Description | This article describes why WAN1 should be used by default. Perform failover to WAN2 only if WAN1 goes down. |
Scope | FortiGate v7.0 and above. |
Solution |
If WAN1 and WAN2 use DHCP/PPPoE, set different distance values:
config system interface edit "wan1" set distance 10 next edit "wan2" set distance 20 next end
Lower distance = higher priority. If using static routes, disable default gateways on interfaces and set priority in the routes.
Set a link monitor for WAN1 to detect failure:
config system link-monitor edit "wan1-monitor" set srcintf "wan1" set server "8.8.8.8" set protocol ping set update-static-route enable next end
config system global set snat-route-change enable end
Ensures existing sessions follow new routes during failover/failback.
Once everything is configured, test various failure scenarios to check the setup:
diagnose sys link-monitor status
For a reliable dual WAN setup on FortiGate, set WAN1 with a lower route distance (or higher priority for static routes), monitor only WAN1, and enable snat-route-change. This ensures automatic failover to WAN2 and failback to WAN1.
SD-WAN as an Alternative to Traditional WAN Failover:
While the example above demonstrates manual configuration of dual WAN failover using static routes and link monitoring, FortiGate also supports SD-WAN, which simplifies WAN management and provides more advanced failover and load-balancing capabilities.
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.