Description
Scope
FortiGate v6.2.4 and later.
Solution
Take FortiGuard as an example here.
config system fortiguard
set interface-select-method {auto|sdwan|specify}
There is an option to configure the interface according to the following 3 options.
config system fortiguard
set interface-select-method auto
end
As per the above config, the selection method is configured as auto.
Check the settings of the implicit SD-WAN rule and traffic is forwarded according to that rule.
If the config is as follows.
config system virtual-wan-link
set status enable
set load-balance-mode usage-based <----- Spillover method.
end
The traffic is going to be forwarded to the first SD-WAN member and will keep forwarding the traffic until bandwidth reaches its limit.
Other methods are also listed here:
This is straightforward to use a specific interface for specific traffic, just define this.
config system fortiguard
set interface-select-method specify
set interface wan1
end
Note.
This command cannot be enabled globally on FortiGate for all the locally-originating traffic.
Specify it individually for each traffic that is locally-originating.
Example.
DNS.
config system dns
set interface-select-method [auto|sdwan|...]
set interface {string}
end
FortiGuard.
config system fortiguard
set interface-select-method [auto|sdwan|...]
set interface {string}
end
RADIUS.
config user radius
set interface-select-method [auto|sdwan|...]
set interface {string}
end
Email Server.
config system email-server
set interface-select-method [auto|sdwan|...]
set interface {string}
end
Security Fabric:
config system csf
set upstream-interface-select-method {auto | sdwan | specify}
set upstream-interface <port>
end
For Security Fabric, this feature is available in v7.2.8/v7.4.4/7v.6.0 and above.
The reason for using this configuration is in case of redundancy, if there are two or more IPSEC tunnels for a peer if one of the tunnels is down, the CSF feature will source the traffic to the IPSEC tunnel which is UP, rather than leaving the traffic to be routed by the egress interface.
Specify the 'interface-select-method' for FSSO when the FSSO is behind the VPN tunnel, make sure the IPsec tunnel interface is an SD-WAN member, and then set the 'interface-select-method' to SD-WAN as below.
config user fsso
edit <FSSO>
set interface-select-method sdwan
set souce-ip <internal_interface_ip>
next
end
Note: This feature is available in FortiOS 7.2.8/7.4.4/7.6.0 and above.
From version 7.0, it is possible to select how specific local traffic will be routed out.
First, enable this option is Feature Visibility:
System -> Feature Visibility -> Local Out Routing.
Then, depending on the service, it is possible to change the setting in a specific VDOM or in Global.
Network -> Local Out Routing.
The outgoing interface method is described at the beginning.
Some services might not be visible in GUI.
For example, if there is no LDAP server configured, no LDAP service will be visible in the tab and will appear only if the LDAP server is configured.
If there are multiple servers, the option to change the behavior per server will appear.
Related documents:
Implicit rule
system fortiguard
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.