase2 interface status: 1. Run the diagnose vpn ike gateway list command on HQ1. The system should return the following: vd: root/0 name: to_HQ2 version: 1 interface: port2 6 addr: 2001:db8:d0c:1::e:500 -> 2001:db8:d0c:2::e:500 tun_i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
762
Network npu_flag=00 npu_rgwy=2001:db8:d0c:2::e npu_lgwy=2001:db8:d0c:1::e npu_selid=0 dec_ npuid=0 enc_npuid=0 run_tally=0 Site-to-site IPv4 over IPv6 VPN example In this example, two private networks with IPv4 addressing communicate securely over IPv6 infrastructure. The following topology is used for this example: l ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
763
Network IP Version IPv6 Remote Gateway Static IP Address IP Address 2001:db8:d0c:2::e Interface port2 v. Configure the following Authentication settings: Method Pre-shared Key Pre-shared Key sample vi. Configure the following New Phase 2 settings: Local Address addr_subnet Remote Address addr_subnet c. Configure the IP...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
764
Network iii. Name the policy and configure the following parameters: Incoming Interface to_HQ2 Outgoing Interface port3 Source all Destination all Schedule always Service ALL Action ACCEPT iv. Click OK. e. Configure the static routes: i. Go to Network > Static Routes. ii. Click Create New > IPv6 Static Route. iii. Conf...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
765
Network iv. Go to Network > Interfaces and edit port3. v. Set Addressing mode to Manual and enter the IP/Netmask. IP/Netmask 192.168.3.1/24 b. Configure IPsec settings: i. Go to VPN > IPsec Wizard and enter a VPN name. ii. Set Template type to Custom. iii. Click Next. iv. Configure the following Network settings: IP Ve...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
766
Network iii. Name the policy and configure the following parameters: Incoming Interface to_HQ1 Outgoing Interface port3 Source all Destination all Schedule always Service ALL Action ACCEPT iv. Click OK. e. Configure the static routes: i. Go to Network > Static Routes. ii. Click Create New > IPv6 Static Route. iii. Conf...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
767
Network end next edit port3 set ip 192.168.2.1/24 next end b. Configure IPsec settings: config vpn ipsec phase1-interface edit "to_HQ2" set interface port2 set ip-version 6 set peertype any set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1 set remote-gw6 2001:db8:d0c:2::e set psksecret sample next end co...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
768
Network set gateway 2001:db8:d0c:1::f set device "port2" next end config router static edit 1 set dst 192.168.3.0 255.255.255.0 set device "to_HQ2" next edit 2 set dst 192.168.3.0 255.255.255.0 set device blackhole set distance 254 next end 2. Configure the HQ2 FortiGate. a. Configure the IPv6 address on port2 and IPv4...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
769
Network set dstintf "to_HQ1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set logtraffic "all" next edit 2 set srcintf "to_HQ1" set dstintf "port3" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set logtraffic "all" next end...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
770
Network IKE SA: created 1/1 established 1/1 time 0/0/0 ms IPsec SA: created 1/2 established 1/2 time 0/5/10 ms id/spi: 160 8d7231820bb5ffd9/6c840a4c11b57927 direction: initiator status: established 7215-7215s ago = 0ms proposal: aes128-sha256 key: 32d8521a77d98529-5fe4b67914d30f87 lifetime/rekey: 86400/78884 DPD sent/r...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
771
Network l Port2 connects to the IPv4 public network and port3 connects to the IPv6 local network. l HQ1 port2 IPv4 address is 10.0.0.1 and port3 IPv6 address is 2001:db8:d0c:4::e. l HQ2 port2 IPv4 address is 10.0.1.1 and port3 IPv6 address is 2001:db8:d0c:3::e. Please note that the IPv6 addresses used in this example a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
772
Network i. Go to Policy & Objects > Firewall Policy. ii. Click Create New. iii. Name the policy and configure the following parameters: Incoming Interface port3 Outgoing Interface to_HQ2 Source all Destination all Schedule always Service ALL Action ACCEPT iv. Click OK. d. Configure the IPv6 firewall policy to allow IPv...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
773
Network Interface to_HQ2 vi. Select OK. vii. Repeat the first two steps for IPv6 Static Route and configure the following settings for the blackhole route: Destination 2001:db8:d0c:3::/64 Interface Blackhole Administrative Distance 254 viii. Select OK. 2. Configure the HQ2 FortiGate: a. Configure the IPv4 address on po...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
774
Network i. Go to Policy & Objects > Firewall Policy. ii. Click Create New. iii. Name the policy and configure the following parameters: Incoming Interface port3 Outgoing Interface to_HQ1 Source all Destination all Schedule always Service ALL Action ACCEPT iv. Click OK. d. Configure the IPv6 firewall policy to allow IPv...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
775
Network Interface to_HQ1 vi. Select OK. vii. Repeat the first two steps for IPv6 Static Route and configure the following settings for the blackhole route: Destination 2001:db8:d0c:4::/64 Interface Blackhole Administrative Distance 254 viii. Select OK. To configure the example in the CLI: 1. Configure the HQ1 FortiGate...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
776
Network set srcaddr6 "all" set dstaddr6 "all" set action accept set schedule "always" set service "ALL" set logtraffic "all" next edit 2 set srcintf "to_HQ2" set dstintf "port3" set srcaddr6 "all" set dstaddr6 "all" set action accept set schedule "always" set service "ALL" set logtraffic "all" next end d. Configure the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
777
Network set interface port2 set ip-version 4 set peertype any set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1 set remote-gw 10.0.0.1 set psksecret sample next end config vpn ipsec phase2-interface edit "to_HQ2" set phase1name "to_HQ1" set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
778
Network set device blackhole set distance 254 next end Verification The following commands are useful to check IPsec phase1/phase2 interface status: 1. Run the diagnose vpn ike gateway list command on HQ1. The system should return the following: vd: root/0 name: to_HQ2 version: 1 interface: port2 6 addr: 10.0.0.1:500 -...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
779
Network ah=sha1 key=20 a931ee4518c365dae630431b25edfe6d930e8075 dec:pkts/bytes=22/1760, enc:pkts/bytes=24/2784 npu_flag=00 npu_rgwy=10.0.0.2 npu_lgwy=10.0.0.1 npu_selid=0 dec_npuid=0 enc_npuid=0 Basic OSPFv3 example In this example, three FortiGate devices are configured in an OSPF network. l 1st Floor FortiGate is the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
780
Network FortiGate Interface IP address 2nd Floor FortiGate (BDR) loopback 2.2.2.2 port1 2001:db8:d0c:2::2/64 port2 2001:db8:d0c:3::2/64 port3 2001:db8:d0c:5::1/64 Enterprise Core FortiGate (ASBR) loopback 13.13.13.13 port1 2001:db8:d0c:1::1/64 port2 2001:db8:d0c:3::1/64 port3 2001:db8:d0c:6::1/64 l Firewall policies ar...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
781
Network next end 2nd Floor FortiGate To configure 2nd Floor FortiGate in the CLI: config router ospf6 set router-id 2.2.2.2 config area edit 0.0.0.0 next end config ospf6-interface edit "2nd-Floor-FortiGate-Internal" set interface "port1" set priority 250 set dead-interval 40 set hello-interval 10 next edit "2nd-Floor-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
782
Network end config redistribute "bgp" set status enable end end Testing and configuration Both the network connectivity and OSPF routing are tested. When a link goes down, routes should converge as expected. 1. Working state l Enterprise Core FortiGate: # get router info6 ospf neighbor OSPFv3 Process (root) Neighbor ID...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
783
Network O 2001:db8:d0c:2::/64 [110/2] via fe80::20c:29ff:fe4d:f81f, port1, 00:16:36, [1024/0] [110/2] via fe80::20c:29ff:fe6b:b2c9, port2, 00:16:36, [1024/0] C 2001:db8:d0c:3::/64 via ::, port2, 00:17:23 O 2001:db8:d0c:4::/64 [110/2] via fe80::20c:29ff:fe4d:f81f, port1, 00:16:36, [1024/0] O 2001:db8:d0c:5::/64 [110/2] ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
784
Network The default route advertised by Enterprise Core FortiGate using default-information-originate is considered an OSPF E2 route. Other routes redistributed from BGP are also E2 routes. l 1st Floor FortiGate: # get router info6 ospf neighbor OSPFv3 Process (root) Neighbor ID Pri State Dead Time Interface 2.2.2.2 25...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
785
Network l Enterprise Core FortiGate: # get router info6 routing-table IPv6 Routing Table Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, B - BGP, V -...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
786
Network E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, B - BGP * - candidate default Timers: Uptime Routing table for VRF=0 O*E2 ::/0 [110/10] via fe80::20c:29ff:fe6b:b2bf, port1, 00:00:55 C ::1/128 via ::, root, 01:28:14 O E2 64:ff9b::/96 [110/10] via fe80::20c:29ff:fe6b:b2bf, port1, 00:00:55 C 2001:d...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
787
Network 4. In the Neighbors table, click Create New and set the following: IP 2001:db8:d0c:6::2 Remote AS 64510 5. Click OK. 6. Under IPv6 Networks, set IP/Netmask to 2001:db8:d0c:6::/64. 7. Click Apply. To configure BGP on the Enterprise Core FortiGate in the CLI: config router bgp set as 64511 set router-id 13.13.13....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
788
Network 0 announced prefixes For address family: VPNv4 Unicast BGP table version 1, neighbor version 0 Index 1, Offset 0, Mask 0x2 Community attribute sent to this neighbor (both) 0 accepted prefixes, 0 prefixes in rib 0 announced prefixes For address family: IPv6 Unicast BGP table version 3, neighbor version 2 Index 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
789
Network To verify the routing table: # get router info6 routing-table IPv6 Routing Table Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, B - BGP, V -...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
790
Network 4. Configure the IP pool: a. Enter a Name. b. Set the Type to NPTv6. c. Enter the Internal prefix and External prefix. d. Click OK. How NPTv6 works NPTv6 works on the principle that network translation is accomplished using a stateless approach, and that it is checksum-neutral at the transport layer. For instan...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
791
Network To configure the NPTv6 IP pool: 1. Configure the NPTv6 IP pool and prefix length: The internal and external prefix must be the same length. config firewall ippool6 edit "NPTv6-ippool6-1" set type nptv6 set internal-prefix 2000:10:1:100::/64 set external-prefix 2000:172:16:200::/64 next end 2. Apply the IP pool ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
792
Network address_dst(1): all uuid_idx=8045 service(1): [0:0x0:0/(0,65535)->(0,65535)] helper:auto nat(0): nat_64(0): nptv6(1): 2000:10:1:100::/64->2000:172:16:200::/64 adjust=FD88 3. Verify the session table. The translated IP address shows 2000:172:16:200:fd88::41 after applying the external prefix and the adjustment. ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
793
Network [flowlabel 0xa0b59] ^C 8 packets received by filter 0 packets dropped by kernel The IPv6 prefix and subnet fields have been translated but the host field remains unchanged. Enhancing SIP reliability in 464XLAT environments FortiGate can now disable IP address translation within the SIP payload in 464XLAT enviro...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
794
Network 1. The CLAT component run insides the user equipment (UE) and performs a one-to-one (IPv4 to IPv6) stateless translation. The CLAT component translates traffic with an IPv4 destination to IPv6. While the IPv4 address is converted to IPv6 in the IP header, the IP information within the payload, including the SIP...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
795
Network     txn 7fc9eb250e00 (REGISTER)       cseq 49308 dir 0 state 5 status 200 expiry 903 HA 0       i_session: 7fc9eb250000  r_session: 7fc9eb250000       register: present       from: sip:1001@172.16.200.44       to: sip:1001@172.16.200.44       src: [2000:1:1:1::1:6e0c]:49555       dst: 172.16.200.44:5060   vdom ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
796
Network   vdom 1 (vdom1) vrf 0 call 7fc9eb265000     call-id: QFwxzc1FTIYZQJsQZW3-kKofMxJUcxaB     txn 7fc9eb250e00 (REGISTER)       cseq 49308 dir 0 state 5 status 200 expiry 871 HA 0       i_session: 7fc9eb250000  r_session: 7fc9eb250000       register: present       from: sip:1001@172.16.200.44       to: sip:1001@17...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
797
Network 3. View the IPv6 expectation session list: # diagnose sys session6 list expectation ... orgin->sink: org pre->post, reply pre->post dev=34->0/43->0 hook=post dir=org act=noop 2000:1:1:1::1:6e0c:0->2000:172:16:200::44:64448(:::0) peer=172.16.200.6:64444->172.16.200.33:4000 naf=1 ... orgin->sink: org pre->post, r...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
798
Network orgin->sink: org pre->post, reply pre->post dev=43->23/23->0 gwy=172.16.200.44/0.0.0.0 hook=pre dir=org act=noop 172.16.200.6:64444->172.16.200.44:18764(0.0.0.0:0) hook=post dir=reply act=noop 172.16.200.44:18764->172.16.200.6:64444(0.0.0.0:0) peer=2000:172:16:200::44:64446->2000:1:1:1::1:6e0c:9117 naf=2 hook=p...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
799
Network l Example CLI configuration on page 800 l Example GUI configuration on page 806 l DHCP client mode for inter-VDOM links on page 811 l FortiGate secure edge to FortiSASE on page 812 l WiFi access point with internet connectivity on page 815 Example CLI configuration In this example, the Controller provides secur...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
800
Network set ip 1.1.1.10 255.255.255.0 set allowaccess fabric ping set ip-managed-by-fortiipam disable next end IPAM is specifically disabled for this interface since a static IP address is desired for this topology. 2. On the FortiGate Connector: a. Enable VDOMs: config system global set vdom-mode multi-vdom end You wi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
801
Network set vdom "lan-ext" set ip 6.6.6.1 255.255.255.0 set allowaccess ping fabric set type physical set lldp-reception enable set role wan next end 3. On the FortiGate Controller: a. Extension controller configurations are automatically initialized: config extension-controller fortigate-profile edit "FGCONN-lanext-de...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
802
Network The VXLANs are built on the IPsec tunnels between the Connector and Controller. The VXLAN interfaces are aggregated for load balancing and redundancy. A softswitch combines the aggregate interface with the local LAN ports, allowing the LAN ports to be part of the VXLAN. This combines the local LAN ports with th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
803
Network config system interface edit "le-agg-link" set vdom "lan-ext" set type aggregate set member "vx-port1" "vx-port2" set snmp-index 35 set lacp-mode static set algorithm Source-MAC next end d. The softswitch is automatically configured and bridges the aggregate interface and the local LAN to connect the LAN to the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
804
Network edit 1 set start-ip 9.9.9.254 set end-ip 9.9.9.254 next end next end 3. Configure the firewall policy to allow traffic from the LAN extension interface to the WAN interface (port1): config firewall policy edit "2" set name "lan-ext" set srcintf "FGT60F0000000001" set dstintf "port1" set action accept set srcadd...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
805
Network controller ip: 1.1.1.0 controller port: 5246 controller name: FG5H1E0000000001 missed echo: 0 up time(seconds): 29483 status: EXTWS_RUN Data-Channel: uplink [0]: port1 IPsec tunnel ul-port1 VxLAN interface vx-port1 uplink [1]: port2 IPsec tunnel ul-port2 VxLAN interface vx-port2 downlink [0]: lan In this exampl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
806
Network a. Go to System > Settings. b. In the System Operation Settings sections, enable Virtual Domains. c. Click OK. You will be logged out of the device when VDOM mode is enabled. 4. On the FortiGate Connector, enable the FortiExtender setting. For high-end models (1000 series and higher) and VM models, enter: confi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
807
Network c. Click OK. 7. On the FortiGate Connector, edit port5: a. Set the Role to LAN. b. Set the Virtual domain to lan-extvdom. The addressing mode is set to Manual and the IP/Netmask set to 0.0.0.0/0.0.0.0 because port5 will become part of the le-switch software switch, which has its own IP address already assigned....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
808
Network 8. On the FortiGate Connector, select the LAN extension VDOM, and enter the IP address of the FortiGate controller: a. Go to Network > LAN Extension. b. Set the Access Controller (AC) address to the IP address of port3 on the FortiGate Controller. In this example, use 172.31.0.254. c. Click Apply. 9. On the For...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
809
Network d. Click OK. 11. On the FortiGate Controller, configure the default gateway if a static WAN IP configuration is used: a. Go to Network > Static Routes and edit the default gateway settings to specify the correct internet gateway address and WAN interface. b. Click OK. 12. On the FortiGate Controller, configure ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
810
Network DHCP client mode for inter-VDOM links Continuing with the same configuration as Example GUI configuration on page 806, a new VDOM named lan-extvdom was created on the FortiGate Connector and its type was set to LAN extension. This configuration allows the VDOM to function as a FortiExtender in LAN extension mod...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
811
Network configuration on page 806) and the root VDOM clients (in this example) through the FortiGate Connector LAN extension VXLAN aggregate link. 3. Verify that the lan_ext1 interface obtained an IP address from the FortiGate Controller (the client IP address for the lan_ext1 VDOM link is from the same 192.168.0.0/24 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
812
Network See Connecting FortiGate to FortiSASE using GUI and CLI for details on how to find the FortiSASE domain name. In this example, the VDOM name is ext, and the FortiSASE domain name is turbo￾a1p0hv3p.edge.prod.fortisase.com. config vdom edit ext config system settings set vdom-type lan-extension set lan-extension-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
813
Network end next end 7. In FortiSASE, authorize the FortiGate as a LAN extension in the Edge Devices > FortiGates page. See Authorizing a FortiGate. 8. In the LAN extension VDOM, in Network > LAN Extension observe that the Connection Summary shows values for the Access Controller Name, Access Controller IP, and Connect...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
814
Network a. Within the root VDOM, create a firewall policy with wan2 (second ISP link on FortiGate with proper routing already set up) as the destination and lan as the source within the traffic VDOM to allow local traffic in the IP address range for static IP clients in the LAN subnet (LAN-STATIC-RANGE) from the FortiG...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
815
Network Creating a LAN extension SSID for FortiExtender Use the FortiExtender SSIDs tab to create a LAN extension SSID for a managed FortiExtender device. In this The SSID name in this example is 2G-lanext. To create a LAN extension SSID for FortiExtender in the GUI: 1. Go to Network > FortiExtenders > FortiExtender SS...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
816
Network Configuring a FortiExtender profile Use a FortiExtender profile to define the LAN extension settings, such as the radio band for the LAN extension SSID, to create a WiFi SSID. The FortiExtender profile in this example is named FVA22F-lanext-default, and the LAN extension named 2G-lanext is selected to create a ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
817
Network config modem1 end config modem2 end end config lan-extension set ipsec-tunnel "fext-ipsec-g18O" set backhaul-interface "lan" config backhaul edit "1" set port wan set role primary next edit "2" set port lte1 set role secondary next config wifi set country CA config radio-1 set mode AP set band 2.4GHz set status...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
818
Network 4. Set the remaining settings as desired, and click OK. To apply the profile and authorize FortiExtender in the CLI: config extension-controller extender edit "FV017TF23000004" set id "FVA22FTF23000004" set authorized enable set device-id 0 set extension-type lan-extension set profile "FVA22F-lanext-default" ne...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
819
Network 4. Set the remaining options as desired, and click OK. To configure the LAN extension interface as a DHCP server in the CLI: 1. Assign an IP address to the LAN extension interface: config system interface edit "FV017TF23000004" set vdom "root" set ip 172.31.0.254 255.255.255.0 set allowaccess ping ssh set type ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
820
Network config ip-range edit 1 set start-ip 172.31.0.1 set end-ip 172.31.0.254 next end set dhcp-settings-from-fortiipam enable config exclude-range edit 1 set start-ip 172.31.0.254 set end-ip 172.31.0.254 next end next end 3. Confirm that the DHCP server can assign IP addresses to clients connecting to the FortiExtend...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
821
Network 4. Set the remaining options as desired, and click OK. To configure a firewall policy to use the LAN extension interface in the GUI: config firewall policy ... edit 4 set name "lan-ext" set uuid 341c7010-270b-51ec-16b6-309891e3e880 set srcintf "FV017TF23000004" set dstintf "dmz" set action accept set srcaddr "a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
822
Network 2. Go to Switch Interface, and verify that the device received the WiFi interface for the LAN extension. In this example, the WiFi interface is named 2G-lan. 3. Go to Wi-Fi Status, and verify that the WiFi client is connected to the LAN extension SSID. In this example, the client is connected to 2G-lanext. 4. C...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
823
Network end end allow The NP7 platform will forward all SCTP packets with zero checksum. drop The NP7 platform will drop all SCTP packets with zero checksum. This is the default value. trap-to-host NP7 anomaly protection for SCTP will be disabled and SCTP packets with zero checksum will be forwarded. This option can al...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
824
Network 5. Set the remaining options as desired, and click OK. To enable Industrial Connectivity for an interface in the CLI: config system interface edit <name> set allowaccess icond ... next end set allowaccess icond Specify what types of management protocols can access the interface: l icond: Industrial Connectivity...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
825
Network In the following topology, PC1 uses the IEC 60870-5-101 (shortened to IEC-101) protocol to transmit data from SCADA systems to FortiGate Rugged, where the data is converted to the IEC 60870-5-104 (shortened to IEC-104) protocol, and sent to PC2. The data is converted as follows: l FortiGate Rugged transmits dat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
826
Network iec101-trp  : 2500 iec104-t1 : 15 iec104-t2 : 10 iec104-t3 : 20 iec104-k  : 12 iec104-w  : 8 Sample configuration to convert Modbus serial to Modbus TCP After the Industrial Connectivity service is enabled and configured for an interface, supported FortiGate Rugged devices can receive data from Modbus networks ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
827
Network modbus-serial-mode  : RTU/ASCII modbus-serial-addr  : 1 modbus-serial-timeout-resp: 500 modbus-tcp-unit-id  : 255 Diagnostics Administrators can use the Diagnostics page to access the following tools:  Capture packet Captures packet streams in real-time to let you view header and payload information. See Using ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
828
Network When creating the packet capture: l The Name field must be a unique name for the packet capture criteria being configured. l Enabling Include non-IP packets allows non-IP address packets to be captured when enabled. Supported non-IP address packet types include ARP, RARP, LLC, LLDP, VLAN, and LACPDU. When the p...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
829
Network a. Basic: enter criteria for the Host, Port, and Protocol number. b. Advanced: enter a string, such as src host 172.16.200.254 and dst host 172.16.200.1 and dst port 443. 4. Click Start capture. The capture is visible in real-time. 5. While the capture is running, select a packet, then click the Headers or Pack...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
830
Network 6. When the capture is finished, click Save as pcap. The PCAP file is automatically downloaded. 7. Optionally, use the Search bar or the column headers to filter the results further. Multiple packet captures Multiple packet captures can be run simultaneously for when many packet captures are needed for one situ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
831
Network next end 2. Run packet capture commands: a. List all of the packet captures: # diagnose on-demand-sniffer list  mkey: port1 Capture interface: port1 status: not_started start time:  end time: b. Start a packet capture: # diagnose on-demand-sniffer start "port1 Capture" c. Stop a packet capture: # diagnose on-de...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
832
Network b. Advanced: filter by Source IP, Source port, Destination IP, Destination port, and Protocol, which is the equivalent of: l # diagnose debug flow filter saddr <addr/range> l # diagnose debug flow filter sport <port/range> l # diagnose debug flow filter daddr <addr/range> l # diagnose debug flow filter dport <p...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
833
Network 4. When the debug flow is finished (or you click Stop debug flow), click Save as CSV. The CSV file is automatically downloaded. FortiOS 7.6.2 Administration Guide 834 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
834
Network The current output can be filtered by Time and Message. The Function field can be added. 5. Hover over the table header and click the gear icon (Configure Table). 6. Select Function and click Apply. The Function column is displayed and can be used to filter the output for further analysis. FortiOS 7.6.2 Adminis...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
835
Network FortiOS 7.6.2 Administration Guide 836 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
836
SD-WAN The following topics provide information about SD-WAN: l SD-WAN overview on page 837 l SD-WAN quick start on page 841 l SD-WAN members and zones on page 851 l Performance SLA on page 866 l SD-WAN rules on page 938 l Advanced routing on page 1039 l VPN overlay on page 1070 l Advanced configuration on page 1174 l ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
837
SD-WAN The control, data plane, and security layer can only be deployed on a FortiGate. The other two layers can help to scale and enhance the solution. For large deployments, FortiManager and FortiAnalyzer provide the management and orchestration capabilities FortiSwitch and FortiAP provide the components to deploy an...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
838
SD-WAN Overlay VPN overlays are needed when traffic must travel across multiple sites. These are usually site-to-site IPsec tunnels that interconnect branches, datacenters, and the cloud, forming a hub-and-spoke topology. The management and maintenance of the tunnels should be considered when determining the overlay ne...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
839
SD-WAN l Active probing requires manually defining the server to be probed, and generates consistent probing traffic. l Passive probing uses active sessions that are passing through firewall policies used by the related SD-WAN interfaces to derive health measurements. It reduces the amount of configuration, and elimina...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
840
SD-WAN For more details, see the SD-WAN / SD-Branch Architecture for MSSPs guide. SD-WAN quick start This section provides an example of how to start using SD-WAN for load balancing and redundancy. In this example, two ISP internet connections, wan1 (DHCP) and wan2 (static), use SD-WAN to balance traffic between them a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
841
SD-WAN configurations on the FortiGate. In this step, two interfaces are configured and added to the default SD-WAN zone (virtual-wan-link) as SD-WAN member interfaces. This example uses a mix of static and dynamic IP addresses; your deployment could also use only one or the other. Once the SD-WAN members are created a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
842
SD-WAN 8. Repeat the above steps for wan2, setting Gateway to the ISP's gateway: 10.100.20.2. Adding a static route You must configure a default route for the SD-WAN. The default gateways for each SD-WAN member interface do not need to be defined in the static routes table. FortiGate will decide what route or routes ar...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
843
SD-WAN Selecting the implicit SD-WAN algorithm SD-WAN rules define specific routing options to route traffic to an SD-WAN member. If no routing rules are defined, the default Implicit rule is used. It can be configured to use one of five different load balancing algorithms. See Implicit rule on page 946 for more detail...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
844
SD-WAN 3. Configure the following: Name Enter a name for the policy. Incoming Interface internal Outgoing Interface virtual-wan-link Source all Destination all Schedule always Service ALL Action ACCEPT Firewall / Network Options Enable NAT and set IP Pool Configuration to Use Outgoing Interface Address. Security Profil...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
845
SD-WAN SLA targets are not required for link monitoring. 5. Configure the required metrics in Link Status. 6. Ensure that Update static route is enabled. This disables static routes for the inactive interface and restores routes on recovery. 7. Click OK. Results The following GUI pages show the function of the SD-WAN a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
846
SD-WAN Bandwidth Select Bandwidth to view the amount of downloaded and uploaded data for each interface. Volume Select Volume to see donut charts of the received and sent bytes on the interfaces. Sessions Select Sessions to see a donut chart of the number of active sessions on each interface. Performance SLA Go to Netw...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
847
SD-WAN Packet loss Select Packet Loss to see the percentage of packets lost for each member. Latency Select Latency to see the current latency, in milliseconds, for each member. Jitter Select Jitter to see the jitter, in milliseconds, for each member. FortiOS 7.6.2 Administration Guide 848 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
848
SD-WAN Routing table Go to Dashboard > Network, expand the Routing widget, and select Static & Dynamic to review all static and dynamic routes. For more information about the widget, see Static & Dynamic Routing monitor on page 120. Firewall policy Go to Policy & Objects > Firewall Policy to review the SD-WAN policy. C...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
849
SD-WAN config system sdwan set status enable config members edit 1 set interface "wan1" next edit 2 set interface "wan2" set gateway 10.100.20.2 next end end If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone. 3. Create a static route for SD-WAN: config router static edit 1 set sdwan...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
850
SD-WAN next end 6. Configure a performance SLA: config system sdwan config health-check edit "server" set server "208.91.112.53" set update-static-route enable set members 1 2 next end end Results To view the routing table: # get router info routing-table all Routing table for VRF=0 Codes: K - kernel, C - connected, S ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
851
SD-WAN Individual SD-WAN member interfaces cannot be used directly in policies, but they can be moved between SD-WAN zones at any time. If a member interface requires a special SD-WAN consideration, it can be put into an SD-WAN zone by itself. SD-WAN zones and members can be used in IPv4 and IPv6 static routes to make ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
852
SD-WAN GUI option CLI option Description Interface interface Select the interface to use as an SD-WAN member. Optionally, select None in the GUI to not use an interface yet. SD-WAN Zone zone Select the destination zone if it exists at the time of member creation. Otherwise, the default virtual-wan-link zone is applied....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
853
SD-WAN To configure the SD-WAN members and add them to the default zone in the CLI: config system sdwan config members edit 1 set interface "WAN1" set zone "virtual-wan-link" next edit 2 set interface "WAN2" set zone "virtual-wan-link" next edit 3 set interface "VPN1" set zone "virtual-wan-link" next edit 4 set interfa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
854
SD-WAN To configure the SD-WAN zones in the CLI: 1. Configure the SD-WAN zones: config system sdwan config zone edit "Overlay" next edit "Underlay" next end end 2. Add the member interfaces to their respective zones: config system sdwan config members edit 1 set interface WAN1 set zone "Underlay" next edit 2 set interf...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf