FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
gmanea
Staff
Staff
Article Id 196731

Description

 

This article explains the functionality of ‘set interface-select-method’ that was introduced to fix an issue faced with local self-originating traffic (DNS, FortiGuard, RADIUS, LDAP) on FortiGate on version 6.2.3 and earlier which would not match SD-WAN rules.
 
With FortiOS version 6.2.3 and earlier, the self-originating traffic was not using SD-WAN rules to push traffic to the correct Interface as defined in rules. 
 
Related document.


Scope


FortiGate v6.2.4 and later.

Solution

 

Take FortiGuard as an example here.

 

config system fortiguard
    set interface-select-method {auto|sdwan|specify}

 

There is an option to configure the interface according to the following 3 options.

 

  1. Auto: default and when used, it matches the implicit allow rule in SD-WAN rules.

 

config system fortiguard

    set interface-select-method auto
end

 

As per the above config, the selection method is configured as auto.
Check the settings of the implicit SD-WAN rule and traffic is forwarded according to that rule.

If the config is as follows.

 

config system virtual-wan-link
    set status enable
    set load-balance-mode usage-based           <----- Spillover method.
end

 

The traffic is going to be forwarded to the first SD-WAN member and will keep forwarding the traffic until bandwidth reaches its limit.

Other methods are also listed here: 

Implicit rule

 

  1. SD-WAN: used to match specific SD-WAN rules.

    To match the traffic SD-WAN rules defined for certain traffic.

    If traffic for fortiGuard goes via the WAN1 interface and there is an SD-WAN rule present for it, the traffic will be matched against that rule.

    config system fortiguard
        set interface-select-method sdwan
    end

  2. Specify: Need to specify a specific interface.


This is straightforward to use a specific interface for specific traffic, just define this.

config system fortiguard
    set interface-select-method specify
    set interface wan1
end

 

Note.
This command cannot be enabled globally on FortiGate for all the locally-originating traffic.
Specify it individually for each traffic that is locally-originating.

Example.

DNS.

 

config system dns
    set interface-select-method [auto|sdwan|...]
    set interface {string}
end

 

FortiGuard.

 

config system fortiguard
    set interface-select-method [auto|sdwan|...]
    set interface {string}
end

 

RADIUS.

 

config user radius
    set interface-select-method [auto|sdwan|...]
    set interface {string}
end

 

Email Server.

 

 

config system email-server
    set interface-select-method [auto|sdwan|...]
    set interface {string}
end

 

Security Fabric:

 

config system csf 

    set upstream-interface-select-method {auto | sdwan | specify}

    set upstream-interface <port>

end

 

For Security Fabric, this feature is available in v7.2.8/v7.4.4/7v.6.0 and above.

The reason for using this configuration is in case of redundancy, if there are two or more IPSEC tunnels for a peer if one of the tunnels is down, the CSF feature will source the traffic to the IPSEC tunnel which is UP, rather than leaving the traffic to be routed by the egress interface. 

 

Specify the 'interface-select-method' for FSSO when the FSSO is behind the VPN tunnel, make sure the IPsec tunnel interface is an SD-WAN member, and then set the 'interface-select-method' to SD-WAN as below.

 

config user fsso

edit <FSSO>

set interface-select-method sdwan

set souce-ip <internal_interface_ip>

next

end

 

Note: This feature is available in FortiOS 7.2.8/7.4.4/7.6.0 and above.

 

From version 7.0, it is possible to select how specific local traffic will be routed out. 

 

First,  enable this option is Feature Visibility:
System -> Feature Visibility -> Local Out Routing.

 

Then, depending on the service, it is possible to change the setting in a specific VDOM or in Global. 
Network -> Local Out Routing.

 

JeanPhilippe_P_0-1723324612856.png

 

JeanPhilippe_P_1-1723324631444.png

 

The outgoing interface method is described at the beginning. 

 

Some services might not be visible in GUI. 

 

For example, if there is no LDAP server configured, no LDAP service will be visible in the tab and will appear only if the LDAP server is configured. 

 

If there are multiple servers, the option to change the behavior per server will appear. 

 

Related documents:
Implicit rule
system fortiguard