greetings all,
I created two SLAs, they have the same settings (same interface participants, same SLA target, same link status metrics) but only with different detect server (probing target). SLA 1 probing 10.74.a,b, SLA 2 probing 172.29.x.y.
And, I added the two SLA under the same SD-WAN rule, which is with lowest cost (SLA)
the question is , what is the Boolean logic here? Let's say, 15 consecutive times of probing failure occurs to either one of the two (1 out of 2) SLAs , will the related interface become inactive? and will the SD-WAN switch to the secondary interface (the interface with higher cost)?
AND, what about if I add the two probing detect servers to the same SLA? and only use the one SLA under the SD-WAN rule?
Thanks,
Sean
Solved! Go to Solution.
Greetings!
If you have two separate Performance SLA Rules, both rules must fail simultaneously for the related interface to become inactive. Therefore, if only one of the two SLAs fails (e.g., 15 consecutive probing failures), the interface will not be marked as inactive, and the SD-WAN will not switch to the secondary interface.
When you configure multiple probing servers within a single SLA, it operates as an 'AND' circuit. This means that both probing servers must fail for the SLA to trigger a failure state. If only one server fails, the interface will remain active.
I hope I answered your query.
Regards!
Created on 03-09-2025 06:53 PM Edited on 03-09-2025 06:54 PM
great explanation, thanks a lot, we are almost there. Can you please review my thought here?
In practice, it seems both way :
can bring the same operational result.
In way 1, both SLA servers must fail to consider the SD-WAN member as dead. If either of them is reachable, the member is considered alive. So, in this scenario, the SD-WAN rule will not switch to the other interface if only one of the SLA server is unreachable.
In way 2, just like you mentioned, it also works in the same way as way one.
In my production, I used the way 2, because I also need visibility of each SLA performance in fortigate and FortiAnalyzer for both detect server, if I add the two server under a single SLA, then I don't have a good visibility for each of the server (as being illustrated Technical Tip: SD-WAN Performance SLA with Multiple Servers ). And I don't want the sd-wan trigger the failover if only 1 SLA fails, instead I want the failover to occur when both SLA fail (for 15 consecutive times, in my case).
I prefer to SLA monitor services the end users care about. O365 environment? Why not verify that office.com is reachable/performant? Similar targets are available for Google, AWS, or target your cloud-hosted ERP platform.
thanks,
this is a hybrid environment. We are monitoring the reachability to Azure.
Could you elaborate a bit more?
In my case, we applied 2 SLA under the same SD-WAN rule. Could you please help to review the post from Dhruvin_pate down below your post? And my supplementary post after that?
Greetings!
If you have two separate Performance SLA Rules, both rules must fail simultaneously for the related interface to become inactive. Therefore, if only one of the two SLAs fails (e.g., 15 consecutive probing failures), the interface will not be marked as inactive, and the SD-WAN will not switch to the secondary interface.
When you configure multiple probing servers within a single SLA, it operates as an 'AND' circuit. This means that both probing servers must fail for the SLA to trigger a failure state. If only one server fails, the interface will remain active.
I hope I answered your query.
Regards!
Created on 03-09-2025 06:53 PM Edited on 03-09-2025 06:54 PM
great explanation, thanks a lot, we are almost there. Can you please review my thought here?
In practice, it seems both way :
can bring the same operational result.
In way 1, both SLA servers must fail to consider the SD-WAN member as dead. If either of them is reachable, the member is considered alive. So, in this scenario, the SD-WAN rule will not switch to the other interface if only one of the SLA server is unreachable.
In way 2, just like you mentioned, it also works in the same way as way one.
In my production, I used the way 2, because I also need visibility of each SLA performance in fortigate and FortiAnalyzer for both detect server, if I add the two server under a single SLA, then I don't have a good visibility for each of the server (as being illustrated Technical Tip: SD-WAN Performance SLA with Multiple Servers ). And I don't want the sd-wan trigger the failover if only 1 SLA fails, instead I want the failover to occur when both SLA fail (for 15 consecutive times, in my case).
Hello Sean,
In way 1: It is correct , it will not move to another interface if either of them is reachable.
In way 2: it will not move to another interface unless particular SLA categorically being used in sdwan rules.
Regards!
thanks for the update, it is highly appreciated.
Now I am confused by way 2 from your reply. In my case I use both SLAs under the same SD-WAN rule, you can see all of them from the screenshot.
What is the difference as way 1?
hello Dhruvin,
by saying "particular SLA categorically being used in sdwan rules", you meant 1 (out of 2) particular SLA being used in SD-WAN rule. Am I understanding correctly?
In my case, both (2 out of 2) SLA are used. So, it should work in the same way as way 1, right?
hi Dhruvin,
could you please look into my reply and share your idea.I did need your input, pleeeeeeeeeeeeeeease!
love from your client
User | Count |
---|---|
2554 | |
1356 | |
795 | |
647 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.