//Chura CCIE, NSE7, CCSE+
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Ahead of the Threat. FCNSA v5 / FCNSP v5
Fortigate 1000C / 1000D / 1500D
//Chura CCIE, NSE7, CCSE+
Can't find any documentation specifying whether this works with IPSEC and SSL VPN. Anyone test this?
You won't find any documentation since the virtual-link is ECMP load-balance outbound traffic. The virtual-wan interface is also not selectable for a 1> ipsec termination 2> ssl-vpn termination
Look in the fortinet 5x beta forum and will find numerous posting about this.
PCNSE
NSE
StrongSwan
it would be very helpful if it can support IPSEC as you can failover based on latency
FCSNP 5, JNCIS-FW,JNCIA-SSL ,MCSE, ITIL.
Don't see how that would work plus the fact the virtual-wan-load interface is either src or WRR based. Than the peer would need 2 static vpn settings for both of your wan1 and wan2. If you need IPSEC vpn failover, build a 2nd vpn and use a tunnel monitor, define the 2nd tunnel to the 2nd WAN2 (2nd ISP uplink )
This feature is already in place btw.
PCNSE
NSE
StrongSwan
Don't see how that would work plus the fact the virtual-wan-load interface is either src or WRR based. Than the peer would need 2 static vpn settings for both of your wan1 and wan2. If you need IPSEC vpn failover, build a 2nd vpn and use a tunnel monitor, define the 2nd tunnel to the 2nd WAN2 (2nd ISP uplink )
This feature is already in place btw.
PCNSE
NSE
StrongSwan
That's what I figured. Being able to reduce duplication of policies across multiple wan interfaces is a nice side effect. But considering that you must remove the wan interfaces policies prior to moving to the functionality is a bummer. Would be nice if there was some type of transition where when moving this Virtual WAN Link have it take the policies from a WAN interface as the starting point in some automated fashion. The other gotcha I see with this is that once you go down this path won't you need to revert back to the non Virtual WAN Link implementation to support it on the existing wan interface(s)?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.