index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
955 | SD-WAN
In this example both WAN1 and WAN2 are assumed to have 200ms latency to the health-check server named DC_
HealthCheck. Because WAN2 is specified before WAN1 in priority-members, SD-WAN parses the two interfaces
metric as follows:
l WAN1: 200ms
l WAN2: 200ms / (1+10%) = ~182ms
As a result, WAN2 is selected becaus... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
956 | SD-WAN
Internet Service Google-Gmail
Strategy Best Quality
Interface
preference
wan1 and wan2
Measured SLA google
Quality criteria Latency
8. Click OK.
To configure an SD-WAN rule to use priority:
config system sdwan
config health-check
edit "google"
set server "google.com"
set members 1 2
next
end
config service
edit ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
957 | SD-WAN
set link-cost-factor latency
set priority-members 1 2
next
end
end
To diagnose the Performance SLA status:
FGT # diagnose sys sdwan health-check google
Health Check(google):
Seq(1): state(alive), packet-loss(0.000%) latency(14.563), jitter(4.334) sla_map=0x0
Seq(2): state(alive), packet-loss(0.000%) latency(12.6... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
958 | SD-WAN
4. Enable SLA Target. Set the Latency threshold to 10 ms, and the Jitter threshold to 5 ms. See Health checks for
more details.
5. Click OK.
6. Go to Network > SD-WAN, select the SD-WAN Rules tab, and click Create New.
7. Enter a name for the rule, such as gmail.
8. Configure the following settings:
Internet Ser... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
959 | SD-WAN
set cost 10
next
edit 2
set interface "wan2"
set cost 5
next
end
config health-check
edit "google"
set server "google.com"
set members 1 2
config sla
edit 1
set latency-threshold 10
set jitter-threshold 5
next
end
next
end
config service
edit 1
set name "gmail"
set mode sla
set internet-service enable
set intern... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
960 | SD-WAN
TOS(0x0/0x0), Protocol(0: 1->65535), Mode(sla)
Members:<<BR>>
1: Seq_num(2), alive, sla(0x1), cfg_order(1), selected
2: Seq_num(1), alive, sla(0x1), cfg_order(0), selected
Internet Service: Google.Gmail(65646)
When both wan1 and wan2 meet the SLA requirements, Gmail traffic will only use wan2. If only wan1 meets... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
961 | SD-WAN
next
end
Example
Based on the same topology as the preceding example, your wan1 and wan2 SD-WAN interfaces connect to two ISPs
that both go to the public internet. You want to configure Gmail services to use both of the interface, but the link quality
must meet a standard of latency: 10ms, and jitter: 5ms. This ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
962 | SD-WAN
Internet Service Google-Gmail
Strategy Lowest Cost (SLA)
Interface
preference
wan1 and wan2
Required SLA
target
google
Load balancing Enable this setting
9. Click OK.
To configure an SD-WAN rule to use load balancing with SLA targets in the CLI:
config system sdwan
config members
edit 1
set interface "wan1"
set ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
963 | SD-WAN
To diagnose the performance SLA status:
FGT # diagnose sys sdwan health-check status
Health Check(google):
Seq(1): state(alive), packet-loss(0.000%) latency(14.563), jitter(4.334) sla_map=0x0
Seq(2): state(alive), packet-loss(0.000%) latency(12.633), jitter(6.265) sla_map=0x0
FGT # diagnose sys sdwan service4 1
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
964 | SD-WAN
SD-WAN traffic shaping and QoS
Use a traffic shaper in a firewall shaping policy to control traffic flow. You can use it to control maximum and guaranteed
bandwidth, or put certain traffic to one of the three different traffic priorities: high, medium, or low.
An advanced shaping policy can classify traffic into... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
965 | SD-WAN
Destination all
Service HTTP and HTTPS
Outgoing interface virtual-wan-link
Shared Shaper Enable and set to high-priority
Reverse Shaper Enable and set to high-priority
c. Click OK.
5. Go to Policy & Objects > Traffic Shaping, select the Traffic Shaping Policy tab, and click Create New.
a. Name the traffic shapin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
966 | SD-WAN
To configure the firewall traffic shaper priority using the CLI:
config firewall shaper traffic-shaper
edit "high-priority"
set maximum-bandwidth 1048576
set per-policy enable
next
edit "low-priority"
set guaranteed-bandwidth 1000
set maximum-bandwidth 1048576
set priority low
set per-policy enable
next
end
To c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
967 | SD-WAN
set dst "voip-server"
set dscp-forward enable
set dscp-forward-tag 101110
next
end
end
If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone.
To use the diagnose command to check if specific traffic is attached to the correct traffic shaper:
# diagnose firewall iprope list 100015... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
968 | SD-WAN
state=may_dirty npu npd os mif route_preserve
statistic(bytes/packets/allow_err): org=868/15/1 reply=752/10/1 tuples=2
tx speed(Bps/kbps): 76/0 rx speed(Bps/kbps): 66/0
orgin->sink: org pre->post, reply pre->post dev=39->38/38->39 gwy=172.16.200.55/0.0.0.0
hook=post dir=org act=snat 10.1.100.11:58241->172.16.200... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
969 | SD-WAN
policy 2
tos ff
packets dropped 0
bytes dropped 0
SDN dynamic connector addresses in SD-WAN rules
SDN dynamic connector addresses can be used in SD-WAN rules. FortiGate supports both public (AWS, Azure, GCP,
OCI, AliCloud) and private (Kubernetes, VMware ESXi and NSX, OpenStack, ACI, Nuage) SDN connectors.
The c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
970 | SD-WAN
3. Enter the following:
Name azure-address
Type Dynamic
Sub Type Fabric Connector Address
SDN Connector azure1
Addresses to collect Private
Filter SecurityGroup=edsouza-centos
Interface Any
4. Click OK.
To use the firewall address in an SD-WAN service rule:
1. Go to Network > SD-WAN, select the SD-WAN Rules tab,... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
971 | SD-WAN
To debug the SDN connector to resolve the firewall address:
# diagnose debug application azd -1
Debug messages will be on for 30 minutes.
...
azd sdn connector azure1 start updating IP addresses
azd checking firewall address object azure-address-1, vd 0
IP address change, new list:
10.18.0.4
10.18.0.12
...
...
#... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
972 | SD-WAN
Application matching
To apply application steering, SD-WAN service rules match traffic based on the applications that are in the application
signature database. To view the signatures, go to Security Profiles > Application Signatures and select Signature.
On the first session that passes through, the IPS engine ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
973 | SD-WAN
This example configures all SIP traffic to use MPLS while all other traffic uses DIA. If DIA is not working, the traffic will
use MPLS.
By default, individual applications and application groups cannot be selected in SD-WAN rules. To enable this
functionality in the GUI, go to System > Feature Visibility and ena... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
974 | SD-WAN
set service "ALL"
set utm-status enable
set fsso disable
set application-list "default"
set ssl-ssh-profile "certificate-inspection"
set nat enable
next
end
To configure an SD-WAN rule to use SIP and DIA using the CLI:
config system sdwan
set status enable
config members
edit 1
set interface "MPLS"
next
edit 2
s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
975 | SD-WAN
Internet Service: SIP(4294836224 34640) SIP.Method(4294836225 152305677) SIP.Via.NAT
(4294836226 38938) SIP_Media.Type.Application(4294836227 26180) SIP_Message(4294836228
26179) SIP_Voice(4294836229 30251)
# diagnose sys sdwan service4 2
Service(2): Address Mode(IPV4) flags=0x0
TOS(0x0/0x0), Protocol(0: 1->6553... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
976 | SD-WAN
To configure the SD-WAN members, static route, and firewall policy in the GUI:
1. Add port1 (DIA_1), port2 (DIA_2), and port3 (MPLS) as SD-WAN members. Set the cost of DIA_1 and DIA_2 to 0,
and MPLS to 20. See Configuring the SD-WAN interface on page 841 for details.
2. Configure a static route. See Adding a sta... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
977 | SD-WAN
8. Click OK to create the SD-WAN rule.
To configure the SD-WAN rule and performance SLA checks for non-business critical application in the
GUI:
1. Go to Network > SD-WAN, select the SD-WAN Rules tab, and click Create New.
2. Set the name to NonBusinessCriticalApps.
This rule will steer your non-business critica... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
978 | SD-WAN
The preferred link advantage can be customized in the CLI when the mode is priority
(Best Quality) or auto:
config system sdwan
config service
edit <id>
set link-cost-threshold <integer>
next
end
end
7. Create and apply a new performance SLA profile:
a. Click in the Measured SLA field.
b. In the drop-down list, ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
979 | SD-WAN
9. Click OK to create the SD-WAN rule.
To configure the SD-WAN members, static route, and firewall policy in the CLI:
1. Configure the interfaces:
config system interface
edit "port1"
set ip <class_ip&net_netmask>
set alias "DIA_1"
set role wan
next
edit "port2"
set ip <class_ip&net_netmask>
set alias "DIA_2"
se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
980 | SD-WAN
config members
edit 1
set interface "port1"
set gateway 172.16.20.2
next
edit 2
set interface "port2"
set gateway 172.17.80.2
next
edit 3
set interface "port3"
set gateway 10.100.20.2
set cost 20
next
end
end
If no SD-WAN zone is specified, members are added to the default virtual-wan-link zone.
3. Configure a s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
981 | SD-WAN
edit "BusinessCriticalApps_HC"
set id 1
next
end
set priority-members 1 2 3
next
end
end
To configure the SD-WAN rule and performance SLA checks for non-business critical application in the
CLI:
1. Configure the nonBusinessCriticalApps_HC health-check:
config system sdwan
config health-check
edit "NonBusinessCri... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
982 | SD-WAN
Health checks
To verify the status of each of the health checks in the GUI:
1. Go to Network > SD-WAN, select the Performance SLAs tab, and select each of the health checks from the list.
To verify the status of each of the health checks in the CLI:
# diagnose sys sdwan health-check
Health Check(BusinessCritical... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
983 | SD-WAN
Rule members and hit count
To verify the active members and hit count of the SD-WAN rule in the GUI:
1. Go to Network > SD-WAN and select the SD-WAN Rules tab.
The interface that is currently selected by the rule has a checkmark next to its name in the Members column. Hover
the cursor over the checkmark to open ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
984 | SD-WAN
2. Drill down on an application, such as YouTube, then select the Sessions tab.
To verify applications identified by Application Control in SD-WAN:
# diagnose sys sdwan internet-service-app-ctrl-list
Steam(16518 4294838108): 23.6.148.10 6 443 Thu Apr 15 08:51:54 2021
Netflix(18155 4294837589): 54.160.93.182 6 44... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
985 | SD-WAN
VoIP and social media traffic are steered. VoIP traffic from the customer service department is more important than
social media traffic. The edge FortiGate identifies the tagged traffic based on SD-WAN rules then steers the traffic:
l VoIP traffic is marked with DSCP tag 011100 and steered to the VPN overlay wi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
986 | SD-WAN
From port3 port3
To virtual-wan-link Overlay
Source all all
Destination all all
Schedule always always
Service all all
Action Accept Accept
NAT enabled enabled
After the topology is configured, you can proceed with the configuration of the edge FortiGate:
l Configuring SD-WAN rules on page 987
l Results on page ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
987 | SD-WAN
set tos 0x70
set tos-mask 0xf0
set dst "all"
set health-check "Default_DNS"
set link-cost-factor jitter
set priority-members 4 3
next
end
end
Social media traffic
Social media traffic is steered to the virtual-wan-link zone.
DSCP values are usually 6-bit binary numbers that are padded with zeros at the end. Soci... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
988 | SD-WAN
set name "All-traffic"
set mode sla
set dst "all"
config sla
edit "Default_DNS"
set id 1
next
end
set priority-members 1 2
next
end
end
Results
These sections show the function of SD-WAN with respect to DSCP tagged traffic steering, and can help confirm that it is
running as expected:
l Verifying the DSCP tagged... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
989 | SD-WAN
Web traffic marked with DSCP tag 0x30:
# diagnose sniffer packet any '(ip and ip[1] & 0xfc == 0x30)' 6 0 l
Verifying the service rules
To check that the expected DSCP tags and corresponding interfaces are used by the SD-WAN rules to
steer traffic:
# diagnose sys sdwan service4
Service(5): Address Mode(IPV4) flag... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
990 | SD-WAN
Verifying traffic steering on the SD-WAN rules
Go to Network > SD-WAN and select the SD-WAN Rules tab to check the Hit Count on the SD-WAN interfaces.
Verifying that steered traffic is leaving from the expected interface
To confirm that web traffic (port 443) flows through the correct underlay interface members,... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
991 | SD-WAN
ECMP support for the longest match in SD-WAN rule matching
The longest match SD-WAN rule can match ECMP best routes. The rule will select the egress ports on ECMP specific
routes, and not the less specific routes, to transport traffic.
The service mode determines which egress port on the ECMP specific routes is ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
992 | SD-WAN
edit 3
set interface "port15"
set zone "z1"
set gateway 172.16.209.2
next
edit 4
set interface "port16"
set zone "z1"
set gateway 172.16.210.2
next
end
config health-check
edit "1"
set server "10.1.100.2"
set members 0
config sla
edit 1
next
end
next
end
config service
edit 1
set name "1"
set mode sla
set dst "a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
993 | SD-WAN
Dst address(1):
0.0.0.0-255.255.255.255
2. The routing table shows that there are ECMP default routes on all of the members, and ECMP specific (or best)
routes only on port15 and port16:
FGT_A (root) # get router info routing-table static
Routing table for VRF=0
S* 0.0.0.0/0 [1/0] via 172.16.200.2, port1
[1/0] v... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
994 | SD-WAN
Example
In this example, four SD-WAN members in two zones are configured. The remote PC (PC_2 - 10.1.100.22) is accessible
on port15 and port16, even though there are valid routes for all of the SD-WAN members. A single SD-WAN service rule
is configured that allows traffic to balanced between all four of the mem... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
995 | SD-WAN
edit 1
next
end
next
end
config service
edit 1
set name "1"
set mode sla
set dst "all"
set src "172.16.205.0"
config sla
edit "1"
set id 1
next
end
set priority-members 1 2 3 4
set tie-break fib-best-match
next
end
end
To check the results:
1. The debug shows the SD-WAN service rule. Both port15 and port16 are u... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
996 | SD-WAN
ping 10.1.100.22
4. On FGT_A, sniff for traffic sent to PC_2:
# diagnose sniffer packet any 'host 10.1.100.22' 4
interfaces=[any]
filters=[host 10.1.100.22]
2.831299 port5 in 172.16.205.11 -> 10.1.100.22: icmp: echo request
2.831400 port15 out 172.16.205.11 -> 10.1.100.22: icmp: echo request
Traffic is leaving o... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
997 | SD-WAN
To configure application categories as an SD-WAN rule destination in the GUI:
1. Enable the feature visibility:
a. Go to System > Feature Visibility.
b. In the Additional Features section, enable Application Detection Based SD-WAN.
c. Click Apply.
To enable GUI visibility of application detection based SD-WAN in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
998 | SD-WAN
d. Configure the other settings as needed.
e. Click OK.
5. Configure the firewall policy:
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Configure the following settings:
Incoming Interface port5
Outgoing Interface virtual-wan-link
Source 172.16.205.0
Destination all
Schedule always
Service... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
999 | SD-WAN
edit "virtual-wan-link"
next
end
config members
edit 1
set interface "dmz"
set gateway 172.16.208.2
next
edit 2
set interface "vlan100"
set gateway 172.16.206.2
next
end
config health-check
edit "1"
set server "8.8.8.8"
set protocol dns
set members 0
config sla
edit 1
next
end
next
end
end
2. Configure the SD-WA... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,000 | SD-WAN
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set application-list "g-default"
next
end
To test the configuration:
1. Verify that the traffic is sent over dmz:
# diagnose firewall proute list
list route policy info(vf=root):
id=2133590017(0x7f2c0001) vwl_service=1(1) vwl_mbr_seq=1 2 dscp_tag... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,001 | SD-WAN
internet service(2): (null)(0,5,0,0,0) (null)(0,21,0,0,0)
hit_count=635 last_used=2021-12-15 15:55:43
# diagnose sniffer packet any 'host 172.217.14.197' 4
interfaces=[any]
filters=[host 172.217.14.197]
304.625168 vlan100 in 172.16.205.100.60592 -> 172.217.14.197.443: psh 2961572711 ack
2277139565
Example for IP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,002 | SD-WAN
end
config health-check
edit "1"
set addr-mode ipv6
set server "2000::2:2:2:2"
set members 0
config sla
edit 1
next
end
next
end
config service
edit 1
set name "1"
set addr-mode ipv6
set mode sla
set internet-service enable
set internet-service-app-ctrl 16091
set internet-service-app-ctrl-group "network-Ping"
se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,003 | SD-WAN
next
end
To verify the configuration:
1. On FGT_A, check the routing table:
The routing table has ECMP applied to default gateways for each SD-WAN member.
# get router info routing-table static
Routing table for VRF=0
S* 0.0.0.0/0 [1/0] via 172.16.203.2, agg1, [1/0]
[1/0] via 172.16.206.2, vlan100, [1/0]
[1/0]... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,004 | SD-WAN
18.960005 vlan100 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq
3 [flowlabel 0x5080d]
18.960015 agg1 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3
[flowlabel 0x5080d]
18.960024 port4 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3
[flowlabel 0x5080... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,005 | SD-WAN
8.116663 vlan100 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261
ack 583862554 [class 0x10] [flowlabel 0xf1403]
8.116674 agg1 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261 ack
583862554 [class 0x10] [flowlabel 0xf1403]
8.116685 port4 out 2000:172:16:205::100.35146 -> 2000::2... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,006 | SD-WAN
Example
In this example SD-WAN is configured between one hub and multiple spokes, and the SD-WAN configuration shows
SD-WAN rule 3 with the following required settings to enable spoke-to-spoke traffic between multiple ADVPN shortcuts:
l set load-balance enable
l set tie-break fib-best-match
show system sdwan
co... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,007 | SD-WAN
set dst "033"
set priority-members 1
next
edit 2
set dst "133"
set priority-members 2
next
edit 3
set mode sla
set load-balance enable
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
set tie-break fib-best-match
next
end
end
To trigger spoke-to-spoke communication, run an ICMP pin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,008 | SD-WAN
4: Seq_num(2 vd2-2_0), alive, sla(0x1), gid(2), num of pass(1), selected
Dst address(1):
0.0.0.0-255.255.255.255
3. Confirm firewall policing routing list:
# diagnose firewall proute list 2131230723
list route policy info(vf=vd2):
id=2131230723(0x7f080003) vwl_service=3 vwl_mbr_seq=1 1 2 2 dscp_tag=0xfc 0xfc
fl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,009 | SD-WAN
14.665300 npu0_vlink1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
14.665306 vd3-vlan33 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply
14.665314 vd3-1_0 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
14.665326 vd2-1_0 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply
14.665331 vd2-vlan22 out 33.1.1.13 -> 22.1.1.22: icmp: e... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,010 | SD-WAN
67.257216 vd33-vlan33 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
67.257217 npu0_vlink1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
67.257223 vd3-vlan33 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply
67.257234 vd3-1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
67.257245 p1 in 33.1.1.13 -> 22.1.1.22: icmp: echo re... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,011 | SD-WAN
18.024377 vd22-vlan22 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
18.024379 npu0_vlink1 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
18.024385 vd2-vlan22 in 22.1.1.22 -> 33.1.1.13: icmp: echo request
18.024400 vd2-1_0 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
18.024411 vd3-1_0 in 22.1.1.22 -> 33.1.1.13... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,012 | SD-WAN
filters=[host 33.1.1.13]
8.723075 vd22-vlan22 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
8.723077 npu0_vlink1 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
8.723084 vd2-vlan22 in 22.1.1.22 -> 33.1.1.13: icmp: echo request
8.723103 vd2-2_0 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
8.723115 vd3-2_0 in 22... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,013 | SD-WAN
When SD-WAN steers multicast traffic, ADVPN is not supported. Use the set shortcut
option to disable shortcuts for the service:
config system sdwan
config service
edit <id>
set shortcut {enable | disable}
next
end
end
Example 1
In this hub and spoke example for IPv4 multicast traffic, the PIM source is behind th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,014 | SD-WAN
To configure the hub:
1. On the hub, enable multicast routing, configure the multicast RP, and enable PIM sparse mode on each interface:
config router multicast
set multicast-routing enable
config pim-sm-global
config rp-address
edit 1
set ip-address 172.16.205.1
next
end
end
config interface
edit "tport1"
set p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,015 | SD-WAN
set members 0
config sla
edit 1
next
end
next
end
config service
edit 1
set mode sla
set protocol 103
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
set use-shortcut-sla disable
set shortcut disable
next
edit 2
set mode sla
set dst "all"
config sla
edit "ping"
set id 1
next
end
s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,016 | SD-WAN
end
end
To verify traffic failover:
With this configuration, multicast traffic starts on tunnel1. When tunnel1 becomes out of SLA, traffic switches to tunnel2.
When tunnel1 is in SLA again, the traffic switches back to tunnel1.
The following health-check capture on the spokes shows tunnel1 in SLA with packet-los... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,017 | SD-WAN
198.060736 port4 out 172.16.205.11 -> 225.1.1.1: icmp: echo request
199.060647 tunnel2 in 172.16.205.11 -> 225.1.1.1: icmp: echo request
199.060655 port4 out 172.16.205.11 -> 225.1.1.1: icmp: echo request
200.060598 tunnel2 in 172.16.205.11 -> 225.1.1.1: icmp: echo request
200.060604 port4 out 172.16.205.11 -> 2... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,018 | SD-WAN
Following is an overview of how to configure the topology:
1. Configure the hub FortiGate. The RP is configured on the hub FortiGate.
2. Configure the spoke FortiGate in front of the traffic receiver.
3. Configure the spoke FortiGate in front of the PIM source.
To configure the hub:
1. Configure loopbacks hub-lo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,019 | SD-WAN
config pim-sm-global
config rp-address
edit 1
set ip-address 192.90.1.11
next
end
end
config interface
edit "p11"
set pim-mode sparse-mode
next
edit "p101"
set pim-mode sparse-mode
next
edit "p25-v90"
set pim-mode sparse-mode
next
end
end
3. Enable SD-WAN with the following settings:
l Add interfaces p11 and p10... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,020 | SD-WAN
set detect-mode remote
set probe-timeout 60000
set recoverytime 1
set sla-id-redistribute 1
set members 2
config sla
edit 1
set link-cost-factor latency
set latency-threshold 100
set priority-in-sla 15
set priority-out-sla 25
next
end
next
end
end
4. Configure BGP to peer with neighbors. Neighbor group is config... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,021 | SD-WAN
config pim-sm-global
set spt-threshold disable
set pim-use-sdwan enable
config rp-address
edit 1
set ip-address 192.90.1.11
next
end
end
config interface
edit "p195"
set pim-mode sparse-mode
next
edit "p196"
set pim-mode sparse-mode
next
edit "internal4"
set pim-mode sparse-mode
set static-group "225-1-1-122"
ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,022 | SD-WAN
next
end
config service
edit 1
set mode sla
set protocol 103
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 5 6
set use-shortcut-sla disable
set shortcut disable
next
edit 2
set mode sla
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 5 6
next
end
end
3. C... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,023 | SD-WAN
4. Configure the default gateway to use the SD-WAN zone. Other routes are for the underlay to route traffic to the
hub's WAN interfaces:
config router static
edit 10
set distance 1
set sdwan-zone "virtual-wan-link"
next
....
next
end
To configure the spoke (in front of the source):
1. Enable multicast routing t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,024 | SD-WAN
health-check.
l Disable the use of an ADVPN shortcut.
In the following example, 11.11.11.11 is the underlay address for one of the WAN links on the hub, and
172.31.100.100 is the loopback address on the server.
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
edit "overlay"
next
end... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,025 | SD-WAN
next
end
set priority-members 1 2
set use-shortcut-sla disable
set shortcut disable
next
edit 2
set mode sla
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
next
end
end
4. Configure BGP:
config router bgp
set as 65505
set router-id 123.1.1.123
set ibgp-multipath enable
set additi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,026 | SD-WAN
Example 3
In the following example for using SD-WAN rules to steer IPv6 multicast traffic, three PIM-SM enabled tunnels are
configured between Spoke-1 and the Hub. The multicast source is located at Hub, and the multicast receiver is attached
to Spoke-1.
This example focuses on configuration related allowing SD-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,027 | SD-WAN
set dstintf "any"
set srcaddr "all"
set dstaddr "all"
next
end
3. Verify that all PIM-SM neighbors are established:
# get router info6 multicast pim sparse-mode neighbor
Neighbor Interface Uptime/Expires Ver DR
Address Prio/Mode
fe80::1 hub-phase1 06:49:35/00:01:39 v2 1 /
fe80::2 hub2-phase1 06:49:34/00:01... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,028 | SD-WAN
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
end
config members
edit 1
set interface "spoke11-p1"
next
edit 2
set interface "spoke12-p1"
next
edit 3
set interface "spoke13-p1"
next
end
config health-check
edit "1"
set addr-mode ipv6
set server "2000::9:0:0:1"
set update-static-r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,029 | SD-WAN
edit "1"
set id 1
next
edit "2"
set id 1
next
edit "3"
set id 1
next
end
set priority-members 1 2 3
set sla-compare-method number
set dst6 "all"
next
end
end
4. Verify that all PIM-SM neighbors are established:
# get router info6 multicast pim sparse-mode neighbor
Neighbor Interface Uptime/Expires Ver DR
Addr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,030 | SD-WAN
(*, ff15::10)
RP: 2000:172:16:205::1
RPF nbr: fe80:10:10:15::253
RPF idx: spoke11-p1
Upstream State: JOINED
Local:
port2
Joined:
Asserted:
FCR:
Source: 2000:172:16:205::100
Outgoing:
port2
KAT timer running, 196 seconds remaining
Packet count 168
...
l On the Hub:
We see that hub-phase1 is connected to sp... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,031 | SD-WAN
FGT_B (root) (Interim)# diagnose sys sdwan service6
Service(1): Address Mode(IPV6) flags=0x4200 use-shortcut-sla use-shortcut
Tie break: cfg
Shortcut priority: 2
Gen(1), TOS(0x0/0x0), Protocol(103): src(1->65535):dst(1->65535), Mode(sla), slacompare-number
Members(3):
1: Seq_num(3 spoke13-p1 virtual-wan-link)... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,032 | SD-WAN
This adjustment redirects the PIM-SM join message from Spoke-1 to RP towards spoke13-p1, triggering a failover
of the multicast traffic to hub3-phase1 on the Hub.
Use SD-WAN rules for WAN link selection with load balancing
This example covers a use case where a user has multiple WAN links and wants to optimize t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,033 | SD-WAN
d. Set the Status to Enable
e. Click OK.
4. Repeat step 3 for wan2 and wan3.
a. For wan2, set the Gateway to the ISP’s gateway, 10.1.100.254.
b. For wan3, set the Gateway to the ISP’s gateway, 13.13.13.254.
To configure the SD-WAN members in the CLI:
config system sdwan
set status enable
config zone
edit "virtua... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,034 | SD-WAN
To configure a manual SD-WAN rule in the CLI:
config system sdwan
config service
edit 1
set name "test"
set load-balance enable
set dst "all"
set src "all"
set priority-members 1 2
next
end
end
Configuring a static route
A default route for SD-WAN must be configured. See Adding a static route on page 843 for mor... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,035 | SD-WAN
Source all
Destination all
Schedule always
Service ALL
Action ACCEPT
NAT Enable and select NAT.
IP Pool Configuration Use Outgoing Interface Address
Enable this policy Enable this setting.
3. Configure the other settings as needed.
4. Click OK.
To configure the firewall policy for SD-WAN in the CLI:
config firew... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,036 | SD-WAN
Src address(1):
0.0.0.0-255.255.255.255
Dst address(1):
0.0.0.0-255.255.255.255
This output indicates that both wan1 and wan2 are operational.
2. Verify the policy route list:
# diagnose firewall proute list
list route policy info(vf=root):
id=2130706433(0x7f000001) vwl_service=1(test) vwl_mbr_seq=1 2 dscp_tag=0... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,037 | SD-WAN
To verify the configuration when wan1 is down and wan2 is up:
1. Verify the SD-WAN service rules status:
# diagnose sys sdwan service4
Service(1): Address Mode(IPV4) flags=0x24200 use-shortcut-sla use-shortcut
Tie break: cfg
Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(manual hashmode=ro... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,038 | SD-WAN
Tie break: cfg
Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(manual hashmode=round-robin)
Members(2):
1: Seq_num(1 wan1 virtual-wan-link), alive, gid(1), selected
2: Seq_num(2 wan2 virtual-wan-link), dead, gid(1)
Src address(1):
0.0.0.0-255.255.255.255
Dst address(1):
0.0.0.0-255.255.255.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,039 | SD-WAN
Go to Network > Local Out Routing to configure the available types of local out traffic. Some types of traffic can only be
configured in the CLI.
By default Local Out Routing is not visible in the GUI. Go to System > Feature Visibility to
enable it. See Feature visibility on page 3345 for more information.
When ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,040 | SD-WAN
Manually Selected an IP from the list, if the selected interface has multiple IPs
configured.
If Specify is selected, select a setting for Source IP:
4. Click OK.
To edit local-out settings from a RADIUS server entry:
1. Go to User & Authentication > RADIUS Servers and double-click an entry to edit it.
2. Click ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,041 | SD-WAN
4. Click OK.
To edit multiple entries concurrently:
1. Go to Network > Local Out Routing.
2. If applicable, select IPv4 or IPv6. IPv4+IPv6 does not support multi-select.
3. Click Multi-Select Mode. All of the local out settings that can be edited concurrently are shown.
4. Select the specific entries, or click S... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,042 | SD-WAN
execute ping-options use-sdwan {yes | no}
execute ping6-options use-sd-wan {yes | no}
Traceroute
IPv4 traceroute can be configured to use SD-WAN rules:
execute traceroute-options use-sdwan {yes | no}
Central management
Central management traffic can use SD-WAN rules or a specific interface:
config system central... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,043 | SD-WAN
set dhcp-relay-interface <interface>
next
end
dhcp-relay-interface-selectmethod {auto | sdwan |
specify}
Select the interface selection method:
l auto: Set the outgoing interface automatically (default).
l sdwan: Set the interface by SD-WAN or policy routing rules.
l specify: Set the interface manually.
dhcp-re... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,044 | SD-WAN
config system {netflow | vdom-netflow}
set interface-select-method {auto | sdwan | specify}
set interface <interface>
end
config system {sflow | vdom-sflow}
config collectors
edit <id>
set interface-select-method {auto | sdwan | specify}
set interface <interface>
next
end
end
interface-select-method {auto |
sdwa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,045 | SD-WAN
edit <user>
set interface-select-method {auto | sdwan | specify}
next
end
Using BGP tags with SD-WAN rules
SD-WAN rules can use Border Gateway Protocol (BGP) learned routes as dynamic destinations.
In this example, a customer has two ISP connections, wan1 and wan2. wan1 is used primarily for direct access to
int... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,046 | SD-WAN
set match-community "30:5"
set set-route-tag 15
next
end
next
end
3. Configure BGP:
config router bgp
set as xxxxx
set router-id xxxx
config neighbor
edit "10.100.20.2"
set soft-reconfiguration enable
set remote-as xxxxx
set route-map-in "comm1"
next
end
end
4. Configure the route tag address object:
config fire... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,047 | SD-WAN
config service
edit 1
set name "DataCenter"
set mode manual
set priority-members 2
set dst "DataCenter_route_tag_15"
next
end
end
Troubleshooting BGP tags with SD-WAN rules
Check the network community
Use the get router info bgp network command to check the network community:
# get router info bgp network
BGP ta... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,048 | SD-WAN
# get router info bgp network 10.100.11.0
BGP routing table entry for 10.100.10.0/24
Paths: (2 available, best 1, table Default-IP-Routing-Table)
Advertised to non peer-group peers:
172.10.22.2
20
10.100.20.2 from 10.100.20.2 (6.6.6.6)
Origin EGP metric 200, localpref 100, weight 10000, valid, external, best
Com... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,049 | SD-WAN
To configure the hub:
config router bgp
set as 65505
set router-id 11.11.11.11
set ibgp-multipath enable
set additional-path enable
set additional-path-select 4
config neighbor-group
edit "gr1"
set capability-default-originate enable
set remote-as 65505
set additional-path both
set adv-additional-path 4
set rout... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,050 | SD-WAN
next
edit "10.10.204.254"
set soft-reconfiguration enable
set remote-as 65505
set additional-path both
set adv-additional-path 4
next
end
config network
edit 3
set prefix 22.1.1.0 255.255.255.0
next
end
end
To view the BGP routing table on a spoke:
Spoke1 # get router info routing-table bgp
Routing table for VRF... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,051 | SD-WAN
l Applying different route-maps based on the SD-WAN's health checks. For example, different BGP community
strings can be advertised to BGP neighbors when SLAs are not met.
l Traffic can be selectively forwarded based on the active BGP neighbor. If the SD-WAN service's role matches the
active SD-WAN neighbor, the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,052 | SD-WAN
To configure BGP route-maps and neighbors:
1. Configure an access for the routes to be matched:
config router access-list
edit "net192"
config rule
edit 1
set prefix 192.168.20.0 255.255.255.0
next
end
next
end
2. Configure the primary neighbor's preferred route-map:
config router route-map
edit "comm1"
config r... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,053 | SD-WAN
config neighbor
edit "10.100.1.1"
set soft-reconfiguration enable
set remote-as 20
set route-map-out "comm5"
set route-map-out-preferable "comm1"
next
edit "10.100.1.5"
set soft-reconfiguration enable
set remote-as 20
set route-map-out "comm5"
set route-map-out-preferable "comm2"
next
end
end
When SLAs are met, ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,054 | SD-WAN
next
end
end
3. Configure the SD-WAN neighbors and assign them a role and the health checks used to determine if the neighbor
meets the SLA:
SD-WAN neighbors can only be configured in the CLI.
config system sdwan
config neighbor
edit "10.100.1.1"
set member 1
set role primary
set health-check "ping"
set sla-id 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.