Created on
05-20-2025
11:53 PM
Edited on
05-21-2025
01:19 AM
By
Anthony_E
Description
This article outlines best practices for configuring FortiGate firewalls to support reliable application-aware backup and replication traffic. Without proper configuration, backup solutions may experience disruptions due to timeouts, SSL/SSH inspection, NAT behavior, or Unified Threat Management (UTM) interference.
Scope
FortiGate, application-aware backup and replication solutions (e.g., Veeam, Commvault, Veritas, etc.)
Solution
Bypass SSL/SSH Inspection (DPI):
Disable or Exclude from UTM Features:
Disable the following for backup-related traffic, or exclude them from inspection profiles if UTM is required:
Create Specific Firewall Policies:
config firewall policy
edit 101
set name "Backup_to_Storage"
set srcintf "ae1"
set dstintf "ae3"
set srcaddr "Backup_Server"
set dstaddr "Backup_Storage"
set action accept
set schedule "always"
set service "ALL"
set nat enable
set logtraffic all
next
end
Address Definitions:
config firewall address
edit "Backup_Server"
set subnet 192.168.1.16 255.255.255.0
next
edit "Backup_Storage"
set subnet 192.168.98.88 255.255.255.0
next
end
Note:
Adjust interface names and address objects according to the network layout.
Tune or Remove Session Helpers:
config system session-helper
show # Identify the ID for RPC
delete <id_of_rpc>
end
Alternatively, bind RPC ports to defined services and bypass session helpers to avoid misclassification.
Increase Session Timeout (Optional):
For long backup jobs:
# Per Policy
config firewall policy
edit <policy_id>
set session-ttl 3600
next
end
# Globally
config system session-ttl
set default 3600
end
Verify NAT and MTU Settings:
Enable Logging for Troubleshooting:
config firewall policy
edit <id>
set logtraffic all
next
end
Open Required Ports:
| Port Range | Protocol | Description |
|---|---|---|
| 10001 | TCP | Installer/Agent Communication |
| 9392, 9401 | TCP | Management/Monitoring Access |
| 443 | TCP | Web UI and API Access |
| 2500–5000 | TCP | Data Movement (default range) |
Refer to the backup solution’s documentation for a complete port list.
Conclusion:
Properly configuring FortiGate firewalls ensures the stable and efficient operation of backup solutions. Disabling conflicting security features, optimizing session handling, and defining dedicated policies help avoid performance issues. For ongoing problems, collect relevant logs and consult Fortinet Technical Support.
great job thank you Monty!
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.