FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
gmanea
Staff
Staff
Article Id 196731

Description

 

This article explains the functionality of the set interface-select-method CLI option, which was introduced in FortiOS 6.2.4 to address issues with local self-originating traffic (DNS, FortiGuard, RADIUS, LDAP) not matching SD-WAN routing rules.
 
In FortiOS version 6.2.3 and earlier, self-originating traffic would not follow SD-WAN rules, nor could traffic be forced to use a specific interface. Instead, self-originating traffic would only follow the routes in the routing table. See the following section from the FortiOS 6.2.3 Cookbook for more information: Self-originating traffic


Scope


FortiGate v6.2.4 and later.

Solution

 

As of FortiOS 6.2.4, the interface-select-method CLI option was added to a number of config sections on the FortiGate that control self-originating traffic such as DNS, FortiGuard, RADIUS, LDAP, TACACS+, and Central Management (i.e. FortiManager/FortiGate Cloud). Note that this setting is configured on a per-traffic-type basis and

is not available as a global command (i.e. it cannot be set once and applied to all traffic, it must be set under each CLI section if necessary).

 

Consider the FortiGuard section as an example:

 

config system fortiguard
    set interface-select-method {auto|sdwan|specify}

 

Under 'set interface-select-method', there are three options available:

 

1. auto: default behavior where the FortiGate will select the best path to the associated destinations (in this case, FortiGuard server addresses) via the route table/Forward Information Base (FIB). Notably, this traffic will not match any explicit/user-defined SD-WAN rules, and instead it will follow the implicit SD-WAN rule if the best-path is via an SD-WAN zone interface.


For example, if the implicit SD-WAN rule is configured with set load-balance-mode usage-based (aka Spillover method) then this self-originated FortiGuard traffic will utilize the first SD-WAN member and will keep forwarding traffic until bandwidth reaches the spillover limit (see also: Implicit rule)

 

config system virtual-wan-link
    set status enable
    set load-balance-mode usage-based           <----- Spillover method.
end

 

2. sdwan: Allows the self-originated traffic to follow user-defined SD-WAN rules.

For example, if a Manual SD-WAN rule exists to send FortiGuard traffic out via WAN2 and set interface-select-method sdwan is configured then the FortiGate will send traffic out via the WAN2 interface, rather than being potentially load-balanced via the implicit SD-WAN rule.

 

3. specify: self-originating traffic will only ever attempt to be transmitted via the specified interface.

 

Important Note:

The FortiGate must have a route in the routing table/FIB for the destinations associated with this self-originating traffic (e.g. if dmz is the specified interface to reach RADIUS server 10.0.0.1 then the FortiGate must have a valid route to 10.0.0.1 via the dmz interface). If a route does not exist then the FortiGate will not be able to send traffic out to the destination.

 

After configuring set interface-select-method specify, the interface option will become available for specifying a single outgoing interface to use for this set of traffic:

 

config system fortiguard
    set interface-select-method specify
    set interface wan1
end


The following are some of the original places in the CLI where interface-select-method can be configured, though note that over time many (if not all) of the FortiGate CLI sections regarding self-originated traffic have had interface-select-method added as a capability. Check the FortiOS CLI References for a given FortiOS version to see which CLI options support this (search for 'interface-select-method'): https://docs.fortinet.com/document/fortigate/latest/cli-reference/84566/fortios-cli-reference

 

  • DNS (config system dns)
  • Per-VDOM DNS (config system vdom-dns)
  • FortiGuard (config system fortiguard)
  • LDAP (config user ldap)
  • RADIUS (config user radius)
  • FortiManager/FortiGate Cloud Central Management (config system central-management)
  • TACACS+ (config user tacacs+)
  • NTP (config system ntp)
  • FSSO (config user fsso) **
  • Certificate (config vpn certificate setting)
  • Security Fabric (config system csf)***

** Using interface-select-method sdwan with FSSO can be very useful when the Collector Agent is accessed over two or more redundant IPsec tunnels. To facilitate this, make sure the IPsec tunnels are members of SD-WAN, then pair set interface-select-method sdwan with set source-ip <address> (if the IPsec tunnels do not have addresses, or if traffic must be sourced from a LAN address).

 

*** The Security Fabric section (added in FortiOS 7.2.8, 7.4.4, and 7.6.0) modifies the CLI option to upstream-interface-select-method, though the usage remains the same as other sections:

 

This option was added along with the source-ip option so that administrators could set a loopback address as the source while accommodating for redundant routing scenarios (like when the Leaf FortiGate connects to the upstream Root FortiGate via two or more IPsec tunnels).

 

config system csf 

set source-ip <IPv4 Address>

set upstream-interface-select-method {auto | sdwan | specify}

set upstream-interface <port>

end

 

Configuring interface-select-method via the GUI (FortiOS 7.0 and later)

 

FortiOS 7.0 added the Local Out Routing page, which allows administrators to set source IPs and outgoing interfaces from the GUI, rather than having to do so from the CLI only. See also: https://docs.fortinet.com/document/fortigate/7.0.0/new-features/286784/summarize-source-ip-usage-on-...

 

This feature must first be enabled under System -> Feature Visibility -> Local Out Routing. Then, depending on the service, it is possible to change the setting in a specific VDOM or in the Global VDOM under Network -> Local Out Routing.

 

JeanPhilippe_P_0-1723324612856.png

 

JeanPhilippe_P_1-1723324631444.png

 

Note that the GUI will only show options that have already been configured (e.g. if an LDAP server has not been configured first then there will not be any LDAP-related entries on the Local Out Routing page. If there are multiple entries configured for a given section (e.g. multiple LDAP server entries) then the administrator has the option of modifying behavior on a per-entry basis.

 

Related documents:
Implicit rule
system fortiguard