Created on 11-01-2023 04:30 AM Edited on 09-30-2024 10:40 PM By Jean-Philippe_P
Description |
This article describes the SD-WAN usage-based (spillover) load-balance method’s interface selection behavior while member priorities are used. |
Scope | FortiGate. |
Solution |
As per the spillover load balancing algorithm, the highest priority member is used until bandwidth exceeds ingress and egress thresholds. Additional traffic is then sent through the next SD-WAN member.
The priority is often managed by manually configuring a priority value in the SD-WAN member configuration.
config system sdwan config members edit 1 set interface "tunnel-A" set zone "VPN" set spillover-threshold 90000 set ingress-spillover-threshold 90000 set priority 10 next edit 3 set interface "tunnel-B" set zone "VPN" set priority 20 next
However, SD-WAN will not consider member priorities when dynamic routing (BGP) is in use.
For the following routing entry pushed by BGP, interface tunnel-B is considered despite the priority set on the SD-WAN member interfaces (where tunnel-A is prioritized). FortiOS routes the traffic to 10.1.0.0/20 via tunnel-B (which is listed above tunnel-A in the route table) and it will never spill over.
Routing information: * i10.1.0.0/20 172.16.23.2 0 100 0 0 65002 65001 65000 ? <1/->
Routing entry for 10.1.0.0/20
Further information on why BGP selects tunnel-B over tunnel-A can be seen in Technical Tip: Usage of BGP multipath and description of the BGP NLRI table.
SD-WAN implicit rule with spillover as load-balance method works only with static routes.
Configure a static route to override BGP routes. When a static route is configured, a priority value assigned to each SD-WAN member will be considered.
config router static edit 0 set dst 10.1.0.0 255.255.240.0 set distance 1 set sdwan-zone "VPN" next
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.