FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
naveenk
Staff
Staff
Article Id 192579

Description
This article describes factory default health checks for performance SLA configuration.

 

SD-WAN configuration needs the ‘Performance SLA’ to find the WAN link failure detection. 

Performance SLAs are used to measure the health of SD-WAN member interfaces, it can be done in three ways: 

  • Active probing of the server using protocols such as ICMP, HTTP, TWAMP, TCPECHO, UDP-ECHO, DNS, FTP.
  • Remote WAN health measurement using embedded information in ICMP probes.
  • Passive WAN health measurement using session information that is captured on firewall policies that have ‘passive-wan-health-measurement’ configured.


While configuring it, define the target server or server such as Google DNS 8.8.8.8.
However from the v6.2 and onward, FortiOS introduced factory default health checks which it can use as target server.

 

Scope

 

FortiGate.

Solution
There are five predefined performance SLA profiles for newly created VDOMs or factory reset FortiGate:

 

  • AWS.
  • FortiGuard.
  • Gmail.
  • Google Search.
  • Office 365.

View and configure the SLA profiles in Network -> Performance SLA.

 
Select the SD-WAN members under the participants and save the settings.
 
 
After configuring a health check, the packet loss, latency, and jitter data for the SLA profiles will be visible.
If a value is colored red, it means that it failed to meet the SLA requirements.