Description | This article explains the SD-WAN rule matching process. |
Scope | FortiOS SD-WAN. |
Solution |
SD-WAN rules steers traffic, but traffic must match the rule first. Matching traffic is confirmed through the process outlined in this article. The article sometimes simply refers to SD-WAN rules as 'rules'. Note that SDWAN rules are 'policy routes', but regular policy routes have precedence over SD-WAN rules. This means the 'regular policy routes' are processed first, i.e. before any SD-WAN rule is processed. The same command can be used to check both the 'regular policy route' and SD-WAN rule. However, the ID of any 'regular policy route' is between 1-65535, while the ID of any SD-WAN rule is a ten-digit number like the one shown in the image below.
diagnose firewall proute list <- Checks both regular and SD-WAN rules.
SDWAN rule matching process analysis:
For the purposes of demonstration, this article will use a PacketA sent from the source address '10.10.10.10' to the destination address '200.200.200.200' for analysis. The device is configured with the following SD-WAN rules and routing table (FIB):
The FortiGate received PacketA and checked the destination IP address for routing (if DNAT was required on PacketA, it would have been done before this stage. DNAT comes before routing lookup).
PBR -> SDWAN rule -> FIB
The validation process is what means routes (which are expected to match a rule) do not match rules, despite how the source and destination are the same as configured in the SD-WAN rule. This is because of the additional condition(s) which have to be fulfilled or met. Even if PacketA fulfilled the 'source & destination' specified in the SWDAN rule: if the validation check failed, PacketA will be considered as 'no match' by the rule, and FortiOS will proceed to the next rule. If that rule is the last, it will use an implicit rule for the forwarding, which is the same as FIB.
The following are the criteria in the validation process:
config system sdwan config service <- SD-WAN rule. edit <xx> set default enable <- Disable is the default setting. end
config system sdwan config service edit xx set gateway enable <- Disable is the default setting. end
See the following flowchart for an overview:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.