Created on
10-27-2022
01:06 AM
Edited on
03-12-2024
12:52 AM
By
Anthony_E
Description | This article shows how to configure correctly SD-WAN health-check for IPsec Interface. |
Scope | SD-WAN, FortiGate v6.4.8. |
Solution |
Scenario:
Simple diagram:
Users are behind subnet 192.168.100.0/24 with gateway 192.168.100.1 (FortiGate LAN interface). Both IPsec interfaces are up.
The SD-WAN health-check (called: ipsec_check):
SpokeB (sdwan) # show health-check ipsec_check
config health-check
These are confirmed to be dead those are up.
SpokeB (root) # diagnose sys sdwan health-check
By default, the IPsec site-to-site interface has no IP address:
SpokeB (root) # show system interface ipsec_1
config system interface
SpokeB (root) # show system interface ipsec_2
There are 2 workarounds available that it is possible to choose to solve this problem.
Alternative 1:
This IP should be reachable from the partner IPsec node. In this case, use '10.100.10.1' for ipsec_1 and '10.100.20.1' for ipsec_2. 'Remote IP' is a dummy IP - it is not necessary to assign it to any interface.
SpokeB (root) # show system interface ipsec_1
SpokeB (root) # show system interface ipsec_2
To check the IP address used for performance SLA:
SpokeB (root) # get router info kernel 17
SpokeB (members) # show
The source IP can also be set on the health check directly (Starting with v7.2.0):
config system sdwan config health-check
To check the IP address used for performance SLA:
SpokeB (root) # get router info kernel 17
Now, health-check detects the status of the interfaces correctly:
SpokeB (root) # diagnose sys sdwan health-check
Related articles: Technical Tip: Configure IPsec VPN with SD-WAN Technical Tip: Use of 'link-monitor' to detect IPsec ESP (IPsec payload) being blocked |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.