Description |
This article describes the monitoring of FortiGate using server probes.
Users can use server probes on interfaces on FortiGate to check the reachability and the response time of accessing FortiGate. The following probe response modes can be configured:
none: disable probe. http-probe: HTTP probe. twamp: Two-Way Active Measurement Protocol.
Once the targeted FortiGate is configured with server-probe on its interfaces, users may configure server probe monitoring on third-party monitoring tool (using http-get), or using the Link Monitor feature available on a remote FortiGate. |
Scope | FortiGate. |
Solution |
config system probe-response set mode http end
It is possible to set additional configurations such as specifying custom port other than port 80.
Refer to this document for more information.
config system interfaces edit <interface> set allowaccess probe-response <- This will only allow probe-response. If any other allowaccess is require such as https and ping, include the respective in the command line. next end
config system link-monitor edit Probe set srcintf <interface> set server <FortiGate_IP> <- Configure the FortiGate IP that has the server probe response configured. set gateway-ip <Gateway_IP> set protocol http set port <port> <- Replace this with the port number configured in the probe response section if the custom port is used. The default port is 80. next end
To verify that the server probe is working, the following command can be issued if the link monitor is used to send the server probe request.
This command is to be issued on the local FortiGate where probe-response is configured:
diag sys server-probe response
The following screenshot shows the expected output of the above command:
On the remote FortiGate that has been configured with the link monitor feature, the following command will show the response of the server probe request:
diag sys link-monitor status Probe <- Probe is the name of the link monitor that was configured. Replace that to the name of the link monitor name that is configured.
The following screenshot shows the expected output of the above command:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.