| Description |
This article describes how Health checks are used to make decisions in SD-WAN rules. Irrespective of the commonly used health checks, there are other types of Health checks in FortiGate. |
|||||||||||||||
| Scope | FortiGate. | |||||||||||||||
| Solution |
There are three types of health checks used:
Below are the different types of probes used in this setup:
config system sdwan config health-check edit " passive" set detect-mode passive set member 3 4 config firewall policy edit 10 set passive-wan-health-measurement enable
Per-application passive monitoring can be done as below, Upon configuring the above, it is possible to use below for per-application passive monitoring:
config system sdwan config service edit 1 set name " microsoft" set src 'all" set internet-service enable set internet-service app-ctrl xxxxx yyyyy <----- Application signature ID can get from Security Profiles -> Application signatures. set health-check passive <----- Name of the above health check. set priority member 1 4 set passive-measurement enable end
config system sdwan config health-check edit "prefer-passive" set server "10.10.10.1" set protocol ping set detect-mode prefer-passive set members 4 next end end
In the example above, passive monitoring is preferred. FortiGate starts pinging 10.10.10.1 only after no TCP traffic has been seen through member 4 for three minutes.
Note: From v7.6.4, this behaviour has been changed; SD-WAN passive health check does not need to be configured for Application Performance Monitoring to work. So this part of the configuration mentioned below is not required.
config system sdwan config health-check edit " passive" set detect-mode passive set member 3 4 next end end
In Active Monitoring mode, the FortiOS link monitor process (lnkmt) is responsible for monitoring the SD-WAN members' states and performance, whereas in Passive Monitoring mode, the link monitor passive process (lnkmt_passive) collects the data and generates the report, which will be used by the lnkmt process later, to calculate packet loss, latency and jitter.
These commands can be run to view the collected passive data:
diagnose sys link-monitor-passive admin list diagnose sys link-monitor-passive admin list by-interface diagnose sys link-monitor-passive admin list by-application [Name/ID] diagnose sys link-monitor-passive admin app-id-map |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.