index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
1,155
SD-WAN set sla-id 1 next end end Testing and verification The following tests use diagnostic commands on various FortiGates to verify the connections in the SD-WAN configuration. Test case 1: the primary PoP and Hub-1 are in SLA To verify the configuration: 1. Verify the SD-WAN service rules status on Spoke-1. When all...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,156
SD-WAN 3. Send traffic from a host behind Spoke-1 to 172.31.200.200. 4. Run a sniffer trace on Spoke-1. Traffic leaves and returns on the H1_T11 overlay : Spoke-1 (root) # diagnose sniffer packet any 'host 172.31.200.200' 4 interfaces=[any] filters=[host 172.31.200.200] 5.098248 port4 in 10.0.3.2 -> 172.31.200.200: icm...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,157
SD-WAN 3: Seq_num(4 H2_T22 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0), selected 4: Seq_num(5 H3_T11 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0), selected 5: Seq_num(6 H3_T22 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0), selected 6: Seq_num(1 H1_T11 PoP1), alive, sla(0x0),...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,158
SD-WAN (4.404), bandwidth-up(999999), bandwidth-dw(999999), bandwidth-bi(1999998) sla_map=0x1 Seq(6 H3_T22): state(alive), packet-loss(0.000%) latency(0.179), jitter(0.011), mos (4.404), bandwidth-up(999999), bandwidth-dw(999998), bandwidth-bi(1999997) sla_map=0x1 2. Verify the SD-WAN neighbor status. The SD-WAN neighb...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,159
SD-WAN Origin IGP metric 0, localpref 100, valid, internal, best Community: 10:2 Last update: Mon Jul 17 18:08:58 2023 b. On Hub-2: PoP1-Hub2 (root) # get router info bgp network 10.0.3.0/24 VRF 0 BGP routing table entry for 10.0.3.0/24 Paths: (1 available, best #1, table Default-IP-Routing-Table) Not advertised to any...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,160
SD-WAN Spoke-1 (root) # diagnose sys sdwan neighbor SD-WAN neighbor status: hold-down(disable), hold-down-time(0), hold_boot_time(0) Selected role(standalone) last_secondary_select_time/current_time in seconds 0/436605 Neighbor(172.31.0.1): member(1 2)role(standalone) Health-check(:0) sla-fail alive Neighbor(172.31.0.2...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,161
SD-WAN PoP1-Hub2 (root) # get router info bgp network 10.0.3.0/24 VRF 0 BGP routing table entry for 10.0.3.0/24 Paths: (1 available, best #1, table Default-IP-Routing-Table) Not advertised to any peer Original VRF 0 Local, (Received from a RR-client) 172.31.0.65 from 172.31.0.65 (172.31.0.65) Origin IGP metric 0, local...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,162
SD-WAN Members(6): 1: Seq_num(5 H3_T11 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0), selected 2: Seq_num(6 H3_T22 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0), selected 3: Seq_num(1 H1_T11 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0), selected 4: Seq_num(2 H1_T22 PoP1), aliv...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,163
SD-WAN filters=[host 172.31.200.200] 0.202708 port4 in 10.0.3.2 -> 172.31.200.200: icmp: echo request 0.202724 H3_T11 out 10.0.3.2 -> 172.31.200.200: icmp: echo request 0.202911 H3_T11 in 172.31.200.200 -> 10.0.3.2: icmp: echo reply 0.202934 port4 out 172.31.200.200 -> 10.0.3.2: icmp: echo reply Test case 6: Hub-1 has ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,164
SD-WAN 3. Verify the BGP learned routes. Hub-1 does not advertise any external routes to the Spoke-1 BGP neighbor: PoP1-Hub1 (root) # get router info bgp neighbors 172.31.0.65 advertised-routes % No prefix for neighbor 172.31.0.65 Using a single IKE elector in ADVPN to match all SD-WAN control plane traffic In the SD-W...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,165
SD-WAN next end 2. Configure the phase 2 interface: config vpn ipsec phase2-interface edit "Hub" set phase1name "Hub" set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305 next end 3. Configure the VPN interface: config system interface edit "Hub" set vdom "root" set ip 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,166
SD-WAN set peertype any set net-device enable set proposal aes128-sha256 aes256-sha256 aes128gcm-prfsha256 aes256gcm-prfsha384 chacha20poly1305-prfsha256 set add-route disable set npu-offload disable set idle-timeout enable set idle-timeoutinterval 5 set auto-discovery-receiver enable set remote-gw 172.16.200.4 set psk...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,167
SD-WAN config system sdwan set status enable config zone edit "virtual-wan-link" next end config members edit 1 set interface "Spoke1" next end config health-check edit "1" set server "174.16.101.44" set members 0 next end end To configure the Spoke2 FortiGate: 1. Configure the phase 1 interface: config vpn ipsec phase...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,168
SD-WAN set type tunnel set remote-ip 10.10.1.254 255.255.255.0 set snmp-index 15 set interface "wan1" next end 4. Configure the BGP settings: config router bgp set as 65412 config neighbor edit "10.10.1.250" set advertisement-interval 0 set remote-as 65412 next edit "10.10.1.1" set remote-as 65412 next end config netwo...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,169
SD-WAN id6=::10.0.0.3 dst_mtu=1500 dpd-link=on weight=1 bound_if=19 lgwy=static/1 tun=intf mode=dial_inst/3 encap=none/66224 options [102b0]=create_dev rgwy-chg frag-rfc role=primary accept_traffic=1 overlay_id=0 parent=Spoke1 index=0 proxyid_num=2 child_num=0 refcnt=6 ilast=0 olast=0 ad=r/2 stat: rxp=0 txp=1 rxb=0 txb...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,170
SD-WAN enc: spi=bdc3bd80 esp=aes key=16 d0ec06b61ad572cc8813b599edde8c68 ah=sha1 key=20 0306850f0184d957e9475da33d7971653a95c233 dec:pkts/bytes=1084/44234, enc:pkts/bytes=1106/80932 npu_flag=00 npu_rgwy=172.16.200.4 npu_lgwy=172.16.200.1 npu_selid=0 dec_npuid=0 enc_ npuid=0 The dynamic selector is created (highlighted)...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,171
SD-WAN Spoke1 # diagnose debug enable Spoke1 # diagnose debug application ike -1 ... ike 0:Spoke1_0: connection idle time-out ike 0:Spoke1_0: deleting ike 0:Spoke1_0: flushing ike 0:Spoke1_0: deleting IPsec SA with SPI 75cde338 ike 0:Spoke1_0:Spoke1: deleted IPsec SA with SPI 75cde338, SA count: 0 ike 0:Spoke1_0: sendi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,172
SD-WAN To view the status of the OaaS license in the CLI: 1. Verify that the entitlement can be updated: The SD-WAN Overlay-as-a-Service license is listed as SWOS in the CLI. # diagnose test update info System contracts: FMWR,Wed Dec 20 16:00:00 2023 SPAM,Wed Dec 20 16:00:00 2023 SBCL,Wed Dec 20 16:00:00 2023 SWNO,Wed ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,173
SD-WAN Advanced configuration The following topics provide instructions on SD-WAN advanced configuration: l SD-WAN with FGCP HA on page 1174 l Configuring SD-WAN in an HA cluster using internal hardware switches on page 1181 l SD-WAN configuration portability on page 1184 l SD-WAN segmentation over a single overlay on ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,174
SD-WAN FGCP HA cluster: The following devices are required to convert the topology to HA: l A second FortiGate that is the same model running the same firmware version. l Two switches for connecting each FortiGate's WAN interface to the corresponding ISP modem. Before you begin: l Ensure that the licenses and subscript...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,175
SD-WAN To configure the standalone FortiGate for HA in the GUI: 1. Go to System > Settings and change the Host name so that the FortiGate can be easily identified as the primary unit. 2. Go to System > HA and configure the following options: Mode Active-Passive Device priority 250 Group name My-cluster Password <passwo...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,176
SD-WAN set group-name My-cluster set password <password> set priority 250 set override enable set hbdev ha1 200 ha2 100 end If HA mode does not start after running the above steps, ensure that none of the FortiGate's interfaces use DHCP or PPPoE addressing. Configuring the secondary FortiGate for HA The secondary Forti...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,177
SD-WAN 2. Configure HA: config system ha set mode a-p set group-id 100 set group-name My-cluster set password <password> set priority 128 set hbdev ha1 200 ha2 100 end Connecting the heartbeat interfaces between the FortiGates To connect and check the heartbeat interfaces: 1. Connect the heartbeat interfaces ha1 and ha...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,178
SD-WAN Connecting other traffic interfaces After the device configurations are synchronized, you can connect the rest of the traffic interfaces. Making these connections will disrupt traffic as cables are disconnected and reconnected. Switches must be used between the cluster and the ISPs, and between the cluster and t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,179
SD-WAN If you are using port monitoring, you can also unplug the primary FortiGate's internet facing interface to test failover. After the secondary FortiGate becomes the primary, you can log into the cluster using the same IP address as before the fail over. If the primary FortiGate is powered off, you will be logged ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,180
SD-WAN Configuring SD-WAN in an HA cluster using internal hardware switches In this SD-WAN configuration, two FortiGates in an active-passive (A-P) HA pair are used to provide hardware redundancy. Instead of using external switches to provide a mesh network connection to the ISP routers, the FortiGates use their built-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,181
SD-WAN Failure on a hardware switch or ISP router If a hardware switch or switch interface is down, or the ISP router is down, the SD-WAN can detect the broken SLA and continue routing to the other ISP. For example, if FGT_A is the primary unit, and ISP 2 Router becomes unreachable, the SLA health checks on SD-WAN will...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,182
SD-WAN g. Click OK. h. Repeat these steps to create a second hardware switch interface (HD_SW2) with two interface members (internal3 and internal4) and IP/Netmask set to 192.168.3.2/24. To connect the devices as shown in the topology: 1. Connect the incoming interface to the internal switch on both FortiGates. 2. On F...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,183
SD-WAN 1. On the primary FortiGate, go to Network > SD-WAN, select the SD-WAN Zones tab, and click Create New > SD￾WAN Member. 2. In the Interface dropdown, select HD_SW1. 3. Leave SD-WAN Zone set to virtual-wan-link. 4. Enter the Gateway address 192.168.1.1. 5. Click OK. 6. Repeat these steps to add the second interfa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,184
SD-WAN Example 1 In this example, we create a template with two SD-WAN members configured without assigned interfaces that are used in a performance SLA and SD-WAN rule. The template can be used to configure new devices, as in Example 2 on page 1189. Interfaces are then assigned to the members, and the configuration be...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,185
SD-WAN The members are disabled until interfaces are configured, but can still be used in performance SLAs and SD-WAN rules. To create a performance SLA in the GUI: 1. Go to Network > SD-WAN and select the Performance SLAs tab. 2. Click Create New. 3. Configure the performance SLA, specifying the empty members as parti...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,186
SD-WAN To create an SD-WAN rule in the GUI: 1. Go to Network > SD-WAN, select the SD-WAN Rules tab, and click Create New. 2. Configure the rule, adding both members to the Interface preference field: 3. Click OK. To assign interfaces to the SD-WAN members in the GUI: 1. Go to Network > SD-WAN and select the SD-WAN Zone...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,187
SD-WAN To configure the SD-WAN in the CLI: 1. Create SD-WAN members: config system sdwan set status enable config members edit 1 next edit 2 next end end 2. Create a health check (performance SLA): config system sdwan config health-check edit "office" set server "office365.com" set protocol http set sla-fail-log-period...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,188
SD-WAN Example 2 In this example, the configuration from Example 1 is copied onto a new FortiGate. Using the CLI console and the GUI To copy the SD-WAN configuration from the original FortiGate: 1. Optionally, change the console screen paging setting. See Screen paging on page 64 for details. 2. Open the CLI console. 3...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,189
SD-WAN 4. Click OK. 5. Repeat the above steps to assign an interface to the second member. Using a terminal emulator The following instructions use PuTTy. The steps may vary in other terminal emulators. To copy the SD-WAN configuration from the original FortiGate: 1. Connect to the FortiGate. See Connecting to the CLI ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,190
SD-WAN vrf <vrf id> Virtual Routing Forwarding ID. source <address> Source IP address used in the health-check packet to the server. Overlay stickiness When a hub has multiple overlays, traffic received on one overlay should egress on the same overlay when possible. The service-sla-tie-break option ensures overlay stic...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,191
SD-WAN config vpn ipsec phase1-interface edit <name> set encapsulation vpn-id-ipip next end encapsulation vpn-id-ipip VPN ID with IPIP encapsulation. VPN configuration for BGP The role of a VRF can be specified, along with other VRF details. Up to 252 VRFs can be configured per VDOM for any device. config router bgp co...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,192
SD-WAN Display BGP routes by VRF and neighbor # diagnose ip router bgp set-filter vrf <vrf> # diagnose ip router bgp set-filter neighbor <neighbor address> # diagnose ip router bgp set-filter reset # execute router clear bgp vpnv4 unicast soft {in | out} # get router info filter show # get router info filter vrf {vrf |...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,193
SD-WAN To configure the hub: config router bgp set as 65505 set router-id 11.11.11.11 set ibgp-multipath enable set additional-path enable set additional-path-vpnv4 enable set cluster-id 11.12.13.14 set additional-path-select 3 config neighbor-group edit "gr1" set capability-graceful-restart enable set capability-defau...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,194
SD-WAN edit 33 set prefix 11.1.1.0 255.255.255.0 next end config vrf edit "0" set role pe next edit "1" set role ce set rd "1:1" set export-rt "1:1" set import-rt "1:1" next edit "2" set role ce set rd "2:1" set export-rt "2:1" set import-rt "2:1" next end end config vpn ipsec phase1-interface edit "p1" set type dynami...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,195
SD-WAN config vpn ipsec phase2-interface edit "p1" set phase1name "p1" set proposal aes128-sha1 set dhgrp 5 next edit "p2" set phase1name "p2" set proposal aes128-sha1 set dhgrp 5 next end To configure a spoke: config router bgp set as 65505 set router-id 2.2.2.2 set ebgp-multipath enable set ibgp-multipath enable set ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,196
SD-WAN end config vrf edit "0" set role pe next edit "1" set role ce set rd "1:1" set export-rt "1:1" set import-rt "1:1" next edit "2" set role ce set rd "2:1" set export-rt "2:1" set import-rt "2:1" next end end config vpn ipsec phase1-interface edit "vd2-1" set interface "vd2-vlan12" set peertype any set net-device ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,197
SD-WAN set phase1name "vd2-2" set proposal aes128-sha1 set dhgrp 5 set auto-negotiate enable next end config system sdwan set status enable config zone edit "virtual-wan-link" next edit "SASE" next edit "zon2" next end config members edit 1 set interface "vd2-1" set cost 10 next edit 2 set interface "vd2-2" set cost 20...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,198
SD-WAN set name "test-tag" set mode sla set dst "001-100" config sla edit "ping" set id 1 next end set priority-members 1 2 next end end To check the spoke 1 routes: # get router info routing-table bgp Routing table for VRF=0 B* 0.0.0.0/0 [200/0] via 10.10.100.254 (recursive via vd2-1 tunnel 11.1.1.11 vrf 0), 04:42:57,...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,199
SD-WAN [200/0] via 10.10.200.3 [2] (recursive is directly connected, vd2-2_0), 04:44:11, [1/0] To test the configuration on shortcut 1: 1. From VRF1 of spoke 1 ping VRF1 of spoke 2 and from VRF2 of spoke 1 ping VRF2 spoke 2. Both VRF1 and VRF2 source and destination IP addresses are the same, so you can see how the tra...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,200
SD-WAN 3. Check sessions on spoke 2: The output vd=<vdom ID>:<VRF ID> indicates that sessions are created in and stay in the corresponding VRFs. l User at 22.1.1.22 in VRF1 on spoke 1 pings 33.1.1.33 in VRF1 on spoke 2: # diagnose sys session list session info: proto=1 proto_state=00 duration=11 expire=49 timeout=0 fla...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,201
SD-WAN To test the configuration on shortcut 2: 1. From VRF1 of spoke 1 ping VRF1 of spoke 2 and from VRF2 of spoke 1 ping VRF2 spoke 2. Both VRF1 and VRF2 source and destination IP addresses are the same, so you can see how the traffic is isolated 2. Check sessions on spoke 1: The output vd=<vdom ID>:<VRF ID> indicate...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,202
SD-WAN l User at 22.1.1.22 in VRF1 on spoke 1 pings 33.1.1.133 in VRF1 on spoke 2: # diagnose sys session list session info: proto=1 proto_state=00 duration=24 expire=38 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 origin-shaper= reply-shaper= per_ip_shaper= class_id=0 ha_id=0 policy_dir=0 tunnel=/ vla...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,203
SD-WAN To configure the health check: config system sdwan config health-check edit "1" set server "11.11.22.11" set vrf 1 set source 22.1.1.2 set members 1 2 config sla edit 1 set latency-threshold 200 set jitter-threshold 50 next end next end end To check the health check status: # diagnose sys sdwan health-check stat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,204
SD-WAN edit 1 next end next end config service edit 1 set mode sla set dst "all" config sla edit "1" set id 1 next end set priority-members 1 2 set tie-break input-device next end end To verify that traffic stays in the same overlay on ingress and egress on the hub: 1. Confirm that the SD-WAN service rule has Tie break...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,205
SD-WAN In this example, two spokes each have two tunnels to the hub. l Each spoke has two VRFs behind it that can use the same IP address or subnets. l The computers in VRF1 behind spoke 1 can talk to the computers in VRF1 behind spoke 2, but not to any of the computers in the VRF2s behind either spoke. l The computers...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,206
SD-WAN config neighbor-group edit "EDGEv6" set advertisement-interval 1 set activate disable set activate-vpnv4 disable set capability-graceful-restart enable set next-hop-self-rr6 enable set soft-reconfiguration6 enable set remote-as 65100 set update-source "vd11-lo1" set additional-path6 both set adv-additional-path6...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,207
SD-WAN chacha20poly1305-prfsha256 set add-route disable set dpd on-idle set npu-offload disable set dhgrp 5 set auto-discovery-sender enable set encapsulation vpn-id-ipip set psksecret ********** set dpd-retryinterval 60 next edit "p111" set type dynamic set interface "vd11-vlan111" set ike-version 2 set peertype any s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,208
SD-WAN set holdtime-timer 15 set ibgp-multipath enable set additional-path6 enable set additional-path-vpnv6 enable set recursive-next-hop enable set tag-resolve-mode merge set graceful-restart enable set additional-path-select6 4 config neighbor edit "2001::10:200:1:1" set advertisement-interval 1 set activate disable...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,209
SD-WAN set interface "vd2-vlan12" set ike-version 2 set peertype any set net-device enable set exchange-ip-addr6 2001::10:200:1:100 set proposal aes128-sha256 aes256-sha256 aes128gcm-prfsha256 aes256gcm-prfsha384 chacha20poly1305-prfsha256 set add-route disable set npu-offload disable set dhgrp 5 set auto-discovery-rec...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,210
SD-WAN config system sdwan set status enable config zone edit "virtual-wan-link" next end config members edit 1 set interface "vd2-1" set cost 10 next edit 2 set interface "vd2-2" set cost 20 next end config health-check edit "ping6" set addr-mode ipv6 set server "2001::10:200:1:1" set source6 2001::10:200:1:100 set me...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,211
SD-WAN (recursive via vd2-2 tunnel ::111.1.1.11), 1d15h41m, [1024/0] Routing table for VRF=2 B V 2001:33::/64 [200/0] via 2001::10:200:1:101 tag 100 (recursive via vd2-1 tunnel ::11.1.1.11), 1d15h41m (recursive via vd2-2 tunnel ::111.1.1.11), 1d15h41m, [1024/0] To test the configuration on shortcut 1: 1. From VRF1 of s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,212
SD-WAN set type {rt | soo} set match <extended_community_specifications> set regexp <ordered_list_of_attributes> next end next end type {standard | expanded} Set the extended community list type (standard or expanded). action {deny | permit} Deny or permit route-based operations based on the route's extended community ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,213
SD-WAN However, in this scenario, we want A-1 and A-2 to use an ADVPN shortcut, but we do not want B-1 and B-2 to use ADVPN. A route map is configured on the hub to match the desired extended community route target number where only this route target is permitted, and others are denied. This allows the hub’s BGP route ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,214
SD-WAN gr1 gr2 … VRF 1 BGP routing table entry for 33.1.1.0/24 Paths: (2 available, best #2, table Default-IP-Routing-Table) Not advertised to any peer Original VRF 0 external duplicated Local, (Received from a RR-client) 0.0.0.0 from 10.10.100.3 (3.3.3.3) Origin IGP metric 0, localpref 100, valid, internal, best Exten...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,215
SD-WAN config router route-map edit "rmp11" config rule edit 1 set match-extcommunity "extcomm1" next edit 2 set action deny next end next end 4. Update the related BGP neighbor group settings: config router bgp config neighbor-group edit "gr1" set route-map-out-vpnv4 "rmp11" next edit "gr2" set route-map-out-vpnv4 "rm...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,216
SD-WAN 03:47:21, [1/0] [200/0] via 10.10.200.3 [2] (recursive via vd2-2 tunnel 11.1.2.11), 03:47:21, [1/0] B V 100.1.1.0/24 [200/0] via 10.10.100.254 (recursive via vd2-1 tunnel 11.1.1.11), 03:47:50, [1/0] [200/0] via 10.10.200.254 (recursive via vd2-2 tunnel 11.1.2.11), 03:47:50, [1/0] Copying the DSCP value from the ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,217
SD-WAN To configure the FortiGates: 1. Configure the firewall policy on the spoke (FortiGate A): config firewall policy edit 1 set srcintf "port1" set dstintf "virtual-wan-link" set action accept set srcaddr "all" set dstaddr "all" set srcaddr6 "all6" set dstaddr6 "all6" set schedule "always" set service "ALL" set logt...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,218
SD-WAN state=log may_dirty f00  statistic(bytes/packets/allow_err): org=3024/36/1 reply=3024/36/1 tuples=2 tx speed(Bps/kbps): 82/0 rx speed(Bps/kbps): 82/0 orgin->sink: org pre->post, reply pre->post dev=20->17/17->20 gwy=172.16.200.55/10.2.2.1 hook=post dir=org act=snat 10.2.2.1:25290->172.16.200.55:8(172.16.200.2:25...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,219
SD-WAN set service "ALL" set logtraffic all set auto-asic-offload disable set nat enable set diffserv-copy enable next end To test the configuration: 1. Generate some local-in traffic. 2. Verify that the session’s tos value from the original direction is applied to the reply direction: # diagnose sys session list sessi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,220
SD-WAN To connect to the servers that are behind the cloud FortiGate-VM, virtual IP addresses (VIPs) are configured on port2 to map to the servers: l VPN traffic terminating on port1 is routed to the VIP on port2 to access the web servers. l VPN traffic terminating on the VPN gateway accesses the VIPs on port2 directly...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,221
SD-WAN 5. Click OK. To configure a custom IPsec VPN: 1. Go to VPN > IPsec Wizard. 2. Set Name to Core_Dialup. 3. Set Template type to Custom. 4. Click Next. 5. Configure Network settings: Remote Gateway Dialup User Interface port1 NAT Traversal Enable 6. Configure Authentication settings: Method Pre-shared Key Pre-shar...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,222
SD-WAN 7. Leave the default Phase 1 Proposal settings and disable XAUTH. 8. Configure the Phase 2 Selector settings: Name Ent_Core Local Address Named Address - local_subnet_10_0_2_0 Remote Address Named Address - all This setting allows traffic originating from both the remote subnet 10.100.88.0 and the health checks ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,223
SD-WAN 3. Set Interface to Core_Dialup. 4. Click OK. To configure a firewall policy to allow traffic from the tunnel to port2: 1. Go to Policy & Objects > Firewall Policy and click Create New. 2. Configure the following: Name Core_Dialup-to-port2 Incoming Interface Core_Dialup Outgoing Interface port2 Source all Destin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,224
SD-WAN 3. Set Name to remote_subnet_10_0_2_0. 4. Set IP/Netmask to 10.0.2.0/24. 5. Click OK. To configure a custom IPsec VPN: 1. Go to VPN > IPsec Wizard. 2. Set Name to FGT_AWS_Tun. 3. Set Template type to Custom. 4. Click Next. 5. Configure Network settings: Remote Gateway Static IP Address IP Address 100.21.29.17 In...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,225
SD-WAN 4. Enable Administrative access for HTTPS, PING, and SSH. 5. Click OK. Routing is defined when creating the SD-WAN interface. The firewall policy is created after the SD-WAN interface is defined. Configuring the VPN overlay between the HQ FortiGate and AWS native VPN gateway This example uses static routing. It ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,226
SD-WAN 4. Click Download Configuration to download the FortiGate's tunnel configurations. The configuration can be referred to when configuring the FortiGate VPN. 5. The new VPG is attached to your VPC, but to successfully route traffic to the VPG, proper routing must be defined. Go to Virtual Private Cloud > Subnets, ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,227
SD-WAN Configure routing to the VPG on the cloud FortiGate-VM To configure routing to the VPG on the cloud FortiGate-VM: 1. Go to Network > Static Routes and click Create New. 2. Set Destination to Subnet and enter the IP address and netmask: 10.100.88.0/255.255.255.0. 3. Set Gateway Address to Specify and enter 10.0.2...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,228
SD-WAN Configure IPsec VPN on the HQ FortiGate To configure a custom IPsec VPN: 1. Go to VPN > IPsec Wizard. 2. Set Name to AWS_VPG. 3. Set Template type to Custom. 4. Click Next. 5. Configure Network settings: Remote Gateway Static IP Address IP Address 34.210.19.225 This address is taken from the downloaded AWS confi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,229
SD-WAN Routing is defined when creating the SD-WAN interface. The firewall policy is created after the SD-WAN interface is defined. Configuring the VIP to access the remote servers VIPs, interface IP addresses, and policies are created on the cloud FortiGate-VM to allow access to the remote servers. To configure additi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,230
SD-WAN 4. Click OK. 5. Create a second VIP for the FTP server with the following settings: Name VIP-FTP Interface port2 External IP address/range 10.0.2.21 Map to IPv4 address/range 10.0.3.44 To configure firewall policies to allow traffic from port2 to port3: 1. Go to Policy & Objects > Firewall Policy and click Creat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,231
SD-WAN Incoming Interface port2 Outgoing Interface port3 Source all Destination VIP-HTTP Schedule always Service ALL Action ACCEPT NAT Enabled 3. Configure the remaining settings as required. 4. Click OK. 5. Create a second policy for the FTP VIP with the following settings: Name To-FTP Incoming Interface port2 Outgoin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,232
SD-WAN 4. Configure a health check 5. Configure SD-WAN rules To add SD-WAN member interfaces: 1. Go to Network > SD-WAN, select the SD-WAN Zones tab, and click Create New > SD-WAN Member. 2. Set Interface to AWS_VPG then click OK. 3. Click Create New > SD-WAN Member again. 4. Set Interface to FGT_AWS_Tun. 5. Set Gatewa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,233
SD-WAN Individual routes to each tunnel are automatically added to the routing table with the same distance: To configure firewall policies to allow traffic from the internal subnet to SD-WAN: 1. Go to Policy & Objects > Firewall Policy and click Create New. 2. Configure the following: Name ISFW-to-IaaS Incoming Interf...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,234
SD-WAN Server 10.0.2.10 Participants Specify Add AWS_VPG and FGT_AWS_Tun as participants. 3. Click OK. Health check probes originate from the VPN interface's IP address. This is why the phase2 selectors are configured with Local Address set to all. To configure SD-WAN rules to steer traffic: HTTPS and HTTP traffic is s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,235
SD-WAN 4. Create other SD-WAN rules as required: Verifying the traffic To verify that pings are sent across the IPsec VPN tunnels l On the HQ FortiGate, run the following CLI command: # diagnose sniffer packet any 'host 10.0.2.10' 4 0 1 interfaces=[any] Using Original Sniffing Mode interfaces=[any] filters=[host 10.0.2...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,236
SD-WAN 2. Run the following CLI command: # diagnose sys sdwan health-check … Seq(1 AWS_VPG): state(alive), packet-loss(0.000%) latency(56.221), jitter(0.290) sla_ map=0x0 Seq(2 FGT_AWS_Tun): state(alive), packet-loss(0.000%) latency(55.039), jitter(0.223) sla_map=0x0 To verify service rules: 1. Go to Network > SD-WAN a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,237
SD-WAN 10.0.2.0-10.0.2.255 Service(3): Address Mode(IPV4) flags=0x0 Gen(1), TOS(0x0/0x0), Protocol(6: 443->443), Mode(manual) Members: 1: Seq_num(2 FGT_AWS_Tun), alive, selected Src address: 0.0.0.0-255.255.255.255 Dst address: 10.0.2.0-10.0.2.255 Service(4): Address Mode(IPV4) flags=0x0 Gen(1), TOS(0x0/0x0), Protocol(...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,238
SD-WAN statistic(bytes/packets/allow_err): org=48/1/0 reply=40/1/1 tuples=3 tx speed(Bps/kbps): 26/0 rx speed(Bps/kbps): 22/0 orgin->sink: org pre->post, reply pre->post dev=5->18/18->5 gwy=172.16.200.1/10.100.88.101 hook=post dir=org act=snat 10.100.88.101:55621->10.0.2.20:443(172.16.200.2:55621) hook=pre dir=reply ac...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,239
SD-WAN hook=post dir=reply act=noop 10.0.2.21:22->10.100.88.101:55644(0.0.0.0:0) pos/(before,after) 0/(0,0), 0/(0,0) src_mac=00:09:0f:00:03:01 misc=0 policy_id=32 auth_info=0 chk_client_info=0 vd=0 serial=00b75287 tos=ff/ff app_list=2000 app=16060 url_cat=0 sdwan_mbr_seq=0 sdwan_service_id=0 rpdb_link_id= ff000002 rpdb...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,240
SD-WAN Gen(2), TOS(0x0/0x0), Protocol(6: 80->80), Mode(manual) Members: 1: Seq_num(2 FGT_AWS_Tun), dead Src address: 0.0.0.0-255.255.255.255 Dst address: 10.0.2.0-10.0.2.255 Service(2): Address Mode(IPV4) flags=0x0 Gen(1), TOS(0x0/0x0), Protocol(6: 22->22), Mode(manual) Members: 1: Seq_num(1 AWS_VPG), alive, selected S...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,241
SD-WAN misc=0 policy_id=32 auth_info=0 chk_client_info=0 vd=0 serial=00b87199 tos=ff/ff app_list=2000 app=34050 url_cat=0 rpdb_link_id= 80000000 rpdb_svc_id=0 ngfwid=n/a npu_state=0x3041008 session info: proto=6 proto_state=66 duration=3 expire=1 timeout=3600 flags=00000000 socktype=0 sockport=0 av_idx=0 use=4 origin-s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,242
SD-WAN [1/0] via 10.100.65.254, port5 S 10.0.2.0/24 [1/0] via 169.254.55.153, AWS_VPG C 10.0.10.0/24 is directly connected, Branch-HQ-A C 10.0.10.1/32 is directly connected, Branch-HQ-A … SD-WAN Network Monitor service The SD-WAN Network Monitor service is a tool designed to determine upload and download speeds. Speed ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,243
SD-WAN Service Overview License outbandwidth. l Possible to temporarily bypass the bandwidth limits set on the interface and configure custom maximum bandwidth limits. l Server is on the cloud, which is maintained by Fortinet. Speed test from hub to spoke l Server is the spoke. l Tests initiated from the hub. l Results...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,244
SD-WAN To download the server list of speed tests: 1. Download the server list from FortiCloud: # execute speed-test-server download Download completed. 2. Verify the list: # execute speed-test-server list ... FTNT_CA_Toronto valid Host: 154.52.23.67 5200 fortinet ... FTNT_CA_Vancouver valid Host: 154.52.20.6 5200 fort...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,245
SD-WAN 3. Click Execute speed test in the right pane. The CLI equivalent to running a speed test in the GUI is execute speed-test <interface>. 4. When the test completes, click OK in the Confirm pane to apply the results to the estimated bandwidth. The results can also be applied later by clicking Apply results to esti...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,246
SD-WAN mode {Auto | TCP | UDP} Set the protocol used for the speed test: l Auto (default): dynamically select TCP or UDP based on the speed test setting. l UDP: use UDP. l TCP: use TCP. update-inbandwidth enable {enable | disable} Enable/disable bypassing the interface's inbound bandwidth setting. update-outbandwidth e...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,247
SD-WAN Speed test results are cached for future use. When speed tests are initiated from the hub, the results are cached on the hub. When speed tests are initiated from the spoke, the results are cached on the spoke, but sent to the hub. When a speed-test server is enabled on a hub or spoke, two speed test daemons are ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,248
SD-WAN CLI commands Enable the speed-test server: config system global set speedtest-server {enable | disable} set speedtestd-server-port <integer> set speedtestd-ctrl-port <integer> end speedtest-server {enable | disable} Enable/disable the speed test server on the hub or spoke (default = disable).This enables iPerf i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,249
SD-WAN Enable speed test access on both the underlay and the IPsec overlay tunnel interfaces on the speed test server: config system interface edit <interface> set allowaccess speed-test [other access] ... next end <interface> The dial-up IPsec tunnel interface on the speed test server. set allowaccess {speed￾test | [o...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,250
SD-WAN diagnose debug application speedtestd <int> Enable debug of the speed test server daemon. diagnose test application forticron 9 List the scheduled speed tests. diagnose test application forticron 10 Show the cached speed test results. diagnose test application forticron 11 Write the cached speed test results to ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,251
SD-WAN the speed test to run on its underlay interface. The spokes establish BGP peering with the hub over the VPN interface, and advertises its loopback network to the hub. The specific configuration is only shown for FGT_B. When the speed test is running, routing through the VPN overlay can be bypassed, and route map...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,252
SD-WAN set start 01:00 set end 23:00 set day monday tuesday wednesday thursday friday saturday next end 5. Configure the speed test schedule: The custom controller port used for authentication is set to 6000, and the custom port used to run the speed tests is set to 7000. The shaping profile is set to local. config sys...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,253
SD-WAN end config neighbor edit "10.10.100.254" set member 1 set mode speedtest next end end 5. Configure BGP routing: config router route-map edit "No_Speed-Test" config rule edit 1 set action permit next end next edit "Start_Speed-Test" config rule edit 1 set action deny next end next end config router bgp set as 654...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
1,254
SD-WAN 2. At the scheduled time, the speed test starts for the hub-phase1 interface from hub to spoke: # diagnose test application forticron 9 Speed test schedules: Interface Server Update Up/Down-limit (kbps) Days H:M TOS Schedule ----------------------------------------------------------------------------------------...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf