FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Description This article describes how to test FortiGate’s execute ping command to help the self-originating traffic follows the existing implemented SD-WAN rules.
Scope From version 6.2.4.
Solution By default, self-originating traffic, such as Syslog, FortiAnalyzer logging, FortiGuard services, remote authentication, and others, relies on routing table lookups to determine the egress interface that is used to initiate the connection. Policy routes generated by SD-WAN rules do not apply to this traffic.
To ping traffic, self-originating traffic can be configured to use SD-WAN rules: