index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
755 | Network
iii. Name the policy and configure the following parameters:
Incoming Interface port3
Outgoing Interface to_HQ2
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
iv. Click OK.
d. Configure the IPv6 firewall policy to allow IPv6 traffic from the IPsec interface to port3:
i. Go to Policy & Obje... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
756 | Network
vii. Repeat the first two steps and configure the following settings for the blackhole route:
Destination 2001:db8:d0c:3::/64
Interface Blackhole
Administrative Distance 254
viii. Select OK.
2. Configure the HQ2 FortiGate:
a. Configure the IPv6 address on port2 and port3:
i. Go to Network > Interfaces and edit ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
757 | Network
iii. Name the policy and configure the following parameters:
Incoming Interface port3
Outgoing Interface to_HQ1
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
iv. Click OK.
d. Configure the IPv6 firewall policy to allow IPv6 traffic from the IPsec interface to port3:
i. Go to Policy & Obje... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
758 | Network
vii. Repeat the first two steps and configure the following settings for the blackhole route:
Destination 2001:db8:d0c:4::/64
Interface Blackhole
Administrative Distance 254
viii. Select OK.
To configure the example in the CLI:
1. Configure the HQ1 FortiGate.
a. Configure the IPv6 address on port2 and port3:
co... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
759 | Network
set dstaddr6 "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic "all"
next
edit 2
set srcintf "to_HQ2"
set dstintf "port3"
set srcaddr6 "all"
set dstaddr6 "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic "all"
next
end
d. Configure the static routes:
con... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
760 | Network
set ip-version 6
set peertype any
set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
set remote-gw6 2001:db8:d0c:1::e
set psksecret sample
next
end
config vpn ipsec phase2-interface
edit "to_HQ2"
set phase1name "to_HQ1"
set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm
aes... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
761 | Network
next
end
Verification
The following commands are useful to check IPsec phase1/phase2 interface status:
1. Run the diagnose vpn ike gateway list command on HQ1. The system should return the following:
vd: root/0
name: to_HQ2
version: 1
interface: port2 6
addr: 2001:db8:d0c:1::e:500 -> 2001:db8:d0c:2::e:500
tun_i... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
762 | Network
npu_flag=00 npu_rgwy=2001:db8:d0c:2::e npu_lgwy=2001:db8:d0c:1::e npu_selid=0 dec_
npuid=0 enc_npuid=0
run_tally=0
Site-to-site IPv4 over IPv6 VPN example
In this example, two private networks with IPv4 addressing communicate securely over IPv6 infrastructure.
The following topology is used for this example:
l ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
763 | Network
IP Version IPv6
Remote Gateway Static IP Address
IP Address 2001:db8:d0c:2::e
Interface port2
v. Configure the following Authentication settings:
Method Pre-shared Key
Pre-shared Key sample
vi. Configure the following New Phase 2 settings:
Local Address addr_subnet
Remote Address addr_subnet
c. Configure the IP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
764 | Network
iii. Name the policy and configure the following parameters:
Incoming Interface to_HQ2
Outgoing Interface port3
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
iv. Click OK.
e. Configure the static routes:
i. Go to Network > Static Routes.
ii. Click Create New > IPv6 Static Route.
iii. Conf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
765 | Network
iv. Go to Network > Interfaces and edit port3.
v. Set Addressing mode to Manual and enter the IP/Netmask.
IP/Netmask 192.168.3.1/24
b. Configure IPsec settings:
i. Go to VPN > IPsec Wizard and enter a VPN name.
ii. Set Template type to Custom.
iii. Click Next.
iv. Configure the following Network settings:
IP Ve... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
766 | Network
iii. Name the policy and configure the following parameters:
Incoming Interface to_HQ1
Outgoing Interface port3
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
iv. Click OK.
e. Configure the static routes:
i. Go to Network > Static Routes.
ii. Click Create New > IPv6 Static Route.
iii. Conf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
767 | Network
end
next
edit port3
set ip 192.168.2.1/24
next
end
b. Configure IPsec settings:
config vpn ipsec phase1-interface
edit "to_HQ2"
set interface port2
set ip-version 6
set peertype any
set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
set remote-gw6 2001:db8:d0c:2::e
set psksecret sample
next
end
co... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
768 | Network
set gateway 2001:db8:d0c:1::f
set device "port2"
next
end
config router static
edit 1
set dst 192.168.3.0 255.255.255.0
set device "to_HQ2"
next
edit 2
set dst 192.168.3.0 255.255.255.0
set device blackhole
set distance 254
next
end
2. Configure the HQ2 FortiGate.
a. Configure the IPv6 address on port2 and IPv4... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
769 | Network
set dstintf "to_HQ1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic "all"
next
edit 2
set srcintf "to_HQ1"
set dstintf "port3"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic "all"
next
end... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
770 | Network
IKE SA: created 1/1 established 1/1 time 0/0/0 ms
IPsec SA: created 1/2 established 1/2 time 0/5/10 ms
id/spi: 160 8d7231820bb5ffd9/6c840a4c11b57927
direction: initiator
status: established 7215-7215s ago = 0ms
proposal: aes128-sha256
key: 32d8521a77d98529-5fe4b67914d30f87
lifetime/rekey: 86400/78884
DPD sent/r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
771 | Network
l Port2 connects to the IPv4 public network and port3 connects to the IPv6 local network.
l HQ1 port2 IPv4 address is 10.0.0.1 and port3 IPv6 address is 2001:db8:d0c:4::e.
l HQ2 port2 IPv4 address is 10.0.1.1 and port3 IPv6 address is 2001:db8:d0c:3::e.
Please note that the IPv6 addresses used in this example a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
772 | Network
i. Go to Policy & Objects > Firewall Policy.
ii. Click Create New.
iii. Name the policy and configure the following parameters:
Incoming Interface port3
Outgoing Interface to_HQ2
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
iv. Click OK.
d. Configure the IPv6 firewall policy to allow IPv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
773 | Network
Interface to_HQ2
vi. Select OK.
vii. Repeat the first two steps for IPv6 Static Route and configure the following settings for the blackhole route:
Destination 2001:db8:d0c:3::/64
Interface Blackhole
Administrative Distance 254
viii. Select OK.
2. Configure the HQ2 FortiGate:
a. Configure the IPv4 address on po... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
774 | Network
i. Go to Policy & Objects > Firewall Policy.
ii. Click Create New.
iii. Name the policy and configure the following parameters:
Incoming Interface port3
Outgoing Interface to_HQ1
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
iv. Click OK.
d. Configure the IPv6 firewall policy to allow IPv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
775 | Network
Interface to_HQ1
vi. Select OK.
vii. Repeat the first two steps for IPv6 Static Route and configure the following settings for the blackhole route:
Destination 2001:db8:d0c:4::/64
Interface Blackhole
Administrative Distance 254
viii. Select OK.
To configure the example in the CLI:
1. Configure the HQ1 FortiGate... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
776 | Network
set srcaddr6 "all"
set dstaddr6 "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic "all"
next
edit 2
set srcintf "to_HQ2"
set dstintf "port3"
set srcaddr6 "all"
set dstaddr6 "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic "all"
next
end
d. Configure the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
777 | Network
set interface port2
set ip-version 4
set peertype any
set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
set remote-gw 10.0.0.1
set psksecret sample
next
end
config vpn ipsec phase2-interface
edit "to_HQ2"
set phase1name "to_HQ1"
set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
778 | Network
set device blackhole
set distance 254
next
end
Verification
The following commands are useful to check IPsec phase1/phase2 interface status:
1. Run the diagnose vpn ike gateway list command on HQ1. The system should return the following:
vd: root/0
name: to_HQ2
version: 1
interface: port2 6
addr: 10.0.0.1:500 -... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
779 | Network
ah=sha1 key=20 a931ee4518c365dae630431b25edfe6d930e8075
dec:pkts/bytes=22/1760, enc:pkts/bytes=24/2784
npu_flag=00 npu_rgwy=10.0.0.2 npu_lgwy=10.0.0.1 npu_selid=0 dec_npuid=0 enc_npuid=0
Basic OSPFv3 example
In this example, three FortiGate devices are configured in an OSPF network.
l 1st Floor FortiGate is the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
780 | Network
FortiGate Interface IP address
2nd Floor FortiGate (BDR) loopback 2.2.2.2
port1 2001:db8:d0c:2::2/64
port2 2001:db8:d0c:3::2/64
port3 2001:db8:d0c:5::1/64
Enterprise Core FortiGate (ASBR) loopback 13.13.13.13
port1 2001:db8:d0c:1::1/64
port2 2001:db8:d0c:3::1/64
port3 2001:db8:d0c:6::1/64
l Firewall policies ar... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
781 | Network
next
end
2nd Floor FortiGate
To configure 2nd Floor FortiGate in the CLI:
config router ospf6
set router-id 2.2.2.2
config area
edit 0.0.0.0
next
end
config ospf6-interface
edit "2nd-Floor-FortiGate-Internal"
set interface "port1"
set priority 250
set dead-interval 40
set hello-interval 10
next
edit "2nd-Floor-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
782 | Network
end
config redistribute "bgp"
set status enable
end
end
Testing and configuration
Both the network connectivity and OSPF routing are tested. When a link goes down, routes should converge as
expected.
1. Working state
l Enterprise Core FortiGate:
# get router info6 ospf neighbor
OSPFv3 Process (root)
Neighbor ID... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
783 | Network
O 2001:db8:d0c:2::/64 [110/2] via fe80::20c:29ff:fe4d:f81f, port1, 00:16:36,
[1024/0]
[110/2] via fe80::20c:29ff:fe6b:b2c9, port2, 00:16:36,
[1024/0]
C 2001:db8:d0c:3::/64 via ::, port2, 00:17:23
O 2001:db8:d0c:4::/64 [110/2] via fe80::20c:29ff:fe4d:f81f, port1, 00:16:36,
[1024/0]
O 2001:db8:d0c:5::/64 [110/2] ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
784 | Network
The default route advertised by Enterprise Core FortiGate using default-information-originate is
considered an OSPF E2 route. Other routes redistributed from BGP are also E2 routes.
l 1st Floor FortiGate:
# get router info6 ospf neighbor
OSPFv3 Process (root)
Neighbor ID Pri State Dead Time Interface
2.2.2.2 25... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
785 | Network
l Enterprise Core FortiGate:
# get router info6 routing-table
IPv6 Routing Table
Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF,
IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, B - BGP, V -... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
786 | Network
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, B - BGP
* - candidate default
Timers: Uptime
Routing table for VRF=0
O*E2 ::/0 [110/10] via fe80::20c:29ff:fe6b:b2bf, port1, 00:00:55
C ::1/128 via ::, root, 01:28:14
O E2 64:ff9b::/96 [110/10] via fe80::20c:29ff:fe6b:b2bf, port1, 00:00:55
C 2001:d... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
787 | Network
4. In the Neighbors table, click Create New and set the following:
IP 2001:db8:d0c:6::2
Remote AS 64510
5. Click OK.
6. Under IPv6 Networks, set IP/Netmask to 2001:db8:d0c:6::/64.
7. Click Apply.
To configure BGP on the Enterprise Core FortiGate in the CLI:
config router bgp
set as 64511
set router-id 13.13.13.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
788 | Network
0 announced prefixes
For address family: VPNv4 Unicast
BGP table version 1, neighbor version 0
Index 1, Offset 0, Mask 0x2
Community attribute sent to this neighbor (both)
0 accepted prefixes, 0 prefixes in rib
0 announced prefixes
For address family: IPv6 Unicast
BGP table version 3, neighbor version 2
Index 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
789 | Network
To verify the routing table:
# get router info6 routing-table
IPv6 Routing Table
Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF,
IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, B - BGP, V -... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
790 | Network
4. Configure the IP pool:
a. Enter a Name.
b. Set the Type to NPTv6.
c. Enter the Internal prefix and External prefix.
d. Click OK.
How NPTv6 works
NPTv6 works on the principle that network translation is accomplished using a stateless approach, and that it is
checksum-neutral at the transport layer. For instan... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
791 | Network
To configure the NPTv6 IP pool:
1. Configure the NPTv6 IP pool and prefix length:
The internal and external prefix must be the same length.
config firewall ippool6
edit "NPTv6-ippool6-1"
set type nptv6
set internal-prefix 2000:10:1:100::/64
set external-prefix 2000:172:16:200::/64
next
end
2. Apply the IP pool ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
792 | Network
address_dst(1):
all uuid_idx=8045
service(1):
[0:0x0:0/(0,65535)->(0,65535)] helper:auto
nat(0):
nat_64(0):
nptv6(1):
2000:10:1:100::/64->2000:172:16:200::/64 adjust=FD88
3. Verify the session table. The translated IP address shows 2000:172:16:200:fd88::41 after applying the external
prefix and the adjustment.
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
793 | Network
[flowlabel 0xa0b59]
^C
8 packets received by filter
0 packets dropped by kernel
The IPv6 prefix and subnet fields have been translated but the host field remains unchanged.
Enhancing SIP reliability in 464XLAT environments
FortiGate can now disable IP address translation within the SIP payload in 464XLAT enviro... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
794 | Network
1. The CLAT component run insides the user equipment (UE) and performs a one-to-one (IPv4 to IPv6) stateless
translation. The CLAT component translates traffic with an IPv4 destination to IPv6. While the IPv4 address is
converted to IPv6 in the IP header, the IP information within the payload, including the SIP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
795 | Network
txn 7fc9eb250e00 (REGISTER)
cseq 49308 dir 0 state 5 status 200 expiry 903 HA 0
i_session: 7fc9eb250000 r_session: 7fc9eb250000
register: present
from: sip:1001@172.16.200.44
to: sip:1001@172.16.200.44
src: [2000:1:1:1::1:6e0c]:49555
dst: 172.16.200.44:5060
vdom ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
796 | Network
vdom 1 (vdom1) vrf 0 call 7fc9eb265000
call-id: QFwxzc1FTIYZQJsQZW3-kKofMxJUcxaB
txn 7fc9eb250e00 (REGISTER)
cseq 49308 dir 0 state 5 status 200 expiry 871 HA 0
i_session: 7fc9eb250000 r_session: 7fc9eb250000
register: present
from: sip:1001@172.16.200.44
to: sip:1001@17... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
797 | Network
3. View the IPv6 expectation session list:
# diagnose sys session6 list expectation
...
orgin->sink: org pre->post, reply pre->post dev=34->0/43->0
hook=post dir=org act=noop 2000:1:1:1::1:6e0c:0->2000:172:16:200::44:64448(:::0)
peer=172.16.200.6:64444->172.16.200.33:4000 naf=1
...
orgin->sink: org pre->post, r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
798 | Network
orgin->sink: org pre->post, reply pre->post dev=43->23/23->0 gwy=172.16.200.44/0.0.0.0
hook=pre dir=org act=noop 172.16.200.6:64444->172.16.200.44:18764(0.0.0.0:0)
hook=post dir=reply act=noop 172.16.200.44:18764->172.16.200.6:64444(0.0.0.0:0)
peer=2000:172:16:200::44:64446->2000:1:1:1::1:6e0c:9117 naf=2
hook=p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
799 | Network
l Example CLI configuration on page 800
l Example GUI configuration on page 806
l DHCP client mode for inter-VDOM links on page 811
l FortiGate secure edge to FortiSASE on page 812
l WiFi access point with internet connectivity on page 815
Example CLI configuration
In this example, the Controller provides secur... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
800 | Network
set ip 1.1.1.10 255.255.255.0
set allowaccess fabric ping
set ip-managed-by-fortiipam disable
next
end
IPAM is specifically disabled for this interface since a static IP address is desired for
this topology.
2. On the FortiGate Connector:
a. Enable VDOMs:
config system global
set vdom-mode multi-vdom
end
You wi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
801 | Network
set vdom "lan-ext"
set ip 6.6.6.1 255.255.255.0
set allowaccess ping fabric
set type physical
set lldp-reception enable
set role wan
next
end
3. On the FortiGate Controller:
a. Extension controller configurations are automatically initialized:
config extension-controller fortigate-profile
edit "FGCONN-lanext-de... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
802 | Network
The VXLANs are built on the IPsec tunnels between the Connector and Controller. The VXLAN interfaces are
aggregated for load balancing and redundancy. A softswitch combines the aggregate interface with the local LAN
ports, allowing the LAN ports to be part of the VXLAN. This combines the local LAN ports with th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
803 | Network
config system interface
edit "le-agg-link"
set vdom "lan-ext"
set type aggregate
set member "vx-port1" "vx-port2"
set snmp-index 35
set lacp-mode static
set algorithm Source-MAC
next
end
d. The softswitch is automatically configured and bridges the aggregate interface and the local LAN to connect
the LAN to the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
804 | Network
edit 1
set start-ip 9.9.9.254
set end-ip 9.9.9.254
next
end
next
end
3. Configure the firewall policy to allow traffic from the LAN extension interface to the WAN interface (port1):
config firewall policy
edit "2"
set name "lan-ext"
set srcintf "FGT60F0000000001"
set dstintf "port1"
set action accept
set srcadd... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
805 | Network
controller ip: 1.1.1.0
controller port: 5246
controller name: FG5H1E0000000001
missed echo: 0
up time(seconds): 29483
status: EXTWS_RUN
Data-Channel:
uplink [0]: port1
IPsec tunnel ul-port1
VxLAN interface vx-port1
uplink [1]: port2
IPsec tunnel ul-port2
VxLAN interface vx-port2
downlink [0]: lan
In this exampl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
806 | Network
a. Go to System > Settings.
b. In the System Operation Settings sections, enable Virtual Domains.
c. Click OK. You will be logged out of the device when VDOM mode is enabled.
4. On the FortiGate Connector, enable the FortiExtender setting. For high-end models (1000 series and higher) and
VM models, enter:
confi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
807 | Network
c. Click OK.
7. On the FortiGate Connector, edit port5:
a. Set the Role to LAN.
b. Set the Virtual domain to lan-extvdom.
The addressing mode is set to Manual and the IP/Netmask set to 0.0.0.0/0.0.0.0 because port5 will become
part of the le-switch software switch, which has its own IP address already assigned.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
808 | Network
8. On the FortiGate Connector, select the LAN extension VDOM, and enter the IP address of the FortiGate controller:
a. Go to Network > LAN Extension.
b. Set the Access Controller (AC) address to the IP address of port3 on the FortiGate Controller. In this example,
use 172.31.0.254.
c. Click Apply.
9. On the For... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
809 | Network
d. Click OK.
11. On the FortiGate Controller, configure the default gateway if a static WAN IP configuration is used:
a. Go to Network > Static Routes and edit the default gateway settings to specify the correct internet gateway
address and WAN interface.
b. Click OK.
12. On the FortiGate Controller, configure ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
810 | Network
DHCP client mode for inter-VDOM links
Continuing with the same configuration as Example GUI configuration on page 806, a new VDOM named lan-extvdom
was created on the FortiGate Connector and its type was set to LAN extension. This configuration allows the VDOM to
function as a FortiExtender in LAN extension mod... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
811 | Network
configuration on page 806) and the root VDOM clients (in this example) through the FortiGate Connector LAN
extension VXLAN aggregate link.
3. Verify that the lan_ext1 interface obtained an IP address from the FortiGate Controller (the client IP address for the
lan_ext1 VDOM link is from the same 192.168.0.0/24 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
812 | Network
See Connecting FortiGate to FortiSASE using GUI and CLI for details on how to find the FortiSASE domain name.
In this example, the VDOM name is ext, and the FortiSASE domain name is turboa1p0hv3p.edge.prod.fortisase.com.
config vdom
edit ext
config system settings
set vdom-type lan-extension
set lan-extension-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
813 | Network
end
next
end
7. In FortiSASE, authorize the FortiGate as a LAN extension in the Edge Devices > FortiGates page. See Authorizing
a FortiGate.
8. In the LAN extension VDOM, in Network > LAN Extension observe that the Connection Summary shows values for
the Access Controller Name, Access Controller IP, and Connect... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
814 | Network
a. Within the root VDOM, create a firewall policy with wan2 (second ISP link on FortiGate with proper routing
already set up) as the destination and lan as the source within the traffic VDOM to allow local traffic in the IP
address range for static IP clients in the LAN subnet (LAN-STATIC-RANGE) from the FortiG... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
815 | Network
Creating a LAN extension SSID for FortiExtender
Use the FortiExtender SSIDs tab to create a LAN extension SSID for a managed FortiExtender device.
In this The SSID name in this example is 2G-lanext.
To create a LAN extension SSID for FortiExtender in the GUI:
1. Go to Network > FortiExtenders > FortiExtender SS... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
816 | Network
Configuring a FortiExtender profile
Use a FortiExtender profile to define the LAN extension settings, such as the radio band for the LAN extension SSID, to
create a WiFi SSID.
The FortiExtender profile in this example is named FVA22F-lanext-default, and the LAN extension named 2G-lanext is
selected to create a ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
817 | Network
config modem1
end
config modem2
end
end
config lan-extension
set ipsec-tunnel "fext-ipsec-g18O"
set backhaul-interface "lan"
config backhaul
edit "1"
set port wan
set role primary
next
edit "2"
set port lte1
set role secondary
next
config wifi
set country CA
config radio-1
set mode AP
set band 2.4GHz
set status... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
818 | Network
4. Set the remaining settings as desired, and click OK.
To apply the profile and authorize FortiExtender in the CLI:
config extension-controller extender
edit "FV017TF23000004"
set id "FVA22FTF23000004"
set authorized enable
set device-id 0
set extension-type lan-extension
set profile "FVA22F-lanext-default"
ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
819 | Network
4. Set the remaining options as desired, and click OK.
To configure the LAN extension interface as a DHCP server in the CLI:
1. Assign an IP address to the LAN extension interface:
config system interface
edit "FV017TF23000004"
set vdom "root"
set ip 172.31.0.254 255.255.255.0
set allowaccess ping ssh
set type ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
820 | Network
config ip-range
edit 1
set start-ip 172.31.0.1
set end-ip 172.31.0.254
next
end
set dhcp-settings-from-fortiipam enable
config exclude-range
edit 1
set start-ip 172.31.0.254
set end-ip 172.31.0.254
next
end
next
end
3. Confirm that the DHCP server can assign IP addresses to clients connecting to the FortiExtend... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
821 | Network
4. Set the remaining options as desired, and click OK.
To configure a firewall policy to use the LAN extension interface in the GUI:
config firewall policy
...
edit 4
set name "lan-ext"
set uuid 341c7010-270b-51ec-16b6-309891e3e880
set srcintf "FV017TF23000004"
set dstintf "dmz"
set action accept
set srcaddr "a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
822 | Network
2. Go to Switch Interface, and verify that the device received the WiFi interface for the LAN extension. In this example,
the WiFi interface is named 2G-lan.
3. Go to Wi-Fi Status, and verify that the WiFi client is connected to the LAN extension SSID. In this example, the client
is connected to 2G-lanext.
4. C... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
823 | Network
end
end
allow The NP7 platform will forward all SCTP packets with zero checksum.
drop The NP7 platform will drop all SCTP packets with zero checksum. This is the
default value.
trap-to-host NP7 anomaly protection for SCTP will be disabled and SCTP packets with zero
checksum will be forwarded.
This option can al... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
824 | Network
5. Set the remaining options as desired, and click OK.
To enable Industrial Connectivity for an interface in the CLI:
config system interface
edit <name>
set allowaccess icond
...
next
end
set allowaccess icond Specify what types of management protocols can access the interface:
l icond: Industrial Connectivity... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
825 | Network
In the following topology, PC1 uses the IEC 60870-5-101 (shortened to IEC-101) protocol to transmit data from
SCADA systems to FortiGate Rugged, where the data is converted to the IEC 60870-5-104 (shortened to IEC-104)
protocol, and sent to PC2.
The data is converted as follows:
l FortiGate Rugged transmits dat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
826 | Network
iec101-trp : 2500
iec104-t1 : 15
iec104-t2 : 10
iec104-t3 : 20
iec104-k : 12
iec104-w : 8
Sample configuration to convert Modbus serial to Modbus TCP
After the Industrial Connectivity service is enabled and configured for an interface, supported FortiGate Rugged devices
can receive data from Modbus networks ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
827 | Network
modbus-serial-mode : RTU/ASCII
modbus-serial-addr : 1
modbus-serial-timeout-resp: 500
modbus-tcp-unit-id : 255
Diagnostics
Administrators can use the Diagnostics page to access the following tools:
Capture packet Captures packet streams in real-time to let you view header and payload information. See
Using ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
828 | Network
When creating the packet capture:
l The Name field must be a unique name for the packet capture criteria being configured.
l Enabling Include non-IP packets allows non-IP address packets to be captured when enabled. Supported non-IP
address packet types include ARP, RARP, LLC, LLDP, VLAN, and LACPDU. When the p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
829 | Network
a. Basic: enter criteria for the Host, Port, and Protocol number.
b. Advanced: enter a string, such as src host 172.16.200.254 and dst host 172.16.200.1 and dst port 443.
4. Click Start capture. The capture is visible in real-time.
5. While the capture is running, select a packet, then click the Headers or Pack... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
830 | Network
6. When the capture is finished, click Save as pcap. The PCAP file is automatically downloaded.
7. Optionally, use the Search bar or the column headers to filter the results further.
Multiple packet captures
Multiple packet captures can be run simultaneously for when many packet captures are needed for one situ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
831 | Network
next
end
2. Run packet capture commands:
a. List all of the packet captures:
# diagnose on-demand-sniffer list
mkey: port1 Capture
interface: port1
status: not_started
start time:
end time:
b. Start a packet capture:
# diagnose on-demand-sniffer start "port1 Capture"
c. Stop a packet capture:
# diagnose on-de... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
832 | Network
b. Advanced: filter by Source IP, Source port, Destination IP, Destination port, and Protocol, which is the
equivalent of:
l # diagnose debug flow filter saddr <addr/range>
l # diagnose debug flow filter sport <port/range>
l # diagnose debug flow filter daddr <addr/range>
l # diagnose debug flow filter dport <p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
833 | Network
4. When the debug flow is finished (or you click Stop debug flow), click Save as CSV. The CSV file is automatically
downloaded.
FortiOS 7.6.2 Administration Guide 834
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
834 | Network
The current output can be filtered by Time and Message. The Function field can be added.
5. Hover over the table header and click the gear icon (Configure Table).
6. Select Function and click Apply. The Function column is displayed and can be used to filter the output for further
analysis.
FortiOS 7.6.2 Adminis... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
835 | Network
FortiOS 7.6.2 Administration Guide 836
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
836 | SD-WAN
The following topics provide information about SD-WAN:
l SD-WAN overview on page 837
l SD-WAN quick start on page 841
l SD-WAN members and zones on page 851
l Performance SLA on page 866
l SD-WAN rules on page 938
l Advanced routing on page 1039
l VPN overlay on page 1070
l Advanced configuration on page 1174
l ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
837 | SD-WAN
The control, data plane, and security layer can only be deployed on a FortiGate. The other two layers can help to scale
and enhance the solution. For large deployments, FortiManager and FortiAnalyzer provide the management and
orchestration capabilities FortiSwitch and FortiAP provide the components to deploy an... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
838 | SD-WAN
Overlay
VPN overlays are needed when traffic must travel across multiple sites. These are usually site-to-site IPsec tunnels that
interconnect branches, datacenters, and the cloud, forming a hub-and-spoke topology.
The management and maintenance of the tunnels should be considered when determining the overlay ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
839 | SD-WAN
l Active probing requires manually defining the server to be probed, and generates consistent probing traffic.
l Passive probing uses active sessions that are passing through firewall policies used by the related SD-WAN
interfaces to derive health measurements. It reduces the amount of configuration, and elimina... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
840 | SD-WAN
For more details, see the SD-WAN / SD-Branch Architecture for MSSPs guide.
SD-WAN quick start
This section provides an example of how to start using SD-WAN for load balancing and redundancy.
In this example, two ISP internet connections, wan1 (DHCP) and wan2 (static), use SD-WAN to balance traffic between
them a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
841 | SD-WAN
configurations on the FortiGate.
In this step, two interfaces are configured and added to the default SD-WAN zone (virtual-wan-link) as SD-WAN member
interfaces. This example uses a mix of static and dynamic IP addresses; your deployment could also use only one or the
other.
Once the SD-WAN members are created a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
842 | SD-WAN
8. Repeat the above steps for wan2, setting Gateway to the ISP's gateway: 10.100.20.2.
Adding a static route
You must configure a default route for the SD-WAN. The default gateways for each SD-WAN member interface do not
need to be defined in the static routes table. FortiGate will decide what route or routes ar... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
843 | SD-WAN
Selecting the implicit SD-WAN algorithm
SD-WAN rules define specific routing options to route traffic to an SD-WAN member.
If no routing rules are defined, the default Implicit rule is used. It can be configured to use one of five different load
balancing algorithms. See Implicit rule on page 946 for more detail... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
844 | SD-WAN
3. Configure the following:
Name Enter a name for the policy.
Incoming Interface internal
Outgoing Interface virtual-wan-link
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
Firewall / Network Options Enable NAT and set IP Pool Configuration to Use Outgoing Interface Address.
Security Profil... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
845 | SD-WAN
SLA targets are not required for link monitoring.
5. Configure the required metrics in Link Status.
6. Ensure that Update static route is enabled. This disables static routes for the inactive interface and restores routes
on recovery.
7. Click OK.
Results
The following GUI pages show the function of the SD-WAN a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
846 | SD-WAN
Bandwidth
Select Bandwidth to view the amount of downloaded and uploaded data for each interface.
Volume
Select Volume to see donut charts of the received and sent bytes on the interfaces.
Sessions
Select Sessions to see a donut chart of the number of active sessions on each interface.
Performance SLA
Go to Netw... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
847 | SD-WAN
Packet loss
Select Packet Loss to see the percentage of packets lost for each member.
Latency
Select Latency to see the current latency, in milliseconds, for each member.
Jitter
Select Jitter to see the jitter, in milliseconds, for each member.
FortiOS 7.6.2 Administration Guide 848
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
848 | SD-WAN
Routing table
Go to Dashboard > Network, expand the Routing widget, and select Static & Dynamic to review all static and dynamic
routes. For more information about the widget, see Static & Dynamic Routing monitor on page 120.
Firewall policy
Go to Policy & Objects > Firewall Policy to review the SD-WAN policy.
C... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
849 | SD-WAN
config system sdwan
set status enable
config members
edit 1
set interface "wan1"
next
edit 2
set interface "wan2"
set gateway 10.100.20.2
next
end
end
If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone.
3. Create a static route for SD-WAN:
config router static
edit 1
set sdwan... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
850 | SD-WAN
next
end
6. Configure a performance SLA:
config system sdwan
config health-check
edit "server"
set server "208.91.112.53"
set update-static-route enable
set members 1 2
next
end
end
Results
To view the routing table:
# get router info routing-table all
Routing table for VRF=0
Codes: K - kernel, C - connected, S ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
851 | SD-WAN
Individual SD-WAN member interfaces cannot be used directly in policies, but they can be moved between SD-WAN
zones at any time. If a member interface requires a special SD-WAN consideration, it can be put into an SD-WAN zone
by itself.
SD-WAN zones and members can be used in IPv4 and IPv6 static routes to make ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
852 | SD-WAN
GUI option CLI option Description
Interface interface Select the interface to use as an SD-WAN
member. Optionally, select None in the GUI
to not use an interface yet.
SD-WAN Zone zone Select the destination zone if it exists at the
time of member creation. Otherwise, the
default virtual-wan-link zone is applied.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
853 | SD-WAN
To configure the SD-WAN members and add them to the default zone in the CLI:
config system sdwan
config members
edit 1
set interface "WAN1"
set zone "virtual-wan-link"
next
edit 2
set interface "WAN2"
set zone "virtual-wan-link"
next
edit 3
set interface "VPN1"
set zone "virtual-wan-link"
next
edit 4
set interfa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
854 | SD-WAN
To configure the SD-WAN zones in the CLI:
1. Configure the SD-WAN zones:
config system sdwan
config zone
edit "Overlay"
next
edit "Underlay"
next
end
end
2. Add the member interfaces to their respective zones:
config system sdwan
config members
edit 1
set interface WAN1
set zone "Underlay"
next
edit 2
set interf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.