Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
mauirixxx
New Contributor

VIP' s, dual WAN fun, and more ....

Ok, so now I' m going to join the " How do I make WAN2 work" (basically) crowd. Let me pre-apologize for the length of this post, I' m just trying to be as thorough as possible. Current setup: WAN1, Cable ISP, Static IP address, everything works great for 2+ years, VIP' s get routed, etc WAN2, DSL ISP, Static IP address, just got turned on today (verified via my laptop configured with static IP info and plugged directly into the DSL modem). Now I know I need to do configuring with policy routing and probably some more configuration, but I did setup a VIP pointing from one of the static DSL IP addresses to a virtual linux server (when the VIP points to one of my static cable IP' s, it works), and try to FTP into it from my remote network in california (I' m based out of Hawaii) - it fails. So I need to know where I went wrong basically. Here is what the master plan is for the dual wan setup: keep all traffic incoming and outgoing on the cable modem, however, in the event of a cable outage, re-route all traffic to the DSL line. I know I have to recreate the cable VIP setup on the DSL side, and create new public DNS entries for failover duties so e-mail keeps flowing. So here is what I have configured so far: System -> Network -> wan1 (CABLE): Manual address mode; IP/Netmask: 67.52.67.90/255.255.255.248; Admin access=Ping; Administrative status=Up System -> Network -> wan2 (DSL): Manual address mode; IP/Netmask: 72.253.160.96/255.255.255.0; Admin access=Ping; Administrative access=Up System -> Network -> Options -> DNS Settings: I run my own DNS servers (and they forward to OpenDNS), but I have the DNS from my cable ISP entered, and I have enabled DNS forwarding from " internal" . Dead gateway detection is set to 5 seconds and 5 pings. System -> Config -> Operation = NAT (obviously? lol) Router -> Static -> Static Route: IP/Mask is set to 0.0.0.0/0.0.0.0 on all 4 entries. Gateways are (in order top to bottom): 192.168.10.1 wan1 distance=10 67.52.67.89 wan1 distance=1 72.253.160.1 wan2 distance=3 192.168.10.1 wan2 distance=10 I have NO policy routes set (yet?). I have also configured NOTHING in Router -> Dynamic. Under Firewall -> Policy I have the following: internal(LAN) -> wan1(CABLE): source/destination=all, service=any, shedule=always, action=accept. internal(LAN) -> wan2(DSL): source/destination=all, service=any, schedule=always, action=accept. I have duplicated 2 VIP' s from the cable side of things to the DSL side of things as well, to which when I hit the public DSL IP from behind the FortiGate, it forwards it to the appropriate LAN IP (my virtual Linux server), yet when I attempt to hit our Linux website via one of my remote computers, it just times out. Clues to what I did wrong? I' ve been reading the routing forum for the past week trying to make sense of all this before I even had the DSL turned on. The forticare docs weren' t much help either :( Help me obi-wan kenobi' s! :p
Rick Payton, IT Support Morikawa & Associates http://www.mai-hawaii.com/ FortiGate-60 build 726 (retired) FortiGate-60B v4.0 build 328 MR2 Patch 8 FortiAnalyzer-100B v4.0 build 513 MR3
Rick Payton, IT Support Morikawa & Associates http://www.mai-hawaii.com/ FortiGate-60 build 726 (retired) FortiGate-60B v4.0 build 328 MR2 Patch 8 FortiAnalyzer-100B v4.0 build 513 MR3
2 REPLIES 2
UkWizard
New Contributor

Its explained here:- http://kc.forticare.com/default.asp?id=376&Lang=1&SID= but in essence, if you are happy to have the DSL as purely backup, then go for the redundancy setup, which is two default routes, one per wan interface with the CABLE one having a lower distance number. then setup ping servers on the two wan interfaces. so that when the pings stop, it will failback to the higher distance default route. But with this, you cannot use the wan2 when it hasnt failed over, just like what you are experiencing at the moment (ie the failed incoming 2nd vip). as the return traffic goes out via the first path, hence it fails.
UK Based Technical Consultant FCSE v2.5 FCSE v2.8 FCNSP v3 Specialising in Systems, Apps, SAN Storage and Networks, with over 25 Yrs IT experience.
UK Based Technical Consultant FCSE v2.5 FCSE v2.8 FCNSP v3 Specialising in Systems, Apps, SAN Storage and Networks, with over 25 Yrs IT experience.
mauirixxx
New Contributor

Ok from that link, it looks like if I' m going to stick with the master plan, I need to follow scenario #1, though scenario #3 seems to be the best way (and seemingly more complicated way). After giving it some thought, I' m going to go with #3 - now I' m assuming with #3, if I create a VIP on both links pointing to the same internal server, I should be able to hit the internal server from EITHER public IP, correct? Off to try and make sense of things, thanks for the response ukwizard! EDIT: Now if I' m reading this right, I need to muck around with Policy routing, and make both policies identical, save for making one policy point towards the cable link, and the other point towards the dsl link. Yes? EDIT #2: Ok, so far I have the distance on both gateways set to match each other. I have NOT set policy routes (yet), so all internal client initiated traffic is still going over the cable link. However, VIP' s work on both links now (tested via remote location). So far, so good. I' ll save the policy routing for later, when (if? :p ) I get a response back.
Rick Payton, IT Support Morikawa & Associates http://www.mai-hawaii.com/ FortiGate-60 build 726 (retired) FortiGate-60B v4.0 build 328 MR2 Patch 8 FortiAnalyzer-100B v4.0 build 513 MR3
Rick Payton, IT Support Morikawa & Associates http://www.mai-hawaii.com/ FortiGate-60 build 726 (retired) FortiGate-60B v4.0 build 328 MR2 Patch 8 FortiAnalyzer-100B v4.0 build 513 MR3
Labels
Top Kudoed Authors