Created on
11-01-2023
04:30 AM
Edited on
12-10-2025
07:08 AM
By
Jean-Philippe_P
| Description |
This article describes the SD-WAN usage-based (spillover) load-balance method’s interface selection behavior while member priorities are used. |
| Scope | FortiGate. |
| Solution |
As per the spillover load balancing algorithm, the highest priority member is used until bandwidth exceeds ingress and egress thresholds. Additional traffic is then sent through the next SD-WAN member.
The priority is often managed by manually configuring a priority value in the SD-WAN member configuration.
config system sdwan config members edit 1 set interface "tunnel-A" set zone "VPN" set spillover-threshold 90000 set ingress-spillover-threshold 90000 set priority 10 next edit 3 set interface "tunnel-B" set zone "VPN" set priority 20 next
Note: For the above configuration, member interface commands, i.e., 'set spillover-threshold' and 'set ingress-spillover-threshold', will be only available if load-balance-mode is set to 'usage-based' under SD-WAN.
Routing information: * i10.1.0.0/20 172.16.23.2 0 100 0 0 65002 65001 65000 ? <1/->
Routing entry for 10.1.0.0/20
Further information on why BGP selects tunnel-B over tunnel-A can be seen in Technical Tip: Usage of BGP multipath and description of the BGP NLRI table.
SD-WAN implicit rule with spillover as a load-balance method works only with static routes.
Configure a static route to override BGP routes. When a static route is configured, a priority value assigned to each SD-WAN member will be considered.
config router static edit 0 set dst 10.1.0.0 255.255.240.0 set distance 1 set sdwan-zone "VPN" next
Note: This is not a separate priority that can be configured specifically for the Spillover load-balancing algorithm. It is the same as the SD-WAN member priority; changing it here will also change the member priority in the SD-WAN zone configuration.
If any non-zero spillover threshold values are configured, traffic is routed through the SD-WAN interface member with the lowest priority; else, keep the priority the same and use interface order for preference.
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.