Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
scheuri
New Contributor III

IPSec tunnels from Azure Fortigate VM to ZScaler and SD-WAN

Dear all

 

We have a Fortigate VM in Azure (6.4.10) which is supposed to have about six (6) IPSec tunnels to ZScaler.

The reason for that many tunnels: Each tunnel is supposed to only offer 400 Mbit/s (we tested 1 Gbit/s, but its still not enough).

 

This is why I wanted to configure six (or so) IPSec-Tunnels, then put them in one SD-WAN zone, use a single performance SLA and then use a SD-WAN Rule to ZScaler Entry Point (eg. 111.211.222.233) with "Maximize Bandwith". The hope was it will use all the IPSec tunnels.

 

However, I am failing at the routing (static route).

When configuring a single static route to 111.211.222.233 using one single tunnel, I can see the routing entry in the routing table - and it works.

However, using the SD WAN zone as interface in the static route results in NO entry in the routing table. None, whats'o'ever.

 

As far as I understand this is because my IPSec tunnels to ZScaler don't have any IP addresses allocated in the "system interface" part (no local ip or remote ip). According to my information ZScaler does not provide that.

 

Am I the only one failing at this part? Is there no solution for connecting the Azure clients via Fortigate VM to ZScaler IPSec and SDWAN?

 

Thanks for your help
Best regards
Stefan

1 Solution
akristof
Staff
Staff

Hello,

It is some time since I was dealing with SDWAN and Zscaler. But you shouldn't need to configure overlay IP address as gateway. You can, configure dummy IP address as here:

https://docs.fortinet.com/document/fortigate/6.4.1/sd-wan-deployment-with-zscaler/147525/configuring...

I would verify that the health-check is not removing all routes from routing-table because health-check is down. I would verify if I can see routes in routing database:

get router info routing-table database

Adrian

View solution in original post

2 REPLIES 2
akristof
Staff
Staff

Hello,

It is some time since I was dealing with SDWAN and Zscaler. But you shouldn't need to configure overlay IP address as gateway. You can, configure dummy IP address as here:

https://docs.fortinet.com/document/fortigate/6.4.1/sd-wan-deployment-with-zscaler/147525/configuring...

I would verify that the health-check is not removing all routes from routing-table because health-check is down. I would verify if I can see routes in routing database:

get router info routing-table database

Adrian
scheuri
New Contributor III

Good day Adrian

 

Thank you SO much for your reply.

I didn't add the underlay (internet connection) as SDWAN zone. I first tried to just add the IPsec tunnels to a SD-WAN Zone and gave them (in the SD-WAN-Zone as members) a fake/dummy IP address.

 

And that did it. After that the routing entries were there and the performance SLA for ALL the IPSec tunnels worked.

 

I understand that the underlay (internet connection) might at some point or with other features be necessary (we have internet as seperat SD-WAN Zone for branches), but in this particular instance it seems not necessary at the moment.

 

Again thanks a lot, much appreciated

Labels
Top Kudoed Authors