Description
Scope
FortiGate v6.2.4 and later.
Solution
As of FortiOS 6.2.4, the interface-select-method CLI option was added to a number of config sections on the FortiGate that control self-originating traffic such as DNS, FortiGuard, RADIUS, LDAP, TACACS+, and Central Management (i.e. FortiManager/FortiGate Cloud). Note that this setting is configured on a per-traffic-type basis and
is not available as a global command (i.e. it cannot be set once and applied to all traffic, it must be set under each CLI section if necessary).
Consider the FortiGuard section as an example:
config system fortiguard
set interface-select-method {auto|sdwan|specify}
Under 'set interface-select-method', there are three options available:
1. auto: default behavior where the FortiGate will select the best path to the associated destinations (in this case, FortiGuard server addresses) via the route table/Forward Information Base (FIB). Notably, this traffic will not match any explicit/user-defined SD-WAN rules, and instead it will follow the implicit SD-WAN rule if the best-path is via an SD-WAN zone interface.
For example, if the implicit SD-WAN rule is configured with set load-balance-mode usage-based (aka Spillover method) then this self-originated FortiGuard traffic will utilize the first SD-WAN member and will keep forwarding traffic until bandwidth reaches the spillover limit (see also: Implicit rule)
config system virtual-wan-link
set status enable
set load-balance-mode usage-based <----- Spillover method.
end
2. sdwan: Allows the self-originated traffic to follow user-defined SD-WAN rules.
For example, if a Manual SD-WAN rule exists to send FortiGuard traffic out via WAN2 and set interface-select-method sdwan is configured then the FortiGate will send traffic out via the WAN2 interface, rather than being potentially load-balanced via the implicit SD-WAN rule.
3. specify: self-originating traffic will only ever attempt to be transmitted via the specified interface.
Important Note:
The FortiGate must have a route in the routing table/FIB for the destinations associated with this self-originating traffic (e.g. if dmz is the specified interface to reach RADIUS server 10.0.0.1 then the FortiGate must have a valid route to 10.0.0.1 via the dmz interface). If a route does not exist then the FortiGate will not be able to send traffic out to the destination.
After configuring set interface-select-method specify, the interface option will become available for specifying a single outgoing interface to use for this set of traffic:
config system fortiguard
set interface-select-method specify
set interface wan1
end
The following are some of the original places in the CLI where interface-select-method can be configured, though note that over time many (if not all) of the FortiGate CLI sections regarding self-originated traffic have had interface-select-method added as a capability. Check the FortiOS CLI References for a given FortiOS version to see which CLI options support this (search for 'interface-select-method'): https://docs.fortinet.com/document/fortigate/latest/cli-reference/84566/fortios-cli-reference
** Using interface-select-method sdwan with FSSO can be very useful when the Collector Agent is accessed over two or more redundant IPsec tunnels. To facilitate this, make sure the IPsec tunnels are members of SD-WAN, then pair set interface-select-method sdwan with set source-ip <address> (if the IPsec tunnels do not have addresses, or if traffic must be sourced from a LAN address).
*** The Security Fabric section (added in FortiOS 7.2.8, 7.4.4, and 7.6.0) modifies the CLI option to upstream-interface-select-method, though the usage remains the same as other sections:
This option was added along with the source-ip option so that administrators could set a loopback address as the source while accommodating for redundant routing scenarios (like when the Leaf FortiGate connects to the upstream Root FortiGate via two or more IPsec tunnels).
config system csf
set source-ip <IPv4 Address>
set upstream-interface-select-method {auto | sdwan | specify}
set upstream-interface <port>
end
Configuring interface-select-method via the GUI (FortiOS 7.0 and later)
FortiOS 7.0 added the Local Out Routing page, which allows administrators to set source IPs and outgoing interfaces from the GUI, rather than having to do so from the CLI only. See also: https://docs.fortinet.com/document/fortigate/7.0.0/new-features/286784/summarize-source-ip-usage-on-...
This feature must first be enabled under System -> Feature Visibility -> Local Out Routing. Then, depending on the service, it is possible to change the setting in a specific VDOM or in the Global VDOM under Network -> Local Out Routing.
Note that the GUI will only show options that have already been configured (e.g. if an LDAP server has not been configured first then there will not be any LDAP-related entries on the Local Out Routing page. If there are multiple entries configured for a given section (e.g. multiple LDAP server entries) then the administrator has the option of modifying behavior on a per-entry basis.
Related documents:
Implicit rule
system fortiguard
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.