Hi all,
I'm an experienced network guy with 28 years of experience, but it's all Cisco. I'm new to Fortinet.
Here's my question: I'm working on a design for a customer with multiple satellite offices that connect back to two datacenters (primary and DR). They are all interconnected with two layer-2 ELAN WAN meshes. I want to centralize all of my routing onto the Fortigate firewalls at each location. But because the WAN links are from two separate vendors each Fortigate is going to have two physical handoffs, one to each vendor's network.
My plan is to create a WAN zone on each Fortigate and then put both physical interfaces in that same zone. (I don't need any filtering/firewalling between those interfaces.) I'm trying to find out if I am going to run into any asymmetric routing issues. The WAN circuits will be load balanced so I can't promise that packets from a particular session that go out on one vendor's circuit won't return on the other vendor's circuit. I could see this breaking stateful firewalling since the return packets will be on a different physical interface. But I could also see it working because the session's return packets will still be in the same zone.
Does anyone know if I'll run into issues here? In sum I'm looking to find out if the session based stateful firewalling references the physical interface like an ASA would, or whether it's by zone and doesn't care about the physical interface.
Thanks,
Ben
Solved! Go to Solution.
Hi Weber
It is by interface.
You may also check this link if it can help.. You can keep good security level if you use auxiliary sessions instead of enabling asymmetric routing.
zone(s) in Fortinet world doesnt really have any routing benefits, more for grouping of interfaces and least amount firewall rules needed to be configured.
you should look into sdwan, cuz in your case it would benefit you
I mean it is by interface, not by zone, when replying to your question:
In sum I'm looking to find out if the session based stateful firewalling references the physical interface like an ASA would, or whether it's by zone and doesn't care about the physical interface.
On the other hand, enabling asymmetric routing is done globally on the FGT.
And as told above, try use auxiliary sessions instead of asym routing, in order to preserve security.
Asym routing was a very good technique in ancient world but it is not anymore with today's security challenges.
Hi Weber
It is by interface.
You may also check this link if it can help.. You can keep good security level if you use auxiliary sessions instead of enabling asymmetric routing.
That might be an option. But from that article it doesn't look like asymmetric routing can be enabled on just one interface or zone? These firewalls also handle the internet edge so I wouldn't be able to jeopardize antivirus or ID functionality.
I wonder if I could do one physical interface with a secondary IP for one of the WAN networks. That would put it all on one zone . . .
I mean it is by interface, not by zone, when replying to your question:
In sum I'm looking to find out if the session based stateful firewalling references the physical interface like an ASA would, or whether it's by zone and doesn't care about the physical interface.
On the other hand, enabling asymmetric routing is done globally on the FGT.
And as told above, try use auxiliary sessions instead of asym routing, in order to preserve security.
Asym routing was a very good technique in ancient world but it is not anymore with today's security challenges.
Yeah, it sounds like asymmetric routing is a no go. I'll look more into the auxiliary routing. I'm thinking too that if I use different interfaces on all Fortigates they shouldn't respond on the wrong circuit for the same issues with asymmetry on both ends. I'll have to map that out more. But basically if all Fortigates have an A and a B WAN connection then wouldn't a firewall at the satellite site know already that a session established on connection A needs to use connection A for return traffic.
To answer some of those questions I'm going to need to learn more about what the customer is looking for.
B
zone(s) in Fortinet world doesnt really have any routing benefits, more for grouping of interfaces and least amount firewall rules needed to be configured.
you should look into sdwan, cuz in your case it would benefit you
SD WAN is a future hope for this network, but not one they are ready for yet. And I'm never going to get to the point where all of the satellite nodes are Fortigate so I'm still going to have to accommodate some that may be Cisco or Aruba unfortunately.
Thanks all. Getting back to this. It looks like you can set up asymmetric routing if it's in its own VDOM. So that's what we're going to try. We don't need much by way of filtering across the WAN so we figure peeling off a dedicated VDOM will allow us to use the FGT more like a WAN router.
User | Count |
---|---|
2559 | |
1357 | |
795 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.