index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
855
SD-WAN l Remote internet access SD-WAN zones are a critical component of SD-WAN rules. See Fields for configuring WAN intelligence on page 943 for more information. Datacenter resource access Datacenter resources are made available through the VPN branches or overlay. In this example, there are two SD-WAN members in th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
856
SD-WAN Outgoing Interface Underlay Source Branch_LAN Destination all Action ACCEPT 3. Configure the other settings as needed. 4. Click OK. Remote internet access Remote internet access (RIA) is the ability for a branch location to route public internet access requests across the overlay and out one of the hub's (or dat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
857
SD-WAN 4. Configure the remaining settings are required. 5. Click OK. To configure an SD-WAN zone in a static route in the CLI: config router {static | static6} edit 1 set sdwan-zone <zone> <zone> ... next end To configure an SD-WAN zone in an SD-WAN rule in the GUI: 1. Go to Network > SD-WAN and select the SD-WAN Rule...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
858
SD-WAN Examples In these two examples, three SD-WAN members are created. Two members, port13 and port15, are in the default zone (virtual-wan-link), and the third member, to_FG_B_root, is in the SASE zone. Example 1 In this example: l Two service rules are created. Rule 1 uses the virtual-wan-link zone, and rule 2 uses...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
859
SD-WAN edit 2 set internet-service enable set internet-service-name "Fortinet-FortiGuard" set priority-zone "SASE" next end end 3. Configure static routes for each of the SD-WAN zones: config router static edit 1 set distance 1 set sdwan-zone "virtual-wan-link" next edit 2 set dst 172.16.109.0 255.255.255.0 set distanc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
860
SD-WAN The default gateway has the members from the virtual-wan-link zone, and the route to 172.16.10.9.0/24 has the single member from the SASE zone. Example 2 In this example, two IPv6 static routes are created. The first route uses the virtual-wan-link zone, and the second route uses the SASE zone. To configure the ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
861
SD-WAN [1/0] via 2004:10:100:1::5, port15, 00:20:51, [1024/0] S 2003:172:16:109::/64 [1/0] via ::ac10:ce02, to_FG_B_root, 00:20:51, [1024/0] S 2003:172:16:209::/64 [5/0] via ::ac10:ce02, to_FG_B_root, 14:40:14, [1024/0] The IPv6 default route includes the members from the virtual-wan-link zone, and the route to 2003:17...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
862
SD-WAN 2. Configure the static route: config router static edit 2000 set dst 200.0.0.0 255.255.255.0 set distance 1 set sdwan-zone "virtual-wan-link" next end To verify the configuration: 1. Verify the kernel routing table for 200.0.0.0/24: # get router info kernel | grep -A 2 200.0.0.0/24 tab=254 vf=0 scope=0 type=1 p...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
863
SD-WAN end config firewall DoS-policy edit <id> set interface <SD-WAN zone> next end config firewall interface-policy edit <id> set interface <SD-WAN zone> next end config firewall multicast-policy edit <id> set srcintf <SD-WAN zone> set dstintf <SD-WAN zone> next end config firewall ttl-policy edit <id> set srcintf <S...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
864
SD-WAN end end 2. Use that SD-WAN zone as an interface in policies: config firewall local-in-policy edit 1 set intf "test" set srcaddr "172.16.205.0" set dstaddr "all" set service "ALL" set schedule "always" next end config firewall DoS-policy edit 1 set interface "test" set srcaddr "172.16.205.0" set dstaddr "all" set...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
865
SD-WAN set service "ALL" set schedule "always" set ttl 5 next end config firewall central-snat-map edit 1 set srcintf any set dstintf "test" set orig-addr "all" set dst-addr "172.16.205.0" next end Performance SLA Performance SLAs are used to measure the health of links that are connected to SD-WAN member interfaces by...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
866
SD-WAN Health checks A health check is defined by a probe mode, protocol, and server. These three options specify what resource is being evaluated and how the evaluation is done. Each health check should be configured specifically for that resource, so the probe mode, protocol and server should be tailored for the part...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
867
SD-WAN udp-echo Use UDP echo to test the link with the server. http Use HTTP-GET to test the link with the server. https Use HTTP-GET to test the link with the server. twamp Use TWAMP to test the link with the server. dns Use DNS query to test the link with the server. The FortiGate sends a DNS query for an A Record an...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
868
SD-WAN set port 7 next end end To use DNS as a health check, and define the IP address that the response must match: config system sdwan set status enable config health-check edit "h4_dns1" set protocol dns set dns-request-domain "ip41.forti2.com" set dns-match-ip 1.1.1.1 next edit "h6_dns1" set addr-mode ipv6 set serv...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
869
SD-WAN set ftp-mode {passive | port} set ftp-file "1.txt" set server <server> next edit "h6_ftp1" set addr-mode ipv6 set server "2032::11" set protocol ftp set port 21 set user "root" set password *********** set ftp-mode {passive | port} set ftp-file "2.txt" next end end Health check probe packets support DSCP markers...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
870
SD-WAN l Packet loss threshold: packet loss for SLA to make a decision, in percentage (0 - 100, default = 0). These settings should be specific to the service whose performance is being considered. You should attempt to configure the constraints to be just under the maximum values for the application or service to func...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
871
SD-WAN You can configure the protocol that is used for status checks, including: Ping, HTTP, HTTPS. DNS, TCP echo, UDP echo, two-way active measurement protocol (TWAMP), TCP connect, and FTP. In the GUI, only Ping, HTTP, and DNS are available. You can view link quality measurements by going to Network > SD-WAN and sele...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
872
SD-WAN 12. Click OK. To configure a link health monitor in the CLI: config system sdwan config health-check edit "PingSLA" set addr-mode {ipv4 | ipv6} set server <server1_IP_address> <server2_IP_address> set detect-mode {active | passive | prefer-passive} set protocol {ping | tcp-echo | udp-echo | http | https| twamp |...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
873
SD-WAN set jitter-threshold <integer> set packetloss-threshold <integer> next end next end end Additional settings are available for some of the protocols: Protocol Additional options http, https port <port_number> http-get <url> http-agent <string> http-match <response_string> twamp port <port_number> security mode {n...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
874
SD-WAN The live charts show the packet loss, latency, or jitter for the selected health check. Hover the cursor over a line in the chart to see the specific value for that interface at that specific time. The table shows information about each health check, including the configured servers, link quality data, and thres...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
875
SD-WAN logdesc="SDWAN SLA information" status="up" interface="port1" eventtime=1618506296222639301 tz="-0700" eventtype="SLA" jitter="0.277" inbandwidthavailable="10.00Gbps" outbandwidthavailable="10.00Gbps" bibandwidthavailable="20.00Gbps" packetloss="1.000%" latency="186.071" slamap="0x1" healthcheck="BusinessCritica...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
876
SD-WAN jitter="0.000" inbandwidthavailable="10.00Gbps" outbandwidthavailable="10.00Gbps" bibandwidthavailable="20.00Gbps" packetloss="100.000%" latency="0.000" slamap="0x0" healthcheck="BusinessCritical_CloudApps" slatargetid=1 metric="packetloss" outbandwidthused="6kbps" inbandwidthused="3kbps" bibandwidthused="9kbps"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
877
SD-WAN Timestamp: Wed Jan 9 18:34:49 2019, used inbandwidth: 3165bps, used outbandwidth: 3362bps, used bibandwidth: 6527bps, tx bytes: 972298bytes, rx bytes: 922724bytes. Timestamp: Wed Jan 9 18:34:59 2019, used inbandwidth: 3184bps, used outbandwidth: 3362bps, used bibandwidth: 6546bps, tx bytes: 977282bytes, rx bytes...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
878
SD-WAN Example In this example, the FortiGate is configured to load-balance between two WAN interfaces, port15 and port16. A health check is configured in passive mode, and SLA thresholds are set. Passive WAN health measurement is enabled on the SD-WAN policy. Measurements are taken from YouTube traffic generated by th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
879
SD-WAN f. Configure the remaining settings as needed. g. Click OK. The SLA list shows the probe mode in the Detect Server column, if the probe mode is passive or prefer passive. Probe packets can only be disabled in the CLI and when the probe mode is not passive. 4. Create SD-WAN rules: a. Go to Network > SD-WAN, selec...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
880
SD-WAN d. Click Create New again and configure the second rule: Name Foreground_Traffic Source address 172.16.205.0 Address all Protocol number Specify - 1 Strategy Lowest Cost (SLA) Interface preference port15 and port16 Required SLA target Passive_Check#1 e. Click OK. To configure the firewall policy in the GUI: 1. G...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
881
SD-WAN edit 2 set zone "SD-WAN" set interface "port16" set gateway 172.16.210.2 next end config health-check edit "Passive_Check" set detect-mode passive set members 1 2 config sla edit 1 set latency-threshold 500 set jitter-threshold 500 set packetloss-threshold 10 next edit 2 set latency-threshold 1000 set jitter-thr...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
882
SD-WAN To configure the firewall policy in the CLI: config firewall policy edit 1 set name "SD-WAN-HC-policy" set srcintf "port5" set dstintf "SD-WAN" set nat enable set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set passive-wan-health-measurement enable set auto-asic-offl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
883
SD-WAN # diagnose sys sdwan service4 2 Service(2): Address Mode(IPV4) flags=0x200 Gen(6), TOS(0x0/0x0), Protocol(1: 1->65535), Mode(sla), sla-compare-order Members(2): 1: Seq_num(2 port16), alive, sla(0x1), gid(1), cfg_order(1), cost(0), selected 2: Seq_num(1 port15), alive, sla(0x0), gid(2), cfg_order(0), cost(0), sel...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
884
SD-WAN l Rule 1: Best quality (latency) using passive SLA for the internet services Alibaba and Amazon. l Rule 2: Best quality (latency) using passive SLA for the applications Netflix and YouTube. l Rule 3: Best quality (latency) using passive SLA for all other traffic. After passive application measurement is enabled ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
885
SD-WAN is a new command which is introduced in this project. next edit 2 set name "2" set mode priority set src "172.16.205.0" set internet-service enable set internet-service-app-ctrl 18155 31077 set health-check "Passive_HC" set priority-members 1 2 set passive-measurement enable ////Enable "passive application measu...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
886
SD-WAN # diagnose sys link-monitor-passive admin list by-interface Interface dmz (5): Default(0x00000000): latency=3080.0 11:57:54, jitter=5.0 11:58:08, pktloss=0.0 % NA Alibaba-Web(0x00690001): latency=30.0 11:30:06, jitter=25.0 11:29:13, pktloss=0.0 % NA YouTube(0x00007965): latency=100.0 12:00:35, jitter=2.5 12:00:3...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
887
SD-WAN Internet Service(2): Netflix(4294837427,0,0,0 18155) YouTube(4294838283,0,0,0 31077) Src address(1): 172.16.205.0-172.16.205.255 Service(3): Address Mode(IPV4) flags=0x200 use-shortcut-sla Gen(9), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(priority), link-cost-factor (latency), link-cost-threshold(10), heath-chec...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
888
SD-WAN mos-codec {g711 | g729 | g722} Set the VoIP codec to use for the MOS calculation (default = g711). link-cost-factor {latency jitter packet-loss mos} Set the criteria to base the link selection on. mos-threshold <value> Set the minimum MOS for the SLA to be marked as pass (1.0 - 5.0, default = 3.6). To configure ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
889
SD-WAN next end set priority-members 0 next end end The MOS currently cannot be used to steer traffic when the mode is set to priority. To verify the MOS calculation results: 1. Verify the health check diagnostics: # diagnose sys sdwan health-check Health Check(Test_MOS): Seq(1 dmz): state(alive), packet-loss(0.000%) l...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
890
SD-WAN eventtype="SLA" healthcheck="Test_MOS" slatargetid=1 interface="port15" status="up" latency="300.118" jitter="0.013" packetloss="0.000" mos="3.905" inbandwidthavailable="1000.00Mbps" outbandwidthavailable="1000.00Mbps" bibandwidthavailable="2.00Gbps" inbandwidthused="0kbps" outbandwidthused="0kbps" bibandwidthus...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
891
SD-WAN In this topology, each FortiGate’s BGP router ID is based on its Loopback0 interface. Each spoke has SLA health checks defined to send ICMP probes to the server’s Lo_HC interface on 172.31.100.100. The ICMP probes include embedded SLA information for each SD-WAN overlay member. Related SD-WAN settings: config sy...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
892
SD-WAN embed-measured-health {enable | disable} Enable/disable embedding SLA information in ICMP probes (default = disable). set priority-in-sla <integer> Set the priority that will be set to the IKE route when the corresponding overlay is in SLA (0 - 65535). set priority-out-sla <integer> Set the priority that will be...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
893
SD-WAN set interface "H1_T11" set zone "overlay" set source 172.31.0.65 next edit 4 set interface "H1_T22" set zone "overlay" set source 172.31.0.65 next end config health-check edit "HUB" set server "172.31.100.100" set embed-measured-health enable set members 0 config sla edit 1 set link-cost-factor latency set laten...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
894
SD-WAN To add the loopback IP to the IPsec interface settings: config vpn ipsec phase1-interface edit "H1_T11" set exchange-interface-ip enable set exchange-ip-addr4 172.31.0.65 next edit "H1_T22" set exchange-interface-ip enable set exchange-ip-addr4 172.31.0.65 next end Configuring the hub FortiGate In the SD-WAN set...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
895
SD-WAN set priority-in-sla 10 set priority-out-sla 20 next end next edit "2" set detect-mode remote set sla-id-redistribute 1 set members 2 config sla edit 1 set link-cost-factor latency set latency-threshold 100 set priority-in-sla 15 set priority-out-sla 25 next end next end end In the BGP settings, note the followin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
896
SD-WAN set exchange-interface-ip enable set exchange-ip-addr4 172.31.0.1 next end Testing and verification Once the hub and spokes are configured, verify that SLA statuses are passed from the spoke to the hub. To verify that the SLA statuses are passed from the spoke to the hub: 1. On Spoke_1, display the status of the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
897
SD-WAN Remote Health Check: 1(1) Passive remote statistics of EDGE_T1(21): EDGE_T1_0(172.31.3.1): timestamp=02-09 16:19:11, latency=1.269, jitter=0.675, pktloss=0.000% 4. When there are multiple spokes, additional options can be used to filter a spoke by health check name, or health check name and the member's sequence...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
898
SD-WAN To verify that the hub will start routing traffic to EDGE_T2 when the spoke H1_T11 tunnel is out of SLA: 1. On Spoke_1, display the status of the health checks for H1_T11 and H1_T22: # diagnose sys sdwan health-check Health Check(HUB): Seq(1 H1_T11): state(alive), packet-loss(0.000%) latency(120.228), jitter(0.0...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
899
SD-WAN For configuration on a spoke, the config system sdwan command includes these options: config system sdwan config members edit <entry> set priority-in-sla <integer> set priority-out-sla <integer> next end end set priority-in-sla <integer> Preferred priority of routes to this member when this member is in SLA (0 -...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
900
SD-WAN SD-WAN settings on the spoke relevant to the examples: config system sdwan set speedtest-bypass-routing enable config members edit <id> set priority-in-sla <value> set priority-out-sla <value> next end config health-check edit <name> set embed-measured-health enable set sla-id-redistribute <id> config sla edit 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
901
SD-WAN To embed SD-WAN SLA status and priorities in ICMP probes: 1. Configure SD-WAN and BGP on Spoke-1 (Branch1_A_FGT): a. Configure SD-WAN: config system sdwan set status enable set speedtest-bypass-routing enable config zone edit "overlay" next end config members edit 4 set interface "H1_T11" set zone "overlay" set ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
902
SD-WAN next end config network edit 1 set prefix 10.0.3.0 255.255.255.0 next end  ...... end c. View the health-check settings: # diagnose sys sdwan health-check Health Check(HUB): Seq(4 H1_T11): state(alive), packet-loss(0.000%) latency(0.246), jitter(0.015), mos (4.404), bandwidth-up(999998), bandwidth-dw(999996), ba...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
903
SD-WAN set link-cost-factor latency set latency-threshold 70 next end next end end b. Configure BGP: config router bgp set as 65001 set router-id 172.31.0.66 ...... config neighbor edit "172.31.0.1" ...... set remote-as 65001  set update-source "Loopback0" next end config network edit 1 set prefix 10.0.4.0 255.255.255....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
904
SD-WAN next end config health-check edit "Remote_HC" set detect-mode remote set sla-id-redistribute 1 set members 1 2 config sla edit 1 set link-cost-factor remote next end next end end b. Configure BGP: config router bgp set as 65001 set router-id 172.31.0.1 set recursive-inherit-priority enable ...... config neighbor...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
905
SD-WAN EDGE_T1_1(172.31.0.66): timestamp=06-12 14:04:30, src=172.31.0.66, latency=0.246, jitter=0.031, pktloss=0.000%, mos=4.404, SLA id=1(pass), rmt_ver=2, rmt_sla=in, rmt_ prio=30 Remote Health Check: Remote_HC(2) Passive remote statistics of EDGE_T2(47): EDGE_T2_0(10.0.0.15): timestamp=06-12 14:04:30, src=172.31.0.6...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
906
SD-WAN Seq(4 H1_T11): state(alive), packet-loss(0.000%) latency(80.217), jitter(0.022), mos (4.361), bandwidth-up(999998), bandwidth-dw(999998), bandwidth-bi(1999996) sla_ map=0x0 Seq(5 H1_T22): state(alive), packet-loss(0.000%) latency(0.202), jitter(0.016), mos (4.404), bandwidth-up(999998), bandwidth-dw(999997), ban...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
907
SD-WAN Speed test rerouting based on embedded SLA priorities When spoke-initiated speed tests are enabled for this configuration, the out-of SLA priority is used by the hub to choose other routes during the speed test. To configure speed tests: 1. On the hub, enable speed tests and allow them on the underlays and overl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
908
SD-WAN set interface "port2" next end f. View the shaping profile: config firewall shaping-profile edit "profile_1" set default-class-id 2 config shaping-entries edit 1 set class-id 2 set priority low set guaranteed-bandwidth-percentage 10 set maximum-bandwidth-percentage 10 next edit 2 set class-id 3 set priority medi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
909
SD-WAN DC1_A_FGT (root) (Interim)# get router info routing-table bgp Routing table for VRF=0  B 10.0.3.0/24 [200/0] via 172.31.0.65 (recursive via EDGE_T1 tunnel 10.0.0.20 [10]), 00:11:56  (recursive via EDGE_T2 tunnel 172.31.0.65 [15]), 00:11:56, [1/0] While the speed test is running on H1_T11 of Spoke-1, Spoke-1 will...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
910
SD-WAN priority=medium forwarded_bytes=0 dropped_packets=0 dropped_bytes=0 class-id=4  allocated-bandwidth=355747(kbps)  guaranteed-bandwidth=142298 (kbps) max-bandwidth=355747(kbps)  current-bandwidth=0(kbps) priority=high forwarded_bytes=0 dropped_packets=0 dropped_bytes=0 --------------------------------------------...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
911
SD-WAN set sla-id-redistribute <ID> config sla edit <entry> set link-cost-factor remote {latency | jitter | packet-loss | mos | remote} next end next end end set sla-id-redistribute <ID> Select the ID from the SLA subtable. The selected SLA's priority value will be distributed into the routing table (0 - 32, default = ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
912
SD-WAN The examples use the following SD-WAN settings on the spoke: SD-WAN settings on the spoke relevant to the examples: config system sdwan set speedtest-bypass-routing enable config health-check edit <name> set embed-measured-health enable set sla-id-redistribute <id> config sla edit 1  <desired SLA thresholds>  ne...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
913
SD-WAN To embed SD-WAN SLA status and priorities in ICMP probes: 1. Configure SD-WAN and BGP on Spoke-1 (Branch1_A_FGT): a. Configure SD-WAN: config system sdwan set status enable set speedtest-bypass-routing enable config zone edit "overlay" next end config members edit 4 set interface "H1_T11" set zone "overlay" set ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
914
SD-WAN set prefix 10.0.3.0 255.255.255.0 next end  ...... end c. View the health-check settings: All overlays on Spoke-1 are in SLA. # diagnose sys sdwan  health-check Health Check(HUB): Seq(4 H1_T11): state(alive), packet-loss(0.000%) latency(0.252), jitter(0.025), mos (4.404), bandwidth-up(999998), bandwidth-dw(99999...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
915
SD-WAN end end b. Configure BGP: config router bgp set as 65001 set router-id 172.31.0.66 ...... config neighbor edit "172.31.0.1" ...... set remote-as 65001  set update-source "Loopback0" next end config network edit 1 set prefix 10.0.4.0 255.255.255.0 next end ...... end c. View the health-check settings: All overlay...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
916
SD-WAN set detect-mode remote set sla-id-redistribute 1 set members 1 2 config sla edit 1 set link-cost-factor remote  set priority-in-sla 100 set priority-out-sla 200 next end next end end b. Configure BGP: config router bgp set as 65001 set router-id 172.31.0.1 set recursive-inherit-priority enable ...... config neig...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
917
SD-WAN prio=0 Remote Health Check: Remote_HC(2) Passive remote statistics of EDGE_T2(47): EDGE_T2_0(10.0.0.15): timestamp=06-11 14:50:33, src=172.31.0.66, latency=0.195, jitter=0.008, pktloss=0.000%, mos=4.404, SLA id=1(pass), rmt_ver=1, rmt_sla=in, rmt_ prio=0 EDGE_T2_1(172.31.0.65): timestamp=06-11 14:50:33, src=172....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
918
SD-WAN (4.361), bandwidth-up(999998), bandwidth-dw(999998), bandwidth-bi(1999996) sla_ map=0x0 Seq(5 H1_T22): state(alive), packet-loss(0.000%) latency(0.202), jitter(0.012), mos (4.404), bandwidth-up(999998), bandwidth-dw(999997), bandwidth-bi(1999995) sla_ map=0x1 6. After the hub receives the updated SLA status, run...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
919
SD-WAN Speed test rerouting based on embedded SLA status When spoke-initiated speed tests are enabled for this configuration, the out-of SLA status is used by the hub to choose other routes during the speed test. To configure speed tests: 1. On the hub, enable speed tests and allow them on the underlays and overlays. a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
920
SD-WAN set interface "port2" next end f. View the shaping profile: config firewall shaping-profile edit "profile_1" set default-class-id 2 config shaping-entries edit 1 set class-id 2 set priority low set guaranteed-bandwidth-percentage 10 set maximum-bandwidth-percentage 10 next edit 2 set class-id 3 set priority medi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
921
SD-WAN DC1_A_FGT (root) (Interim)# get router info routing-table  bgp Routing table for VRF=0 B 10.0.3.0/24 [200/0] via 172.31.0.65 (recursive via EDGE_T2 tunnel 172.31.0.65 [100]), 00:24:14 (recursive via EDGE_T1 tunnel 10.0.0.20 [100]), 00:24:14, [1/0] While the speed test is running on H1_T11 of Spoke-1, Spoke-1 wil...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
922
SD-WAN priority=medium forwarded_bytes=0 dropped_packets=0 dropped_bytes=0 class-id=4  allocated-bandwidth=336990(kbps)  guaranteed-bandwidth=134796 (kbps) max-bandwidth=336990(kbps)  current-bandwidth=0(kbps) priority=high forwarded_bytes=0 dropped_packets=0 dropped_bytes=0 --------------------------------------------...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
923
SD-WAN Value Description preferable Select neighbor based on its HC to match BGP preferable/unpreferable route_ map. priority Select neighbor based on its members' priority-in-sla/priority-out-sla value. Routes to prefixes behind spokes are advertised by the SD-WAN hub to eBGP peers on an external network. The relative...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
924
SD-WAN config members edit 4 set interface "H1_T11" set zone "overlay" set source 172.31.0.65 set priority-in-sla 50 set priority-out-sla 100 next edit 5 set interface "H1_T22" set zone "overlay" set source 172.31.0.65 set priority-in-sla 70 set priority-out-sla 120 next edit 7 set interface "H2_T11" set zone "overlay"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
925
SD-WAN set health-check "HUB" next end end The routes with MEDs are advertised to a router on the external network that establishes a BGP neighbor relationship with Hub-1 and Hub-2. When sending traffic destined for 10.0.3.0/24, the router on the external network will prefer to send traffic to the hub with the lower ME...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
926
SD-WAN Seq(8 H2_T22): state(alive), packet-loss(0.000%), latency(0.205), jitter(0.018), mos (4.404), bandwidth-up(999998), bandwidth-dw(999997), bandwidth-bi(1999995), sla_map=0x1 # get router info bgp neighbors 172.31.0.1 advertised-routes VRF 0 BGP table version is 31, local router ID is 172.31.0.65 Status codes: s s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
927
SD-WAN 6. H1_T11, H2_T11, and H1_T22 are out of SLA. When sending traffic destined for 10.0.3.0/24, the router on the external network will prefer to send traffic to Hub-2 with lower MED 80 over Hub-1 with higher MED 100. # diagnose sys sdwan health-check Health Check(HUB): Seq(4 H1_T11): state(alive), packet-loss(0.00...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
928
SD-WAN Total number of prefixes 1 # get router info bgp neighbors 172.31.0.2 advertised-routes VRF 0 BGP table version is 31, local router ID is 172.31.0.65 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metric LocPrf Weight...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
929
SD-WAN Example In this example, routing is achieved through SD-WAN rules. The agent-based health check detection mode creates the FortiMonitor IP address and FortiGate SD-WAN interface map. This example assumes that the FortiMonitor has already been added to the Security Fabric (see Configuring FortiMonitor on page 350...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
930
SD-WAN set interface "v1236" set gateway 10.12.36.2 next edit 2 set interface "v1237" set gateway 10.12.37.20 next end end 4. Configure the SD-WAN rules to ensure each OnSight client uses only one SD-WAN member, and map the FortiMonitor IP to an SD-WAN member (interface): config system sdwan config service edit 1 set d...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
931
SD-WAN pktloss=0.0 % 20:27:24 v1237( 24) | src=10.2.1.81 | latency=182.9 20:27:24 | jitter=0.1 20:27:24 | pktloss=0.0 % 20:27:24 3. Verify the details of each application: # diagnose sys link-monitor-passive agent list-app app_id=0x00000000, app=fortinet.com, dev=v1236(23) latency=183.2, jitter=0.1, pktloss=0.0,ntt=99....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
932
SD-WAN logdesc="Virtuan WAN Link application performance metrics via FortiMonitor" eventtype="Application Performance Metrics" app="fortinet.com" appid=0 interface="v1237" latency="200.1" jitter="0.4" packetloss="0.0" serverresponsetime="845.4" networktransfertime="116.0" apperror="0.0" timestamp="01-28 00:30:01" msg="...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
933
SD-WAN 2.2.2.2 are assigned to class 2 (sla_probe). This means it has a guaranteed bandwidth and has the highest priority to use unused bandwidth. This allows SD-WAN health check to function properly even during times of congestion. To classify SLA probes for traffic prioritization: 1. Configure the firewall traffic cl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
934
SD-WAN set egress-shaping-profile "profile-1" ... next end 4. Configure the SD-WAN health check and assign the SLA probes into class 2: config system sdwan set status enable config zone edit "virtual-wan-link" next end config members edit 1 set interface "dmz" set gateway 172.16.208.2 next edit 2 set interface "vd1-p1"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
935
SD-WAN priority=low  forwarded_bytes=1446 dropped_packets=0 dropped_bytes=0 class-id=4  allocated-bandwidth=100000(kbps)  guaranteed￾bandwidth=100000(kbps) max-bandwidth=1000000(kbps) current-bandwidth=0(kbps) priority=medium forwarded_bytes=0 dropped_packets=0 dropped_bytes=0 class-id=2  allocated-bandwidth=100000(kbp...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
936
SD-WAN To assign the SLA probe to medium priority: 1. Assign SLA probes into class 4: config sys sdwan config health-check edit 1 set class-id 4 next end set status disable end config sys sdwan set status enable end 2. Verify the SLA probes are assigned into class 4. # diagnose netlink interface list dmz if=dmz family=...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
937
SD-WAN bandwidth=100000(kbps) max-bandwidth=1000000(kbps) current-bandwidth=1(kbps) priority=medium forwarded_bytes=1280 dropped_packets=0 dropped_bytes=0 class-id=2  allocated-bandwidth=100000(kbps)  guaranteed￾bandwidth=100000(kbps) max-bandwidth=1000000(kbps) current-bandwidth=0(kbps) priority=high forwarded_bytes=0...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
938
SD-WAN From the GUI, go to Network > SD-WAN > SD-WAN Rules. When creating a new SD-WAN rule, or editing an existing SD-WAN rule, use the Source and Destination sections to identify traffic, and use the Outgoing interfaces section to configure WAN intelligence for routing traffic. From the CLI, use the following command...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
939
SD-WAN Address type Source Destination IPv4/6 ✓ ✓ MAC ✓ ✓ Group ✓ ✓ FABRIC_DEVICE dynamic address ✓ ✓ Users ✓ ✓ User groups ✓ ✓ Application control (application aware routing) ✓ Internet service database (ISDB) ✓ BGP route tags ✓ Differentiated Services Code Point (DSCP) tags ✓ In the GUI, go to Network > SD-WAN > SD-W...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
940
SD-WAN The following table describes the fields used for the name, ID, and IP version of the SD-WAN rule:  ID, Name, and IP version Field CLI Description ID config system sdwan config service edit <ID> set comment <string> next end ID is generated when the rule is created. You can only specify the ID from the CLI. Name...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
941
SD-WAN Destination Field CLI Description If it is necessary for an SD-WAN rule to match multiple protocols or multiple port ranges, you can create a custom Internet Service. Internet Service set internet-service enable set internet-service-custom <name_1> <name_2> ... <name_n> set internet-service-custom￾group <name_1>...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
942
SD-WAN Destination Field CLI Description For example, the FortiGate receives DSCP values 110000 and 111011. (DSCP is the upper 6 bits of the TOS field – 11000000 and 11101100 respectively). Using the TOS value 0xe0 (11100000), only the second DSCP value is matched. By default, individual applications and application gr...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
943
SD-WAN Interface or zone preference By default, the configured order of interfaces and/or zones in a rule are used. Interfaces and zones that are selected first have precedence over interfaces selected second and so on. You can specify both interfaces and zones. When a zone is specified in the Zone preference field, it...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
944
SD-WAN Automatic and manual strategies have pre-configured logic that do not leverage SLA health checks. The goal of the performance SLA is to measure the quality of each SD-WAN member link. The following methods can be used to measure the quality of a link: l Active measurement l Health-check traffic is sent to a serv...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
945
SD-WAN set dscp-forward-tag 000000 Forward traffic DSCP tag. set dscp-reverse enable Enable use of reverse DSCP tag. set dscp-reverse-tag 000000 Reverse traffic DSCP tag. Default and gateway options Following are additional gateway options that can be set only in the CLI: config system sdwan config service edit <ID> .....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
946
SD-WAN Source IP (source-ip-based) Traffic is divided equally between the interfaces, including the SD-WAN interface. Sessions that start at the same source IP address use the same path. This is the default selection. Sessions (weight-based) The workload is distributing based on the number of sessions that are connecte...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
947
SD-WAN If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone. Example 1 Outgoing traffic is equally balanced between wan1 and wan2, using source-ip-based or source-dest-ip-based mode. Using the GUI: 1. On the FortiGate, enable SD-WAN and add wan1 and wan2 as SD-WAN members, then add a p...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
948
SD-WAN 4. Enter 80 in the wan1 field, and 20 in the wan2 field. 5. Click OK. Using the CLI: config system sdwan set load-balance-mode weight-based config members edit 1 set interface "wan1" set weight 80 next edit 2 set interface "wan2" set weight 20 next end end Example 3 Outgoing traffic is balanced between wan1 and ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
949
SD-WAN next edit 2 set interface "wan2" set volume-ratio 20 next end end Example 4 Load balancing can be used to reduce costs when internet connections are charged at different rates. For example, if wan2 charges based on volume usage and wan1 charges a fixed monthly fee, we can use wan1 at its maximum bandwidth, and u...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
950
SD-WAN Automatic strategy The automatic strategy is a legacy rule that lets you select an outgoing interface based on its performance ranking compared to the other SD-WAN interfaces. This is achieved by applying a performance SLA to rank the interfaces, and then selecting the desired rank. In this example, you have thr...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
951
SD-WAN Manual strategy In manual mode, no health checks are used. As a result, the decision making closer resembles logic than intelligence. SD-WAN manual rules are similar to regular policy-based routes, but have the added features of application-aware routing and BGP-tag routing. A manual strategy rule is comprised o...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
952
SD-WAN set dst "DC_net" set hold-down-time 60 next end end l The command set mode manual will not appear in the configuration because it is the default mode. l The command set hold-down-time <integer> is an optional command that controls how long to wait before switching back to the primary interface in the event of a ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
953
SD-WAN To enable the load balancing strategy for manual mode in the GUI: 1. Go to Network > SD-WAN. 2. Select the SD-WAN Rules tab, and click Create New. 3. Set the Interface selection strategy to Manual. 4. Enable Load balancing. 5. Set the remaining options as desired, and click OK to create the rule. To enable the l...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
954
SD-WAN Best quality strategy When using Best Quality mode, SD-WAN will choose the best link to forward traffic by comparing the link-cost-factor. A link-cost factor is a specific metric of participating link(s) (such as, latency, packet loss, and so on) evaluated against a target that you define (such as a health-check...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf