Created on 11-02-2004 12:00 AM Edited on 06-09-2022 05:50 AM By Anthony_E
Article
Description |
There are two separate considerations when using two Internet uplinks: Link Redundancy and Load Sharing.
These two features can be combined or implemented separately.
|
||||||||||||
Components |
All FortiOS. |
||||||||||||
Steps or Commands |
Check also the related article:
In each scenario, it is necessary to configure the appropriate firewall policies between the interfaces in question to allow the traffic - this document focuses on the routing issues.
Design Scenario #1: Link Redundancy (only).
If Internet access is no longer available on one link, it is necessary that traffic uses the other link.
Routing. Indicate which route is preferable by specifying the distance - the lower distance route is declared active and placed in the routing table. Determining whether link is down (ping servers). It is usually recommended that is using the next hop / gateway device as the ping server. Firewall policies. Design Scenario #2: Load Sharing (only). Use of both Internet links simultaneously but do not have any requirements for failing traffic over in the event of link failure. What is the minimum needed as far as routing is concerned? - one default route for the primary link - direct other traffic over the other link using specific static routes.
For more information, see the article Load sharing between two WAN interfaces.
Design Scenario #3: Link Redundancy and Load Sharing.
While both links are available, distribute the Internet traffic over both links. In the event that a link fails, send all traffic over the active link.
Use default routes with equal distance. This is similar to scenario #1, except that both default routes must have equal distance. The end result is that both routes will remain in the active routing table and and can be viewed in the Routing Monitor (see GUI). The presence of both routes is needed to satisfy reverse path lookup (anti-spoofing feature). Set the distance:
- when defining the static route.
- For interfaces acquiring IP dynamically (DHCP or PPPoE), it is possoble to set the distance for the interface System -> Network -> Interface and configure the following:
- Check 'retrieve gateway' (adds default route automatically). - Enter value in distance field.
To guarantee that 1 link is always preferred:
Use a default policy route to indicate which interface is the preferred interface for accessing the Internet.
** Warning -- Configure this with care! **
Consequently, it is maybe necessary to add specific policy routes that override these default policy routes.
The policy routing table will be read top to bottom. To redirect traffic over the secondary link: To make use of the secondary link, it is necessary to use policy routes to direct some of the traffic onto it rather than onto the primary link.
When defining the policy route, it is best to only define the outgoing interface and leave the gateway blank. Leaving the gateway field blank ensures that the policy route will not be active when the link is down (it is affected by the ping server status).
Special Cases. 1) Monitoring both WAN interfaces simultaneously. To be able to ping both WAN interfaces in order to demonstrate that the links are up, it is necessary to set the distance on both default routes to be the same.
This is the same requirement as for Design Scenario #3. 2. Routing of traffic directed at VIPs. Case Scenario #1 (VIP on non-default interface): In this case, it is not necessary to create an additional static route or policy route for this VIP because a route cache entry is made which tells the FortiGate unit which interface it should use on the return path.
Case Scenario #2 (Redundancy VIPs). - inbound sessions will be handled as discussed in case scenario #1. - Outbound sessions (initiated by the server) will have the server IP modified according to one of the 2 VIPs -- which VIP is selected depends on which interface has the preferred default route.
Conclusion. (redundant VIPs): make sure a policy route directs the server traffic out the desired interface. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.