FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
pkungatti_FTNT
Staff & Editor
Staff & Editor
Article Id 198076

Description


This article explains the Routing Change and Session Fail-over with SD-WAN.

 

Scope

 

FotiGate.

Solution


The three interfaces (Port 1, 2 and 3) are configured over an SD-WAN zone and participating in a Performance SLA.

01.png

 

 
If the Failure Threshold was reached for port3 (5 unanswered consecutive probes), the SLA state of Port3 switches to dead for health-check SLA_ISPs.
 
FGT-1 # diag sys virtual-wan-link health-check SLA_ISPs
Health Check(SLA_ISPs):
Seq(1): state( alive ), packet-loss(0.000%) latency(50. 871), jitter(1.862) sla_map=0x0           <----- Port 1
Seq(2): state( alive ), packet-loss(0.000%) latency(80. 789), jitter(0.534) sla_map=0x0           <----- Port 2

Seq(3): state( dead ), packet-loss(5.000%) sla_marOx0                                             <----- Port 3
 
If update-static-route is enabled, all static routes over Port3 via next-hop 203.0.113.2 are removed from the routing table. The 'inactive' flag is added:
 
# FGT-1 # get router info routing-table database
(...)
5              *>. 0.0.0.0/0 [1/0] via 192.2.0.2, portl
               *>                   [1/0] via 198.51.100.2, port2
                                    [1/0] via 203.0.113.2, port3 inactive
 
After a routing change, sessions are re-validated and may fail over to another SD-WAN member.
Example of routing change:
  • The order of 'oif' interfaces in the policy-route changes.
  • An SD-WAN member switches to a dead state.
  • Dynamic route update.

After the static routes removal, existing sessions over Port3 must be re-validated against the firewall policies.


The following constraints apply for the re-validation of NAT sessions:

  • NAT sessions are only re-checked against firewall policies if this setting is explicitly enabled:

 

config system global
   set snat-route-change enable
end

 

  • NAT sessions are only re-checked against firewall policies performing NAT with the same 'NAT-IP'.
    • Example: Sessions fail over between public internet links is possible if the same 'public IP' is used to NAT traffic via all ISPs (BGP/dynamic routing peering is needed).
    • For this case, configuring IP-Pool over the policy is necessary.