index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
855 | SD-WAN
l Remote internet access
SD-WAN zones are a critical component of SD-WAN rules. See Fields for configuring
WAN intelligence on page 943 for more information.
Datacenter resource access
Datacenter resources are made available through the VPN branches or overlay. In this example, there are two SD-WAN
members in th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
856 | SD-WAN
Outgoing Interface Underlay
Source Branch_LAN
Destination all
Action ACCEPT
3. Configure the other settings as needed.
4. Click OK.
Remote internet access
Remote internet access (RIA) is the ability for a branch location to route public internet access requests across the
overlay and out one of the hub's (or dat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
857 | SD-WAN
4. Configure the remaining settings are required.
5. Click OK.
To configure an SD-WAN zone in a static route in the CLI:
config router {static | static6}
edit 1
set sdwan-zone <zone> <zone> ...
next
end
To configure an SD-WAN zone in an SD-WAN rule in the GUI:
1. Go to Network > SD-WAN and select the SD-WAN Rule... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
858 | SD-WAN
Examples
In these two examples, three SD-WAN members are created. Two members, port13 and port15, are in the default zone
(virtual-wan-link), and the third member, to_FG_B_root, is in the SASE zone.
Example 1
In this example:
l Two service rules are created. Rule 1 uses the virtual-wan-link zone, and rule 2 uses... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
859 | SD-WAN
edit 2
set internet-service enable
set internet-service-name "Fortinet-FortiGuard"
set priority-zone "SASE"
next
end
end
3. Configure static routes for each of the SD-WAN zones:
config router static
edit 1
set distance 1
set sdwan-zone "virtual-wan-link"
next
edit 2
set dst 172.16.109.0 255.255.255.0
set distanc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
860 | SD-WAN
The default gateway has the members from the virtual-wan-link zone, and the route to 172.16.10.9.0/24 has the
single member from the SASE zone.
Example 2
In this example, two IPv6 static routes are created. The first route uses the virtual-wan-link zone, and the second route
uses the SASE zone.
To configure the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
861 | SD-WAN
[1/0] via 2004:10:100:1::5, port15, 00:20:51, [1024/0]
S 2003:172:16:109::/64 [1/0] via ::ac10:ce02, to_FG_B_root, 00:20:51, [1024/0]
S 2003:172:16:209::/64 [5/0] via ::ac10:ce02, to_FG_B_root, 14:40:14, [1024/0]
The IPv6 default route includes the members from the virtual-wan-link zone, and the route to 2003:17... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
862 | SD-WAN
2. Configure the static route:
config router static
edit 2000
set dst 200.0.0.0 255.255.255.0
set distance 1
set sdwan-zone "virtual-wan-link"
next
end
To verify the configuration:
1. Verify the kernel routing table for 200.0.0.0/24:
# get router info kernel | grep -A 2 200.0.0.0/24
tab=254 vf=0 scope=0 type=1 p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
863 | SD-WAN
end
config firewall DoS-policy
edit <id>
set interface <SD-WAN zone>
next
end
config firewall interface-policy
edit <id>
set interface <SD-WAN zone>
next
end
config firewall multicast-policy
edit <id>
set srcintf <SD-WAN zone>
set dstintf <SD-WAN zone>
next
end
config firewall ttl-policy
edit <id>
set srcintf <S... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
864 | SD-WAN
end
end
2. Use that SD-WAN zone as an interface in policies:
config firewall local-in-policy
edit 1
set intf "test"
set srcaddr "172.16.205.0"
set dstaddr "all"
set service "ALL"
set schedule "always"
next
end
config firewall DoS-policy
edit 1
set interface "test"
set srcaddr "172.16.205.0"
set dstaddr "all"
set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
865 | SD-WAN
set service "ALL"
set schedule "always"
set ttl 5
next
end
config firewall central-snat-map
edit 1
set srcintf any
set dstintf "test"
set orig-addr "all"
set dst-addr "172.16.205.0"
next
end
Performance SLA
Performance SLAs are used to measure the health of links that are connected to SD-WAN member interfaces by... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
866 | SD-WAN
Health checks
A health check is defined by a probe mode, protocol, and server. These three options specify what resource is being
evaluated and how the evaluation is done. Each health check should be configured specifically for that resource, so the
probe mode, protocol and server should be tailored for the part... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
867 | SD-WAN
udp-echo Use UDP echo to test the link with the server.
http Use HTTP-GET to test the link with the server.
https Use HTTP-GET to test the link with the server.
twamp Use TWAMP to test the link with the server.
dns Use DNS query to test the link with the server.
The FortiGate sends a DNS query for an A Record an... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
868 | SD-WAN
set port 7
next
end
end
To use DNS as a health check, and define the IP address that the response must match:
config system sdwan
set status enable
config health-check
edit "h4_dns1"
set protocol dns
set dns-request-domain "ip41.forti2.com"
set dns-match-ip 1.1.1.1
next
edit "h6_dns1"
set addr-mode ipv6
set serv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
869 | SD-WAN
set ftp-mode {passive | port}
set ftp-file "1.txt"
set server <server>
next
edit "h6_ftp1"
set addr-mode ipv6
set server "2032::11"
set protocol ftp
set port 21
set user "root"
set password ***********
set ftp-mode {passive | port}
set ftp-file "2.txt"
next
end
end
Health check probe packets support DSCP markers... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
870 | SD-WAN
l Packet loss threshold: packet loss for SLA to make a decision, in percentage (0 - 100, default = 0).
These settings should be specific to the service whose performance is being considered. You should attempt to
configure the constraints to be just under the maximum values for the application or service to func... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
871 | SD-WAN
You can configure the protocol that is used for status checks, including: Ping, HTTP, HTTPS. DNS, TCP echo, UDP
echo, two-way active measurement protocol (TWAMP), TCP connect, and FTP. In the GUI, only Ping, HTTP, and DNS
are available.
You can view link quality measurements by going to Network > SD-WAN and sele... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
872 | SD-WAN
12. Click OK.
To configure a link health monitor in the CLI:
config system sdwan
config health-check
edit "PingSLA"
set addr-mode {ipv4 | ipv6}
set server <server1_IP_address> <server2_IP_address>
set detect-mode {active | passive | prefer-passive}
set protocol {ping | tcp-echo | udp-echo | http | https| twamp |... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
873 | SD-WAN
set jitter-threshold <integer>
set packetloss-threshold <integer>
next
end
next
end
end
Additional settings are available for some of the protocols:
Protocol Additional options
http, https port <port_number>
http-get <url>
http-agent <string>
http-match <response_string>
twamp port <port_number>
security mode {n... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
874 | SD-WAN
The live charts show the packet loss, latency, or jitter for the selected health check. Hover the cursor over a line in the
chart to see the specific value for that interface at that specific time.
The table shows information about each health check, including the configured servers, link quality data, and thres... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
875 | SD-WAN
logdesc="SDWAN SLA information" status="up" interface="port1" eventtime=1618506296222639301
tz="-0700" eventtype="SLA" jitter="0.277" inbandwidthavailable="10.00Gbps"
outbandwidthavailable="10.00Gbps" bibandwidthavailable="20.00Gbps" packetloss="1.000%"
latency="186.071" slamap="0x1" healthcheck="BusinessCritica... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
876 | SD-WAN
jitter="0.000" inbandwidthavailable="10.00Gbps" outbandwidthavailable="10.00Gbps"
bibandwidthavailable="20.00Gbps" packetloss="100.000%" latency="0.000" slamap="0x0"
healthcheck="BusinessCritical_CloudApps" slatargetid=1 metric="packetloss"
outbandwidthused="6kbps" inbandwidthused="3kbps" bibandwidthused="9kbps"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
877 | SD-WAN
Timestamp: Wed Jan 9 18:34:49 2019, used inbandwidth: 3165bps, used outbandwidth:
3362bps, used bibandwidth: 6527bps, tx bytes: 972298bytes, rx bytes: 922724bytes.
Timestamp: Wed Jan 9 18:34:59 2019, used inbandwidth: 3184bps, used outbandwidth:
3362bps, used bibandwidth: 6546bps, tx bytes: 977282bytes, rx bytes... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
878 | SD-WAN
Example
In this example, the FortiGate is configured to load-balance between two WAN interfaces, port15 and port16. A health
check is configured in passive mode, and SLA thresholds are set. Passive WAN health measurement is enabled on the
SD-WAN policy.
Measurements are taken from YouTube traffic generated by th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
879 | SD-WAN
f. Configure the remaining settings as needed.
g. Click OK.
The SLA list shows the probe mode in the Detect Server column, if the probe mode is passive or prefer passive.
Probe packets can only be disabled in the CLI and when the probe mode is not
passive.
4. Create SD-WAN rules:
a. Go to Network > SD-WAN, selec... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
880 | SD-WAN
d. Click Create New again and configure the second rule:
Name Foreground_Traffic
Source address 172.16.205.0
Address all
Protocol number Specify - 1
Strategy Lowest Cost (SLA)
Interface preference port15 and port16
Required SLA target Passive_Check#1
e. Click OK.
To configure the firewall policy in the GUI:
1. G... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
881 | SD-WAN
edit 2
set zone "SD-WAN"
set interface "port16"
set gateway 172.16.210.2
next
end
config health-check
edit "Passive_Check"
set detect-mode passive
set members 1 2
config sla
edit 1
set latency-threshold 500
set jitter-threshold 500
set packetloss-threshold 10
next
edit 2
set latency-threshold 1000
set jitter-thr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
882 | SD-WAN
To configure the firewall policy in the CLI:
config firewall policy
edit 1
set name "SD-WAN-HC-policy"
set srcintf "port5"
set dstintf "SD-WAN"
set nat enable
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set passive-wan-health-measurement enable
set auto-asic-offl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
883 | SD-WAN
# diagnose sys sdwan service4 2
Service(2): Address Mode(IPV4) flags=0x200
Gen(6), TOS(0x0/0x0), Protocol(1: 1->65535), Mode(sla), sla-compare-order
Members(2):
1: Seq_num(2 port16), alive, sla(0x1), gid(1), cfg_order(1), cost(0), selected
2: Seq_num(1 port15), alive, sla(0x0), gid(2), cfg_order(0), cost(0), sel... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
884 | SD-WAN
l Rule 1: Best quality (latency) using passive SLA for the internet services Alibaba and Amazon.
l Rule 2: Best quality (latency) using passive SLA for the applications Netflix and YouTube.
l Rule 3: Best quality (latency) using passive SLA for all other traffic.
After passive application measurement is enabled ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
885 | SD-WAN
is a new command which is introduced in this project.
next
edit 2
set name "2"
set mode priority
set src "172.16.205.0"
set internet-service enable
set internet-service-app-ctrl 18155 31077
set health-check "Passive_HC"
set priority-members 1 2
set passive-measurement enable ////Enable "passive application measu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
886 | SD-WAN
# diagnose sys link-monitor-passive admin list by-interface
Interface dmz (5):
Default(0x00000000): latency=3080.0 11:57:54, jitter=5.0 11:58:08,
pktloss=0.0 % NA
Alibaba-Web(0x00690001): latency=30.0 11:30:06, jitter=25.0 11:29:13,
pktloss=0.0 % NA
YouTube(0x00007965): latency=100.0 12:00:35, jitter=2.5 12:00:3... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
887 | SD-WAN
Internet Service(2): Netflix(4294837427,0,0,0 18155) YouTube(4294838283,0,0,0 31077)
Src address(1):
172.16.205.0-172.16.205.255
Service(3): Address Mode(IPV4) flags=0x200 use-shortcut-sla
Gen(9), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(priority), link-cost-factor
(latency), link-cost-threshold(10), heath-chec... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
888 | SD-WAN
mos-codec {g711 | g729 |
g722}
Set the VoIP codec to use for the MOS calculation (default = g711).
link-cost-factor {latency
jitter packet-loss
mos}
Set the criteria to base the link selection on.
mos-threshold <value> Set the minimum MOS for the SLA to be marked as pass (1.0 - 5.0, default = 3.6).
To configure ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
889 | SD-WAN
next
end
set priority-members 0
next
end
end
The MOS currently cannot be used to steer traffic when the mode is set to priority.
To verify the MOS calculation results:
1. Verify the health check diagnostics:
# diagnose sys sdwan health-check
Health Check(Test_MOS):
Seq(1 dmz): state(alive), packet-loss(0.000%) l... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
890 | SD-WAN
eventtype="SLA" healthcheck="Test_MOS" slatargetid=1 interface="port15" status="up"
latency="300.118" jitter="0.013" packetloss="0.000" mos="3.905"
inbandwidthavailable="1000.00Mbps" outbandwidthavailable="1000.00Mbps"
bibandwidthavailable="2.00Gbps" inbandwidthused="0kbps" outbandwidthused="0kbps"
bibandwidthus... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
891 | SD-WAN
In this topology, each FortiGate’s BGP router ID is based on its Loopback0 interface. Each spoke has SLA health checks
defined to send ICMP probes to the server’s Lo_HC interface on 172.31.100.100. The ICMP probes include embedded
SLA information for each SD-WAN overlay member.
Related SD-WAN settings:
config sy... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
892 | SD-WAN
embed-measured-health
{enable | disable}
Enable/disable embedding SLA information in ICMP probes (default = disable).
set priority-in-sla
<integer>
Set the priority that will be set to the IKE route when the corresponding overlay is
in SLA (0 - 65535).
set priority-out-sla
<integer>
Set the priority that will be... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
893 | SD-WAN
set interface "H1_T11"
set zone "overlay"
set source 172.31.0.65
next
edit 4
set interface "H1_T22"
set zone "overlay"
set source 172.31.0.65
next
end
config health-check
edit "HUB"
set server "172.31.100.100"
set embed-measured-health enable
set members 0
config sla
edit 1
set link-cost-factor latency
set laten... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
894 | SD-WAN
To add the loopback IP to the IPsec interface settings:
config vpn ipsec phase1-interface
edit "H1_T11"
set exchange-interface-ip enable
set exchange-ip-addr4 172.31.0.65
next
edit "H1_T22"
set exchange-interface-ip enable
set exchange-ip-addr4 172.31.0.65
next
end
Configuring the hub FortiGate
In the SD-WAN set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
895 | SD-WAN
set priority-in-sla 10
set priority-out-sla 20
next
end
next
edit "2"
set detect-mode remote
set sla-id-redistribute 1
set members 2
config sla
edit 1
set link-cost-factor latency
set latency-threshold 100
set priority-in-sla 15
set priority-out-sla 25
next
end
next
end
end
In the BGP settings, note the followin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
896 | SD-WAN
set exchange-interface-ip enable
set exchange-ip-addr4 172.31.0.1
next
end
Testing and verification
Once the hub and spokes are configured, verify that SLA statuses are passed from the spoke to the hub.
To verify that the SLA statuses are passed from the spoke to the hub:
1. On Spoke_1, display the status of the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
897 | SD-WAN
Remote Health Check: 1(1)
Passive remote statistics of EDGE_T1(21):
EDGE_T1_0(172.31.3.1): timestamp=02-09 16:19:11, latency=1.269, jitter=0.675,
pktloss=0.000%
4. When there are multiple spokes, additional options can be used to filter a spoke by health check name, or health
check name and the member's sequence... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
898 | SD-WAN
To verify that the hub will start routing traffic to EDGE_T2 when the spoke H1_T11 tunnel is out of SLA:
1. On Spoke_1, display the status of the health checks for H1_T11 and H1_T22:
# diagnose sys sdwan health-check
Health Check(HUB):
Seq(1 H1_T11): state(alive), packet-loss(0.000%) latency(120.228), jitter(0.0... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
899 | SD-WAN
For configuration on a spoke, the config system sdwan command includes these options:
config system sdwan
config members
edit <entry>
set priority-in-sla <integer>
set priority-out-sla <integer>
next
end
end
set priority-in-sla
<integer>
Preferred priority of routes to this member when this member is in SLA (0 -... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
900 | SD-WAN
SD-WAN settings on the spoke relevant to the examples:
config system sdwan
set speedtest-bypass-routing enable
config members
edit <id>
set priority-in-sla <value>
set priority-out-sla <value>
next
end
config health-check
edit <name>
set embed-measured-health enable
set sla-id-redistribute <id>
config sla
edit 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
901 | SD-WAN
To embed SD-WAN SLA status and priorities in ICMP probes:
1. Configure SD-WAN and BGP on Spoke-1 (Branch1_A_FGT):
a. Configure SD-WAN:
config system sdwan
set status enable
set speedtest-bypass-routing enable
config zone
edit "overlay"
next
end
config members
edit 4
set interface "H1_T11"
set zone "overlay"
set ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
902 | SD-WAN
next
end
config network
edit 1
set prefix 10.0.3.0 255.255.255.0
next
end
......
end
c. View the health-check settings:
# diagnose sys sdwan health-check
Health Check(HUB):
Seq(4 H1_T11): state(alive), packet-loss(0.000%) latency(0.246), jitter(0.015), mos
(4.404), bandwidth-up(999998), bandwidth-dw(999996), ba... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
903 | SD-WAN
set link-cost-factor latency
set latency-threshold 70
next
end
next
end
end
b. Configure BGP:
config router bgp
set as 65001
set router-id 172.31.0.66
......
config neighbor
edit "172.31.0.1"
......
set remote-as 65001
set update-source "Loopback0"
next
end
config network
edit 1
set prefix 10.0.4.0 255.255.255.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
904 | SD-WAN
next
end
config health-check
edit "Remote_HC"
set detect-mode remote
set sla-id-redistribute 1
set members 1 2
config sla
edit 1
set link-cost-factor remote
next
end
next
end
end
b. Configure BGP:
config router bgp
set as 65001
set router-id 172.31.0.1
set recursive-inherit-priority enable
......
config neighbor... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
905 | SD-WAN
EDGE_T1_1(172.31.0.66): timestamp=06-12 14:04:30, src=172.31.0.66, latency=0.246,
jitter=0.031, pktloss=0.000%, mos=4.404, SLA id=1(pass), rmt_ver=2, rmt_sla=in, rmt_
prio=30
Remote Health Check: Remote_HC(2)
Passive remote statistics of EDGE_T2(47):
EDGE_T2_0(10.0.0.15): timestamp=06-12 14:04:30, src=172.31.0.6... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
906 | SD-WAN
Seq(4 H1_T11): state(alive), packet-loss(0.000%) latency(80.217), jitter(0.022), mos
(4.361), bandwidth-up(999998), bandwidth-dw(999998), bandwidth-bi(1999996) sla_
map=0x0
Seq(5 H1_T22): state(alive), packet-loss(0.000%) latency(0.202), jitter(0.016), mos
(4.404), bandwidth-up(999998), bandwidth-dw(999997), ban... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
907 | SD-WAN
Speed test rerouting based on embedded SLA priorities
When spoke-initiated speed tests are enabled for this configuration, the out-of SLA priority is used by the hub to choose
other routes during the speed test.
To configure speed tests:
1. On the hub, enable speed tests and allow them on the underlays and overl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
908 | SD-WAN
set interface "port2"
next
end
f. View the shaping profile:
config firewall shaping-profile
edit "profile_1"
set default-class-id 2
config shaping-entries
edit 1
set class-id 2
set priority low
set guaranteed-bandwidth-percentage 10
set maximum-bandwidth-percentage 10
next
edit 2
set class-id 3
set priority medi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
909 | SD-WAN
DC1_A_FGT (root) (Interim)# get router info routing-table bgp
Routing table for VRF=0
B 10.0.3.0/24 [200/0] via 172.31.0.65 (recursive via EDGE_T1 tunnel 10.0.0.20 [10]),
00:11:56
(recursive via EDGE_T2 tunnel 172.31.0.65 [15]),
00:11:56, [1/0]
While the speed test is running on H1_T11 of Spoke-1, Spoke-1 will... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
910 | SD-WAN
priority=medium forwarded_bytes=0
dropped_packets=0 dropped_bytes=0
class-id=4 allocated-bandwidth=355747(kbps) guaranteed-bandwidth=142298
(kbps)
max-bandwidth=355747(kbps) current-bandwidth=0(kbps)
priority=high forwarded_bytes=0
dropped_packets=0 dropped_bytes=0
--------------------------------------------... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
911 | SD-WAN
set sla-id-redistribute <ID>
config sla
edit <entry>
set link-cost-factor remote {latency | jitter | packet-loss | mos |
remote}
next
end
next
end
end
set sla-id-redistribute
<ID>
Select the ID from the SLA subtable. The selected SLA's priority value will be
distributed into the routing table (0 - 32, default = ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
912 | SD-WAN
The examples use the following SD-WAN settings on the spoke:
SD-WAN settings on the spoke relevant to the examples:
config system sdwan
set speedtest-bypass-routing enable
config health-check
edit <name>
set embed-measured-health enable
set sla-id-redistribute <id>
config sla
edit 1
<desired SLA thresholds>
ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
913 | SD-WAN
To embed SD-WAN SLA status and priorities in ICMP probes:
1. Configure SD-WAN and BGP on Spoke-1 (Branch1_A_FGT):
a. Configure SD-WAN:
config system sdwan
set status enable
set speedtest-bypass-routing enable
config zone
edit "overlay"
next
end
config members
edit 4
set interface "H1_T11"
set zone "overlay"
set ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
914 | SD-WAN
set prefix 10.0.3.0 255.255.255.0
next
end
......
end
c. View the health-check settings:
All overlays on Spoke-1 are in SLA.
# diagnose sys sdwan health-check
Health Check(HUB):
Seq(4 H1_T11): state(alive), packet-loss(0.000%) latency(0.252), jitter(0.025), mos
(4.404), bandwidth-up(999998), bandwidth-dw(99999... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
915 | SD-WAN
end
end
b. Configure BGP:
config router bgp
set as 65001
set router-id 172.31.0.66
......
config neighbor
edit "172.31.0.1"
......
set remote-as 65001
set update-source "Loopback0"
next
end
config network
edit 1
set prefix 10.0.4.0 255.255.255.0
next
end
......
end
c. View the health-check settings:
All overlay... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
916 | SD-WAN
set detect-mode remote
set sla-id-redistribute 1
set members 1 2
config sla
edit 1
set link-cost-factor remote
set priority-in-sla 100
set priority-out-sla 200
next
end
next
end
end
b. Configure BGP:
config router bgp
set as 65001
set router-id 172.31.0.1
set recursive-inherit-priority enable
......
config neig... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
917 | SD-WAN
prio=0
Remote Health Check: Remote_HC(2)
Passive remote statistics of EDGE_T2(47):
EDGE_T2_0(10.0.0.15): timestamp=06-11 14:50:33, src=172.31.0.66, latency=0.195,
jitter=0.008, pktloss=0.000%, mos=4.404, SLA id=1(pass), rmt_ver=1, rmt_sla=in, rmt_
prio=0
EDGE_T2_1(172.31.0.65): timestamp=06-11 14:50:33, src=172.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
918 | SD-WAN
(4.361), bandwidth-up(999998), bandwidth-dw(999998), bandwidth-bi(1999996) sla_
map=0x0
Seq(5 H1_T22): state(alive), packet-loss(0.000%) latency(0.202), jitter(0.012), mos
(4.404), bandwidth-up(999998), bandwidth-dw(999997), bandwidth-bi(1999995) sla_
map=0x1
6. After the hub receives the updated SLA status, run... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
919 | SD-WAN
Speed test rerouting based on embedded SLA status
When spoke-initiated speed tests are enabled for this configuration, the out-of SLA status is used by the hub to choose
other routes during the speed test.
To configure speed tests:
1. On the hub, enable speed tests and allow them on the underlays and overlays.
a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
920 | SD-WAN
set interface "port2"
next
end
f. View the shaping profile:
config firewall shaping-profile
edit "profile_1"
set default-class-id 2
config shaping-entries
edit 1
set class-id 2
set priority low
set guaranteed-bandwidth-percentage 10
set maximum-bandwidth-percentage 10
next
edit 2
set class-id 3
set priority medi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
921 | SD-WAN
DC1_A_FGT (root) (Interim)# get router info routing-table bgp
Routing table for VRF=0
B 10.0.3.0/24 [200/0] via 172.31.0.65 (recursive via EDGE_T2 tunnel 172.31.0.65
[100]), 00:24:14
(recursive via EDGE_T1 tunnel 10.0.0.20 [100]),
00:24:14, [1/0]
While the speed test is running on H1_T11 of Spoke-1, Spoke-1 wil... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
922 | SD-WAN
priority=medium forwarded_bytes=0
dropped_packets=0 dropped_bytes=0
class-id=4 allocated-bandwidth=336990(kbps) guaranteed-bandwidth=134796
(kbps)
max-bandwidth=336990(kbps) current-bandwidth=0(kbps)
priority=high forwarded_bytes=0
dropped_packets=0 dropped_bytes=0
--------------------------------------------... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
923 | SD-WAN
Value Description
preferable Select neighbor based on its HC to match BGP preferable/unpreferable route_
map.
priority Select neighbor based on its members' priority-in-sla/priority-out-sla value.
Routes to prefixes behind spokes are advertised by the SD-WAN hub to eBGP peers on an external network. The
relative... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
924 | SD-WAN
config members
edit 4
set interface "H1_T11"
set zone "overlay"
set source 172.31.0.65
set priority-in-sla 50
set priority-out-sla 100
next
edit 5
set interface "H1_T22"
set zone "overlay"
set source 172.31.0.65
set priority-in-sla 70
set priority-out-sla 120
next
edit 7
set interface "H2_T11"
set zone "overlay"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
925 | SD-WAN
set health-check "HUB"
next
end
end
The routes with MEDs are advertised to a router on the external network that establishes a BGP neighbor
relationship with Hub-1 and Hub-2. When sending traffic destined for 10.0.3.0/24, the router on the external network
will prefer to send traffic to the hub with the lower ME... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
926 | SD-WAN
Seq(8 H2_T22): state(alive), packet-loss(0.000%), latency(0.205), jitter(0.018), mos
(4.404), bandwidth-up(999998), bandwidth-dw(999997), bandwidth-bi(1999995), sla_map=0x1
# get router info bgp neighbors 172.31.0.1 advertised-routes
VRF 0 BGP table version is 31, local router ID is 172.31.0.65
Status codes: s s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
927 | SD-WAN
6. H1_T11, H2_T11, and H1_T22 are out of SLA.
When sending traffic destined for 10.0.3.0/24, the router on the external network will prefer to send traffic to Hub-2
with lower MED 80 over Hub-1 with higher MED 100.
# diagnose sys sdwan health-check
Health Check(HUB):
Seq(4 H1_T11): state(alive), packet-loss(0.00... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
928 | SD-WAN
Total number of prefixes 1
# get router info bgp neighbors 172.31.0.2 advertised-routes
VRF 0 BGP table version is 31, local router ID is 172.31.0.65
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
929 | SD-WAN
Example
In this example, routing is achieved through SD-WAN rules. The agent-based health check detection mode creates the
FortiMonitor IP address and FortiGate SD-WAN interface map.
This example assumes that the FortiMonitor has already been added to the Security Fabric (see Configuring
FortiMonitor on page 350... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
930 | SD-WAN
set interface "v1236"
set gateway 10.12.36.2
next
edit 2
set interface "v1237"
set gateway 10.12.37.20
next
end
end
4. Configure the SD-WAN rules to ensure each OnSight client uses only one SD-WAN member, and map the
FortiMonitor IP to an SD-WAN member (interface):
config system sdwan
config service
edit 1
set d... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
931 | SD-WAN
pktloss=0.0 % 20:27:24
v1237( 24) | src=10.2.1.81 | latency=182.9 20:27:24 | jitter=0.1 20:27:24 |
pktloss=0.0 % 20:27:24
3. Verify the details of each application:
# diagnose sys link-monitor-passive agent list-app
app_id=0x00000000, app=fortinet.com, dev=v1236(23)
latency=183.2, jitter=0.1, pktloss=0.0,ntt=99.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
932 | SD-WAN
logdesc="Virtuan WAN Link application performance metrics via FortiMonitor"
eventtype="Application Performance Metrics" app="fortinet.com" appid=0 interface="v1237"
latency="200.1" jitter="0.4" packetloss="0.0" serverresponsetime="845.4"
networktransfertime="116.0" apperror="0.0" timestamp="01-28 00:30:01" msg="... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
933 | SD-WAN
2.2.2.2 are assigned to class 2 (sla_probe). This means it has a guaranteed bandwidth and has the highest priority to
use unused bandwidth. This allows SD-WAN health check to function properly even during times of congestion.
To classify SLA probes for traffic prioritization:
1. Configure the firewall traffic cl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
934 | SD-WAN
set egress-shaping-profile "profile-1"
...
next
end
4. Configure the SD-WAN health check and assign the SLA probes into class 2:
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
end
config members
edit 1
set interface "dmz"
set gateway 172.16.208.2
next
edit 2
set interface "vd1-p1"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
935 | SD-WAN
priority=low forwarded_bytes=1446
dropped_packets=0 dropped_bytes=0
class-id=4 allocated-bandwidth=100000(kbps) guaranteedbandwidth=100000(kbps)
max-bandwidth=1000000(kbps) current-bandwidth=0(kbps)
priority=medium forwarded_bytes=0
dropped_packets=0 dropped_bytes=0
class-id=2 allocated-bandwidth=100000(kbp... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
936 | SD-WAN
To assign the SLA probe to medium priority:
1. Assign SLA probes into class 4:
config sys sdwan
config health-check
edit 1
set class-id 4
next
end
set status disable
end
config sys sdwan
set status enable
end
2. Verify the SLA probes are assigned into class 4.
# diagnose netlink interface list dmz
if=dmz family=... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
937 | SD-WAN
bandwidth=100000(kbps)
max-bandwidth=1000000(kbps) current-bandwidth=1(kbps)
priority=medium forwarded_bytes=1280
dropped_packets=0 dropped_bytes=0
class-id=2 allocated-bandwidth=100000(kbps) guaranteedbandwidth=100000(kbps)
max-bandwidth=1000000(kbps) current-bandwidth=0(kbps)
priority=high forwarded_bytes=0... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
938 | SD-WAN
From the GUI, go to Network > SD-WAN > SD-WAN Rules. When creating a new SD-WAN rule, or editing an existing
SD-WAN rule, use the Source and Destination sections to identify traffic, and use the Outgoing interfaces section to
configure WAN intelligence for routing traffic.
From the CLI, use the following command... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
939 | SD-WAN
Address type Source Destination
IPv4/6 ✓ ✓
MAC ✓ ✓
Group ✓ ✓
FABRIC_DEVICE dynamic address ✓ ✓
Users ✓ ✓
User groups ✓ ✓
Application control (application aware routing) ✓
Internet service database (ISDB) ✓
BGP route tags ✓
Differentiated Services Code Point (DSCP) tags ✓
In the GUI, go to Network > SD-WAN > SD-W... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
940 | SD-WAN
The following table describes the fields used for the name, ID, and IP version of the SD-WAN rule:
ID, Name, and IP version
Field CLI Description
ID config system sdwan
config service
edit <ID>
set comment <string>
next
end
ID is generated when the rule is
created. You can only specify the
ID from the CLI.
Name... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
941 | SD-WAN
Destination
Field CLI Description
If it is necessary for an SD-WAN rule to
match multiple protocols or multiple
port ranges, you can create a custom
Internet Service.
Internet Service set internet-service enable
set internet-service-custom
<name_1> <name_2> ...
<name_n>
set internet-service-customgroup <name_1>... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
942 | SD-WAN
Destination
Field CLI Description
For example, the FortiGate receives
DSCP values 110000 and 111011.
(DSCP is the upper 6 bits of the TOS
field – 11000000 and 11101100
respectively). Using the TOS value
0xe0 (11100000), only the second
DSCP value is matched.
By default, individual applications and application gr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
943 | SD-WAN
Interface or zone preference
By default, the configured order of interfaces and/or zones in a rule are used. Interfaces and zones that are selected first
have precedence over interfaces selected second and so on.
You can specify both interfaces and zones. When a zone is specified in the Zone preference field, it... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
944 | SD-WAN
Automatic and manual strategies have pre-configured logic that do not leverage SLA health checks.
The goal of the performance SLA is to measure the quality of each SD-WAN member link. The following methods can be
used to measure the quality of a link:
l Active measurement
l Health-check traffic is sent to a serv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
945 | SD-WAN
set dscp-forward-tag
000000
Forward traffic DSCP tag.
set dscp-reverse enable Enable use of reverse DSCP tag.
set dscp-reverse-tag
000000
Reverse traffic DSCP tag.
Default and gateway options
Following are additional gateway options that can be set only in the CLI:
config system sdwan
config service
edit <ID>
..... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
946 | SD-WAN
Source IP (source-ip-based) Traffic is divided equally between the interfaces, including the SD-WAN interface.
Sessions that start at the same source IP address use the same path.
This is the default selection.
Sessions (weight-based) The workload is distributing based on the number of sessions that are connecte... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
947 | SD-WAN
If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone.
Example 1
Outgoing traffic is equally balanced between wan1 and wan2, using source-ip-based or source-dest-ip-based mode.
Using the GUI:
1. On the FortiGate, enable SD-WAN and add wan1 and wan2 as SD-WAN members, then add a p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
948 | SD-WAN
4. Enter 80 in the wan1 field, and 20 in the wan2 field.
5. Click OK.
Using the CLI:
config system sdwan
set load-balance-mode weight-based
config members
edit 1
set interface "wan1"
set weight 80
next
edit 2
set interface "wan2"
set weight 20
next
end
end
Example 3
Outgoing traffic is balanced between wan1 and ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
949 | SD-WAN
next
edit 2
set interface "wan2"
set volume-ratio 20
next
end
end
Example 4
Load balancing can be used to reduce costs when internet connections are charged at different rates. For example, if
wan2 charges based on volume usage and wan1 charges a fixed monthly fee, we can use wan1 at its maximum
bandwidth, and u... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
950 | SD-WAN
Automatic strategy
The automatic strategy is a legacy rule that lets you select an outgoing interface based on its performance ranking
compared to the other SD-WAN interfaces. This is achieved by applying a performance SLA to rank the interfaces, and
then selecting the desired rank.
In this example, you have thr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
951 | SD-WAN
Manual strategy
In manual mode, no health checks are used. As a result, the decision making closer resembles logic than intelligence.
SD-WAN manual rules are similar to regular policy-based routes, but have the added features of application-aware
routing and BGP-tag routing. A manual strategy rule is comprised o... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
952 | SD-WAN
set dst "DC_net"
set hold-down-time 60
next
end
end
l The command set mode manual will not appear in the configuration because it is the
default mode.
l The command set hold-down-time <integer> is an optional command that
controls how long to wait before switching back to the primary interface in the event of a
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
953 | SD-WAN
To enable the load balancing strategy for manual mode in the GUI:
1. Go to Network > SD-WAN.
2. Select the SD-WAN Rules tab, and click Create New.
3. Set the Interface selection strategy to Manual.
4. Enable Load balancing.
5. Set the remaining options as desired, and click OK to create the rule.
To enable the l... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
954 | SD-WAN
Best quality strategy
When using Best Quality mode, SD-WAN will choose the best link to forward traffic by comparing the link-cost-factor. A
link-cost factor is a specific metric of participating link(s) (such as, latency, packet loss, and so on) evaluated against a
target that you define (such as a health-check... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.