Description | This article describes how to prevent traffic being sent over an undesired SD-WAN member after an undesired SD-WAN rule match. |
Scope | FortiGate. |
Solution |
In the Fortinet SD-WAN implementation, the same type of traffic could be matched by different SD-WAN rules at different times, without configuration changes in the middle.
2 possible reasons for this behavior:
Some types of traffic must be checked only against a specific set of rules, this article is explains how to achieve this goal.
For example, consider assume a Fortinet SD-WAN deployed with:
With a set of SD-WAN rules like this:
config system sdwan config service edit 1 set name "Traffic_to_Hubs" set mode sla set dst "RFC1918" config sla edit "To_Hub_1" set id 1 next end set priority-zone "Overlay" next edit 4 set name "Web_traffic_to_SSE_POPs" set mode sla set src "all" set internet-service enable set internet-service-app-ctrl 15893 40568 config sla edit "TO_SSE_POP_1" set id 1 next edit "TO_SSE_POP_2" set id 1 next end set priority-zone "GRE_Zone" next edit 3 set name "Traffic_to_Internet_DIA" set mode sla set dst "all" set priority-zone "Underlay" next end
If the Performance SLA checks failure over all SD-WAN members of the SD-WAN zone called 'Overlay' (VPN IPsec tunnels) due to Underlays degradation or Hubs unavailability, Private Web traffic could be matched by rule ID 4 and sent to the SSE (Security Service Edge) provider infrastructure.
To avoid this, it is necessary for private traffic to:
To obtain it, add 2 configurations:
config system sdwan config service edit 2 set name "No_Corp_traffic_to_Internet" set dst "RFC1918" set dst-negate enable set priority-zone "Overlay" next end
Important notes:
Black hole or 'backup' static routes are not visible in the routing table until BGP is UP. It is necessary to view the routing database with the following command to see them:
get router info routing-table database
After any SD-WAN configuration changes like the one described above, it is still possible to observe traffic matched by the wrong SD-WAN rules, for different reasons such as:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.