Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
khannie
New Contributor

Having problem splitting traffic.

I have FG100D with 2 running ISP. Task 1: I would like to split the smtp traffic going out from wan1 and internet traffic going out on wan2. How should I split it. Task 2 (if possible): If task 1 is working I would like to do fail-over. Example like if wan1 ISP down it fail-over to wan2 including smtp traffic and if wan2 ISP down it fail-over to wan1 including internet traffic. Is the above tasks possible to do?
9 REPLIES 9
emnoc
Esteemed Contributor III

Hi task #1 is simple with PBR ( policy based routing ) config router policy edit 1 set src 1.1.1.1 255.255.255.255 set protocol 25 set gateway 192.168.1.1 set output-device " wan1" next end the src would be your SMTP server and the next-hop gateway and interface need to be defined Task#2 is also simple You have host of option, but installing a 2nd route called a floating route would be the best option. Then use a next-hop gateway detect ( aka ping server ) config router static edit 1 set device " wan2" set gateway 192.168.2.1 set priority 50 next edit 2 set device " wan2" set gateway 192.168.2.1 set priority 100 next You should follow the kb on fail-over , redundant ISP, , ECMP & ping-server. http://docs-legacy.fortinet.com/cb/html/FOS_Cookbook/Install_advanced/cb_install-dual-internet.html You will find most topics have been discussed with design scenarios. The kb on fortinet site are useful but the search method can be frustrating. Always review the KB and DOCs. They also started throwing up howto videos. I hope this helps & enjoy your time on this forum.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
ede_pfau
SuperUser
SuperUser

@emnoc: edit 2 should be " wan1" , the second default route to the second WAN interface. And regarding failover: all true for static routing but...not for PBR. Policy routes won' t obey the routing metrics, they are always followed before routing table lookup. That' s where the FortiOS PBR has it' s limitations: if your PBR points SMTP traffic to WAN1 and WAN1 fails, SMTP traffic will go to Nirvana. (Hopefully, you prove me wrong.)

Ede


"Kernel panic: Aiee, killing interrupt handler!"
Ede"Kernel panic: Aiee, killing interrupt handler!"
khannie

I also think the PBR will not work for the failover process.
mickstrick_FTNT

Dead Gateway Detection would remove the policy route. You don' t need to specify a gateway for the PBR as this can be taken from the routing table (for the matching PBR egress interface).
ShrewLWD
Contributor

I have a question close to this... We have a Fortinet in an MPLS cloud, with VOIP phones leaving the Fortinet and terminating in the MPLS, and a secondary ISP attached to WAN2. If the internet at the head of the MPLS goes down, but the MPLS itself stays up, and I am pinging an external IP, the failover will happen to WAN2, but will the failover allow the VOIP phones to continue to function across WAN1, or will it stop all traffic? We are a little stuck getting failover to occur for just their internet traffic, but leave all the traffic needing to go into the MPLS to stay running across WAN1.
rbenassi

The failover will prevent wan1 to route any traffic if the ping server is dead. We have two different interfaces with different addressing behind the same ISP, maybe you could think about it. We are able to manage failover for different interfaces also with both linked to the same provider.
lightmoon1992
New Contributor

ECMP with DPD will work this out. DPD is meant to protect against logical failures (the interface may be physically up, but cannot process traffic). following articles may provide more details with examples: http://kb.fortinet.com/kb/viewContent.do?externalId=100137 Mohammad

Mohammad Al-Zard

 

Mohammad Al-Zard
dominikw
New Contributor II

Let me ask : do you have 2 ISP with two different pools if public IP ? if you talk about smtp traffic - do you mean outgoing traffic or incoming ? If you have your own smtp server and 2 different public IP you can set 2 MX records in DNS.

Dominik Weglarz, IT System Engineer

Dominik Weglarz, IT System Engineer
Istvan_Takacs_FTNT

Yes, it' s possible. Since you have 2 ISPs, I imagine you received 2 independent public IP pools/addresses. You BGP advertise one prefix via ISP1 and the other one via ISP2. Both BGP neighbors will advertise the default gateway to your FGT with ECMP (Equal Cost Multiple Path) applied and same distance, so you have to make sure different priority settings are applied on them. Whichever default has the lowest value in the priority field will be used as the primary route. You can then create a policy to force SMTP via ISP2 only even though the different priority will be used for everything else, e.g config router policy edit 1 set input-device " LAN_port1" set protocol 6 set start-port 25 set end-port 25 set output-device " WAN2" next end That may create asymmetric routing and the firewall will drop the response due to RPF (reverse past forwarding) check and with error " reverse path check fail, drop" , but it' s just a guess, because the source IP of the packets are coming from will be the one that' s advertised via ISP2, the response should go back the same way. You can configure the firewall though to enable asymmetric routing if that happens, but be aware that by doing this you are reducing the security level of your firewall since spoofed packets can now more easily traverse the firewall. Unfortunately the solution still won' t help during failover, you will manually have to change the policy routes to point at the working ISP, since you are forcing SMTP traffic through the secondary route. The DNS MX should have 2 records, 1 for the preferred IP via ISP2 and the 2nd points at the secondary IP via ISP2, so that should take care of the automatic failover. What I would suggest is to stage and test it first to make sure it behaves as you expect it. Also you may want to look at the new " virtual WAN" interface feature in FortiOS 5.2 It helps with some of the config to reduce the number of policies, etc. but the failover still need to be manually taken care of. Using a virtual WAN link for redundant Internet connections http://docs.fortinet.com/d/fortigate-using-a-virtual-wan-link-for-redundant-internet-connections
Labels
Top Kudoed Authors