Created on
01-11-2023
10:07 PM
Edited on
10-28-2025
04:36 AM
By
Jean-Philippe_P
| Description | This article describes how to confirm if the correct SD-WAN policy is used by a session. |
| Scope | FortiGate, SD-WAN, SD-WAN rules. |
| Solution |
Topology:
LAN (10.61.0.0/20)--- FortiGate A --- ADVPN --- FortiGate B-- LAN (10.14.0.0/20). LAN (10.61.0.0/20)--- FortiGate A --- port1 -- Internet.
FortiGate uses SD-WAN rule 1 for Internet traffic and SD-WAN rule 2 for traffic over VPN. diagnose sys sdwan service
Service(2): Address Mode(IPV4) flags=0x200 use-shortcut-sla Dst address(1):
Dst address(1):
Note: Starting from v7.4.4, the 'diagnose sys sdwan service' command is now divided into two separate commands for IPv4 and IPv6.
To confirm if the traffic is correctly matching the SD-WAN rule, run the following command to check the session list:
diagnose sys session filter clear <----- To make sure that no filter was applied before. diagnose sys session filter src <source address> diagnose sys session list
The output will be as follows:
session info: proto=1 proto_state=00 duration=15 expire=59 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
session info: proto=1 proto_state=00 duration=35 expire=59 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
The SD-WAN specific session information, sdwan_mbr_seq and sdwan_service_id, indicate the SD-WAN member ID and the SD-WAN rule ID in use, respectively. If the session matched the SD-WAN implicit rule and therefore was handled using standard FIB routing, those SD-WAN fields do not appear. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.