FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Nivedha
Staff
Staff
Article Id 242676
Description This article describes how to confirm if the correct SD-WAN policy is used by a session.
Scope FortiGate, SD-WAN, SD-WAN rules
Solution

Topology: 

 

LAN (10.61.0.0/20)--- FortiGate A --- ADVPN --- FortiGate B-- LAN (10.14.0.0/20)

LAN (10.61.0.0/20)--- FortiGate A --- port1 -- Internet

 

Nivedha_0-1673481102968.png

 

FortiGate uses SD-WAN rule 1 for Internet traffic and SD-WAN rule 2 for traffic over VPN.
The configuration can be checked using the following command

  # diag sys sdwan service

 

Service(2): Address Mode(IPV4) flags=0x200 use-shortcut-sla
Gen(1), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(manual)
Members(1):
1: Seq_num(2 NSY1-B1), alive, selected
Src address(1):
10.61.0.0-10.61.15.255

Dst address(1):
10.14.0.0-10.14.15.255


Service(1): Address Mode(IPV4) flags=0x200 use-shortcut-sla
Gen(1), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(manual)
Members(1):
1: Seq_num(4 port1), alive, selected
Src address(1):
10.61.0.0-10.61.15.255

Dst address(1):
0.0.0.0-255.255.255.255

 

To confirm if the traffic is correctly matching the SD-WAN rule, run the following command to check the session list:

 

        diag sys session filter clear <----- To make sure that no filter was applied before.

diag sys session filter src <source address>

diag sys session list

 

The output will be as follows:

 

session info: proto=1 proto_state=00 duration=15 expire=59 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255
state=may_dirty
statistic(bytes/packets/allow_err): org=960/16/1 reply=960/16/1 tuples=2
tx speed(Bps/kbps): 62/0 rx speed(Bps/kbps): 62/0
orgin->sink: org pre->post, reply pre->post dev=4->3/3->4 gwy=10.56.243.254/10.61.2.39
hook=post dir=org act=snat 10.61.2.39:1->8.8.8.8:8(10.56.242.32:60417)
hook=pre dir=reply act=dnat 8.8.8.8:60417->10.56.242.32:0(10.61.2.39:1)
misc=0 policy_id=1 pol_uuid_idx=14742 auth_info=0 chk_client_info=0 vd=0
serial=00006f69 tos=ff/ff app_list=0 app=0 url_cat=0
sdwan_mbr_seq=1 sdwan_service_id=1  <----- Indicates the service ID.
rpdb_link_id=ff000001 ngfwid=n/a
npu_state=0x000100
no_ofld_reason: npu-flag-off

 

 

session info: proto=1 proto_state=00 duration=35 expire=59 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255
state=may_dirty npu
statistic(bytes/packets/allow_err): org=900/15/1 reply=900/15/1 tuples=2
tx speed(Bps/kbps): 35/0 rx speed(Bps/kbps): 35/0
orgin->sink: org pre->post, reply pre->post dev=4->23/23->4 gwy=10.56.242.13/10.61.2.39
hook=post dir=org act=snat 10.61.2.39:1->10.14.2.13:8(192.168.2.2:60417)
hook=pre dir=reply act=dnat 10.14.2.13:60417->192.168.2.2:0(10.61.2.39:1)
misc=0 policy_id=2 pol_uuid_idx=14744 auth_info=0 chk_client_info=0 vd=0
serial=00006ec1 tos=ff/ff app_list=0 app=0 url_cat=0
sdwan_mbr_seq=3 sdwan_service_id=2 <----- Indicates the service id.
rpdb_link_id=ff000002 ngfwid=n/a
npu_state=0x000100
npu info: flag=0x82/0x00, offload=0/0, ips_offload=0/0, epid=0/0, ipid=0/0, vlan=0x0000/0x0000
vlifid=0/0, vtag_in=0x0000/0x0000 in_npu=0/0, out_npu=0/0, fwd_en=0/0, qid=0/0
no_ofld_reason:
ofld_fail_reason(kernel, drv): none/not-established, none(0)/none(0)
npu_state_err=00/04
total session 2