So my questions are: 1. How does traffic shaping in the 50B/60B/60C compare to rate-limiting and policing in Cisco devices such as the ones listed above? Does it work well for both ingress and egress? 2. In the limited exposure I' ve had with a 50B (very impressed) there were some issues with SIP ALG and a particular SIP trunk provider (requiring that we disable it). If we configure the device in routing/transparent mode, are things like SIP ALG automatically disabled? We need the traffic to pass through Fortigate without any dynamic port mapping, etc.On #1, traffic shaping and packet priority is simple with a fortigate. In order to take advantage of TrafficShaping, you will need unique individual FWpolicies installed for the traffic that you will shape. So keep that in mind Also imho, traffic shapping on ingress is useless, you should rather shape the traffic at the egress and as close to the edge as possible. On #2, what' s specifically is the SIP problem with your SIP trunking and ALG? If your not doing any private-address-2-NAT/PAT translations, than dynamic ports openings should not be as critical. And lastly you should evaluate what you need? A router and firewall are not designed for the same functions and serve a different need. Let a router route data and a firewall perform it' s intended function. And yes a Firewall also does L3routing.
PCNSE
NSE
StrongSwan
ORIGINAL: emnoc Also imho, traffic shapping on ingress is useless, you should rather shape the traffic at the egress and as close to the edge as possible.Have you dealt with file sharing and large downloads lately?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
This device will be placed as close to the edge as possible. I understand that a router and firewall are not designed for the same functions and serve a different need. What I' m having a hard time grasping is that it appears the 50B/60B/60C can function as a pure router (without any firewall services) and can handle the throughput that we need in our application.Yes the Fortigate can act as a pure router, but it cannot act without firewall services. Remember that after configuring ip addresses on interfaces and routing whether dynamic or static. You need to create firewall policies to enable traffic flow. Creating firewall policies activates a " firewall service" which is the statefull firewall of the Fortigate. A statefull firewall keeps tracks of sessions going in and out of the firewall as oppose to a router which just passes on traffic. Since a Fortigate has limited resources its session tracking has its limits, for an FG60B that would be 70,000 sessions. So depending on your traffic once you hit the session limit I believe FG will start blocking new sessions. So its not just about the throughput performance, you have to take into account the session limits of the FG. FG is a great product just use where it was designed/built for. In my opinion Routing and L2 Switching is Cisco domain (no offense to HP procurve :) ). For the 2900 series router based on datasheet it can handle 75MBps traffic with other services enabled aside from routing.
Also imho, traffic shapping on ingress is useless, you should rather shape the traffic at the egress and as close to the edge as possible.I agree with this one since traffic has already consumed capacity on the link before the Fortigate/Router can even drop it. Some applications might even make the situation worse since after a drop it will request the dropped packet to be retransmitted.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1744 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.