index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
955
SD-WAN In this example both WAN1 and WAN2 are assumed to have 200ms latency to the health-check server named DC_ HealthCheck. Because WAN2 is specified before WAN1 in priority-members, SD-WAN parses the two interfaces metric as follows: l WAN1: 200ms l WAN2: 200ms / (1+10%) = ~182ms As a result, WAN2 is selected becaus...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
956
SD-WAN Internet Service Google-Gmail Strategy Best Quality Interface preference wan1 and wan2 Measured SLA google Quality criteria Latency 8. Click OK. To configure an SD-WAN rule to use priority: config system sdwan config health-check edit "google" set server "google.com" set members 1 2 next end config service edit ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
957
SD-WAN set link-cost-factor latency set priority-members 1 2 next end end To diagnose the Performance SLA status: FGT # diagnose sys sdwan health-check google Health Check(google): Seq(1): state(alive), packet-loss(0.000%) latency(14.563), jitter(4.334) sla_map=0x0 Seq(2): state(alive), packet-loss(0.000%) latency(12.6...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
958
SD-WAN 4. Enable SLA Target. Set the Latency threshold to 10 ms, and the Jitter threshold to 5 ms. See Health checks for more details. 5. Click OK. 6. Go to Network > SD-WAN, select the SD-WAN Rules tab, and click Create New. 7. Enter a name for the rule, such as gmail. 8. Configure the following settings: Internet Ser...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
959
SD-WAN set cost 10 next edit 2 set interface "wan2" set cost 5 next end config health-check edit "google" set server "google.com" set members 1 2 config sla edit 1 set latency-threshold 10 set jitter-threshold 5 next end next end config service edit 1 set name "gmail" set mode sla set internet-service enable set intern...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
960
SD-WAN TOS(0x0/0x0), Protocol(0: 1->65535), Mode(sla) Members:<<BR>> 1: Seq_num(2), alive, sla(0x1), cfg_order(1), selected 2: Seq_num(1), alive, sla(0x1), cfg_order(0), selected Internet Service: Google.Gmail(65646) When both wan1 and wan2 meet the SLA requirements, Gmail traffic will only use wan2. If only wan1 meets...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
961
SD-WAN next end Example Based on the same topology as the preceding example, your wan1 and wan2 SD-WAN interfaces connect to two ISPs that both go to the public internet. You want to configure Gmail services to use both of the interface, but the link quality must meet a standard of latency: 10ms, and jitter: 5ms. This ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
962
SD-WAN Internet Service Google-Gmail Strategy Lowest Cost (SLA) Interface preference wan1 and wan2 Required SLA target google Load balancing Enable this setting 9. Click OK. To configure an SD-WAN rule to use load balancing with SLA targets in the CLI: config system sdwan config members edit 1 set interface "wan1" set ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
963
SD-WAN To diagnose the performance SLA status: FGT # diagnose sys sdwan health-check status Health Check(google): Seq(1): state(alive), packet-loss(0.000%) latency(14.563), jitter(4.334) sla_map=0x0 Seq(2): state(alive), packet-loss(0.000%) latency(12.633), jitter(6.265) sla_map=0x0 FGT # diagnose sys sdwan service4 1 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
964
SD-WAN SD-WAN traffic shaping and QoS Use a traffic shaper in a firewall shaping policy to control traffic flow. You can use it to control maximum and guaranteed bandwidth, or put certain traffic to one of the three different traffic priorities: high, medium, or low. An advanced shaping policy can classify traffic into...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
965
SD-WAN Destination all Service HTTP and HTTPS Outgoing interface virtual-wan-link Shared Shaper Enable and set to high-priority Reverse Shaper Enable and set to high-priority c. Click OK. 5. Go to Policy & Objects > Traffic Shaping, select the Traffic Shaping Policy tab, and click Create New. a. Name the traffic shapin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
966
SD-WAN To configure the firewall traffic shaper priority using the CLI: config firewall shaper traffic-shaper edit "high-priority" set maximum-bandwidth 1048576 set per-policy enable next edit "low-priority" set guaranteed-bandwidth 1000 set maximum-bandwidth 1048576 set priority low set per-policy enable next end To c...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
967
SD-WAN set dst "voip-server" set dscp-forward enable set dscp-forward-tag 101110 next end end If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone. To use the diagnose command to check if specific traffic is attached to the correct traffic shaper: # diagnose firewall iprope list 100015...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
968
SD-WAN state=may_dirty npu npd os mif route_preserve statistic(bytes/packets/allow_err): org=868/15/1 reply=752/10/1 tuples=2 tx speed(Bps/kbps): 76/0 rx speed(Bps/kbps): 66/0 orgin->sink: org pre->post, reply pre->post dev=39->38/38->39 gwy=172.16.200.55/0.0.0.0 hook=post dir=org act=snat 10.1.100.11:58241->172.16.200...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
969
SD-WAN policy 2 tos ff packets dropped 0 bytes dropped 0 SDN dynamic connector addresses in SD-WAN rules SDN dynamic connector addresses can be used in SD-WAN rules. FortiGate supports both public (AWS, Azure, GCP, OCI, AliCloud) and private (Kubernetes, VMware ESXi and NSX, OpenStack, ACI, Nuage) SDN connectors. The c...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
970
SD-WAN 3. Enter the following: Name azure-address Type Dynamic Sub Type Fabric Connector Address SDN Connector azure1 Addresses to collect Private Filter SecurityGroup=edsouza-centos Interface Any 4. Click OK. To use the firewall address in an SD-WAN service rule: 1. Go to Network > SD-WAN, select the SD-WAN Rules tab,...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
971
SD-WAN To debug the SDN connector to resolve the firewall address: # diagnose debug application azd -1 Debug messages will be on for 30 minutes. ... azd sdn connector azure1 start updating IP addresses azd checking firewall address object azure-address-1, vd 0 IP address change, new list: 10.18.0.4 10.18.0.12 ... ... #...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
972
SD-WAN Application matching To apply application steering, SD-WAN service rules match traffic based on the applications that are in the application signature database. To view the signatures, go to Security Profiles > Application Signatures and select Signature. On the first session that passes through, the IPS engine ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
973
SD-WAN This example configures all SIP traffic to use MPLS while all other traffic uses DIA. If DIA is not working, the traffic will use MPLS. By default, individual applications and application groups cannot be selected in SD-WAN rules. To enable this functionality in the GUI, go to System > Feature Visibility and ena...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
974
SD-WAN set service "ALL" set utm-status enable set fsso disable set application-list "default" set ssl-ssh-profile "certificate-inspection" set nat enable next end To configure an SD-WAN rule to use SIP and DIA using the CLI: config system sdwan set status enable config members edit 1 set interface "MPLS" next edit 2 s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
975
SD-WAN Internet Service: SIP(4294836224 34640) SIP.Method(4294836225 152305677) SIP.Via.NAT (4294836226 38938) SIP_Media.Type.Application(4294836227 26180) SIP_Message(4294836228 26179) SIP_Voice(4294836229 30251) # diagnose sys sdwan service4 2 Service(2): Address Mode(IPV4) flags=0x0 TOS(0x0/0x0), Protocol(0: 1->6553...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
976
SD-WAN To configure the SD-WAN members, static route, and firewall policy in the GUI: 1. Add port1 (DIA_1), port2 (DIA_2), and port3 (MPLS) as SD-WAN members. Set the cost of DIA_1 and DIA_2 to 0, and MPLS to 20. See Configuring the SD-WAN interface on page 841 for details. 2. Configure a static route. See Adding a sta...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
977
SD-WAN 8. Click OK to create the SD-WAN rule. To configure the SD-WAN rule and performance SLA checks for non-business critical application in the GUI: 1. Go to Network > SD-WAN, select the SD-WAN Rules tab, and click Create New. 2. Set the name to NonBusinessCriticalApps. This rule will steer your non-business critica...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
978
SD-WAN The preferred link advantage can be customized in the CLI when the mode is priority (Best Quality) or auto: config system sdwan config service edit <id> set link-cost-threshold <integer> next end end 7. Create and apply a new performance SLA profile: a. Click in the Measured SLA field. b. In the drop-down list, ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
979
SD-WAN 9. Click OK to create the SD-WAN rule. To configure the SD-WAN members, static route, and firewall policy in the CLI: 1. Configure the interfaces: config system interface edit "port1" set ip <class_ip&net_netmask> set alias "DIA_1" set role wan next edit "port2" set ip <class_ip&net_netmask> set alias "DIA_2" se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
980
SD-WAN config members edit 1 set interface "port1" set gateway 172.16.20.2 next edit 2 set interface "port2" set gateway 172.17.80.2 next edit 3 set interface "port3" set gateway 10.100.20.2 set cost 20 next end end If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone. 3. Configure a s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
981
SD-WAN edit "BusinessCriticalApps_HC" set id 1 next end set priority-members 1 2 3 next end end To configure the SD-WAN rule and performance SLA checks for non-business critical application in the CLI: 1. Configure the nonBusinessCriticalApps_HC health-check: config system sdwan config health-check edit "NonBusinessCri...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
982
SD-WAN Health checks To verify the status of each of the health checks in the GUI: 1. Go to Network > SD-WAN, select the Performance SLAs tab, and select each of the health checks from the list. To verify the status of each of the health checks in the CLI: # diagnose sys sdwan health-check Health Check(BusinessCritical...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
983
SD-WAN Rule members and hit count To verify the active members and hit count of the SD-WAN rule in the GUI: 1. Go to Network > SD-WAN and select the SD-WAN Rules tab. The interface that is currently selected by the rule has a checkmark next to its name in the Members column. Hover the cursor over the checkmark to open ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
984
SD-WAN 2. Drill down on an application, such as YouTube, then select the Sessions tab. To verify applications identified by Application Control in SD-WAN: # diagnose sys sdwan internet-service-app-ctrl-list Steam(16518 4294838108): 23.6.148.10 6 443 Thu Apr 15 08:51:54 2021 Netflix(18155 4294837589): 54.160.93.182 6 44...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
985
SD-WAN VoIP and social media traffic are steered. VoIP traffic from the customer service department is more important than social media traffic. The edge FortiGate identifies the tagged traffic based on SD-WAN rules then steers the traffic: l VoIP traffic is marked with DSCP tag 011100 and steered to the VPN overlay wi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
986
SD-WAN From port3 port3 To virtual-wan-link Overlay Source all all Destination all all Schedule always always Service all all Action Accept Accept NAT enabled enabled After the topology is configured, you can proceed with the configuration of the edge FortiGate: l Configuring SD-WAN rules on page 987 l Results on page ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
987
SD-WAN set tos 0x70 set tos-mask 0xf0 set dst "all" set health-check "Default_DNS" set link-cost-factor jitter set priority-members 4 3 next end end Social media traffic Social media traffic is steered to the virtual-wan-link zone. DSCP values are usually 6-bit binary numbers that are padded with zeros at the end. Soci...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
988
SD-WAN set name "All-traffic" set mode sla set dst "all" config sla edit "Default_DNS" set id 1 next end set priority-members 1 2 next end end Results These sections show the function of SD-WAN with respect to DSCP tagged traffic steering, and can help confirm that it is running as expected: l Verifying the DSCP tagged...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
989
SD-WAN Web traffic marked with DSCP tag 0x30: # diagnose sniffer packet any '(ip and ip[1] & 0xfc == 0x30)' 6 0 l Verifying the service rules To check that the expected DSCP tags and corresponding interfaces are used by the SD-WAN rules to steer traffic: # diagnose sys sdwan service4 Service(5): Address Mode(IPV4) flag...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
990
SD-WAN Verifying traffic steering on the SD-WAN rules Go to Network > SD-WAN and select the SD-WAN Rules tab to check the Hit Count on the SD-WAN interfaces. Verifying that steered traffic is leaving from the expected interface To confirm that web traffic (port 443) flows through the correct underlay interface members,...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
991
SD-WAN ECMP support for the longest match in SD-WAN rule matching The longest match SD-WAN rule can match ECMP best routes. The rule will select the egress ports on ECMP specific routes, and not the less specific routes, to transport traffic. The service mode determines which egress port on the ECMP specific routes is ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
992
SD-WAN edit 3 set interface "port15" set zone "z1" set gateway 172.16.209.2 next edit 4 set interface "port16" set zone "z1" set gateway 172.16.210.2 next end config health-check edit "1" set server "10.1.100.2" set members 0 config sla edit 1 next end next end config service edit 1 set name "1" set mode sla set dst "a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
993
SD-WAN Dst address(1): 0.0.0.0-255.255.255.255 2. The routing table shows that there are ECMP default routes on all of the members, and ECMP specific (or best) routes only on port15 and port16: FGT_A (root) # get router info routing-table static Routing table for VRF=0 S* 0.0.0.0/0 [1/0] via 172.16.200.2, port1 [1/0] v...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
994
SD-WAN Example In this example, four SD-WAN members in two zones are configured. The remote PC (PC_2 - 10.1.100.22) is accessible on port15 and port16, even though there are valid routes for all of the SD-WAN members. A single SD-WAN service rule is configured that allows traffic to balanced between all four of the mem...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
995
SD-WAN edit 1 next end next end config service edit 1 set name "1" set mode sla set dst "all" set src "172.16.205.0" config sla edit "1" set id 1 next end set priority-members 1 2 3 4 set tie-break fib-best-match next end end To check the results: 1. The debug shows the SD-WAN service rule. Both port15 and port16 are u...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
996
SD-WAN ping 10.1.100.22 4. On FGT_A, sniff for traffic sent to PC_2: # diagnose sniffer packet any 'host 10.1.100.22' 4 interfaces=[any] filters=[host 10.1.100.22] 2.831299 port5 in 172.16.205.11 -> 10.1.100.22: icmp: echo request 2.831400 port15 out 172.16.205.11 -> 10.1.100.22: icmp: echo request Traffic is leaving o...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
997
SD-WAN To configure application categories as an SD-WAN rule destination in the GUI: 1. Enable the feature visibility: a. Go to System > Feature Visibility. b. In the Additional Features section, enable Application Detection Based SD-WAN. c. Click Apply. To enable GUI visibility of application detection based SD-WAN in...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
998
SD-WAN d. Configure the other settings as needed. e. Click OK. 5. Configure the firewall policy: a. Go to Policy & Objects > Firewall Policy and click Create New. b. Configure the following settings: Incoming Interface port5 Outgoing Interface virtual-wan-link Source 172.16.205.0 Destination all Schedule always Service...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
999
SD-WAN edit "virtual-wan-link" next end config members edit 1 set interface "dmz" set gateway 172.16.208.2 next edit 2 set interface "vlan100" set gateway 172.16.206.2 next end config health-check edit "1" set server "8.8.8.8" set protocol dns set members 0 config sla edit 1 next end next end end 2. Configure the SD-WA...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,000
SD-WAN set utm-status enable set ssl-ssh-profile "certificate-inspection" set application-list "g-default" next end To test the configuration: 1. Verify that the traffic is sent over dmz: # diagnose firewall proute list list route policy info(vf=root): id=2133590017(0x7f2c0001) vwl_service=1(1) vwl_mbr_seq=1 2 dscp_tag...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,001
SD-WAN internet service(2): (null)(0,5,0,0,0) (null)(0,21,0,0,0) hit_count=635 last_used=2021-12-15 15:55:43 # diagnose sniffer packet any 'host 172.217.14.197' 4 interfaces=[any] filters=[host 172.217.14.197] 304.625168 vlan100 in 172.16.205.100.60592 -> 172.217.14.197.443: psh 2961572711 ack 2277139565 Example for IP...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,002
SD-WAN end config health-check edit "1" set addr-mode ipv6 set server "2000::2:2:2:2" set members 0 config sla edit 1 next end next end config service edit 1 set name "1" set addr-mode ipv6 set mode sla set internet-service enable set internet-service-app-ctrl 16091 set internet-service-app-ctrl-group "network-Ping" se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,003
SD-WAN next end To verify the configuration: 1. On FGT_A, check the routing table: The routing table has ECMP applied to default gateways for each SD-WAN member. # get router info routing-table  static Routing table for VRF=0 S*  0.0.0.0/0 [1/0] via 172.16.203.2, agg1, [1/0] [1/0] via 172.16.206.2, vlan100, [1/0] [1/0]...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,004
SD-WAN 18.960005 vlan100 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3 [flowlabel 0x5080d] 18.960015 agg1 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3 [flowlabel 0x5080d] 18.960024 port4 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3 [flowlabel 0x5080...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,005
SD-WAN 8.116663 vlan100 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261 ack 583862554 [class 0x10] [flowlabel 0xf1403] 8.116674 agg1 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261 ack 583862554 [class 0x10] [flowlabel 0xf1403] 8.116685 port4 out 2000:172:16:205::100.35146 -> 2000::2...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,006
SD-WAN Example In this example SD-WAN is configured between one hub and multiple spokes, and the SD-WAN configuration shows SD-WAN rule 3 with the following required settings to enable spoke-to-spoke traffic between multiple ADVPN shortcuts:  l set load-balance enable l set tie-break fib-best-match show system sdwan co...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,007
SD-WAN set dst "033" set priority-members 1 next edit 2 set dst "133" set priority-members 2 next edit 3 set mode sla set load-balance enable set dst "all" config sla edit "ping" set id 1 next end set priority-members 1 2 set tie-break fib-best-match next end end To trigger spoke-to-spoke communication, run an ICMP pin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,008
SD-WAN 4: Seq_num(2 vd2-2_0), alive, sla(0x1), gid(2), num of pass(1), selected Dst address(1): 0.0.0.0-255.255.255.255 3. Confirm firewall policing routing list:  # diagnose firewall proute list 2131230723 list route policy info(vf=vd2): id=2131230723(0x7f080003) vwl_service=3 vwl_mbr_seq=1 1 2 2 dscp_tag=0xfc 0xfc fl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,009
SD-WAN 14.665300 npu0_vlink1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply 14.665306 vd3-vlan33 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply 14.665314 vd3-1_0 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply 14.665326 vd2-1_0 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply 14.665331 vd2-vlan22 out 33.1.1.13 -> 22.1.1.22: icmp: e...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,010
SD-WAN 67.257216 vd33-vlan33 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply 67.257217 npu0_vlink1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply 67.257223 vd3-vlan33 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply 67.257234 vd3-1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply 67.257245 p1 in 33.1.1.13 -> 22.1.1.22: icmp: echo re...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,011
SD-WAN 18.024377 vd22-vlan22 out 22.1.1.22 -> 33.1.1.13: icmp: echo request 18.024379 npu0_vlink1 out 22.1.1.22 -> 33.1.1.13: icmp: echo request 18.024385 vd2-vlan22 in 22.1.1.22 -> 33.1.1.13: icmp: echo request 18.024400 vd2-1_0 out 22.1.1.22 -> 33.1.1.13: icmp: echo request 18.024411 vd3-1_0 in 22.1.1.22 -> 33.1.1.13...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,012
SD-WAN filters=[host 33.1.1.13] 8.723075 vd22-vlan22 out 22.1.1.22 -> 33.1.1.13: icmp: echo request 8.723077 npu0_vlink1 out 22.1.1.22 -> 33.1.1.13: icmp: echo request 8.723084 vd2-vlan22 in 22.1.1.22 -> 33.1.1.13: icmp: echo request 8.723103 vd2-2_0 out 22.1.1.22 -> 33.1.1.13: icmp: echo request 8.723115 vd3-2_0 in 22...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,013
SD-WAN When SD-WAN steers multicast traffic, ADVPN is not supported. Use the set shortcut option to disable shortcuts for the service: config system sdwan config service edit <id> set shortcut {enable | disable} next end end Example 1 In this hub and spoke example for IPv4 multicast traffic, the PIM source is behind th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,014
SD-WAN To configure the hub: 1. On the hub, enable multicast routing, configure the multicast RP, and enable PIM sparse mode on each interface: config router multicast set multicast-routing enable config pim-sm-global config rp-address edit 1 set ip-address 172.16.205.1 next end end config interface edit "tport1" set p...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,015
SD-WAN set members 0 config sla edit 1 next end next end config service edit 1 set mode sla set protocol 103 set dst "all" config sla edit "ping" set id 1 next end set priority-members 1 2 set use-shortcut-sla disable set shortcut disable next edit 2 set mode sla set dst "all" config sla edit "ping" set id 1 next end s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,016
SD-WAN end end To verify traffic failover: With this configuration, multicast traffic starts on tunnel1. When tunnel1 becomes out of SLA, traffic switches to tunnel2. When tunnel1 is in SLA again, the traffic switches back to tunnel1. The following health-check capture on the spokes shows tunnel1 in SLA with packet-los...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,017
SD-WAN 198.060736 port4 out 172.16.205.11 -> 225.1.1.1: icmp: echo request 199.060647 tunnel2 in 172.16.205.11 -> 225.1.1.1: icmp: echo request 199.060655 port4 out 172.16.205.11 -> 225.1.1.1: icmp: echo request 200.060598 tunnel2 in 172.16.205.11 -> 225.1.1.1: icmp: echo request 200.060604 port4 out 172.16.205.11 -> 2...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,018
SD-WAN Following is an overview of how to configure the topology: 1. Configure the hub FortiGate. The RP is configured on the hub FortiGate. 2. Configure the spoke FortiGate in front of the traffic receiver. 3. Configure the spoke FortiGate in front of the PIM source. To configure the hub: 1. Configure loopbacks hub-lo...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,019
SD-WAN config pim-sm-global config rp-address edit 1 set ip-address 192.90.1.11 next end end config interface edit "p11" set pim-mode sparse-mode next edit "p101" set pim-mode sparse-mode next edit "p25-v90" set pim-mode sparse-mode next end end 3. Enable SD-WAN with the following settings: l Add interfaces p11 and p10...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,020
SD-WAN set detect-mode remote set probe-timeout 60000 set recoverytime 1 set sla-id-redistribute 1 set members 2 config sla edit 1 set link-cost-factor latency set latency-threshold 100 set priority-in-sla 15 set priority-out-sla 25 next end next end end 4. Configure BGP to peer with neighbors. Neighbor group is config...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,021
SD-WAN config pim-sm-global set spt-threshold disable set pim-use-sdwan enable config rp-address edit 1 set ip-address 192.90.1.11 next end end config interface edit "p195" set pim-mode sparse-mode next edit "p196" set pim-mode sparse-mode next edit "internal4" set pim-mode sparse-mode set static-group "225-1-1-122" ne...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,022
SD-WAN next end config service edit 1 set mode sla set protocol 103 set dst "all" config sla edit "ping" set id 1 next end set priority-members 5 6 set use-shortcut-sla disable set shortcut disable next edit 2 set mode sla set dst "all" config sla edit "ping" set id 1 next end set priority-members 5 6 next end end 3. C...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,023
SD-WAN 4. Configure the default gateway to use the SD-WAN zone. Other routes are for the underlay to route traffic to the hub's WAN interfaces:  config router static edit 10 set distance 1 set sdwan-zone "virtual-wan-link" next .... next end To configure the spoke (in front of the source): 1. Enable multicast routing t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,024
SD-WAN health-check. l Disable the use of an ADVPN shortcut. In the following example, 11.11.11.11 is the underlay address for one of the WAN links on the hub, and 172.31.100.100 is the loopback address on the server. config system sdwan set status enable config zone edit "virtual-wan-link" next edit "overlay" next end...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,025
SD-WAN next end set priority-members 1 2 set use-shortcut-sla disable set shortcut disable next edit 2 set mode sla set dst "all" config sla edit "ping" set id 1 next end set priority-members 1 2 next end end 4. Configure BGP: config router bgp set as 65505 set router-id 123.1.1.123 set ibgp-multipath enable set additi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,026
SD-WAN Example 3 In the following example for using SD-WAN rules to steer IPv6 multicast traffic, three PIM-SM enabled tunnels are configured between Spoke-1 and the Hub. The multicast source is located at Hub, and the multicast receiver is attached to Spoke-1. This example focuses on configuration related allowing SD-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,027
SD-WAN set dstintf "any" set srcaddr "all" set dstaddr "all" next end 3. Verify that all PIM-SM neighbors are established: # get router info6 multicast pim sparse-mode neighbor Neighbor  Interface  Uptime/Expires  Ver DR Address  Prio/Mode fe80::1 hub-phase1 06:49:35/00:01:39 v2  1 / fe80::2 hub2-phase1  06:49:34/00:01...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,028
SD-WAN config system sdwan set status enable config zone edit "virtual-wan-link" next end config members edit 1 set interface "spoke11-p1" next edit 2 set interface "spoke12-p1" next edit 3 set interface "spoke13-p1" next end config health-check edit "1" set addr-mode ipv6 set server "2000::9:0:0:1" set update-static-r...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,029
SD-WAN edit "1" set id 1 next edit "2" set id 1 next edit "3" set id 1 next end set priority-members 1 2 3 set sla-compare-method number set dst6 "all" next end end 4. Verify that all PIM-SM neighbors are established: # get router info6 multicast pim sparse-mode neighbor Neighbor  Interface  Uptime/Expires  Ver DR Addr...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,030
SD-WAN (*, ff15::10) RP: 2000:172:16:205::1 RPF nbr: fe80:10:10:15::253 RPF idx: spoke11-p1 Upstream State: JOINED  Local: port2  Joined:  Asserted: FCR: Source: 2000:172:16:205::100  Outgoing:  port2  KAT timer running, 196 seconds remaining  Packet count 168 ... l On the Hub: We see that hub-phase1 is connected to sp...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,031
SD-WAN FGT_B (root) (Interim)# diagnose sys sdwan service6 Service(1): Address Mode(IPV6) flags=0x4200 use-shortcut-sla use-shortcut  Tie break: cfg  Shortcut priority: 2 Gen(1), TOS(0x0/0x0), Protocol(103): src(1->65535):dst(1->65535), Mode(sla), sla￾compare-number Members(3): 1: Seq_num(3 spoke13-p1 virtual-wan-link)...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,032
SD-WAN This adjustment redirects the PIM-SM join message from Spoke-1 to RP towards spoke13-p1, triggering a failover of the multicast traffic to hub3-phase1 on the Hub. Use SD-WAN rules for WAN link selection with load balancing This example covers a use case where a user has multiple WAN links and wants to optimize t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,033
SD-WAN d. Set the Status to Enable e. Click OK. 4. Repeat step 3 for wan2 and wan3. a. For wan2, set the Gateway to the ISP’s gateway, 10.1.100.254. b. For wan3, set the Gateway to the ISP’s gateway, 13.13.13.254. To configure the SD-WAN members in the CLI: config system sdwan set status enable config zone edit "virtua...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,034
SD-WAN To configure a manual SD-WAN rule in the CLI: config system sdwan config service edit 1 set name "test" set load-balance enable set dst "all" set src "all" set priority-members 1 2 next end end Configuring a static route A default route for SD-WAN must be configured. See Adding a static route on page 843 for mor...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,035
SD-WAN Source all Destination all Schedule always Service ALL Action ACCEPT NAT Enable and select NAT. IP Pool Configuration Use Outgoing Interface Address Enable this policy Enable this setting. 3. Configure the other settings as needed. 4. Click OK. To configure the firewall policy for SD-WAN in the CLI: config firew...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,036
SD-WAN Src address(1): 0.0.0.0-255.255.255.255 Dst address(1): 0.0.0.0-255.255.255.255 This output indicates that both wan1 and wan2 are operational. 2. Verify the policy route list: # diagnose firewall proute list list route policy info(vf=root): id=2130706433(0x7f000001) vwl_service=1(test) vwl_mbr_seq=1 2 dscp_tag=0...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,037
SD-WAN To verify the configuration when wan1 is down and wan2 is up: 1. Verify the SD-WAN service rules status: # diagnose sys sdwan service4 Service(1): Address Mode(IPV4) flags=0x24200 use-shortcut-sla use-shortcut Tie break: cfg Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(manual hash￾mode=ro...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,038
SD-WAN Tie break: cfg Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(manual hash￾mode=round-robin) Members(2): 1: Seq_num(1 wan1 virtual-wan-link), alive, gid(1), selected 2: Seq_num(2 wan2 virtual-wan-link), dead, gid(1) Src address(1): 0.0.0.0-255.255.255.255 Dst address(1): 0.0.0.0-255.255.255....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,039
SD-WAN Go to Network > Local Out Routing to configure the available types of local out traffic. Some types of traffic can only be configured in the CLI. By default Local Out Routing is not visible in the GUI. Go to System > Feature Visibility to enable it. See Feature visibility on page 3345 for more information. When ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,040
SD-WAN Manually Selected an IP from the list, if the selected interface has multiple IPs configured. If Specify is selected, select a setting for Source IP: 4. Click OK. To edit local-out settings from a RADIUS server entry: 1. Go to User & Authentication > RADIUS Servers and double-click an entry to edit it. 2. Click ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,041
SD-WAN 4. Click OK. To edit multiple entries concurrently: 1. Go to Network > Local Out Routing. 2. If applicable, select IPv4 or IPv6. IPv4+IPv6 does not support multi-select. 3. Click Multi-Select Mode. All of the local out settings that can be edited concurrently are shown. 4. Select the specific entries, or click S...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,042
SD-WAN execute ping-options use-sdwan {yes | no} execute ping6-options use-sd-wan {yes | no} Traceroute IPv4 traceroute can be configured to use SD-WAN rules: execute traceroute-options use-sdwan {yes | no} Central management Central management traffic can use SD-WAN rules or a specific interface: config system central...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,043
SD-WAN set dhcp-relay-interface <interface> next end dhcp-relay-interface-select￾method {auto | sdwan | specify} Select the interface selection method: l auto: Set the outgoing interface automatically (default). l sdwan: Set the interface by SD-WAN or policy routing rules. l specify: Set the interface manually. dhcp-re...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,044
SD-WAN config system {netflow | vdom-netflow} set interface-select-method {auto | sdwan | specify} set interface <interface> end config system {sflow | vdom-sflow} config collectors edit <id> set interface-select-method {auto | sdwan | specify} set interface <interface> next end end interface-select-method {auto | sdwa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,045
SD-WAN edit <user> set interface-select-method {auto | sdwan | specify} next end Using BGP tags with SD-WAN rules SD-WAN rules can use Border Gateway Protocol (BGP) learned routes as dynamic destinations. In this example, a customer has two ISP connections, wan1 and wan2. wan1 is used primarily for direct access to int...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,046
SD-WAN set match-community "30:5" set set-route-tag 15 next end next end 3. Configure BGP: config router bgp set as xxxxx set router-id xxxx config neighbor edit "10.100.20.2" set soft-reconfiguration enable set remote-as xxxxx set route-map-in "comm1" next end end 4. Configure the route tag address object: config fire...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,047
SD-WAN config service edit 1 set name "DataCenter" set mode manual set priority-members 2 set dst "DataCenter_route_tag_15" next end end Troubleshooting BGP tags with SD-WAN rules Check the network community Use the get router info bgp network command to check the network community: # get router info bgp network BGP ta...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,048
SD-WAN # get router info bgp network 10.100.11.0 BGP routing table entry for 10.100.10.0/24 Paths: (2 available, best 1, table Default-IP-Routing-Table) Advertised to non peer-group peers: 172.10.22.2 20 10.100.20.2 from 10.100.20.2 (6.6.6.6) Origin EGP metric 200, localpref 100, weight 10000, valid, external, best Com...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,049
SD-WAN To configure the hub: config router bgp set as 65505 set router-id 11.11.11.11 set ibgp-multipath enable set additional-path enable set additional-path-select 4 config neighbor-group edit "gr1" set capability-default-originate enable set remote-as 65505 set additional-path both set adv-additional-path 4 set rout...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,050
SD-WAN next edit "10.10.204.254" set soft-reconfiguration enable set remote-as 65505 set additional-path both set adv-additional-path 4 next end config network edit 3 set prefix 22.1.1.0 255.255.255.0 next end end To view the BGP routing table on a spoke: Spoke1 # get router info routing-table bgp Routing table for VRF...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,051
SD-WAN l Applying different route-maps based on the SD-WAN's health checks. For example, different BGP community strings can be advertised to BGP neighbors when SLAs are not met. l Traffic can be selectively forwarded based on the active BGP neighbor. If the SD-WAN service's role matches the active SD-WAN neighbor, the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,052
SD-WAN To configure BGP route-maps and neighbors: 1. Configure an access for the routes to be matched: config router access-list edit "net192" config rule edit 1 set prefix 192.168.20.0 255.255.255.0 next end next end 2. Configure the primary neighbor's preferred route-map: config router route-map edit "comm1" config r...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,053
SD-WAN config neighbor edit "10.100.1.1" set soft-reconfiguration enable set remote-as 20 set route-map-out "comm5" set route-map-out-preferable "comm1" next edit "10.100.1.5" set soft-reconfiguration enable set remote-as 20 set route-map-out "comm5" set route-map-out-preferable "comm2" next end end When SLAs are met, ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,054
SD-WAN next end end 3. Configure the SD-WAN neighbors and assign them a role and the health checks used to determine if the neighbor meets the SLA: SD-WAN neighbors can only be configured in the CLI. config system sdwan config neighbor edit "10.100.1.1" set member 1 set role primary set health-check "ping" set sla-id 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf