SD-WAN With FOS FMG-7.4.x-New Features
SD-WAN With FOS FMG-7.4.x-New Features
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 5
Overview 6
What's new in 7.4.0 6
What's new in 7.4.1 7
ADVPN 8
Add option to keep sessions in established ADVPN shortcuts while they remain in SLA 8
Example configuration 9
Active SIM card switching available on FortiGates with cellular modem and dual SIM card
support 14
Example 1 15
Example 2 16
Active dynamic BGP neighbor triggered by ADVPN shortcut 7.4.1 18
How this solution differs from typical SD-WAN with ADVPN 19
Example 19
Monitoring 29
Logging FortiMonitor-detected performance metrics 29
Example 29
SD-WAN Monitoring Map integrates with Cloud Assisted Monitoring Service to allow FGT
interface speed tests from inside FMG FMG 32
SD-WAN monitoring map enhancements FMG 35
Improve client-side settings for SD-WAN network monitor 7.4.1 39
Summary of related CLI commands 39
Examples 40
Multiple interface monitoring for IPsec 7.4.1 51
SD-WAN Cloud Assisted Monitoring service widgets FAZ 7.4.1 57
Provisioning 62
Automated SD-WAN post overlay process creates policies to allow the health-check
traffic to flow between Branch and HUB FMG 62
Automated SD-WAN overlay process adds "branch_id" meta variable auto assignment
FMG 65
Fortinet factory-default wireless and extender templates FMG 67
SD-WAN template for heterogeneous WAN link types FMG 74
Support the new SD-WAN Overlay-as-a-Service 7.4.1 76
Fabric Authorization Template is integrated with Device Blueprint and supports meta
variables FMG 7.4.1 79
Routing 83
Using MP-BGP EVPN with VXLAN 83
Basic MP-BGP EVPN configuration 85
Example 86
Add route tag address objects 94
Allow better control over the source IP used by each egress interface for local out traffic 96
Example configurations 97
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 3
Fortinet Inc.
BGP conditional advertisements for IPv6 prefix when IPv4 prefix conditions are met and
vice-versa 104
DS-Lite example 104
SD-WAN multi-PoP multi-hub large scale design and failover 7.4.1 109
Outgoing path control 111
Incoming path control 112
Neighbor group configuration 112
Example 113
SD-WAN steering 129
Classifying SLA probes for traffic prioritization 129
Example 129
Support IPv6 application based steering in SD-WAN 134
Example 135
Using a single IKE elector in ADVPN to match all SD-WAN control plane traffic 139
Example 139
VRF-aware SD-WAN IPv6 health checks 147
Support maximize bandwidth (SLA) to load balance spoke-to-spoke traffic between
multiple ADVPN shortcuts 148
Example 149
Allow multicast traffic to be steered by SD-WAN 155
Example 1 156
Example 2 160
Support HTTPS performance SLA health checks 7.4.1 169
Example 1: applying a default HTTPS health check: 169
Example 2: configuring an IPv6 health check with HTTPS 170
Using load balancing in a manual SD-WAN rule without configuring an SLA target 7.4.1 171
Service 172
Overlay as a Service 172
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 4
Fortinet Inc.
Change Log
2023-05-11 Initial release for FortiOS 7.4.0. See What's new in 7.4.0 on page 6.
2023-05-15 Updated to include FortiManager 7.4.0 features. See What's new in 7.4.0 on page 6.
2023-07-19 Updated Active SIM card switching available on FortiGates with cellular modem and dual SIM
card support on page 14.
2023-08-31 Updated to include FortiOS and FortiManager 7.4.1 features. See What's new in 7.4.1 on page
7.
2023-10-30 Added SD-WAN Cloud Assisted Monitoring service widgets FAZ 7.4.1 on page 57.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 5
Fortinet Inc.
Overview
This guide provides details of new features for SD-WAN introduced in FortiOS 7.4, FortiManager 7.4, and FortiAnalyzer
7.4.
l What's new in 7.4.1 on page 7
For each feature, the guide provides detailed information on configuration, requirements, and limitations, as applicable.
For features introduced in FortiManager or FortiAnalyzer, the short product name is appended to the end of the topic
heading, for example FMG or FAZ: SD-WAN monitoring map enhancements FMG on page 35.
For features introduced in 7.4.1 and later versions, the version number is appended to the end of the topic heading. For
example, Multiple interface monitoring for IPsec 7.4.1 on page 51 was introduced in 7.4.1. If a topic heading has no
version number at the end, the feature was introduced in 7.4.0.
For features introduced in FortiManager or FortiAnalyzer 7.4.1 and later versions, the short product name and version
number are appended to the end of the topic heading.
For example, Fabric Authorization Template is integrated with Device Blueprint and supports meta variables FMG 7.4.1
on page 79 was introduced in FortiManager 7.4.1.
Feature Details
ADVPN l Add option to keep sessions in established ADVPN shortcuts while they
remain in SLA on page 8
l Active SIM card switching available on FortiGates with cellular modem and
dual SIM card support on page 14
Provisioning l Automated SD-WAN post overlay process creates policies to allow the
health-check traffic to flow between Branch and HUB FMG on page 62
l Automated SD-WAN overlay process adds "branch_id" meta variable auto
assignment FMG on page 65
l Fortinet factory-default wireless and extender templates FMG on page 67
l SD-WAN template for heterogeneous WAN link types FMG on page 74
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 6
Fortinet Inc.
Overview
Feature Details
SD-WAN steering l Classifying SLA probes for traffic prioritization on page 129
l Support IPv6 application based steering in SD-WAN on page 134
l Using a single IKE elector in ADVPN to match all SD-WAN control plane
traffic on page 139
l VRF-aware SD-WAN IPv6 health checks on page 147
l Support maximize bandwidth (SLA) to load balance spoke-to-spoke traffic
between multiple ADVPN shortcuts on page 148
l Allow multicast traffic to be steered by SD-WAN on page 155
Feature Details
ADVPN l Active dynamic BGP neighbor triggered by ADVPN shortcut 7.4.1 on page 18
Monitoring l Improve client-side settings for SD-WAN network monitor 7.4.1 on page 39
l Multiple interface monitoring for IPsec 7.4.1 on page 51
l SD-WAN Cloud Assisted Monitoring service widgets FAZ 7.4.1 on page 57
Routing l SD-WAN multi-PoP multi-hub large scale design and failover 7.4.1 on page
109
SD-WAN steering l Support HTTPS performance SLA health checks 7.4.1 on page 169
l Using load balancing in a manual SD-WAN rule without configuring an SLA
target 7.4.1 on page 171
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 7
Fortinet Inc.
ADVPN
ADVPN
7.4.0
l Add option to keep sessions in established ADVPN shortcuts while they remain in SLA on page 8
l Active SIM card switching available on FortiGates with cellular modem and dual SIM card support on page 14
7.4.1
l Active dynamic BGP neighbor triggered by ADVPN shortcut 7.4.1 on page 18
In an SD-WAN hub and spoke configuration where ADVPN is used, when a primary shortcut goes out of SLA, traffic
switches to the backup shortcut. During idle timeout, sessions will prefer using the primary parent tunnel and try to
establish a new primary shortcut. However, because it is out of SLA, traffic switches back to the backup shortcut, which
causes unnecessary traffic interruption.
The shortcut-stickiness option keeps existing sessions on the established ADVPN shortcuts while they remain in
SLA instead of switching to a new link every idle timeout. New sessions will be routed through the primary shortcut if it is
in SLA.
config system sdwan
config service
edit <id>
set shortcut-stickiness {enable | disable}
next
end
end
Use case 1:
1. The sessions will switch over to the backup shortcut due to the primary shortcut being out of SLA.
2. After an idle timeout, the primary shortcut is torn down, and the routes will be reinstalled on the primary parent
tunnel.
3. When shortcut-stickiness is enabled, even though the primary parent tunnel is preferred, established
ADVPN sessions will remain on the backup shortcut (stickiness) instead of switching to the primary parent tunnel.
4. New sessions will be routed to the primary parent tunnel and trigger the primary shortcut, then traffic switches to the
primary shortcut if it is in SLA.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 8
Fortinet Inc.
ADVPN
Use case 2:
1. The sessions will switch over to the backup shortcut due to the primary shortcut being out of SLA.
2. After some time, the primary shortcut becomes in SLA.
3. When shortcut-stickiness is enabled, even though primary shortcut is preferred, established ADVPN
sessions will remain on the backup shortcut (stickiness) instead of switching to the primary shortcut.
4. New sessions will be routed through the primary shortcut.
Example configuration
The following example demonstrates using the shortcut-stickiness option in use case 1.
After an idle timeout occurs, existing sessions remain on the spoke12-p1_0 backup shortcut tunnel. New sessions will try
to create a shortcut over spoke11-p1, but will fall back to spoke12-p1_0 when it detects spoke11-p1 is out of SLA.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 9
Fortinet Inc.
ADVPN
set members 1 2
config sla
edit 1
next
end
next
end
config service
edit 1
set name "1"
set shortcut-stickiness enable
set mode sla
set dst "all"
set src "10.1.100.0"
config sla
edit "1"
set id 1
next
end
set priority-members 1 2
next
end
end
Dst address(1):
0.0.0.0-255.255.255.255
The SD-WAN service rule prefers the primary parent tunnel (spoke11-p1) over the backup parent tunnel
(spoke12-p1) before shortcuts are established.
3. Send traffic from PC-1 to PC-2 to trigger the primary shortcut. Verify the diagnostics.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 10
Fortinet Inc.
ADVPN
The SD-WAN service rule sends traffic to the parent tunnel (spoke11-p1) initially, and then switches to the
primary shortcut tunnel (spoke11-p1_0) once it is established.
b. Verify the service status:
# diagnose sys sdwan service
Dst address(1):
0.0.0.0-255.255.255.255
The SD-WAN service rule prefers the primary shortcut tunnel (spoke11-p1_0) over other tunnels.
4. Make the primary shortcut be out of SLA. The traffic will switch to the backup parent tunnel and trigger the backup
shortcut. Verify the diagnostics.
a. Run a sniffer trace:
# diagnose sniffer packet any 'host 192.168.5.44' 4
interfaces=[any]
filters=[host 192.168.5.44]
20.588046 port2 in 10.1.100.22 -> 192.168.5.44: icmp: echo request
20.588157 spoke12-p1 out 10.1.100.22 -> 192.168.5.44: icmp: echo request
20.588791 spoke12-p1 in 192.168.5.44 -> 10.1.100.22: icmp: echo reply
20.588876 port2 out 192.168.5.44 -> 10.1.100.22: icmp: echo reply
21.589079 port2 in 10.1.100.22 -> 192.168.5.44: icmp: echo request
21.589190 spoke12-p1_0 out 10.1.100.22 -> 192.168.5.44: icmp: echo request
21.589661 spoke12-p1_0 in 192.168.5.44 -> 10.1.100.22: icmp: echo reply
21.589733 port2 out 192.168.5.44 -> 10.1.100.22: icmp: echo reply
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 11
Fortinet Inc.
ADVPN
When the primary shortcut tunnel goes out of SLA (spoke11-p1_0, alive, sla(0x0)), traffic reroutes to the
backup parent tunnel (spoke12-p1) and then to the backup shortcut tunnel (spoke12-p1_0) once established.
b. Verify the service status:
# diagnose sys sdwan service
Dst address(1):
0.0.0.0-255.255.255.255
Dst address(1):
0.0.0.0-255.255.255.255
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 12
Fortinet Inc.
ADVPN
6. Send new traffic from PC1 to PC2. The traffic is routed to the primary parent tunnel and triggers the primary
shortcut, then traffic will switch to the primary shortcut if it is in SLA. Verify the connection.
a. Run a sniffer trace:
# diagnose sniffer packet any 'host 192.168.5.4' 4
interfaces=[any]
filters=[host 192.168.5.4]
17.120310 port2 in 10.1.100.22 -> 192.168.5.4: icmp: echo request
17.120475 spoke11-p1 out 10.1.100.22 -> 192.168.5.4: icmp: echo request
17.121096 spoke11-p1 in 192.168.5.4 -> 10.1.100.22: icmp: echo reply
17.121151 port2 out 192.168.5.4 -> 10.1.100.22: icmp: echo reply
18.121331 port2 in 10.1.100.22 -> 192.168.5.4: icmp: echo request
18.121480 spoke11-p1_0 out 10.1.100.22 -> 192.168.5.4: icmp: echo request
18.121954 spoke11-p1_0 in 192.168.5.4 -> 10.1.100.22: icmp: echo reply
18.122007 port2 out 192.168.5.4 -> 10.1.100.22: icmp: echo reply
...
At first, traffic tries to go to the primary parent tunnel so that it can trigger the primary shortcut to establish. The
primary shortcut (spoke11-p1_0) is in SLA and new traffic flows through it.
...
14.194066 port2 in 10.1.100.22 -> 192.168.5.4: icmp: echo request
14.194247 spoke12-p1_0 out 10.1.100.22 -> 192.168.5.4: icmp: echo request
14.194499 spoke12-p1_0 in 192.168.5.4 -> 10.1.100.22: icmp: echo reply
14.194565 port2 out 192.168.5.4 -> 10.1.100.22: icmp: echo reply
15.195093 port2 in 10.1.100.22 -> 192.168.5.4: icmp: echo request
15.195174 spoke12-p1_0 out 10.1.100.22 -> 192.168.5.4: icmp: echo request
15.195326 spoke12-p1_0 in 192.168.5.4 -> 10.1.100.22: icmp: echo reply
15.195361 port2 out 192.168.5.4 -> 10.1.100.22: icmp: echo reply
After the primary shortcut goes out of SLA, the traffic switches to the backup shortcut (spoke12-p1_0).
b. Verify the service status:
# diagnose sys sdwan service
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 13
Fortinet Inc.
ADVPN
3: seq_num(2), interface(spoke12-p1):
1: spoke12-p1_0(66)
Members(4):
1: Seq_num(1 spoke11-p1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
2: Seq_num(2 spoke12-p1_0), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
3: Seq_num(2 spoke12-p1), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
4: Seq_num(1 spoke11-p1_0), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
Src address(1):
10.1.100.0-10.1.100.255
Dst address(1):
0.0.0.0-255.255.255.255
New traffic switches back to the backup shortcut while the primary shortcut is still out of SLA.
FortiGates with a cellular modem and dual SIM card can switch in real time from the active SIM card to the passive SIM
card when any of the following issues arise with the active SIM card:
l Ping link monitor fails. The SIM switch time depends on the link monitor parameters set.
l An active SIM card cannot be detected. The SIM switch time is about 20 seconds after the SIM card is no longer
detected.
l A modem disconnection is detected, and a specified interval has elapsed. The SIM switch time occurs after the
specified interval.
SIM card switching events are captured in the FortiGate event log.
In most cases, SIM cards come with the wireless carrier's APN, which is automatically
retrieved at the first connection of the LTE modem. For these cases, you can use SIM cards for
different wireless carriers in SIM slot 1 and slot 2.
When one or both SIM cards require their APN settings to be configured on the FortiGate, then
both SIM cards should be for the same wireless carrier because config system lte-
modem currently only supports a single set apn < apn > setting.
The following command and options can be used to configure this feature:
config system lte-modem
config sim-switch
set by-sim-state {enable | disable}
set by-connection-state {enable | disable}
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 14
Fortinet Inc.
ADVPN
the active SIM card, such as when the active SIM card is ejected.
l disable: do not switch SIM cards based on state.
by-connection-state Enable switching based on the connection state of the active SIM card:
{enable | disable} l enable: switch to the passive SIM card whenever FortiGate detects a
link-monitor-name fails.
l disable: do not switch SIM cards based on the failure of a configured link
monitor.
link-monitor <link- Specify the name of the link monitor to use with by-link-monitor.
monitor-name>
sim-switch-log-alert- Identify what number of constant SIM card switch events will trigger an event log
interval <interval> after the threshold in sim-switch-log-alert-threshold is met.
sim-switch-log-alert- Specify how many minutes to wait before creating an event log when the number
threshold of SIM card switches defined in sim-switch-log-alert-interval is met.
modem-disconnection-time Specify how many seconds to wait before switching over to the passive SIM card
<integer> when by-connection-state is enabled and a modem signal loss is detected.
Example 1
In this example, automatic SIM card switching is disabled. When disabled, the SIM card only works in the default slot1,
but you can manually switch the SIM card to slot2. Event logs include details about the SIM card switch.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 15
Fortinet Inc.
ADVPN
2. Manually switch the SIM card from slot1 to slot2, and run the following command:
The SIM card switch may take a few seconds. You can run diagnose system lte-modem sim-info to check
the results.
The following log is generated after unplugging an active SIM card:
7: date=2023-05-02 time=10:41:05 eventtime=1683049264795418820 tz="-0700"
logid="0100046518" type="event" subtype="system" level="information" vd="root"
logdesc="LTE modem active SIM card switch event" msg="LTE modem active SIM card slot
changed to 2 by user."
Example 2
In this section, automatic SIM card switching is enabled and configured to switch based on SIM state, connection state,
or link monitor state, and it includes example event logs for each scenario.
With this configuration, the second SIM card becomes active when the active SIM card is no longer detected, for
example, if the active SIM card is ejected. The following event logs are generated:
5: date=2023-04-28 time=17:27:27 eventtime=1682728046989682780 tz="-0700"
logid="0100046513" type="event" subtype="system" level="information" vd="root"
logdesc="LTE modem data link connection event" msg="LTE modem data link changed from
QMI_WDS_CONNECTION_STATUS_DISCONNECTED to QMI_WDS_CONNECTION_STATUS_CONNECTED"
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 16
Fortinet Inc.
ADVPN
With this configuration, the second SIM card becomes active when the modem cannot establish a connection with
the carrier through the active SIM card. For example, a FortiGate is in a room with poor signal quality. With this
configuration, the SIM card switch is triggered after the modem is detected as disconnected for 30 seconds, and the
following event log is generated:
56: date=2023-05-01 time=11:14:56 eventtime=1682964896356933480 tz="-0700"
logid="0100046519" type="event" subtype="system" level="notice" vd="root" logdesc="LTE
modem active SIM card switched: modem disconnection detected" msg="LTE modem active SIM
card slot changed to 2, due to modem connection down."
When poor signal quality causes SIM cards to frequently switch back and forth, and the flapping rate occurs more
than five times within the configured 15 minute time period, an event log is triggered to record the flapping severity:
65: date=2023-05-01 time=11:14:13 eventtime=1682964853083194400 tz="-0700"
logid="0100046521" type="event" subtype="system" level="warning" vd="root" logdesc="LTE
modem active SIM card slot flipped back and forth in short time" msg="LTE modem switched
SIM slot 8 times in last 15 minutes, which is greater than 5 times threshold."
1. Enable automatic SIM card switching by link monitor, and specify the link monitor:
config system lte-modem
config sim-switch
set by-link-monitor enable
set link-monitor "modem"
set sim-switch-log-alert-interval 15
set sim-switch-log-alert-threshold 5
end
config system link-monitor
edit "modem"
set srcintf "wwan"
set server "8.8.8.8"
set interval 1000
set probe-timeout 100
set failtime 3
set recoverytime 8
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 17
Fortinet Inc.
ADVPN
With this configuration, the second SIM card becomes active when the link monitor detects the active SIM card
exceeds the SLA.
2. Check the link monitor status. In this example, the link monitor status is dead:
# diagnose system link-monitor status modem
Link Monitor: modem, Status: dead, Server num(1), cfg_version=7 HA state: local(dead),
shared(dead)
Flags=0x9 init log_downgateway, Create time: Fri Apr 28 16:34:56 2023
Source interface: wwan (19)
VRF: 0
Interval: 1000 ms
Service-detect: disable
Diffservcode: 000000
Class-ID: 0
Peer: 8.8.8.8(8.8.8.8)
Source IP(10.192.195.164)
Route: 10.192.195.164->8.8.8.8/32, gwy(10.192.195.165)
protocol: ping, state: dead
Packet lost: 11.667%
MOS: 4.353
Number of out-of-sequence packets: 0
Recovery times(5/8) Fail Times(1/3)
Packet sent: 60, received: 56, Sequence(sent/rcvd/exp): 61/61/62
The following event log is generated when the link-monitor status is dead:
15: date=2023-04-28 time=16:31:38 eventtime=1682724697936494139 tz="-0700"
logid="0100046520" type="event" subtype="system" level="notice" vd="root" logdesc="LTE
modem active SIM card switched: link monitor probe failure detected" msg="LTE modem
active SIM card slot changed to 2, due to link monitor probe failures."
When a customer using SD-WAN with ADVPN has numerous IPv4 and IPv6 routes per spoke and there are many
spokes in the topology, using ADVPN with a route reflector-based design poses the following challenges:
l The hub FortiGate will experience high CPU usage due to the amount of processing required to reflect the routes to
the spoke FortiGates.
l Spoke FortiGates will learn many unnecessary routes.
For such cases, it is more suitable to deploy an IPv4- and IPv6-supported solution without a route-reflector that involves
an active dynamic BGP neighbor triggered by an ADVPN shortcut. This solution allows a spoke FortiGate to form a BGP
neighbor with another spoke FortiGate only after the shortcut tunnel between them has been established. As a result, the
spoke only learns routes from its BGP neighbors.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 18
Fortinet Inc.
ADVPN
In a topology where the Spoke 1 and Spoke 2 FortiGates are connected directly to the Hub FortiGate, route reflection will
not be enabled. The Hub FortiGate is only configured with each spoke's summary route. An ADVPN shortcut tunnel is
established between the Spoke 1 and Spoke 2 FortiGates. The valid routing between the Spoke 1 and Spoke 2
FortiGate is still through the Hub FortiGate at this point.
When a host behind Spoke 1 tries to connect to a host behind Spoke 2, Spoke 1 first reaches the Hub based on the valid
routing table. The Hub determines that the destination is reachable, and the ADVPN shortcut tunnel between the spokes
is established. Then, Spoke 1 and Spoke 2 will actively initiate a BGP connection to each other over the shortcut. Once
established, they will exchange their routing information using BGP. On both spokes, BGP will resolve those routes on
the shortcut and update the routing table accordingly.
For this solution, the following IPv4/IPv6 BGP configuration settings are required:
l The hub FortiGate should be configured with neighbor-group and neighbor-range/neighbor-range6.
l Each spoke FortiGate should be configured with neighbor-group and neighbor-range/neighbor-range6
like the hub. More importantly, each spoke should be configured with set passive disable to ensure spokes
are able to initiate dynamic BGP connections between each other.
l The hub FortiGate should have route reflection disabled (by default) where each neighbor-group setting should
have set route-reflector-client disable.
In the configuration, each of the spokes will form a BGP neighbor relationship with the hub. This is unchanged from the
typical SD-WAN with ADVPN configuration.
Example
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 19
Fortinet Inc.
ADVPN
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 20
Fortinet Inc.
ADVPN
end
config network
edit 2
set prefix 10.200.1.0 255.255.255.0
next
edit 4
set prefix 33.0.0.0 255.0.0.0
next
edit 5
set prefix 22.0.0.0 255.0.0.0
next
end
config network6
edit 4
set prefix6 2001:33::/32
next
edit 2
set prefix6 2001:22::/32
next
end
end
b. For IPv6:
config router static6
edit 33
set dst 2001:33::/32
set blackhole enable
set vrf 0
next
edit 22
set dst 2001:22::/32
set blackhole enable
set vrf 0
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 21
Fortinet Inc.
ADVPN
l 2001:33::/32
l 2001:22::/32
Because route reflection has been disabled in this example, initially, Spoke 1 will not know the local subnet of Spoke 2,
and Spoke 2 will not know the local subnet of Spoke 1. Therefore, for traffic routing, summary routes are configured on
the hub as blackhole routes and then advertised to the spokes using BGP.
For example, for traffic from the local subnet of Spoke 2 destined for the local subnet of Spoke 1:
l For the IPv4 case, the summary route 22.0.0.0/8, which includes the local subnet of Spoke 1 (22.1.1.0/24), is
advertised to Spoke 2. When Spoke 2 sends traffic destined for 22.1.1.0/24 to the Hub, the Hub forwards this traffic
to Spoke 1 since they are BGP neighbors.
l For the IPv6 case, the summary route 2001:22::/32, which includes the local subnet of Spoke 1 (2001:22::/64), is
advertised to Spoke 2. When Spoke 2 sends traffic destined for 2001:22::/64 to the Hub, the Hub forwards this traffic
to Spoke 1 since they are BGP neighbors.
Although traffic from spoke-to-spoke goes through the hub first, it is expected that the spoke will eventually go through
the shortcut tunnel.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 22
Fortinet Inc.
ADVPN
next
edit 2
set dst "engineering-department"
set priority-members 2
next
edit 61
set addr-mode ipv6
set priority-members 1
set dst6 "financial-department-IPv6"
next
edit 62
set addr-mode ipv6
set priority-members 2
set dst6 "engineering-department-IPv6"
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 23
Fortinet Inc.
ADVPN
end
config neighbor-range6
edit 1
set prefix6 2001::10:200:1:0/112
set neighbor-group "spokesv6"
next
end
config network
edit 3
set prefix 22.1.1.0 255.255.255.0
next
end
config network6
edit 1
set prefix6 2001:22::/64
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 24
Fortinet Inc.
ADVPN
To trigger a single spoke-to-spoke shortcut VPN, on host 22.1.1.22, ping the host 33.1.1.33 in the Financial Department.
Because of the SD-WAN rule, use SD-WAN member 1 (via ISP1) and its dynamic shortcuts to reach hosts in the
Financial Department.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 25
Fortinet Inc.
ADVPN
The remote route learned from Spoke 2 through the spoke1_1_0 tunnel and using BGP is 33.1.1.0/24.
To trigger a single spoke-to-spoke shortcut VPN over IPv6, on host 2001:22::22/64, ping the host 2001:33::33/64 in the
Financial Department. Because of the SD-WAN rule, use SD-WAN member 1 (via ISP1) and its dynamic shortcuts to
reach hosts in the Financial Department.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 26
Fortinet Inc.
ADVPN
::11.1.1.11), 00:17:30
(recursive via spoke1-2 tunnel
::111.1.1.11), 00:17:30, [1024/0]
B 2001:33::/32 [200/0] via 2001::10:200:1:1 (recursive via spoke1-1 tunnel
::11.1.1.11), 00:17:30
(recursive via spoke1-2 tunnel
::111.1.1.11), 00:17:30, [1024/0]
B 2001:33::/64 [200/0] via 2001::10:200:1:101 (recursive via spoke1-1_0 tunnel
::13.1.1.3), 00:00:24, [1024/0]
The remote route learned from Spoke 2 through the spoke1-1_0 tunnel and using BGP is 2001:33::/64.
To trigger a second spoke-to-spoke shortcut VPN, on host 22.1.1.22, ping the host 33.1.1.133 in the Engineering
Department. Because of the SD-WAN rule, use SD-WAN member 2 (via ISP2) and its dynamic shortcuts to reach hosts
in the Engineering Department.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 27
Fortinet Inc.
ADVPN
00:01:09
(recursive via spoke1-2_0 tunnel
113.1.1.3), 00:01:09, [1/0]
The remote route learned from Spoke 2 through the spoke1-2_0 tunnel and using BGP is 33.1.1.0/24.
To trigger a second spoke-to-spoke shortcut VPN over IPv6, on host 2001:22::22/64, ping the host 2001:33::133/64 in
the Engineering Department. Because of the SD-WAN rule, use SD-WAN member 2 (via ISP2) and its dynamic
shortcuts to reach hosts in the Engineering Department.
The remote route learned from Spoke 2 through the spoke1-2_0 tunnel and using BGP is 2001:33::/64.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 28
Fortinet Inc.
Monitoring
7.4.0
l Logging FortiMonitor-detected performance metrics on page 29
l SD-WAN Monitoring Map integrates with Cloud Assisted Monitoring Service to allow FGT interface speed tests from
inside FMG FMG on page 32
l SD-WAN monitoring map enhancements FMG on page 35
7.4.1
l Improve client-side settings for SD-WAN network monitor 7.4.1 on page 39
l Multiple interface monitoring for IPsec 7.4.1 on page 51
l SD-WAN Cloud Assisted Monitoring service widgets FAZ 7.4.1 on page 57
FortiGate can log statistics when using FortiMonitor to detect advanced SD-WAN application performance metrics.
These logs may also be sent to FortiAnalyzer and FortiManager for review and reporting.
You can control the logging frequency using the app-perf-log-period command:
config system sdwan
set app-perf-log-period <time in seconds>
end
Example
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 29
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 30
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 31
Fortinet Inc.
Monitoring
SD-WAN Monitoring Map integrates with Cloud Assisted Monitoring Service to allow FortiGate interface speed tests
from inside FortiManager.
1. Execution of speed tests can be performed from the SD-WAN Monitor page: Map View, Table View, Device
Drilldown and the Device Dashboard.
2. For devices with a valid license and an interface set with the WAN role, the Execute Speed Test option is displayed
for the interface.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 32
Fortinet Inc.
Monitoring
l If there is a valid route to the cloud server, you will get measured bandwidth when executing the speed test.
l If there is not a valid route to the cloud server, you will see an error message when executing the speed test.
l You can perform the speed test up to 10 times per day. Attempts to perform additional speed tests will present
an error message.
3. For devices without a valid license, or for devices with a valid license but without an interface set to the WAN role,
the Execute Speed Test option is not displayed.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 33
Fortinet Inc.
Monitoring
The latest results of the speed test are displayed on the SD-WAN Monitor pages, including:
l Map View:
l Table View:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 34
Fortinet Inc.
Monitoring
l Device Drilldown:
SD-WAN monitoring map differentiates HUB and branch device types, displays the overlay connectivity between
devices and WAN underlay ports SLA performances.
1. Go to the Device Manager > Monitors > SD-WAN Monitor pane, and click Template View.
l SD-WAN devices provisioned using the currently selected SD-WAN template are displayed on the map.
l Only devices provisioned using the selected SD-WAN template are displayed. You can change the selected
SD-WAN template by clicking the dropdown in the toolbar and selecting a new template.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 35
Fortinet Inc.
Monitoring
l Devices on the map are identified with icons as either a HUB (star icon) or spoke device (device icon).
2. Hovering your mouse over a device on the map displays the following information:
l Device name and whether it is a HUB or spoke.
l Down underlays.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 36
Fortinet Inc.
Monitoring
3. The map shows lines connecting the HUB and spoke devices.
The line color depends on if the tunnel is up (green) or down (red). Device color is based off of the following logic:
a. If the SD-WAN health checks are defined on the device (usually a spoke):
l Green: All health checks pass.
b. When no SD-WAN health checks are defined on the device (usually a HUB):
l Green: All underlays are up.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 37
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 38
Fortinet Inc.
Monitoring
Improvements have been made to the client-side settings of the SD-WAN network bandwidth monitoring service to
increase the flexibility of the speed tests, and to optimize the settings to produce more accurate measurements. The
changes include:
l Support UDP speed tests.
l Support multiple TCP connections to the server instead of a single connection.
l Measure the latency to speed test servers and select the server with the smallest latency to perform the test.
l Support the auto mode speed test, which selects either UDP or TCP testing automatically based on the latency
threshold.
latency-threshold Set the speed test threshold for the auto mode, in milliseconds (0 - 2000, default =
<integer> 60). If the latency exceeds this threshold, the speed test will use the UDP
protocol; otherwise, it will use the TCP protocol.
multiple-tcp-stream Set the number of parallel client streams for the TCP protocol to run during the
<integer> speed test (1 - 64, default = 4).
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 39
Fortinet Inc.
Monitoring
Examples
The following examples show various tests based on different modes (Auto, TCP, UDP), latency thresholds, and test
servers. Some test protocols and servers are manually configured, while others are chosen by the FortiGate.
These examples assume the FortiGate is connected to the internet, has a valid SD-WAN Network Monitor license, and
has downloaded the server list of speed tests from FortiCloud.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 40
Fortinet Inc.
Monitoring
Example 1: executing a speed test without specifying the interface, server, and mode
Geographically, the Vancouver server (154.52.20.6) has the smallest latency (around 7 ms) to FGT_A, so it will be
automatically selected for the speed test because the latency 7 ms to 154.52.20.6 is less than the default latency-
threshold of 60 ms. Meanwhile, four TCP connections will be initiated to perform the test since the default multiple-
tcp-stream is 4.
2. Execute a ping to the closest test server, 154.52.20.6, to learn the latency for the connection:
# execute ping 154.52.20.6
PING 154.52.20.6 (154.52.20.6): 56 data bytes
64 bytes from 154.52.20.6: icmp_seq=0 ttl=50 time=7.5 ms
64 bytes from 154.52.20.6: icmp_seq=1 ttl=50 time=7.2 ms
64 bytes from 154.52.20.6: icmp_seq=2 ttl=50 time=7.1 ms
64 bytes from 154.52.20.6: icmp_seq=3 ttl=50 time=7.1 ms
64 bytes from 154.52.20.6: icmp_seq=4 ttl=50 time=9.1 ms
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 41
Fortinet Inc.
Monitoring
The tested upload/download speed for port1 is 536 Mbps/555 Mbps when connecting to the closest server with four TCP
connections.
The latency-threshold setting is changed to 5 ms, which is less than the latency 7 ms to 154.52.20.6. When
executing the speed test, one UDP connection will be initiated as expected.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 42
Fortinet Inc.
Monitoring
The tested upload/download speed for port1 is 917 Mbps/595 Mbps when connecting to the closest server with one UDP
connection.
The latency-threshold setting is back to the 60 ms default, and the multiple-tcp-stream setting is changed to
10.
To execute the speed test with the default latency threshold and higher client stream value:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 43
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 44
Fortinet Inc.
Monitoring
The tested upload/download speed for port1 is 705 Mbps/632 Mbps when connecting to the closest server with 10 TCP
connections.
Example 4: executing a speed test by specifying the interface, server, and UDP mode
The speed test will test the Toronto server using UDP mode on port1.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 45
Fortinet Inc.
Monitoring
The tested upload/download speed for port1 is 908 Mbps/485 Mbps when connecting to the Toronto server with one
UDP connection.
Example 5: executing a speed test by specifying the interface, server, and auto mode
The speed test will test the Toronto server using auto mode on port1. Since the latency to the Toronto server is less than
60 ms, 10 TCP connections are initiated.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 46
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 47
Fortinet Inc.
Monitoring
The tested upload/download speed for port1 is 346 Mbps/202 Mbps when connecting to the Toronto server with 10 TCP
connections.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 48
Fortinet Inc.
Monitoring
Example 6: executing the speed test with diagnose netlink interface speed-test
After running this diagnose command, the results are recorded in the interface settings for reference as measured-
upstream-bandwidth and measured-downstream-bandwidth.
After running the speed test, the results are recorded in the interface settings for reference as measured-upstream-
bandwidth and measured-downstream-bandwidth.
The speed test will be initiated at 17:07 based on 10 TCP connections. The results will be recorded in port1's
interface settings.
3. Verify the interface settings:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 49
Fortinet Inc.
Monitoring
Example 8: executing multiple speed tests with TCP and UDP connections
A speed test is executed to the closest server using 64 TCP connections and another speed test is executed using one
UDP connection. The results can be checked with a third-party platform (such as Ookla), which returns comparable
results.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 50
Fortinet Inc.
Monitoring
IPsec can monitor multiple interfaces per tunnel, and activate a backup link only when all of the primary links are down.
This can be useful if you have multiple WAN links and want to optimize your WAN link selection and performance while
limiting the use of more expensive and bandwidth intensive interfaces, like 5G or LTE.
In cases where multiple primary overlays are deployed and the backup overlay is on an LTE connection, avoiding IPsec
keep alive messages, BGP hellos, and SD-WAN health checks on the backup connection is required when the primary
overlays are working. The backup overlay can monitor all of the primary overlays, and is not activated until the number of
unhealthy primary overlays equals or surpasses the predefined threshold.
config vpn ipsec phase1-interface
edit <phase-1 name>
set monitor <overlay> <overlay> ... <overlay>
set monitor-min <integer>
next
end
In this example, four primary overlays are configured, T1 - T4, on fixed broadband connections and one backup overlay,
T5, is configured on an LTE connection.
The backup overlay stays down as long as the primary overlays are working normally. When all four of the primary
overlays go down, the backup overlay is activated and used to forward traffic. If any of the primary overlays recover, then
the backup overlay goes down.
SD-WAN can also be configured to steer traffic.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 51
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 52
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 53
Fortinet Inc.
Monitoring
next
edit "T4"
set vdom "root"
set ip 100.1.4.1 255.255.255.255
set allowaccess ping
set type tunnel
set remote-ip 100.1.4.2 255.255.255.0
set snmp-index 65
set interface "port15"
next
edit "T5"
set vdom "root"
set ip 100.1.5.1 255.255.255.255
set allowaccess ping
set type tunnel
set remote-ip 100.1.5.2 255.255.255.0
set snmp-index 117
set interface "vlan200"
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 54
Fortinet Inc.
Monitoring
next
end
config service
edit 1
set name "1"
set load-balance enable
set dst "all"
set src "172.16.205.0"
set priority-members 1 2 3 4 5
next
end
end
l When both the T1 and T2 connections are down, T5 stays down as well, and traffic is load-balanced on T3 and T4
by the SD-WAN configuration:
# get vpn ipsec tunnel summary
'T2' 172.16.203.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/0
'T3' 172.16.206.2:0 selectors(total,up): 1/1 rx(pkt,err): 0/0 tx(pkt,err): 0/0
'T4' 172.16.209.2:0 selectors(total,up): 1/1 rx(pkt,err): 0/0 tx(pkt,err): 0/4
'T5' 172.16.210.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/4
'T1' 172.16.208.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/0
# get router info routing-table static
Routing table for VRF=0
S 8.0.0.0/8 [1/0] via T3 tunnel 172.16.206.2, [1/0]
[1/0] via T4 tunnel 172.16.209.2, [1/0]
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 55
Fortinet Inc.
Monitoring
l When all of the primary overlays are down, T5 is activated and used for traffic
# get vpn ipsec tunnel summary
'T2' 172.16.203.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/0
'T3' 172.16.206.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/0
'T4' 172.16.209.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/0
'T5' 172.16.210.2:0 selectors(total,up): 1/1 rx(pkt,err): 0/0 tx(pkt,err): 0/4
'T1' 172.16.208.2:0 selectors(total,up): 1/0 rx(pkt,err): 0/0 tx(pkt,err): 0/0
# get router info routing-table static
Routing table for VRF=0
S 8.0.0.0/8 [1/0] via T5 tunnel 172.16.210.2, [1/0]
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 56
Fortinet Inc.
Monitoring
The primary overlay T4 has recovered, and the backup overlay is down again:
# diagnose sniffer packet any 'host 8.8.8.8' 4
interfaces=[any]
filters=[host 8.8.8.8]
4.555685 port5 in 172.16.205.100 -> 8.8.8.8: icmp: echo request
4.555790 T4 out 172.16.205.100 -> 8.8.8.8: icmp: echo request
4.560428 T4 in 8.8.8.8 -> 172.16.205.100: icmp: echo reply
4.560478 port5 out 8.8.8.8 -> 172.16.205.100: icmp: echo reply
5.163223 port5 in 172.16.205.100 -> 8.8.8.8: icmp: echo request
5.163332 T4 out 172.16.205.100 -> 8.8.8.8: icmp: echo request
5.167590 T4 in 8.8.8.8 -> 172.16.205.100: icmp: echo reply
5.167620 port5 out 8.8.8.8 -> 172.16.205.100: icmp: echo reply
5.650089 port5 in 172.16.205.100 -> 8.8.8.8: icmp: echo request
5.650194 T4 out 172.16.205.100 -> 8.8.8.8: icmp: echo request
5.654352 T4 in 8.8.8.8 -> 172.16.205.100: icmp: echo reply
5.654387 port5 out 8.8.8.8 -> 172.16.205.100: icmp: echo reply
6.102181 port5 in 172.16.205.100 -> 8.8.8.8: icmp: echo request
6.102263 T4 out 172.16.205.100 -> 8.8.8.8: icmp: echo request
6.106411 T4 in 8.8.8.8 -> 172.16.205.100: icmp: echo reply
6.106445 port5 out 8.8.8.8 -> 172.16.205.100: icmp: echo reply
New widgets are introduced in FortiAnalyzer 7.4.1 for the SD-WAN Cloud Assisted Monitoring service on FortiOS.
Topology
This feature requires an SD-WAN connected to the internet to run speed tests on SD-WAN member interfaces. The
FortiGate version should be 7.4.1 or later, and SD-WAN Bandwidth Monitoring Result event logs are sent from
FortiGate.
Enter the following command to download the speed test server list from FortiGate Cloud:
exec speed-test-server download
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 57
Fortinet Inc.
Monitoring
Speed Test is a new widget added to the Secure SD-WAN Monitor dashboard. This widget displays the download and
upload speeds for all tests run on SD-WAN interfaces through the specified time period. You can select to display as a
combined line chart or as a table chart.
The following is an example of the line chart for Speed Test:
Sort By Speed is a new option added to the Top SD-WAN SLA Issues widget in the Secure SD-WAN Monitor dashboard.
This option displays the peak speed run on SD-WAN interfaces through specified time period.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 58
Fortinet Inc.
Monitoring
The new Sort By Speed option is also added to the Top SD-WAN SLA Issues widget in the SD-WAN Summary
dashboard. This option displays the peak speed run on SD-WAN interfaces through specified time period for selected
devices.
Speed Test By Bandwidth is a new widget added to the SD-WAN Summary dashboard. This widget displays a bar chart
of the combined download and upload speeds for all SD-WAN interfaces on each device.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 59
Fortinet Inc.
Monitoring
Speed Test Summary is a new widget added to the SD-WAN Summary dashboard. This widget displays a table of the
download and upload speeds for all tests run on SD-WAN interfaces through specified time period on selected devices.
An SD-WAN Speed Test By Bandwidth(bps) bar chart is added to the Secure SD-WAN Assessment Report. This chart
displays the combined download and upload speeds for all SD-WAN interfaces on each device.
A SD-WAN Link Speed Test by Bandwidth table is also added to the Secure SD-WAN Assessment Report. This table
displays the download and upload speeds for all tests run on SD-WAN interfaces through the specified time period on
selected devices
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 60
Fortinet Inc.
Monitoring
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 61
Fortinet Inc.
Provisioning
7.4.0
l Automated SD-WAN overlay process adds "branch_id" meta variable auto assignment FMG on page 65
l SD-WAN Monitoring Map integrates with Cloud Assisted Monitoring Service to allow FGT interface speed tests from
inside FMG FMG on page 32
l Fortinet factory-default wireless and extender templates FMG on page 67
l SD-WAN template for heterogeneous WAN link types FMG on page 74
7.4.1
l Support the new SD-WAN Overlay-as-a-Service 7.4.1 on page 76
l Fabric Authorization Template is integrated with Device Blueprint and supports meta variables FMG 7.4.1 on page
79
Automated SD-WAN post overlay process creates policies to allow the health-checks traffic to flow between Branch and
HUB.
The SD-WAN overlay template includes two new options in the wizard to automate the post-wizard processes. The SD-
WAN overlay template example configured in this document uses a dual-hub topology.
1. Normalize Interfaces
Enable the Normalize Interfaces option to normalize the SD-WAN zones created by the template.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 62
Fortinet Inc.
Provisioning
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 63
Fortinet Inc.
Provisioning
VPN IPsec tunnel templates are created for HUB interfaces when using the SD-WAN overlay template.
l
When Normalized Interface is enabled, normalized interfaces for the VPNs are added to the normalized
interface list.
2. Add Health Check Firewall Policy to Hub/Branch Policy Package
Enable the Add Health Check Firewall Policy to Hub/Branch Policy Package option to create health check firewall
policies (or policy blocks) for HUB(s) and branches.
l Users must select the HUB and branch policy package that will be used during the wizard configuration. You
l Based on the selection, firewall policies (or policy blocks) are created to allow SLA health checks to each
device loopback.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 64
Fortinet Inc.
Provisioning
l The SD-WAN overlay template creates the policy block and applies it to the top of the HUB Policy Package.
l A policy block is not created for the SD-WAN branch Policy Package.
The automated SD-WAN overlay process adds "branch_id" meta variable auto assignment.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 65
Fortinet Inc.
Provisioning
3. On the Role Assignment (2/5) step in the wizard, enable Automatic Branch ID Assignment.
l When Automatic Branch ID Assignment is enabled, FortiManager automatically assigns and tracks a branch
ID for each device in the branch device group. This also applies to devices added to the branch device group in
the future, as well as those added to the device group using a zero-touch provisioning device blueprint.
l Branch ID values are between one and the maximum number allowed by the subnet. For example, the default
10.10.0.0/255.255.0.0 overlay network uses the /19 subnet when your setup includes 5 - 8 overlays. The
maximum allowed branch IDs in this range is 8,190 based on the maximum number of number of
usable IPs/FortiGates supported per overlay.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 66
Fortinet Inc.
Provisioning
FortiManager includes Fortinet factory-default wireless and extender templates with built-in security and network
configuration based on best security practices.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 67
Fortinet Inc.
Provisioning
2. FortiAP profiles based on the recommended profiles can be created by activating the recommended profiles.
a. Right-click on a recommended profile and click Activate.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 68
Fortinet Inc.
Provisioning
c. Enter a name for the AP profile and configure the remaining settings if required.
3. The recommended default AP SSIDs are shown in AP Manager in the SSIDs tab.
a. Go to WiFi Profiles and click the SSIDs tab to view the default SSIDs.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 69
Fortinet Inc.
Provisioning
b. Right click on a recommended SSID and click View to view its details.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 70
Fortinet Inc.
Provisioning
b. Enter a name for the SSID and configure the remaining settings as needed.
5. The created SSID can be assigned to an AP profile, and the profile can be assigned to the FortiAP.
a. In the FortiAP Profile, select the configured SSID.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 71
Fortinet Inc.
Provisioning
1. The recommended Extender Profile is shown in Extender Manager on the Extender Profiles tab.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 72
Fortinet Inc.
Provisioning
c. Enter a name for the FortiExtender profile and configure the remaining settings as needed.
3. The created extender profile can be assigned to an extender, then the user can deploy the settings.
a. Right-click on a managed FortiExtender and click Assign Profiles.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 73
Fortinet Inc.
Provisioning
l Performance SLA
SD-WAN template for heterogeneous WAN link types to support single-template usage for FortiGates with different
underlay connections and SLAs.
1. Go to Device Manager > Provisioning Templates > SD-WAN Template, and create or edit a template.
2. You can select the installation target for the following SD-WAN objects:
l system sdwan members
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 74
Fortinet Inc.
Provisioning
3. You can add meta variables for the following health-check attributes:
l System SD-WAN health-check
l Check Interval
l Probe Timeout
l Latency Threshold
l Jitter Threshold
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 75
Fortinet Inc.
Provisioning
l Mos Threshold
SD-WAN Overlay-as-a-Service (OaaS) is supported through a license displayed as SD-WAN Overlay as a Service on
the System > FortiGuard page. Each FortiGate used by the FortiCloud Overlay-as-a-Service portal must have this
license applied to it.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 76
Fortinet Inc.
Provisioning
l Licensed: OaaS is currently licensed and will expire on the provided date.
l Expires Soon: OaaS is currently licensed but will expire soon on the provided date.
l Expired: The OaaS license has already expired on the provided date.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 77
Fortinet Inc.
Provisioning
System contracts:
FMWR,Wed Dec 20 16:00:00 2023
SPAM,Wed Dec 20 16:00:00 2023
SBCL,Wed Dec 20 16:00:00 2023
SWNO,Wed Dec 20 16:00:00 2023
SWNM,Wed Sep 27 17:00:00 2023
SWOS,Mon Aug 14 17:00:00 2023
SPRT,Wed Dec 20 16:00:00 2023
SDWN,Sun Dec 10 16:00:00 2023
SBCL,Wed Dec 20 16:00:00 2023
SBEN,Wed Dec 20 16:00:00 2023
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 78
Fortinet Inc.
Provisioning
In FortiManager 7.4.1, the Fabric Authorization Template is integrated with Device Blueprints and supports metadata
variables.
Prefix Select a model from the dropdown list, for example FP231E.
Number of Devices This field determines how many APs will be added, and you can enter a
number or use a variable. Entering the $ sign causes the variable list to
appear where you can select a variable from the dropdown list. This
example uses the $(APNum) variable.
b. FortiSwitch:
Prefix Select a model from the dropdown list, for example S424DN.
Number of Devices This field determines how many FortiSwitches will be added, and you can
enter a number or use a variable. This example uses the number 1.
FortiLink Interface Enter the interface name. This field supports variables. This example uses
the name fortilink.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 79
Fortinet Inc.
Provisioning
c. FortiExtender:
Prefix Select a model from the dropdown list, for example FX201E.
Number of Devices This field determines how many FortiExtenders will be added, and you can
enter a number or use a variable. This example uses the number 1.
FortiLink Interface Select an extension type from the dropdown list. This example uses
WAN Extension.
1. Go to Device Manager. In the Device & Group window, click the Add Device dropdown and choose Device Blueprint
to create a new device blueprint.
2. Configure the device blueprint. For example:
Fabric Authorization Select the previously configured Fabric Authorization Template (60E).
Template
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 80
Fortinet Inc.
Provisioning
1. Go to Device Manager. In the Device & Group window, click Add Device > Add Model Device.
2. Configure the model device using the device blueprint. For example:
1. After the device is added to the Device Manager, go to the AP Manager, FortiSwitch Manager, and Extender
Manager in FortiManager and you can see that the FortiGate has been automatically configured with a FortiAP,
FortiSwitch and FortiExtender as defined by the template.
For example:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 81
Fortinet Inc.
Provisioning
l FortiAP:
l FortiSwitch:
l FortiExtender:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 82
Fortinet Inc.
Routing
7.4.0
l Using MP-BGP EVPN with VXLAN on page 83
l Add route tag address objects on page 94
l Allow better control over the source IP used by each egress interface for local out traffic on page 96
l BGP conditional advertisements for IPv6 prefix when IPv4 prefix conditions are met and vice-versa on page 104
7.4.1
l SD-WAN multi-PoP multi-hub large scale design and failover 7.4.1 on page 109
FortiOS supports VXLAN as implemented according to RFC 7348. Currently, VXLAN relies on determining the MAC
address of the destination host by using address resolution protocol (ARP) broadcast frames encapsulated in multicast
packets.
l A multicast group is maintained with all the VXLAN tunnel endpoints (VTEPs) associated with the same VXLAN,
namely, with the same VXLAN network identifier (VNI).
l The multicast packets that encapsulate ARP broadcast frames are sent to this multicast group, and then the
destination host replies to the source host using unicast IP packet encapsulated using VXLAN.
l The source and destination FortiGates as VTEPs each maintain a mapping of MAC addresses to remote VTEPs.
As with non-VXLAN traffic, VXLAN relies on the preceding ARP process, commonly known as flood-and-learn that
floods the network with broadcast frames encapsulated as multicast packets to learn MAC addresses. In the RFC 7348
implementation of VXLAN, the data plane is simultaneously used as a control plane.
The following topology demonstrates how flood-and-learn uses ARP broadcast traffic flooded throughout the VXLAN for
PC A to learn PC D's MAC address when PC A tries to connect to PC D.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 83
Fortinet Inc.
Routing
In FortiOS 7.4.0, Multiprotocol Border Gateway Protocol Ethernet Virtual Private Network (MP-BGP EVPN) support for
VXLAN allows for learning MAC addresses in a way that is more suitable for large deployments than flood-and-learn.
MP-BGP EVPN is a standards-based control plane that supports the distribution of attached host MAC and IP addresses
using MP-BGP, namely, using the EVPN address family and MAC addresses treated as routing entries in BGP. As a
control plane that is separate from the data plane, MP-BGP EVPN avoids flood-and-learn in the network, and the wide
use of BGP as an external gateway protocol on the internet proves its ability to scale well with large deployments. The
following topology demonstrates how MP-BGP EVPN distributes route type 2 MAC/IP advertisement routes among
VTEPs in the VXLAN, and minimizes ARP broadcast traffic required for PC A to learn PC D's MAC address when PC A
tries to connect to PC D.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 84
Fortinet Inc.
Routing
l Route type 2 (MAC/IP advertisement route) and route type 3 (inclusive multicast Ethernet tag route)
l Intra-subnet communication
l Single-homing use cases
l VLAN-based service, namely, there is only one broadcast domain per EVPN instance (EVI). This is due to the
current VXLAN design that supports a single VNI for a VXLAN interface.
l EVPN running on IPv4 unicast VXLAN
l Egress replication for broadcast, unknown unicast, and multicast (BUM) traffic
l VXLAN MAC learning from traffic
l IP address local learning
l ARP suppression
For more information about MP-BGP EVPN, see RFC 7432. For more information about
EVPN and VXLAN, see RFC 8365.
The MP-BGP EVPN feature builds on the CLI commands used for configuring VXLAN using a VXLAN tunnel endpoint
(VTEP). See General VXLAN configuration and topologies in the FortiOS Administration Guide for more details.
After configuring VXLAN using a VTEP, the following CLI commands are configured to enable MP-BGP EVPN on each
VTEP.
The ip-local-learning setting is used to enable/disable monitoring the local ARP table of the switch interface
to learn the IP/MAC bindings, and advertise them to neighbors. This setting is disabled by default, but must be
enabled when configuring MP-BGP EVPN.
The arp-suppression setting is used to enable/disable using proxy ARP to perform suppression of ARP
discovery using the flood-and-learn approach. This setting is disabled by default. When enabled, proxy ARP entries
are added on the switch interface to suppress the ARP flooding of known IP/MAC bindings, which were learned by
the MP-BGP EVPN control plane.
2. Configure the EVPN settings within the VXLAN settings:
config system vxlan
edit <name>
set interface <string>
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 85
Fortinet Inc.
Routing
The learn-from-traffic setting is used to enable/disable learning of remote VNIs from VXLAN traffic. This
setting is disabled by default, and should only be enabled when local and all remote peers are using same VNI
value, and some of the peers do not have MP-BGP EVPN capability.
3. Configure the BGP settings:
config router bgp
set ibgp-multipath {enable | disable}
set recursive-next-hop {enable | disable}
set graceful-restart {enable | disable}
config neighbor
edit <WAN_IP_of_other_VTEP>
set ebgp-enforce-multihop {enable | disable}
set next-hop-self {enable | disable}
set next-hop-self-vpnv4 {enable | disable}
set soft-reconfiguration {enable | disable}
set soft-reconfiguration-evpn {enable | disable}
set remote-as <AS_number>
next
end
end
Example
In this example, two FortiGates are configured as VXLAN tunnel endpoints (VTEPs). A VXLAN is configured to allow L2
connectivity between the networks behind each FortiGate. The VXLAN interface vxlan1 and port2 are placed on the
same L2 network using a software switch (sw1). An L2 network is formed between PC1 and PC2. MP-BGP EVPN is
used as the control plane to learn and distribute MAC address information within a single L2 domain identified using a
specific VNI.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 86
Fortinet Inc.
Routing
The MAC address of PC1 is 00:50:00:00:06:00. The MAC address of PC2 is 00:50:00:00:07:00.
This example assumes that the WAN interface and default route settings have already been configured on the VTEP 1
and VTEP 2 FortiGates. These configurations are omitted from the example. All peers are configured for MP-BGP
EVPN.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 87
Fortinet Inc.
Routing
3. Configure the local interface and EVPN settings within the VXLAN settings:
config system vxlan
edit "vxlan1"
set interface "loopback1"
set vni 1000
set evpn-id 100
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 88
Fortinet Inc.
Routing
7. Configure the firewall policies between the member interfaces in the software switch:
config firewall policy
edit 1
set srcintf "port2"
set dstintf "vxlan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
next
edit 2
set srcintf "vxlan1"
set dstintf "port2"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
next
end
3. Configure the local interface and EVPN settings within the VXLAN settings:
config system vxlan
edit "vxlan1"
set interface "loopback2"
set vni 1000
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 89
Fortinet Inc.
Routing
7. Configure the firewall policies between the member interfaces in the software switch:
config firewall policy
edit 1
set srcintf "port2"
set dstintf "vxlan1"
set action accept
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 90
Fortinet Inc.
Routing
2. On the VTEP1 FortiGate, run the switch and VXLAN debug commands.
a. Verify the forwarding database for vxlan1:
# diagnose sys vxlan fdb list vxlan1
mac=00:00:00:00:00:00 state=0x0082 remote_ip=2.2.2.2 port=4789 vni=1000 ifindex0
mac=00:50:00:00:07:00 state=0x0082 remote_ip=2.2.2.2 port=4789 vni=1000 ifindex0
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 91
Fortinet Inc.
Routing
3. Run the BGP EVPN commands and observe the route type 2 (MAC/IP advertisement route) and route type 3
(inclusive multicast Ethernet tag route).
a. Verify the BGP L2 VPN EVPN summary information:
# get router info bgp evpn summary
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 92
Fortinet Inc.
Routing
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 93
Fortinet Inc.
Routing
EVPN IP table:
Address VNI Remote Addr MAC
172.18.1.33 1000 2.2.2.2 00:50:00:00:07:00
A route tag (route-tag) firewall address object can include IPv4 or IPv6 addresses associated with a BGP route tag
number, and is updated dynamically with BGP routing updates. The route tag firewall address object allows for a more
dynamic and flexible configuration that does not require manual intervention to dynamic routing updates. This address
object can be used wherever a firewall address can be used, such as in a firewall policy, a router policy, or an SD-WAN
service rule.
The Route tag field has been removed from the Priority Rule configuration page (Network
> SD-WAN > SD-WAN Rules). The route-tag option has been removed from the config
service settings under config system sdwan.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 94
Fortinet Inc.
Routing
e. Click OK.
2. Add the address to a firewall policy:
a. Go to Policy & Objects > Firewall Policy.
b. Edit an existing policy or create a new one.
c. Set the Destination to vd2_upg_sdwan_route_tag_44.
d. Configure the other settings as needed.
e. Click OK.
3. Add the address to an SD-WAN service rule:
a. Go to Network > SD-WAN and select the SD-WAN Rules tab.
b. Edit an existing rule or create a new one.
c. In the Destination section, set the Address to vd2_upg_sdwan_route_tag_44.
d. Configure the other settings as needed.
e. Click OK.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 95
Fortinet Inc.
Routing
1. After some traffic passes, verify that the route tag firewall address is associated with policy ID 3:
# diagnose firewall iprope list | grep -A 15 index=3
policy index=3 uuid_idx=754 action=accept
flag (8010008): redir master pol_stats
flag2 (4000): resolve_sso
flag3 (100000a0): link-local best-route no-vwp
schedule(always)
cos_fwd=255 cos_rev=255
group=00100004 av=00004e20 au=00000000 split=00000000
host=5 chk_client_info=0x0 app_list=0 ips_view=0
misc=0
zone(1): 0 -> zone(1): 0
source(1): 0.0.0.0-255.255.255.255, uuid_idx=684,
service(1):
[0:0x0:0/(0,65535)->(0,65535)] flags:0 helper:auto
route_tag(1): 44
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 96
Fortinet Inc.
Routing
Better control over the source IP used by each egress interface is feasible by allowing a preferred source IP to be
defined in each of these scenarios.
l Configuring a static route:
config router static
edit <id>
set preferred-source <ip_address>
next
end
l Configuring a route map so that a BGP route can support a preferred source:
config router route-map
edit <name>
config rule
edit <id>
set set-ip-prefsrc <ip_address>
next
end
next
end
Example configurations
In scenarios where multiple CPE (customer premise equipment) routers are used for each transport, it is easy to define a
public IP per router as a loopback IP. Then, locally sourced traffic and BGP routes can use the public loopback IP as
source.
When a FortiGate is used to replace multiple CPE routers, it must be able to source traffic with the public IP assigned by
their respective ISP that is assigned to the loopback interfaces.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 97
Fortinet Inc.
Routing
This feature allows the preferred source IP to be configured in the following scenarios so that local out traffic is sourced
from these IPs.
Example 1
In this example, a source IP is defined per static route. Local traffic that uses the static route will use the source IP
instead of the interface IP associated with the route.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 98
Fortinet Inc.
Routing
When DNS traffic leaves the FortiGate and is routed through port1, the source address 1.1.1.1 is used.
Example 2:
In this example, a route map is configured to set the preferred source IP so that the BGP route can support the preferred
source.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 99
Fortinet Inc.
Routing
edit 1
set set-ip-prefsrc 1.1.1.1
next
end
next
edit "map2"
config rule
edit 1
set set-ip-prefsrc 1.1.1.2
next
end
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 100
Fortinet Inc.
Routing
The FortiGate learns routes from router 3.3.3.3 and prefers the source IP of 1.1.1.2. It learns routes from router
2.2.2.2 and prefers source IP of 1.1.1.1.
5. Run a sniffer trace after some traffic passes.
a. When trying to reach a destination in the 172.25.1.0/0 subnet through router 2.2.2.2:
# diagnose sniffer packet any "icmp" 4
interfaces=[any]
filters=[icmp]
9.244334 agg1 out 1.1.1.1 -> 172.25.1.2: icmp: echo request
9.244337 port12 out 1.1.1.1 -> 172.25.1.2: icmp: echo request
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 101
Fortinet Inc.
Routing
b. When trying to reach a destination in the 172.28.5.0/24 subnet through router 3.3.3.3:
# diagnose sniffer packet any "icmp" 4
interfaces=[any]
filters=[icmp]
2.434035 port1 out 1.1.1.2 -> 172.28.5.2: icmp: echo request
3.434059 port1 out 1.1.1.2 -> 172.28.5.2: icmp: echo request
Traffic destined for the 172.25.1.0/24 subnet uses 1.1.1.1 as source. Traffic destined for the 172.28.5.0/24 subnet
uses 1.1.1.2 as source.
Example 3:
In this example, two SD-WAN members, port5 and port6, will use loopback1 and loopback2 as sources instead of their
physical interface address. A static route is created for destination 200.0.0.0/24 to use the virtual-wan-link. In turn, the
FortiGate will create two ECMP routes to the member gateways and source the traffic from the loopback IPs.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 102
Fortinet Inc.
Routing
In the SD-WAN config members settings, configuring the source for the health check
probes is still required. SD-WAN adds dedicated kernel routes (proto=17) for the health
checks using the interface IP or source IP when specified. To view the kernel routes, use
diagnose ip route list.
Traffic exiting each interface is sourced from the corresponding loopback IP.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 103
Fortinet Inc.
Routing
vice-versa
BGP conditional advertisement allows the router to advertise a route only when certain conditions are met. Multiple
conditions can be used together, with conditional route map entries treated as an AND operator. The FortiGate supports
conditional advertisement of IPv4 and IPv6 route maps with edit <advertise-routemap> under config
conditional-advertise, and supports configuring IPv4 and IPv6 route maps as conditions with the condition-
routemap setting.
The FortiGate can cross-check conditions involving IPv4 and IPv6 route maps and perform conditional advertisements
accordingly when those conditions are met. The global option, cross-family-conditional-adv in the BGP
configuration settings allows this cross-checking to occur.
config router bgp
set cross-family-conditional-adv {enable | disable}
config conditional-advertise
edit <advertise-routemap>
set advertise-routemap <string>
set condition-routemap <name1>, <name2>, ...
set condition-type {exist | non-exist}
next
end
end
By default, the cross-family-conditional-adv setting is disabled. When disabled, the FortiGate will only check
conditional route maps against the routing information base (RIB) of the IP address family (IPv4 or IPv6) that
corresponds to the IP address family of the route map to be advertised conditionally.
For example, for an IPv6 conditional advertisement, if IPv4 conditional route maps have been configured, then the
FortiGate will not meet any of these conditions because IPv4 routes will not exist in the IPv6 RIB. The same behavior
applies for an IPv4 conditional advertisement, namely, that the FortiGate will not meet any configured IPv6 conditions
since these routes will not exist in the IPv4 RIB. If routes do not match a conditional route map, then the condition is
considered non-existent.
IPv4 and IPv6 BGP conditional advertisements using advertising and conditional route maps of the same IP address
family are already supported in previous versions of FortiOS.
DS-Lite example
In this example, the FortiGate acts as a Dual-Stack Lite (DS-Lite) address family transition router (AFTR) where the
customer equipment (CE) network via Router1 uses IPv6 and where Router2 is the internet gateway using IPv4.
The administrator of the AFTR has the following requirements:
l The FortiGate needs to announce IPv4 pools for NAT translation towards the internet gateway only if the IPv6 B4
prefix exists in the routing table.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 104
Fortinet Inc.
Routing
l The FortiGate needs to advertise the DS-Lite termination IPv6 address towards the CE network only if the IPv4
default route exists on the FortiGate.
The prefixes defined in IPv4 route map 2814 and IPv6 route map map-281 both exist, so the FortiGate advertises the
route map prefix in route-map 2224 (172.22.2.0/255.255.255.0) to its BGP neighbor 2.2.2.2.
For IPv6 neighbor 2003::2:2:2:2, the prefixes defined in IPv4 route map 2874 and IPv6 route map map-38 both do not
exist, and the condition-type is set to non-exist, so the FortiGate advertises the route map prefix in route map
map-222 (2003:172:22:1::/64) to its BGP neighbor 2003::2:2:2:2.
When the global cross-family-conditional-adv enabled, this is the only time the FortiGate will cross-check the
address family; otherwise, it only checks the corresponding conditional map and treats the cross-family addresses as
non-existent.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 105
Fortinet Inc.
Routing
next
edit "2.2.2.2"
set advertisement-interval 5
set activate6 disable
set capability-graceful-restart enable
set soft-reconfiguration enable
set remote-as 65412
set keep-alive-timer 34
set holdtime-timer 90
set update-source "loopback1"
config conditional-advertise
edit "2224"
set condition-routemap "2814" "map-281"
next
end
set route-reflector-client enable
next
edit "2003::2:2:2:2"
set advertisement-interval 5
set activate disable
set capability-graceful-restart6 enable
set soft-reconfiguration enable
set soft-reconfiguration6 enable
set remote-as 65412
set keep-alive-timer 30
set holdtime-timer 90
set update-source "loopback1"
config conditional-advertise6
edit "map-222"
set condition-routemap "map-38" "2874"
set condition-type non-exist
next
end
set route-reflector-client6 enable
next
edit "2003::3:3:3:3"
set advertisement-interval 5
set activate disable
set capability-graceful-restart6 enable
set soft-reconfiguration6 enable
set remote-as 65412
set route-map-in6 "community-del777"
set keep-alive-timer 30
set holdtime-timer 90
set update-source "loopback1"
next
end
config network
edit 1
set prefix 172.27.1.0 255.255.255.0
next
edit 2
set prefix 172.27.2.0 255.255.255.0
next
edit 3
set prefix 172.22.2.0 255.255.255.0
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 106
Fortinet Inc.
Routing
next
end
config network6
edit 1
set prefix6 2003:172:22:1::/64
next
end
end
To verify the BGP status and the BGP routing table for IPv4:
To verify the BGP status and the BGP routing table for IPv6:
To verify the BGP routing table for IPv4 and confirm the conditional advertisement occurred:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 107
Fortinet Inc.
Routing
[1/0]
B 172.27.1.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.27.2.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.27.5.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.27.6.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.27.7.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.27.8.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.29.1.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
B 172.29.2.0/24 [200/0] via 1.1.1.1 (recursive via 172.16.203.1, agg2), 00:37:30,
[1/0]
To verify the BGP routing table for IPv6 and confirm the conditional advertisement occurred:
Using a similar BGP configuration with cross-family-conditional-adv disabled, note the following behavior
based on the condition type.
The FortiGate will only check the IPv4 RIB table to see if there is a matching IP address for each route map. Any IPv6
address under the route map will not get checked in the corresponding IPv6 RIB table, and the condition result will be
non-existent. The 222v4 route map will not advertise to its neighbor because the result is non-existent, while the
condition type is existent.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 108
Fortinet Inc.
Routing
If the v6-238 IPv6 prefix does not exist in the IPv6 RIB table, then the FortiGate will only check v4-287 in the IPv6 RIB
table. The FortiGate will not find it because it is an IPv4 address. Since the condition type is also non-exist, route v6-
222 will be advertised to its neighbor.
FortiOS 7.2.0 introduced a feature to define the minimum number of SD-WAN interface members that must meet SLA in
order for the spoke to select a hub to process its SD-WAN traffic. This design is suitable for a single-PoP multi-hub
architecture in order to achieve hub-to-hub failover. See Using multiple members per SD-WAN neighbor configuration
for more information.
In FortiOS 7.4.1, the design is enhanced to support a multi-PoP multi-hub architecture in which incoming and outgoing
traffic failover between PoPs is supported.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 109
Fortinet Inc.
Routing
Based on the preceding diagram, incoming and outgoing traffic to the spoke is preferred over PoP1. If a single hub within
PoP1 goes out of SLA, traffic will continue to flow through the PoP. If the minimum number of members to meet SLA in
the PoP cannot be met, then traffic will fail over to PoP2.
The following enhancements have been made to support the multi-PoP failover scenario.
l Add minimum-sla-meet-members setting in the SD-WAN zone configurations and zone-mode setting in the
SD-WAN service configurations:
config system sdwan
config zone
edit <name>
set minimum-sla-meet-members <integer>
next
end
config service
edit <id>
set mode sla
set zone-mode {enable | disable}
next
end
end
When zone-mode is enabled on a SD-WAN service rule, the traffic is steered based on the status of the zone.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 110
Fortinet Inc.
Routing
The state of the health check referenced in the SD-WAN service can be defined as follows:
l If the number of in SLA members in a zone is less than the minimum-sla-meet-members, then the zone's
state is out of SLA; otherwise, it is in SLA.
l If a zone's state is out of SLA, then all members in the zone are out of SLA.
l If a zone's state is in SLA, then the health check's state of individual members in the zone is determined by its
own state.
l Add service-id setting in the SD-WAN neighbor configurations:
config system sdwan
config neighbor
edit <bgp_neighbor_ip>
set member <member_id>
set service-id <id>
next
end
end
The SD-WAN neighbor’s behavior can be determined by SD-WAN service and naturally synchronizes with SD-
WAN service.
l The SD-WAN service defines priority zones, whose SLA state determines the advertised community preferable
string.
l The SD-WAN service defines the hold-down-time, which determines how long an advertised community
preferable string can be kept when it is expected to be changed.
l Add sla-stickness setting in the SD-WAN service configurations:
config system sdwan
config service
edit <id>
set mode sla
set sla-stickiness {enable | disable}
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 111
Fortinet Inc.
Routing
1. Overlays to the primary and secondary PoP are assigned separately into an SD-WAN primary and secondary zone
on the spoke.
2. One SD-WAN service rule is defined to include these zones as SD-WAN members.
3. When the primary zone is in SLA (minimum-sla-meet-members is met), the SD-WAN service rule steers traffic
to the in SLA overlay members.
4. When the primary zone is out of SLA (minimum-sla-meet-members is not met), the SD-WAN service rule steers
traffic to the in SLA overlay members in the secondary zone.
5. When the primary zone SLA is recovered:
a. If sla-stickness is disabled on the SD-WAN service rule, then traffic will wait the duration of the hold-
down-time before switching back to in SLA overlays in the primary zone.
b. If sla-stickness is enabled on the SD-WAN service rule, then existing traffic will be kept on the in SLA
overlays on the secondary zone, but new traffic will be steered to in SLA overlays in the primary zone.
The incoming traffic from the core/external peers, to PoP, to spoke operates as follows:
1. When the primary zone is in SLA, the spoke uses the preferable route map to advertise local routes with the in SLA
community to hubs in the primary and secondary PoPs.
a. Hubs in the primary PoP translate the in SLA community into a short AS path and advertise it to external peers
to attract incoming traffic.
b. Hubs in the secondary PoP translate the in SLA community into a longer AS path and advertise it to external
peers to deflect incoming traffic.
2. If the number of in SLA overlays in the primary zone is less than the minimum-sla-meet-members, then the
spoke will use the default route map to advertise routes instead of with an out of SLA community to hubs in the
primary PoP.
a. Hubs in the primary PoP translate the out of SLA community into a longest AS path, and advertise it to external
peers to deflect incoming traffic.
b. As a result, inbound traffic is routed to hubs in the secondary PoP.
3. When the primary zone SLA is recovered:
a. The spoke will wait the duration of the predefined hold-down-time in the SD-WAN service rule to use the
preferable route map again to advertise routes with the in SLA community to hubs in the primary PoP.
b. As a result, inbound traffic will be routed back to hubs in the primary PoP.
By configuring the neighbor group for spokes under the hub's SD-WAN neighbor configuration, if all paths from the hub
to external peers are detected as out of SLA, then the hub will use the default route map to deny external routes to
spokes that belong to this neighbor group defined on the hub. As a result, spokes will skip that specific hub and connect
to external peers from other hubs.
This allows spokes to only measure overlay quality to each hub, and hubs to manage health checks to services by
external peers. This significantly decreases the number of health check probes directly from the spoke to services and
decreases the overall complexity. The complexity is further simplified by using multiple VRFs or segmentation where
each spoke needs to send health check probes.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 112
Fortinet Inc.
Routing
Example
Normally, outbound and inbound traffic go through hubs in the primary PoP. If the number of in SLA overlays to the
primary PoP is less than the minimum-sla-meet-members (set to 2 in this example), bi-directional traffic needs to be
switched to hubs in the secondary PoP. But when the primary PoP recovers and the minimum-sla-meet-members is
met again, bi-directional traffic is forced back to hubs in the primary PoP after the predefined hold-down-time
duration.
The hubs do not require SD-WAN configurations to the spokes. However, they use SD-WAN for connections to external
peer routers.
The following configurations highlight important routing and SD-WAN settings that must be configured on the spoke and
the hubs. It is assumed that other configurations such as underlays, IPsec VPN overlays, loopbacks, static routes, and
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 113
Fortinet Inc.
Routing
To configure Spoke-1:
1. Create the primary (PoP1) and secondary (PoP2) zones, and set the minimum-sla-meet-members to 2 on
PoP1:
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
edit "PoP1"
set minimum-sla-meet-members 2
next
edit "PoP2"
next
end
end
2. Add the overlay members to each zone. Four overlays are defined for PoP1, and two overlays are defined for PoP2:
config system sdwan
config members
edit 1
set interface "H1_T11"
set zone "PoP1"
next
edit 2
set interface "H1_T22"
set zone "PoP1"
next
edit 3
set interface "H2_T11"
set zone "PoP1"
next
edit 4
set interface "H2_T22"
set zone "PoP1"
next
edit 5
set interface "H3_T11"
set zone "PoP2"
next
edit 6
set interface "H3_T22"
set zone "PoP2"
next
end
end
3. Configure a performance SLA health check to a probe server behind the three hubs:
config system sdwan
config health-check
edit "Hubs"
set server "172.31.100.100"
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 114
Fortinet Inc.
Routing
4. Configure the service rule with the following settings: use SLA mode, enable zone mode to steer traffic based on the
zone statuses, enable sla-stickiness, and use a 30-second hold down so that upon a recovery, existing
sessions will remain on the secondary PoP while new sessions will switch back to the primary PoP once the 30-
second duration ends:
config system sdwan
config service
edit 1
set mode sla
set zone-mode enable
set dst "all"
set src "CORP_LAN"
set hold-down-time 30
set sla-stickiness enable
config sla
edit "Hubs"
set id 1
next
end
set priority-zone "PoP1" "PoP2"
next
end
end
Since the PoP1 zone is specified before PoP2, PoP1 is regarded as the primary and preferred over the PoP2 zone.
5. Configure the in_sla and out_sla route maps that define the communities that are advertised to the hub when the
zones are in and out of SLA.
a. Configure the access list:
config router access-list
edit "net10"
config rule
edit 1
set prefix 10.0.3.0 255.255.255.0
next
end
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 115
Fortinet Inc.
Routing
6. Configure the default route map for out of SLA scenarios, preferable route map for in SLA scenarios, and the local
network to be advertised:
config router bgp
config neighbor
edit "172.31.0.1"
...
set route-map-out "out_sla"
set route-map-out-preferable "in_sla"
...
next
edit "172.31.0.2"
...
set route-map-out "out_sla"
set route-map-out-preferable "in_sla"
...
next
edit "172.31.0.129"
...
set route-map-out "out_sla"
set route-map-out-preferable "in_sla"
...
next
end
config network
edit 1
set prefix 10.0.3.0 255.255.255.0
next
end
...
end
7. Define SD-WAN neighbors for each hub. The minimum-sla-meet-members is configured for the Hub-1 neighbor
so that bi-directional traffic goes through Hub-1 as long as the in SLA overlays to Hub-1 are no less than 1.
Associate the previously defined service rule to each SD-WAN neighbor:
config system sdwan
config neighbor
edit "172.31.0.1"
set member 1 2
set minimum-sla-meet-members 1
set service-id 1
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 116
Fortinet Inc.
Routing
next
edit "172.31.0.2"
set member 3 4
set service-id 1
next
edit "172.31.0.129"
set member 5 6
set service-id 1
next
end
end
1. Configure the SD-WAN zone, members, and health check for the external connections to peer routers.
Performance SLA health checks are sent to external servers in order to measure the health of the external
connections:
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
end
config members
edit 1
set interface "port4"
next
edit 2
set interface "port5"
next
end
config health-check
edit "external_peers"
set server "10.0.1.2"
set members 1 2
config sla
edit 1
set link-cost-factor latency
set latency-threshold 200
next
end
next
end
end
2. Configure the route maps for in and out of SLA scenarios. When out of SLA (one of the external connections is
down), external routes are denied to be advertised to the spokes that are part of the neighbor group.
a. Configure the access list:
config router access-list
edit "net_Lo"
config rule
edit 1
set prefix 172.31.200.200 255.255.255.255
next
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 117
Fortinet Inc.
Routing
end
next
end
3. In the BGP settings, configure the external network prefix to advertise. Then configure the neighbor group and
neighbor range for the spokes. Configure the preferable and default route maps to define the behavior when the
external connections are in and out of SLA:
config router bgp
...
config network
edit 1
set prefix 172.31.200.200 255.255.255.255
next
end
config neighbor-group
edit "EDGE"
...
set route-map-out "out_sla"
set route-map-out-preferable "in_sla"
...
next
end
config neighbor-range
edit 1
set prefix 172.31.0.64 255.255.255.192
set neighbor-group "EDGE"
next
end
...
end
4. Configure the SD-WAN neighbor to match the neighbor group that includes spokes as members. Specify that at
least one of the external peer connections needs to be up to be considered in SLA:
config system sdwan
config neighbor
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 118
Fortinet Inc.
Routing
edit "EDGE"
set member 1 2
set minimum-sla-meet-members 1
set health-check "external_peers"
set sla-id 1
next
end
end
The following tests use diagnostic commands on various FortiGates to verify the connections in the SD-WAN
configuration.
1. Verify the SD-WAN service rules status on Spoke-1. When all six overlays are in SLA on Spoke-1, the primary PoP
and primary zone PoP1 are preferred. In particular, the overlay H1_T11 over PoP1 is preferred:
Spoke-1 (root) # diagnose sys sdwan service
Service(1): Address Mode(IPV4) flags=0x1c200 use-shortcut-sla use-shortcut sla-
stickiness
Tie break: cfg
Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(sla), sla-
compare-order
Hold down time(30) seconds, Hold start at 362646 second, now 362646
Service role: standalone
Members(6):
1: Seq_num(1 H1_T11 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
2: Seq_num(2 H1_T22 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
3: Seq_num(3 H2_T11 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
4: Seq_num(4 H2_T22 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
5: Seq_num(5 H3_T11 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
6: Seq_num(6 H3_T22 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
Src address(1):
10.0.0.0-10.255.255.255
Dst address(1):
0.0.0.0-255.255.255.255
2. Verify the BGP learned routes on Hub-1. The local route with in SLA community 10:1 is advertised to all hubs.
Though, the AS paths on Hub-1 and Hub-2 are shorter than Hub-3:
PoP1-Hub1 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 119
Fortinet Inc.
Routing
1. Verify the health check status on Spoke-1. The H1_T11 overlay on Hub-1/PoP1 is out of SLA:
Spoke-1 (root) # diagnose sys sdwan health-check
Health Check(Hubs):
Seq(1 H1_T11): state(alive), packet-loss(0.000%) latency(220.214), jitter(0.015), mos
(4.104), bandwidth-up(999999), bandwidth-dw(999998), bandwidth-bi(1999997) sla_map=0x0
Seq(2 H1_T22): state(alive), packet-loss(0.000%) latency(0.196), jitter(0.014), mos
(4.404), bandwidth-up(999999), bandwidth-dw(999999), bandwidth-bi(1999998) sla_map=0x1
Seq(3 H2_T11): state(alive), packet-loss(0.000%) latency(0.173), jitter(0.008), mos
(4.404), bandwidth-up(999998), bandwidth-dw(999997), bandwidth-bi(1999995) sla_map=0x1
…
2. Verify the SD-WAN neighbor status. The SD-WAN neighbor still displays Hub-1’s zone status as pass/alive:
Spoke-1 (root) # diagnose sys sdwan neighbor
SD-WAN neighbor status: hold-down(disable), hold-down-time(0), hold_boot_time(0)
Selected role(standalone) last_secondary_select_time/current_time in seconds
0/436439
Neighbor(172.31.0.1): member(1 2)role(standalone)
Health-check(:0) sla-pass selected alive
Neighbor(172.31.0.2): member(3 4)role(standalone)
Health-check(:0) sla-pass selected alive
Neighbor(172.31.0.129): member(5 6)role(standalone)
Health-check(:0) sla-pass selected alive
3. Verify the SD-WAN service rules status. Spoke-1 steers traffic to the H1_T22 overlay through Hub-1:
Spoke-1 (root) # diagnose sys sdwan service
Service(1): Address Mode(IPV4) flags=0x1c200 use-shortcut-sla use-shortcut sla-
stickiness
Tie break: cfg
Gen(2), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(sla), sla-
compare-order
Hold down time(30) seconds, Hold start at 364162 second, now 364162
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 120
Fortinet Inc.
Routing
4. Verify the BGP learned routes on Hub-1. The hubs continue to receive community 10:1 from the spoke and continue
to route incoming traffic through Hub-1:
PoP1-Hub1 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
Origin IGP metric 0, localpref 100, valid, internal, best
Community: 10:1
Last update: Mon Jul 17 15:16:57 2023
Other in SLA overlays in zone PoP1 though Hub-2 are still preferred over PoP2 in this scenario.
1. Verify the health check status on Spoke-1. Both H1_T11 and H1_T22 overlays on Hub-1/PoP1 are out of SLA:
Spoke-1 (root) # diagnose sys sdwan health-check
Health Check(Hubs):
Seq(1 H1_T11): state(alive), packet-loss(0.000%) latency(220.220), jitter(0.018), mos
(4.103), bandwidth-up(999999), bandwidth-dw(999998), bandwidth-bi(1999997) sla_map=0x0
Seq(2 H1_T22): state(alive), packet-loss(0.000%) latency(220.174), jitter(0.007), mos
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 121
Fortinet Inc.
Routing
2. Verify the SD-WAN neighbor status. The SD-WAN neighbor displays Hub-1’s zone status as failed. However, SD-
WAN Hub-2 is pass/alive:
Spoke-1 (root) # diagnose sys sdwan neighbor
SD-WAN neighbor status: hold-down(disable), hold-down-time(0), hold_boot_time(0)
Selected role(standalone) last_secondary_select_time/current_time in seconds
0/436535
Neighbor(172.31.0.1): member(1 2)role(standalone)
Health-check(:0) sla-fail alive
Neighbor(172.31.0.2): member(3 4)role(standalone)
Health-check(:0) sla-pass selected alive
Neighbor(172.31.0.129): member(5 6)role(standalone)
Health-check(:0) sla-pass selected alive
3. Verify the SD-WAN service rules status. Spoke-1 steers traffic to the H2_T11 overlay through Hub-2:
Spoke-1 (root) # diagnose sys sdwan service
Service(1): Address Mode(IPV4) flags=0x1c200 use-shortcut-sla use-shortcut sla-
stickiness
Tie break: cfg
Gen(3), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(sla), sla-
compare-order
Hold down time(30) seconds, Hold start at 364489 second, now 364490
Service role: standalone
Members(6):
1: Seq_num(3 H2_T11 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
2: Seq_num(4 H2_T22 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
3: Seq_num(5 H3_T11 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
4: Seq_num(6 H3_T22 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
5: Seq_num(1 H1_T11 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
6: Seq_num(2 H1_T22 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
Src address(1):
10.0.0.0-10.255.255.255
Dst address(1):
0.0.0.0-255.255.255.255
4. Verify the BGP learned routes on Hub-1 and Hub-2. Hub-2 and Hub-3 continue to receive community 10:1 from
Spoke-1, but Hub-1 receives the out of SLA community of 10:2.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 122
Fortinet Inc.
Routing
a. On Hub-1:
PoP1-Hub1 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
Origin IGP metric 0, localpref 100, valid, internal, best
Community: 10:2
Last update: Mon Jul 17 18:08:58 2023
b. On Hub-2:
PoP1-Hub2 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
Origin IGP metric 0, localpref 100, valid, internal, best
Community: 10:1
Last update: Mon Jul 17 15:31:43 2023
The number of in SLA overlays in zone PoP1 is less than the minimum-sla-meet-members in zone PoP1. The SD-
WAN service rule for Hub-2 is forcibly marked as sla(0x0) or out of SLA.
1. Verify the health check status on Spoke-1. All three H1_T11, H1_T22, and H2_T11 overlays on PoP1 are out of
SLA:
Spoke-1 (root) # diagnose sys sdwan health-check
Health Check(Hubs):
Seq(1 H1_T11): state(alive), packet-loss(0.000%) latency(220.219), jitter(0.019), mos
(4.103), bandwidth-up(999999), bandwidth-dw(999998), bandwidth-bi(1999997) sla_map=0x0
Seq(2 H1_T22): state(alive), packet-loss(0.000%) latency(220.184), jitter(0.008), mos
(4.104), bandwidth-up(999999), bandwidth-dw(999999), bandwidth-bi(1999998) sla_map=0x0
Seq(3 H2_T11): state(alive), packet-loss(0.000%) latency(220.171), jitter(0.009), mos
(4.104), bandwidth-up(999998), bandwidth-dw(999997), bandwidth-bi(1999995) sla_map=0x0
Seq(4 H2_T22): state(alive), packet-loss(0.000%) latency(0.180), jitter(0.013), mos
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 123
Fortinet Inc.
Routing
2. Verify the SD-WAN neighbor status. The SD-WAN neighbor displays Hub-1 and Hub-2’s zone status as failed:
Spoke-1 (root) # diagnose sys sdwan neighbor
SD-WAN neighbor status: hold-down(disable), hold-down-time(0), hold_boot_time(0)
Selected role(standalone) last_secondary_select_time/current_time in seconds
0/436605
Neighbor(172.31.0.1): member(1 2)role(standalone)
Health-check(:0) sla-fail alive
Neighbor(172.31.0.2): member(3 4)role(standalone)
Health-check(:0) sla-fail alive
Neighbor(172.31.0.129): member(5 6)role(standalone)
Health-check(:0) sla-pass selected alive
3. Verify the SD-WAN service rules status. Since the minimum SLA members is not met for the primary zone (PoP1),
the remaining overlay in PoP1 associated with the SD-WAN service rule is forcibly set to out of SLA. Spoke-1 steers
traffic to the H3_T11 overlay through Hub-3:
Spoke-1 (root) # diagnose sys sdwan service
Service(1): Address Mode(IPV4) flags=0x1c200 use-shortcut-sla use-shortcut sla-
stickiness
Tie break: cfg
Gen(6), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(sla), sla-
compare-order
Hold down time(30) seconds, Hold start at 365341 second, now 365341
Service role: standalone
Members(6):
1: Seq_num(5 H3_T11 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
2: Seq_num(6 H3_T22 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
3: Seq_num(1 H1_T11 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
4: Seq_num(2 H1_T22 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
5: Seq_num(3 H2_T11 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
6: Seq_num(4 H2_T22 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
Src address(1):
10.0.0.0-10.255.255.255
Dst address(1):
0.0.0.0-255.255.255.255
4. Verify the BGP learned routes on each hub. Hub-3 continues to receive community 10:1 from Spoke-1, but Hub-1
and Hub-2 receive the out of SLA community of 10:2.
a. On Hub-1:
PoP1-Hub1 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 124
Fortinet Inc.
Routing
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
Origin IGP metric 0, localpref 100, valid, internal, best
Community: 10:2
Last update: Mon Jul 17 18:22:14 2023
b. On Hub-2:
PoP1-Hub2 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
Origin IGP metric 0, localpref 100, valid, internal, best
Community: 10:2
Last update: Mon Jul 17 18:37:53 2023
c. On Hub-3:
PoP2-Hub3 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
Origin IGP metric 0, localpref 100, valid, internal, best
Community: 10:1
Last update: Mon Jul 17 14:39:04 2023
SD-WAN member H2_T11 recovers and brings the number of overlays in SLA back to being above the minimum-sla-
meet-members threshold in PoP1. After the hold down time duration (30 seconds), in SLA overlays in zone PoP1 are
preferred over PoP2 again. With sla-stickiness enabled, existing traffic is kept on H3_T11, but new traffic is steered
to H2_T11.
1. Verify the SD-WAN service rules status on Spoke-1. The hold down timer has not yet passed, so H2_T11 is not yet
preferred—even though the SLA status is pass/alive:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 125
Fortinet Inc.
Routing
2. Verify the SD-WAN service rules status again after the hold down timer passes. H2_T11 and H2_T22 from PoP1
are now preferred:
Spoke-1 (root) # diagnose sys sdwan service
Service(1): Address Mode(IPV4) flags=0x1c200 use-shortcut-sla use-shortcut sla-
stickiness
Tie break: cfg
Gen(17), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(sla), sla-
compare-order
Hold down time(30) seconds, Hold start at 432003 second, now 432003
Service role: standalone
Members(6):
1: Seq_num(3 H2_T11 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
2: Seq_num(4 H2_T22 PoP1), alive, sla(0x1), gid(0), cfg_order(0), local cost(0),
selected
3: Seq_num(5 H3_T11 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
4: Seq_num(6 H3_T22 PoP2), alive, sla(0x1), gid(0), cfg_order(1), local cost(0),
selected
5: Seq_num(1 H1_T11 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
6: Seq_num(2 H1_T22 PoP1), alive, sla(0x0), gid(0), cfg_order(0), local cost(0),
selected
3. Verify the BGP learned routes on Hub-2, which now receives community 10:1 from Spoke-1:
PoP1-Hub2 (root) # get router info bgp network 10.0.3.0/24
VRF 0 BGP routing table entry for 10.0.3.0/24
Paths: (1 available, best #1, table Default-IP-Routing-Table)
Not advertised to any peer
Original VRF 0
Local, (Received from a RR-client)
172.31.0.65 from 172.31.0.65 (172.31.0.65)
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 126
Fortinet Inc.
Routing
Since Hub-1 has an in SLA path to external peers, it will advertise the external route with destination 172.31.200.200/32
to Spoke-1.
1. Verify the health check status on Hub-1. Note that port4 meets SLA, but port5 does not:
PoP1-Hub1 (root) # diagnose sys sdwan health-check
Health Check(external_peers):
Seq(1 port4): state(alive), packet-loss(0.000%) latency(0.161), jitter(0.009), mos
(4.404), bandwidth-up(999999), bandwidth-dw(999999), bandwidth-bi(1999998) sla_map=0x1
Seq(2 port5): state(dead), packet-loss(100.000%) sla_map=0x0
2. Verify the SD-WAN neighbor status. The minimum-sla-meet-members threshold of 1 is still met:
PoP1-Hub1 (root) # diagnose sys sdwan neighbor
Neighbor(EDGE): member(1 2)role(standalone)
Health-check(external_peers:1) sla-pass selected alive
3. Verify the BGP learned routes. Hub-1 still advertises the external route to the Spoke-1 BGP neighbor:
PoP1-Hub1 (root) # get router info bgp neighbors 172.31.0.65 advertised-routes
VRF 0 BGP table version is 13, local router ID is 172.31.0.1
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight RouteTag Path
*>i172.31.200.200/32 172.31.0.1 100 32768 0 i <-/->
Total number of prefixes 1
In this case, Hub-1 will now advertise the default route map, which denies the advertisement of the external route.
Spoke-1 will now route traffic to the next hub.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 127
Fortinet Inc.
Routing
1. Verify the health check status on Hub-1. Note that port4 and port5 do not meet SLA:
PoP1-Hub1 (root) # diagnose sys sdwan health-check
Health Check(external_peers):
Seq(1 port4): state(dead), packet-loss(100.000%) sla_map=0x0
Seq(2 port5): state(dead), packet-loss(100.000%) sla_map=0x0
2. Verify the SD-WAN neighbor status. The minimum-sla-meet-members threshold of 1 is not met:
PoP1-Hub1 (root) # diagnose sys sdwan neighbor
Neighbor(EDGE): member(1 2)role(standalone)
Health-check(external_peers:1) sla-fail dead
3. Verify the BGP learned routes. Hub-1 does not advertise any external routes to the Spoke-1 BGP neighbor:
PoP1-Hub1 (root) # get router info bgp neighbors 172.31.0.65 advertised-routes
% No prefix for neighbor 172.31.0.65
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 128
Fortinet Inc.
SD-WAN steering
7.4.0
l Classifying SLA probes for traffic prioritization on page 129
l Support IPv6 application based steering in SD-WAN on page 134
l Using a single IKE elector in ADVPN to match all SD-WAN control plane traffic on page 139
l VRF-aware SD-WAN IPv6 health checks on page 147
l Support maximize bandwidth (SLA) to load balance spoke-to-spoke traffic between multiple ADVPN shortcuts on
page 148
l Allow multicast traffic to be steered by SD-WAN on page 155
7.4.1
l Support HTTPS performance SLA health checks 7.4.1 on page 169
l Using load balancing in a manual SD-WAN rule without configuring an SLA target 7.4.1 on page 171
Support for traffic classification on SLA probes has been implemented to ensure they are prioritized in times of
congestion. This prevents SD-WAN link flapping and unexpected routing behaviors, and stabilizes SD-WAN from
unnecessary failovers.
SLA probes can now be classified into a specific class ID so that SLA probes assigned to a class ID with higher priority
are prioritized over other traffic. SLA probes are assigned using the class-id command:
config system sdwan
config health-check
edit <health-check name>
set class-id <class name>
next
end
end
Example
In this example, SLA probes are assigned into different class ID. The interfaces dmz and vd1-01 both have outbandwidth
of 1000000 Kbps (1 Gbps) configured. Three traffic shaping classes are defined:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 129
Fortinet Inc.
SD-WAN steering
Under this scheme, when congestion occurs, traffic in each class will have their guaranteed bandwidth honored. If there
is remaining bandwidth, higher priority traffic will get the bandwidth. On the SD-WAN health check, probes to server
2.2.2.2 are assigned to class 2 (sla_probe). This means it has a guaranteed bandwidth and has the highest priority to
use unused bandwidth. This allows SD-WAN health check to function properly even during times of congestion.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 130
Fortinet Inc.
SD-WAN steering
end
next
end
4. Configure the SD-WAN health check and assign the SLA probes into class 2:
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
end
config members
edit 1
set interface "dmz"
set gateway 172.16.208.2
next
edit 2
set interface "vd1-p1"
next
end
config health-check
edit "1"
set server "2.2.2.2"
set members 1 2
set class-id 2
config sla
edit 1
next
end
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 131
Fortinet Inc.
SD-WAN steering
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 132
Fortinet Inc.
SD-WAN steering
When verifying the class assignment, the counter value should increase.
The example also demonstrates assigning SLA probes to class 4 (sla_probe_2), in which case the probes get medium
priority.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 133
Fortinet Inc.
SD-WAN steering
IPv6 based SD-WAN rules allow matching of applications and application categories. The following options are available
with set addr-mode ipv6:
config system sdwan
config service
edit
set addr-mode ipv6
set internet-service enable
set internet-service-app-ctrl
set internet-service-app-ctrl-group
set internet-service-app-ctrl-category
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 134
Fortinet Inc.
SD-WAN steering
Example
In this example, SD-WAN is configured to use an IPv6 service rule to steer traffic from FGT_A to FGT_B based on the
following application control options:
l Application Telnet
l An application group for ping
l An application category that includes SSH
When the rule is matched, traffic is steered based on the lowest cost SLA strategy. In this example, vlan100 is the
preferred interface, and traffic is routed to vlan100 on FGT_B.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 135
Fortinet Inc.
SD-WAN steering
next
end
config service
edit 1
set name "1"
set addr-mode ipv6
set mode sla
set internet-service enable
set internet-service-app-ctrl 16091
set internet-service-app-ctrl-group "network-Ping"
set internet-service-app-ctrl-category 15
config sla
edit "1"
set id 1
next
end
set priority-members 4 1 2 3
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 136
Fortinet Inc.
SD-WAN steering
3. Initiate traffic for ping, Telnet, and SSH to FGT_B, then FGT_A will learn 3T information for these applications, and
use the SD-WAN rule to route traffic for the applications to the preferred interface of vlan100.
l Following is the sniffer traffic for ping application. The ping traffic flows out of DMZ before 3T information is
recognized, then out from vlan100 after T3 traffic is recognized:
# diagnose sniffer packet any 'host 2000::2:0:0:4' 4
interfaces=[any]
filters=[host 2000::2:0:0:4]
16.952138 port5 in 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 1
[flowlabel 0x5080d]
16.954571 dmz out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 1
[flowlabel 0x5080d]
16.954920 dmz in 2000::2:0:0:4 -> 2000:172:16:205::100: icmp6: echo reply seq 1
16.955086 port5 out 2000::2:0:0:4 -> 2000:172:16:205::100: icmp6: echo reply seq 1
17.953277 port5 in 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 2
[flowlabel 0x5080d]
17.953455 dmz out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 2
[flowlabel 0x5080d]
17.953622 dmz in 2000::2:0:0:4 -> 2000:172:16:205::100: icmp6: echo reply seq 2
17.953722 port5 out 2000::2:0:0:4 -> 2000:172:16:205::100: icmp6: echo reply seq 2
18.959823 port5 in 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3
[flowlabel 0x5080d]
18.960005 vlan100 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq
3 [flowlabel 0x5080d]
18.960015 agg1 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3
[flowlabel 0x5080d]
18.960024 port4 out 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 3
[flowlabel 0x5080d]
18.960295 vlan100 in 2000::2:0:0:4 -> 2000:172:16:205::100: icmp6: echo reply seq 3
18.960449 port5 out 2000::2:0:0:4 -> 2000:172:16:205::100: icmp6: echo reply seq 3
19.983802 port5 in 2000:172:16:205::100 -> 2000::2:0:0:4: icmp6: echo request seq 4
[flowlabel 0x5080d]
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 137
Fortinet Inc.
SD-WAN steering
l Following is the sniffer traffic for Telnet application group. The Telnet traffic flows out of agg1 before 3T
information is recognized, then out from vlan100 after T3 traffic is recognized:
# diagnose sniffer packet any 'host 2000::2:0:0:4 and dst port 23' 4
interfaces=[any]
filters=[host 2000::2:0:0:4 and dst port 23]
4.096393 port5 in 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: syn 2723132265
[flowlabel 0xd4e65]
4.096739 agg1 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: syn 2723132265
[flowlabel 0xd4e65]
4.096752 port4 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: syn 2723132265
[flowlabel 0xd4e65]
.........
5.503679 port5 in 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: psh 2723132345 ack
544895389 [flowlabel 0xd4e65]
5.503894 vlan100 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: psh 2723132345
ack 544895389 [flowlabel 0xd4e65]
5.503907 agg1 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: psh 2723132345 ack
544895389 [flowlabel 0xd4e65]
5.503918 port4 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: psh 2723132345 ack
544895389 [flowlabel 0xd4e65]
5.504641 port5 in 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: ack 544895390
[flowlabel 0xd4e65]
5.504713 vlan100 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: ack 544895390
[flowlabel 0xd4e65]
5.504721 agg1 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: ack 544895390
[flowlabel 0xd4e65]
5.504728 port4 out 2000:172:16:205::100.43128 -> 2000::2:0:0:4.23: ack 544895390
[flowlabel 0xd4e65]
l Following is the sniffer traffic for SSH application category. The SSH traffic flows out of dmz before 3T
information is recognized, then out from vlan100 after T3 traffic is recognized:
# diagnose sniffer packet any 'host 2000::2:0:0:4 and dst port 22' 4
interfaces=[any]
filters=[host 2000::2:0:0:4 and dst port 22]
5.910752 port5 in 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: syn 980547187
[flowlabel 0xf1403]
5.911002 dmz out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: syn 980547187
[flowlabel 0xf1403]
5.914550 port5 in 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: ack 583860244
[flowlabel 0xf1403]
5.914651 dmz out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: ack 583860244
[flowlabel 0xf1403]
.....
8.116507 port5 in 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261 ack
583862554 [class 0x10] [flowlabel 0xf1403]
8.116663 vlan100 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261
ack 583862554 [class 0x10] [flowlabel 0xf1403]
8.116674 agg1 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261 ack
583862554 [class 0x10] [flowlabel 0xf1403]
8.116685 port4 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: psh 980549261 ack
583862554 [class 0x10] [flowlabel 0xf1403]
8.118135 port5 in 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: ack 583862598
[class 0x10] [flowlabel 0xf1403]
8.118171 vlan100 out 2000:172:16:205::100.35146 -> 2000::2:0:0:4.22: ack 583862598
[class 0x10] [flowlabel 0xf1403]
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 138
Fortinet Inc.
SD-WAN steering
In the SD-WAN with ADVPN use case, two spokes can communicate with each other on the control plane by an ADVPN
shortcut. In order to separate the control traffic from data traffic, the IKE creates a dynamic selector for health check
packets sent between the spokes. BGP traffic is also matched by this dynamic IKE selector. Therefore, when spokes
establish BGP peering with other spokes, the BGP traffic does not count towards the data traffic and will not impact
IPsec idle timeout and shortcut tunnel tear down.
Example
In this example, SD-WAN with ADVPN is configured. The IPsec ADVPN shortcut tunnel is required to tear down when it
is idle. SD-WAN health checks are configured, and BGP neighbors established between the spokes is required.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 139
Fortinet Inc.
SD-WAN steering
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 140
Fortinet Inc.
SD-WAN steering
set snmp-index 50
set interface "port2"
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 141
Fortinet Inc.
SD-WAN steering
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 142
Fortinet Inc.
SD-WAN steering
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 143
Fortinet Inc.
SD-WAN steering
end
config network
edit 1
set prefix 192.168.4.0 255.255.255.0
next
end
end
parent=Spoke1 index=0
proxyid_num=2 child_num=0 refcnt=6 ilast=0 olast=0 ad=r/2
stat: rxp=0 txp=1 rxb=0 txb=40
dpd: mode=on-demand on=1 idle=20000ms retry=3 count=0 seqno=1
natt: mode=none draft=0 interval=0 remote_port=0
fec: egress=0 ingress=0
proxyid=Spoke1 proto=0 sa=1 ref=5 serial=2 adr health-check
src: 0:0.0.0.0-255.255.255.255:0
dst: 0:10.10.1.2-10.10.1.2:0
SA: ref=3 options=92626 type=00 soft=0 mtu=1438 expire=43055/0B replaywin=2048
seqno=214 esn=0 replaywin_lastseq=00000213 qat=0 rekey=0 hash_search_len=1
life: type=01 bytes=0/0 timeout=43189/43200
dec: spi=17a473be esp=aes key=16 40dfada9532cefe5563de71ac5908aa1
ah=sha1 key=20 36e967d9b6fce8807132c3923d0edfae6cb6c115
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 144
Fortinet Inc.
SD-WAN steering
The dynamic selector is created (highlighted) for SD-WAN control traffic, SD-WAN health checks, and BGP
between spokes traffic.
3. Verify the BGP neighbors and check the routing table:
Spoke1 # get router info bgp summary
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 145
Fortinet Inc.
SD-WAN steering
4. Stop sending traffic between the spokes, and wait for a few minutes (idle timeout).
5. Verify the IPsec tunnel state on the Spoke1 FortiGate:
Spoke1 # diagnose vpn tunnel list
list all ipsec tunnel in vd 0
------------------------------------------------------
name=Spoke1 ver=2 serial=1 172.16.200.1:0->172.16.200.4:0 tun_id=172.16.200.4 tun_
id6=::172.16.200.4 dst_mtu=1500 dpd-link=on weight=1
bound_if=19 lgwy=static/1 tun=intf mode=auto/1 encap=none/560 options[0230]=create_dev
frag-rfc role=primary accept_traffic=1 overlay_id=0
The shortcut tunnel between the spokes has been torn down. When data traffic is idle, the BGP traffic does not get
sent on the data traffic selector, so the tunnel is not kept alive. This behavior is the expected, which consequently
allows the shortcut tunnel to be torn down when idle.
6. Verify the IKE debugs messages to confirm the ADVPN shortcut was torn down:
Spoke1 # diagnose debug enable
Spoke1 # diagnose debug application ike -1
...
ike 0:Spoke1_0: connection idle time-out
ike 0:Spoke1_0: deleting
ike 0:Spoke1_0: flushing
ike 0:Spoke1_0: deleting IPsec SA with SPI 75cde338
ike 0:Spoke1_0:Spoke1: deleted IPsec SA with SPI 75cde338, SA count: 0
ike 0:Spoke1_0: sending SNMP tunnel DOWN trap for Spoke1
ike 0:Spoke1_0: tunnel down event 0.0.0.0
ike 0:Spoke1_0:Spoke1: delete
ike 0:Spoke1_0: deleting IPsec SA with SPI 75cde337
ike 0:Spoke1_0:Spoke1: deleted IPsec SA with SPI 75cde337, SA count: 0
ike 0:Spoke1_0: sending SNMP tunnel DOWN trap for Spoke1
ike 0:Spoke1_0: tunnel down event 0.0.0.0
ike 0:Spoke1_0:Spoke1: delete
ike 0:Spoke1_0: flushed
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 146
Fortinet Inc.
SD-WAN steering
This example shows how to configure VRF and source for SD-WAN IPv6 health check on a standalone FortiGate.
To configure the VRF and source for SD-WAN IPv6 health check:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 147
Fortinet Inc.
SD-WAN steering
set members 1 2
next
end
end
If an SD-WAN member can reach the server, but not on VRF 10, then it is dead:
# diagnose sys sdwan health-check
Health Check(ping6):
Seq(1 R150): state(alive), packet-loss(0.000%) latency(0.042), jitter(0.022), mos(4.404),
bandwidth-up(0), bandwidth-dw(0), bandwidth-bi(0) sla_map=0x0
Seq(2 R160): state(dead), packet-loss(100.000%) sla_map=0x0
Only the SD-WAN member with the proper VRF route can have the protocol 17 route, so the VRF is functioning correctly:
# diagnose ipv6 route list | grep protocol=17
vf=0 tbl=10 type=01(unicast) protocol=17(fortios) flag=00000000 prio=1024
src:2000:10:100:1::2/128-> dst:2000:10:100:2::22/128 gwy:2000:10:100:1::1 dev=48(R150)
pmtu=1500
When ADVPN is configured on a FortiGate spoke along with an SD-WAN rule set to Maximize Bandwidth SLA (GUI) or
load balance mode (CLI) as well as tie-break set to fib-best-match, then spoke-to-spoke traffic is load balanced
between multiple ADVPN shortcuts when the shortcuts are within the configured SLA conditions.
Following is an example configuration with set mode load-balance and set tie-break fib-best-match
enabled:
config system sdwan
config service
edit 3
set mode load-balance
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
set tie-break fib-best-match
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 148
Fortinet Inc.
SD-WAN steering
Example
In this example SD-WAN is configured between one hub and multiple spokes, and the SD-WAN configuration shows
SD-WAN rule 3 with the following required settings to enable spoke-to-spoke traffic between multiple ADVPN shortcuts:
l set mode load-balance
l set tie-break fib-best-match
show system sdwan
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
edit "zon2"
next
end
config members
edit 1
set interface "vd2-1"
set cost 10
next
edit 2
set interface "vd2-2"
set cost 20
next
end
config health-check
edit "ping"
set server "11.11.11.11"
set members 1 2
config sla
edit 1
set latency-threshold 200
set jitter-threshold 50
next
edit 2
next
end
next
edit "1"
next
end
config service
edit 1
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 149
Fortinet Inc.
SD-WAN steering
To trigger spoke-to-spoke communication, run an ICMP ping on PC A with IP address 22.1.1.22 behind spoke 1 that is
destined for PC B with IP address 33.1.1.33 behind spoke 2. The spoke-to-spoke traffic will be used to demonstrate load
balancing between shortcuts in the CLI output of this topic.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 150
Fortinet Inc.
SD-WAN steering
Dst address(1):
0.0.0.0-255.255.255.255
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 151
Fortinet Inc.
SD-WAN steering
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 152
Fortinet Inc.
SD-WAN steering
^C
84 packets received by filter
0 packets dropped by kernel
6. Check the sniffer packet output after changing the setting to set tie-break fib-best-match.
The following packet sniffer output of ICMP pings demonstrates how load balancing of spoke-to-spoke is limited and
only occurs between shortcuts vd2-1_0 and vd2-2_0, which are within SLA.
# diagnose sniffer packet any "host 33.1.1.13" 4
interfaces=[any]
filters=[host 33.1.1.13]
2.592392 vd22-vlan22 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592394 npu0_vlink1 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592400 vd2-vlan22 in 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592420 vd2-1_0 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592432 vd3-1_0 in 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592441 vd3-vlan33 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592442 npu0_vlink0 out 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592447 vd33-vlan33 in 22.1.1.22 -> 33.1.1.13: icmp: echo request
2.592484 vd33-vlan33 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592485 npu0_vlink1 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592491 vd3-vlan33 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592498 vd3-1_0 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592510 vd2-1_0 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592515 vd2-vlan22 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592516 npu0_vlink0 out 33.1.1.13 -> 22.1.1.22: icmp: echo reply
2.592520 vd22-vlan22 in 33.1.1.13 -> 22.1.1.22: icmp: echo reply
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 153
Fortinet Inc.
SD-WAN steering
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 154
Fortinet Inc.
SD-WAN steering
SD-WAN rules can now steer multicast traffic. When an SD-WAN member is out of SLA, multicast traffic can fail over to
another SD-WAN member, and switch back when SLA recovers.
The new pim-use-sdwan option enables or disables the use of SD-WAN for PIM (Protocol Independent Multicast)
when checking RP (Rendezvous Point) neighbors and sending packets.
config router multicast
config pim-sm-global
set pim-use-sdwan {enable | disable}
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 155
Fortinet Inc.
SD-WAN steering
When SD-WAN steers multicast traffic, ADVPN is not supported. Use the set shortcut
option to disable shortcuts for the service:
config system sdwan
config service
edit <id>
set shortcut {enable | disable}
next
end
end
Example 1
In this hub and spoke example, the PIM source is behind the hub FortiGate, and the RP is set to internal port (port2) of
the hub firewall. Each spoke connects to the two WAN interfaces on the hub by using an overlay tunnel. The overlay
tunnels are members of SD-WAN.
Receivers behind the spoke FortiGates request a stream from the source to receive traffic on tunnel1 by default. When
the overlay tunnel goes out of SLA, the multicast traffic fails over to tunnel2 and continues to flow.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 156
Fortinet Inc.
SD-WAN steering
1. On the hub, enable multicast routing, configure the multicast RP, and enable PIM sparse mode on each interface:
config router multicast
set multicast-routing enable
config pim-sm-global
config rp-address
edit 1
set ip-address 172.16.205.1
next
end
end
config interface
edit "tport1"
set pim-mode sparse-mode
next
edit "tagg1"
set pim-mode sparse-mode
next
edit "port2"
set pim-mode sparse-mode
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 157
Fortinet Inc.
SD-WAN steering
config sla
edit 1
next
end
next
end
config service
edit 1
set mode sla
set protocol 103
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
set use-shortcut-sla disable
set shortcut disable
next
edit 2
set mode sla
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
next
end
end
2. Enable multicast routing and configure the multicast RP. Enable PIM sparse-mode on each interface:
config router multicast
set multicast-routing enable
config pim-sm-global
set spt-threshold disable
set pim-use-sdwan enable
config rp-address
edit 1
set ip-address 172.16.205.1
next
end
end
config interface
edit "tunnel1"
set pim-mode sparse-mode
next
edit "tunnel2"
set pim-mode sparse-mode
next
edit "port4"
set pim-mode sparse-mode
next
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 158
Fortinet Inc.
SD-WAN steering
end
end
With this configuration, multicast traffic starts on tunnel1. When tunnel1 becomes out of SLA, traffic switches to tunnel2.
When tunnel1 is in SLA again, the traffic switches back to tunnel1.
The following health-check capture on the spokes shows tunnel1 in SLA with packet-loss (1.000%):
# diagnose sys sdwan health-check
Health Check(ping):
Seq(1 tunnel1): state(alive), packet-loss(0.000%) latency(0.056), jitter(0.002), mos(4.404),
bandwidth-up(999999), bandwidth-dw(1000000), bandwidth-bi(1999999) sla_map=0x1
Seq(2 tunnel2): state(alive), packet-loss(0.000%) latency(0.100), jitter(0.002), mos(4.404),
bandwidth-up(0), bandwidth-dw(0), bandwidth-bi(0) sla_map=0x1
The following example shows tunnel1 out of SLA with packet-loss (3.000%):
# diagnose sys sdwan health-check
Health Check(ping):
Seq(1 tunnel1): state(alive), packet-loss(3.000%) latency(0.057), jitter(0.003), mos(4.403),
bandwidth-up(999999), bandwidth-dw(1000000), bandwidth-bi(1999999) sla_map=0x0
Seq(2 tunnel2): state(alive), packet-loss(0.000%) latency(0.101), jitter(0.002), mos(4.404),
bandwidth-up(0), bandwidth-dw(0), bandwidth-bi(0) sla_map=0x1
The following example how traffic switches to tunnel2 while tunnel1 health-check is out of SLA. Source (172.16.205.11)
sends traffic to the multicast group. Later the traffic switches back to tunnel1 once SLA returns to normal:
195.060797 tunnel1 in 172.16.205.11 -> 225.1.1.1: icmp: echo request
195.060805 port4 out 172.16.205.11 -> 225.1.1.1: icmp: echo request
196.060744 tunnel1 in 172.16.205.11 -> 225.1.1.1: icmp: echo request
196.060752 port4 out 172.16.205.11 -> 225.1.1.1: icmp: echo request
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 159
Fortinet Inc.
SD-WAN steering
Example 2
In this hub and spoke example, the PIM source is behind spoke 1, and the RP is configured on the hub FortiGate. BGP is
used for routing. The hub uses embedded SLA in ICMP probes to determine the health of each tunnel, allowing it to
prioritize healthy IKE routes.
The receiver is on another spoke. Upon requesting a stream, source passes the traffic to the RP on the hub FortiGate,
and routes the traffic to the receiver over tunnel1. If a tunnel falls out of SLA, the multicast traffic fails over to the other
tunnel.
In this configuration, SD-WAN steers multicast traffic by using embedded SLA information in ICMP probes. See also
Embedded SD-WAN SLA information in ICMP probes. With this feature, the hub FortiGate can use the SLA information
of the spoke's health-check to control BGP and IKE routes over tunnels.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 160
Fortinet Inc.
SD-WAN steering
1. Configure loopbacks hub-lo1 172.31.0.1 for BGP and hub-lo100 172.31.100.100 for health-check:
config system interface
edit "hub-lo1"
set vdom "hub"
set ip 172.31.0.1 255.255.255.255
set allowaccess ping
set type loopback
set snmp-index 82
next
edit "hub-lo100"
set vdom "hub"
set ip 172.31.100.100 255.255.255.255
set allowaccess ping
set type loopback
set snmp-index 81
next
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 161
Fortinet Inc.
SD-WAN steering
config pim-sm-global
config rp-address
edit 1
set ip-address 192.90.1.11
next
end
end
config interface
edit "p11"
set pim-mode sparse-mode
next
edit "p101"
set pim-mode sparse-mode
next
edit "p25-v90"
set pim-mode sparse-mode
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 162
Fortinet Inc.
SD-WAN steering
4. Configure BGP to peer with neighbors. Neighbor group is configured for tunnel interface IP addresses:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 163
Fortinet Inc.
SD-WAN steering
1. Enable multicast routing to use SD-WAN. Configure the RP address. Enable interfaces for PIM sparse-mode.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 164
Fortinet Inc.
SD-WAN steering
config health-check
edit "ping"
set server "172.31.100.100"
set update-static-route disable
set members 0
config sla
edit 1
set link-cost-factor latency
set latency-threshold 100
next
end
next
end
config service
edit 1
set mode sla
set protocol 103
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 5 6
set use-shortcut-sla disable
set shortcut disable
next
edit 2
set mode sla
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 5 6
next
end
end
3. Configure BGP and set neighbors to the overlay gateway IP address on the hub:
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 165
Fortinet Inc.
SD-WAN steering
4. Configure the default gateway to use the SD-WAN zone. Other routes are for the underlay to route traffic to the
hub's WAN interfaces:
config router static
edit 10
set distance 1
set sdwan-zone "virtual-wan-link"
next
....
next
end
1. Enable multicast routing to use SD-WAN. Configure the RP address. Enable interfaces for PIM sparse-mode:
config router multicast
set multicast-routing enable
config pim-sm-global
set pim-use-sdwan enable
config rp-address
edit 1
set ip-address 192.90.1.11
next
end
end
config interface
edit "p198"
set pim-mode sparse-mode
next
edit "p200"
set pim-mode sparse-mode
next
edit "npu0_vlink0"
set pim-mode sparse-mode
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 166
Fortinet Inc.
SD-WAN steering
next
end
end
2. Configure loopback interface lo66 for BGP and sourcing SD-WAN traffic:
config system interface
edit "lo66"
set vdom "root"
set ip 172.31.0.66 255.255.255.255
set allowaccess ping
set type loopback
set snmp-index 21
next
end
3. Configure SD-WAN:
l Add overlay tunnel interfaces as members.
l Configure a performance SLA health-check to send ping probes to the hub.
l Configure a service rule for the PIM protocol. Use the lowest cost (SLA) strategy, and monitor with the ping
health-check.
l Disable the use of an ADVPN shortcut.
In the following example, 11.11.11.11 is the underlay address for one of the WAN links on the hub, and
172.31.100.100 is the loopback address on the server.
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
edit "overlay"
next
end
config members
edit 1
set interface "p198"
set zone "overlay"
set source 172.31.0.66
next
edit 2
set interface "p200"
set zone "overlay"
set source 172.31.0.66
next
end
config health-check
edit "ping"
set server "11.11.11.11"
set members 0
config sla
edit 1
set link-cost-factor latency
set latency-threshold 100
next
end
next
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 167
Fortinet Inc.
SD-WAN steering
edit "HUB"
set server "172.31.100.100"
set embed-measured-health enable
set members 0
config sla
edit 1
set link-cost-factor latency
set latency-threshold 100
next
end
next
end
config service
edit 1
set mode sla
set protocol 103
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
set use-shortcut-sla disable
set shortcut disable
next
edit 2
set mode sla
set dst "all"
config sla
edit "ping"
set id 1
next
end
set priority-members 1 2
next
end
end
4. Configure BGP:
config router bgp
set as 65505
set router-id 123.1.1.123
set ibgp-multipath enable
set additional-path enable
config neighbor
edit "172.31.0.1"
set next-hop-self enable
set soft-reconfiguration enable
set remote-as 65505
set update-source "lo66"
next
end
config network
edit 3
set prefix 192.87.0.0 255.255.0.0
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 168
Fortinet Inc.
SD-WAN steering
next
end
end
5. Configure the default gateway to use the SD-WAN zone. Other routes are for the underlay to route to the hub's WAN
interfaces:
config router static
edit 10
set distance 1
set sdwan-zone "virtual-wan-link" "overlay"
next
...
next
end
HTTPS is supported for SD-WAN performance SLA health checks. All default HTTP-based health checks have been
updated to use HTTPS instead. This includes:
l Default_AWS
l Default_FortiGuard
l Default_Google Search
l Default_Office_365
After upgrading, the default profiles using HTTP are changed to use HTTPS. Non-default
performance SLA health check profiles are not affected after upgrading.
In this example, the Default_AWS health check is applied to an SD-WAN member in the default virtual-wan-link zone.
1. Configure SD-WAN:
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
end
config members
edit 1
set interface "port1"
set gateway 172.16.200.254
set gateway6 2000:172:16:200::254
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 169
Fortinet Inc.
SD-WAN steering
next
end
config health-check
edit "Default_AWS"
set server "aws.amazon.com"
set protocol https
set interval 1000
set probe-timeout 1000
set recoverytime 10
set update-static-route disable
set members 1
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
end
end
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 170
Fortinet Inc.
SD-WAN steering
set packetloss-threshold 5
next
end
next
end
end
The maximize bandwidth (load-balance) strategy used prior to FortiOS 7.4.1 is now known as the load balancing
strategy. This strategy can be configured under the manual mode and the lowest cost (SLA) strategies.
l When the load balancing strategy is configured under the manual mode strategy, SLA targets are not used.
l When the load balancing strategy is configured under the lowest cost (SLA) strategy, SLA targets are used.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 171
Fortinet Inc.
Service
Service
Overlay as a Service
FortiCloud Overlay as a Service (OaaS) is a service for FortiGate devices to easily provision new SD-WAN overlay
networks from FortiCloud. OaaS is a subscription service providing an easy-to-use GUI wizard that simplifies the
process of configuring an SD-WAN overlay within a single region.
The OaaS hub acts as a bridge to allow overlay shortcuts to be formed between your spokes.
OaaS and the spokes rely on Fortinet Inc.’s Auto-Discovery VPN (ADVPN), which allows the central hub to dynamically
inform spokes about a better path for traffic between two spokes. ADVPN shortcut tunnels, also known as shortcuts, are
formed between spokes, such as between branches and the data center, or between branches themselves so that traffic
does not need to pass through the hub.
OaaS can be accessed at https://overlay-as-a-service.forticloud.com/.
SD-WAN with FortiOS, FortiManager, and FortiAnalyzer 7.4.x New Features Guide 172
Fortinet Inc.
www.fortinet.com
Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.