FortiWan Guia PDF
FortiWan Guia PDF
FortiWan Guia PDF
Version 5.1.2
Copyright© 2019 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in
the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be
trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and
other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding
commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s
General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such
event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be
limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or
development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and
guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable.
3
TABLE OF CONTENTS
Getting Started 8
Step 1: Install the appliance 8
Step 2: Configure the management interface 8
Step 3: Configure basic network settings 11
Step 4: Test connectivity to destination servers 12
Step 5: Complete product registration, licensing, and upgrades 12
Step 6: Configure a basic Link load balancing and SNAT rules 13
Step 7: Test the deployment 13
Step 8: Back up the configuration 16
What's New 17
FortiWAN UI 18
Logout, reboot, reset, and shut down the system 19
Dashboard 21
Configuring the Dashboard 21
Adjusting Time Frames in Widgets 23
Main 23
Services 24
Link 24
Virtual Server 25
Global DNS Server 26
Monitor 27
DHCP Monitor 27
FQDN Monitor 28
IPSec Tunnel 29
System 30
Administrator settings 30
Administrator access 30
Admin 31
Password policies 35
Access profiles 35
Basic 37
Maintenance 39
Console 230
Access control CLI commands 230
CLI: execute commands 231
CLI: diagnose commands 233
CLI: System dump 234
CLI: Change Admin password 234
CLI: Connect to the UI 235
CLI: Configure a VLAN interface 235
CLI: Configure a software switch interface 236
CLI: Set System Time 236
CLI: Configure DNS 236
CLI: Static route settings 237
CLI Configure Network Interfaces 237
CLI Disable Health Check 238
CLI: Update firmware 238
Reverse path route caching 240
About server load balancing (SLB) 245
About global load balancing 248
About High Availability 251
HA cluster topology 251
HA synchronization 253
Monitoring an HA cluster 255
Updating firmware for an HA cluster 256
Deploy an active-passive cluster 258
Active-Passive Cluster Best Practice 260
Log into a non-primary member node 261
Best Practices and Fine Tuning 262
About Network Security 263
Regular backups 264
Increase System performance 265
Troubleshooting 266
Topology 267
Login issues 268
Connectivity issues 269
Resource issues 276
Monitoring traffic load 276
Getting Started
Best practice is to follow this work flow for a new deployment.
Prerequisites
l The appliance is installed in a hardware rack or the virtual appliance installed into a VMware
environment.
Use the management port for administrator access, and also for management traffic (such as SNMP or
syslog). If your appliance has a dedicated management port, that's the port you configure as the
management interface; otherwise, conventionally use port 4 (VM and FWN30E use Port 3).
Configure the following basic settings to get started so you can access the UI from a remote location
(such as your desk):
l Static route - Enter the gateway router for the management subnet so you can access the UI
from a host on your subnet.
l IP address - You typically assign a static IP address for the management interface. The IP
address is the host portion of the UI URL. For example, the default IP address for the man-
agement interface is 192.168.1.99 and the default URL for the UI is
https://192.168.1.99.
l Access - Services for administrative access. We recommend HTTPS, SSH, SNMP, PING.
Prerequisites
To connect to the UI
1. Use the crossover cable to connect the laptop Ethernet port to the FortiWAN management port.
2. On your laptop, open the following URL in your browser: https://192.168.1.99/
The system brings up a self-signed security certificate, which it shows to clients whenever they
initiate an HTTPS connection.
3. Verify and accept the certificate, and acknowledge any warnings about self-signed certificates.
The administrator login page appears.
You can also access the UI using CLI commands. See CLI: Connect to
the UI on page 235.
The system supports network settings for various environments. To get started, you configure the
following basic settings:
l Administrator password - Change the password for the admin account.
l System date and time - We recommend you use NTP to maintain the system time.
l Network interfaces - Configure interfaces to receive and forward the network traffic to and from
the destination servers.
l DNS - A primary and secondary server for system DNS lookups.
Prerequisites
l Know the IP address for the NTP servers your network uses to maintain system time.
l Know the IP addresses that have been provisioned for the traffic interfaces for your FortiWAN
deployment.
l Know the IP address for the primary and secondary DNS servers your network uses for DNS
resolution.
l See Admin on page 31 For more information on administrator accounts, see Admin on page 31.
You can also perform this action using CLI commands. See CLI:
Change Admin password on page 234.
You can also perform this action using CLI commands. See CLI: Set
System Time on page 236.
You can also perform this action using CLI commands. See CLI
Configure Network Interfaces on page 237.
To configure DNS
l See Basic on page 37. For information on configuring DNS, see System on page 30.
You can also perform this action using CLI commands. See CLI:
Configure DNS on page 236.
Your new FortiWAN appliance comes with a factory image of the operating system (firmware).
However, if a new version has been released since factory imaging, you might want to install the
newer firmware before continuing the system configuration.
Prerequisites
l Register - Registration is required to log into the Fortinet Customer Service & Support site and
download firmware upgrade files. For details, go to
http://kb.fortinet.com/kb/documentLink.do?externalID=12071.
l Check the installed firmware version - In the UI, go to System > Administrator > Maintenance,
and scroll to the bottom of the page. See Maintenance on page 39.
l Check for upgrades - Major releases include new features, enhancements, and bug fixes.
Patch releases can include enhancements and bug fixes.
l Download the release notes at http://docs.fortinet.com/fortiwan/release-information.
l Download firmware upgrades at https://support.fortinet.com/.
1. Within the FortiWAN UI, go to Dashboard > Main, and within the License Information pane,
click Update.
2. Upload the license file.
3. Within the System Information pane, click Update next to Firmware Version.
4. Upload the firmware file.
l See Updating firmware on page 40.
A FortiWAN Link load balancing has many custom configuration options. You can leverage the
predefined Link, link group, flow-policy configurations to get started.
1. By default, Port1 and Port2 are WAN ports.
2. Configure two SNAT rules for Port1 and Port2.
See Links - underlay or overlay on page 76 and Link group on page 116.
To configure SNAT rules, see Source NAT on page 163.
l Select Port1 as Out Interface.
l Add SNAT rules for Port2 using the same method.
You can test the load balancing deployment by emulating the traffic flow of your planned production
deployment.
Examples
Following are examples of the logs and reports you can use to verify your deployment.
Once you have tested your basic installation and verified that it functions correctly, create a backup.
This “clean” backup is a reference point with many benefits:
l Troubleshooting - You can use a diff tool to compare a problematic configuration with this
baseline configuration.
l Restarting - You can rapidly restore your system to a simple yet working point.
l Rapid deployment - You can use the configuration file as a template for other FortiWAN sys-
tems. You can use any text editor to edit the plain text configuration file and import it into
another FortiWAN system. You should change unique identifiers, such as IP address and other
local network settings that differ from one deployment to another.
What's New
This section highlights the main features of the FortiWan 5.1.2 release.
WebUI enhancements
When system license is invalid or expires, GUI will be redirected to license import page.
Change the default health check method of llb links to be LLB_HLTHCK_ICMP + LLB_HLTHCK_
HOPS; the relationship is OR.
FortiWAN Cloud-Init
FortiWAN Cloud-Init Config Drive is used to pre-configure the FortiWAN VM so that it boots with a
valid license and a pre-determined configuration.
FortiWAN UI
Open the FortiWan UI in your browser.
l We only recommend running FortiWAN on Windows 10+, using Chrome or Firefox. Other plat-
forms and browsers have not been tested.
Parts of the UI
You can reboot, reset, logout, or shut down the system from the UI.
l Logout - Logs the current user out of the system without shutting it down.
l On the right-upper corner of the page, click the account icon to expand the drop-down menu,
click Logout.
l Reboot - Reboots the operating system. Do one of the following:
l On the right-upper corner of the page, click the account icon to expand the drop-down
menu, click Reboot.
l From the CLI console, enter:
execute reboot
l Reset - Resets the configuration to the default factory values. Do one of the following:
l On the right-upper corner of the page, click the account icon to expand the drop-dwon menu,
click Reset Configuration.
l From the CLI console, enter:
execute factoryreset
l Shutdown - Shuts down the system. When the system is shut down, it is unavailable to forward
traffic.
Do one of the following:
l On the right-upper corner of GUI, click the account icon to expand the drop down menu, then
click Shutdown.
l From the CLI console, enter:
execute shutdown
Don't unplug or switch off the FortiWAN appliance without first shutting
down the operating system. The shutdown process enables the system
to finish writing any buffered data, and to correctly spin down and park
the hard disks. Failure to do so could cause data loss and hardware
problems.
Dashboard
The system dashboard appears when you log into the system (or into a virtual domain). It enables you
to monitor system-wide health and utilization.
You can create, modify, or delete a dashboard, or reset all dashboards to default configuration.
Access
To create a dashboard
To modify a dashboard
To delete a dashboard
You can’t delete any default dashboards. You can only delete dashboards you have created.
1. Go to the dashboard you want to delete.
2. Click Delete Dashboard, then the delete confirmation window appears.
3. Click Delete.
The dashboard no longer appears.
Resetting the dashboards sets all dashboards back to the default configuration and removes any
global VDOM dashboards and widgets.
1. Click Reset Dashboards, then the Reset Dashboard window appears.
2. Click Reset.
It might take a minute to update the dashboards, depending on your internet connection.
You might need to refresh the page to see the changes.
Various widget allow you to view data in specific time frames. For example, on the Main dashboard,
you can adjust your view of the inbound and outbound time frame. The default time in 1 hour.
1. From the widget header, click the time designation to get the drop down list of available time
frames.
Main
The Main tab opens when you select Dashboard from the side menu. This page is divided into five
panels:
Porlet Description
System Information host name, current time, system up time, serial number, firmware
version.
Operations: Update firmware, upload license, reboot, shutdown,
reset.
l Click Update to update the FortiWAN firmware.
Porlet Description
License Information License status, support contract information, and FortiGuard services
version.
Operations: Upload license, navigate to the support site, or navigate
to the FortiGuard services configuration page.
l Click Login to register your FortiWAN.
l Click Login and Update to update your FortiWAN license.
Services
Link
Access
Figure 5 - Link UI
Virtual Server
This page enables you to check virtual server statistics. See Virtual server settings on page 191.
Access
This page shows the information about the DNS servers used in global load-balancing.
Access: From the Dashboard, go to Services > Global DNS Server.
Monitor
DHCP Monitor
This page shows the IP addresses assigned when local FortiWAN is set up as a DHCP server. Server
name, IP address, MAC and Expires can be displayed.
Prerequisites
Access
l From the Dashboard, go to Monitor > System, then select the DHCP Monitor tab.
FQDN Monitor
This page shows Hit numbers and expire time for FQDN entries configured in Resources > Address
> Address of FQDN types and searched by local system.
Access
l From the Dashboard, go to Monitor > System, then select the FQDN Monitor tab.
5. Select how many entries to view on a page. You can choose 10, 25, or 50.
6. Click Previous or Next to see more pages. This only works if you have multiple pages.
IPSec Tunnel
The IPSec Tunnel page shows the status and incoming and outgoing statistics of IPSec tunnels.
Access
l From the Dashboard, go to Monitor > System, then select the IPSec Tunnel tab.
System
Administrator settings
Administrator access
l As soon as possible during initial setup, give the default administrator, admin, a password. This
super- administrator account has the highest level of permissions possible, and access to it
should be limited to as few people as possible.
l Change all administrator passwords regularly. Set a policy—such as every 60 days—and fol-
low it. (Mark the Change Password check box to reveal the password dialog.)
l Instead of allowing administrative access from any source, restrict it to trusted internal hosts. On
those computers that you have designated for management, apply strict patch and security
policies. Always password-encrypt any configuration backup that you download to those com-
puters to mitigate the information that attackers can gain from any potential compromise.
l Don't use the default administrator access profile for all new administrators. Create one or more
access profiles with limited permissions tailored to the responsibilities of the new administrator
accounts.
l By default, an administrator logged in who’s idle for more than 30 minutes times, is logged out.
While not recommended, you can change this to a longer period in Timeout. Left unattended, a
UI or CLI session could allow anyone with physical access to your computer to change system
settings. Small idle timeouts mitigate this risk.
l Administrator passwords should be at least 8 characters long and include both numbers and let-
ters.
l Restrict administrative access to a single network interface (usually port 1), and allow only the
management access protocols needed.
l Use only the most secure protocols. Disable ping, except during troubleshooting. Disable
HTTP, SNMP, and Telnet unless the network interface only connects to a trusted, private admin-
istrative network.
l Disable all network interfaces that should not receive any traffic.
l For example, if administrative access is typically through port 1, the Internet is connected
to port 2, and servers are connected to port 3, you would disable (“bring down”) port 4.
This would prevent an attacker with physical access from connecting a cable to port 4
and thereby gaining access if the configuration inadvertently allows it.
l Immediately revoke certificates that have been compromised. If possible, automate the dis-
tribution of certificate revocation lists.
Admin
The Admin tab lets you add users, assign access profiles, and assign dashboard views to a user.
Prerequisites
Access
l From the Dashboard, go to System > Administrator, then select the Admin (default) tab.
Settings
Setting Guidelines
Name Enter a unique user name. Enter a unique name. Valid characters are
A-Z, a-z, 0-9, _, and -. No spaces. Once you Save, you can't change
the name.
Profile Choose from the drop down list. See Access profiles on page 35.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
1. Click the key icon at the end of the row for the user admin to open the change password
editor.
2. Enter the new password, then enter again to confirm, and Save.
Administrator users
We recommend that only network administrators—and if possible, only a single person—use the
admin account. You can configure accounts that provision different scopes of access. For example,
you can create an account for a security auditor who must only be able to view the configuration and
logs, but not change them.
Prerequisites
l If you want to use RADIUS or LDAP authentication, you must have already have created the
RADIUS server or LDAP server configuration.
l Read-Write permission for System settings.
Access
l From the Dashboard, go to System > Administrator, then select the Admin (default) tab.
Settings
Setting Guidelines
Trusted Hosts Source IP address and netmask from which the administrator is
allowed to log in. For multiple addresses, separate each entry
with a space. You can specify up to three trusted areas. They
can be single hosts, subnets, or a mixture.
Configuring trusted hosts hardens the security of the system. In
addition to knowing the password, an administrator must
connect only from the computer or subnets you specify.
Trusted host definitions apply both to the UI and to the CLI when
accessed through Telnet, SSH, or the CLI console widget. Local
console access is not affected by trusted hosts, as the local
console is by definition not remote, and does not occur through
the network.
If ping is enabled, the address you specify here is also a source
IP address to which the system will respond when it receives a
ping or traceroute signal.
To allow logins only from one computer, enter only its IP address
and 32- or 128- bit netmask:
192.0.2.1/32
2001:0db8:85a3:::8a2e:0370:7334/128
Setting Guidelines
l To allow login from the Internet, set a longer and more com-
plex New Password, and enable only secure administrative
access protocols. We also recommend that you restrict trus-
ted hosts to IPs in your administrator’s geographical area.
l For improved security, restrict all trusted host addresses to
single IP addresses of computer(s) from which only this
administrator will log in.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l To change the password, click the Key at the end of the row, then enter the new password.
Password policies
A password policy is a set of rules designed to enhance computer security. A good password policy
encourages users to create strong passwords and use them properly. For your network and data
security and integrity, we strongly recommend the enforcement of strong password policies when
using FortiWAN.
You can set a password policy to be enforced for all users.
Access
l From the Dashboard, go to System > Admininstrator, then select the Password Policy tab.
Setting Guidelines
2. Save.
Access profiles
Access profiles often reflect the specific job of each user (role), such as account creation or log
auditing. Access profiles can limit each user account to their assigned role. This is sometimes called
role-based access control (RBAC).
For complete access to all commands and abilities, you must log in with the account name admin.
Prerequisites
Access
l From the Dashboard, go to System > Administrator, then select the Access Profile tab.
Settings
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
Doesn’t apply to the primary admin user.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row. Doesn’t apply to the primary admin user.
l Click Clone at the right side of column to clone the configuration with a new name.
Basic
Assign basic settings that apply to all users from this page.
Access
l From the Dashboard, go to System > Administrator, then select the Basic tab.
Prerequisites
Settings
Setting Guidelines
host name Configure a host name to facilitate system management. If you use
SNMP, for example, the SNMP system name is derived from the
configured host name. The host name can be up to 35 characters in
length. It can include US-ASCII letters, numbers, hyphens, and
under- scores, but not spaces and special characters.
The System Information widget and the get system status CLI
command display the full host name. If the host name is longer than
16 characters, the name is truncated and ends with a tilde ( ~ ) to
indicate that additional characters exist, but are not displayed.
Default Certificate Enter the default certificate. By default this is set as Factory.
Setting Guidelines
Local MNT Traffic l Enable - turn on local management traffic guarantee (via Band-
Guarantee BM width Management).
l Disable - turn off local management traffic guarantee (via Band-
width Management).
Maintenance
Set system time from the Maintenance tab. Scheduling, logging, and SSL/TLS-related features
depend on system time.
Use Network Time Protocol (NTP) to maintain the system time. When NTP isn't available or is
impractical, you can set the system time manually.
Access
l From the Dashboard, go to System > Administrator, then select the Maintenance tab.
Prerequisites
Settings
Setting Guidelines
System Time Displays the system time. You can use NTP to set the system time, or
use the controls to set the system time manually. Enter time in
HH:MM:SS format.
Daylight Saving Time Enable to have the system adjust its own clock when its time zone
changes between daylight saving time (DST) and standard time.
Time Zone Select the time zone where the appliance is located.
Synchronizing Interval Enter the number of minutes the system should synchronize the time
with the NTP server.
The default is 60 minutes. The range is 1-1440.
You can also set system time using CLI commands. See CLI: Set
System Time on page 236.
Updating firmware
Consider the following to help you determine whether to follow a standard or non-standard upgrade
procedure:
l HA - Updating firmware on an HA cluster requires additional steps for a standalone appliance.
See Updating firmware for an HA cluster on page 256.
l Re-imaging - When installing a firmware version that requires a different size system partition,
you might need to re-image the boot device. Consult the release notes. In that case, don't install
the firmware using this procedure. Instead, see Restoring firmware (“clean install”) on page
278.
l Downgrades - If you are downgrading the firmware to a previous version, and the settings are
not fully backwards compatible, the system might remove incompatible settings or use the
default values for that version of the firmware. You might need to reconfigure some settings.
Firmware can be loaded on two disk partitions: the active partition and the alternate partition. The
upgrade procedure:
l Updates the firmware on the inactive partition and then makes it the active partition.
l Copies the firmware on the active partition, upgrades it, and installs it in place of the con-
figuration on the inactive partition.
For example, if partition 1 is active, and you perform the upgrade procedure:
l Partition 2 is upgraded and becomes the active partition; partition 1 becomes the alternate par-
tition.
l The configuration on partition 1 remains in place; it is copied, upgraded, and installed in place
of the configuration on partition 2.
This preserves the working system state in the event the upgrade fails or is aborted.
Prerequisites
l Download the firmware file from the Fortinet Customer Service & Support website: https://sup-
port.fortinet.com/
l Read the release notes for the version you plan to install.
l Back up your configuration before beginning this procedure. Reverting to an earlier firmware
version could reset settings that are not compatible with the new firmware.
l Superuser permission (user admin).
Access
l From the Dashboard, go to System > Administrator, then select the Maintenance tab.
The system reboots, the alternate becomes the active firmware, and the active becomes the alternate
firmware.
When you update software, you are also updating the UI. To ensure the
UI updates correctly:
l Clear your browser cache.
l Refresh the page.
In most environments, press Ctrl-F5 to force the browser to get a new
copy of the content from the application. See the Wikipedia article on
browser caching issues for a summary of tips for many environments:
https://en.wikipedia.org/wiki/Wikipedia:Bypass_your_cache.
You can also update the firmware in the CLI. See CLI: Update firmware
on page 238.
You can save a copy of the configuration. A simple backup file is a text file. A full backup is a .TAR file,
and includes the complete configuration files, plus any files you have imported, including error page
files, script files, and ISP address book files. Configuration backups don't include data such as logs
and reports.
Backups can be used to:
l Save the configuration as CLI commands that a co-worker or Fortinet support can use to help
you resolve issues with misconfiguration.
l Restore the system to a known functional configuration.
l Create a template configuration you can edit and then load into another system using the
restore procedure.
In the event that FortiWAN experiences hardware failure, being able to restore the entire backup
configuration minimizes the time to reconfigure a replacement.
Prerequisites
l When restoring a configuration, know its management interface configuration in order to access
the UI after the restore procedure is completed. Open the configuration file and make note of the
IP address and network requirements for the management interface (port1).
l Know the administrator user name and password.
l Read-Write permission for System settings.
Access
l From the Dashboard, go to System > Administrator, then select the Backup & Restore tab.
Settings
Setting Guidelines
Entire Configuration Check to include error page files, script files, and ISP address
book files.
This backup is a tar file.
Prerequisites
Access
l From the Dashboard, go to System > Administrator, then select the System Mail Server tab.
Settings
Setting Guidelines
Security l Starttls
l None
Heartbeat and synchronization packets contain sensitive configuration information and can consume
considerable network bandwidth. For best results, directly connect the two HA interfaces using a
crossover cable. If your system uses switches instead of crossover cables to connect the HA heartbeat
interfaces, those interfaces must be reachable by Layer 2 multicast.
l When configuring an HA pair, pay close attention to the options ARP Packet Numbers and
ARP Packet Interval.
l The FortiWAN appliance broadcasts ARP packets to the network to ensure timely fail over.
Delayed broadcast intervals can slow performance. Set the value of ARP Packet Numbers no
higher than needed.
l When the FortiWAN appliance broadcasts ARP packets, it does so at regular intervals. For per-
formance reasons, set the value for ARP Packet Interval no greater than required.
l Some experimentation might be needed to set these options at their optimum value.
l We recommend that you configure an SNMP community and enable the HA heartbeat failed
option to generate a message if the HA heartbeat fails.
Currently, FortiWAN only supports HA configurations for IPv4 address mode; HA isn't supported on
IPv6.
HA system requirements
l Appliances must have the same hardware model and same firmware version.
l Redundant network topology: if an active node fails, physical network cabling and routes must
be able to redirect traffic to the other member nodes.
l At least one physical port on both HA appliances to be used for heartbeat and data traffic
between cluster members. For active-passive fail over pairs, you can connect the ports directly
over cable.
l Heartbeat and synchronization traffic between cluster nodes occur over the physical network
ports that you designate. If switches are used to connect the nodes, the interfaces must be
reachable by Layer 2 multicast.
l Each appliance must be licensed.
Prerequisites
Access
Settings
l After saving the configuration, cluster members send heartbeat traffic to each other. Members
with the same Group ID join the cluster. They send synchronization traffic through their data
links.
Setting Guidelines
Setting Guidelines
l Active-Passive
l Standalone
Group Name (optional) Type a name to identify the HA cluster if you have
more than one. This setting does not affect HA function.
The maximum length is 63 characters.
Group ID Enter a number to identify the HA cluster. Nodes with the same
group ID join the cluster. If you have more than one HA cluster
on the same network, each cluster must have a different group
ID.
The group ID is used in the virtual MAC address that's sent in
broadcast ARP messages.
The valid range is 0 to 31. The default value is 0.
Monitor Interface After HA has been configured on all appliances, you can select
the ports to be monitored.
One or more network interfaces that correlate with a physical
link. These ports will be monitored for link failure. Port
monitoring (also called interface monitoring) monitors physical
network ports to verify that they are functioning properly and
Setting Guidelines
Heartbeat Interface Set the network interface to be used for heartbeat packets. You
can configure one or two heartbeat ports.
Use the same port number for all cluster members. For example,
if you select port3 on the primary node, select port3 as the
heartbeat interface on the other member nodes.
If a switch is used to connect the heartbeat interfaces, the
heartbeat interfaces must be reachable by Layer 2 multicast
Lost Heartbeat Threshold Number of times a node retries the heartbeat and waits to
receive HA heartbeat packets from the other nodes before
concluding the other node is down. This part of the configuration
is pushed from the primary node to member nodes. Normally,
you don't need to change this setting. Exceptions include:
l Increase the failure detection threshold if a failure is detected
Setting Guidelines
ARP Times Enter the number of times that the cluster member broadcasts
extra address resolution protocol (ARP) packets when it takes
on the primary role.
Normally, you don't need to change this setting. Exceptions
include:
l Increase the number of times the primary node sends gra-
tuitous ARP packets if an active-passive cluster takes a long
time to fail over or to train the network. Sending more gra-
tuitous ARP packets may help the fail over to happen faster.
l Decrease the number of times the primary node sends gra-
tuitous ARP packets if the cluster has a large number of
VLAN interfaces and virtual domains. Because gratuitous
ARP packets are broadcast, sending them might generate a
large amount of network traffic. As long as the active-passive
cluster fails over successfully, you can reduce the number of
times gratuitous ARP packets are sent to reduce the amount
of traffic produced by a fail over.
The valid range is 1 to 60. The default is 5.
Although a new NIC has not actually been connected to the
network, the member does this to notify the network that a new
physical port has become associated with the IP address and
Setting Guidelines
ARP Interval Enter the number of seconds to wait between each broadcast of
ARP packets. Normally, you don't need to change this setting.
Exceptions include:
l Decrease the interval if an active-passive cluster takes a
long time to fail over or to train the network. Sending ARP
packets more frequently may help the fail over to happen
faster.
l Increase the interval if the cluster has a large number of
VLAN interfaces and virtual domains. Because gratuitous
ARP packets are broadcast, sending them might generate a
large amount of network traffic. As long as the active-passive
cluster fails over successfully, you can increase the interval
between when gratuitous ARP packets are sent to reduce
the rate of traffic produced by a fail over.
The valid range is from 1 to 20. The default is 6 seconds.
Fail over Threshold Enter the number of consecutive times that the remote IP
address is unreachable to indicate failure.
The default is 5. The valid range is 1-300.
Fail over Hold Time If fail over occurs due to a remote IP monitor test, and this node's
role changes (to master or child), it can't change again until the
hold time elapses. Hold time can be used to prevent
looping. The default hold time is 120 seconds. The valid range is
60-86400.
Setting Guidelines
Name Configuration name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Reference this name in the virtual server
configuration.
After initially saving the configuration, you can't edit the name.
Health Check Interval Seconds between each health check. Should be more than the
timeout to prevent overlapping health checks. The default is 10.
Health Check Timeout Seconds to wait for a reply before assuming that the health
check has failed. The default is 5.
Health Check Retry Number of retries to confirm up or down. The default is 3 retries.
The valid range is 1-10.
FortiGuard
Prerequisites
l To perform a manual update, you must download the update file from the FortiGuard website.
l Read-Write permission for System settings.
Access
Settings
Setting Guidelines
FortiCare Support
Geo IP Database Review the version information. To update, see Main on page 23.
SD-WAN
Update Schedule
Scheduled Update Day Choose a day from the drop down list.
Override Server If you are unable to make connections to the standard FortiGuard
Setting Guidelines
SNMP settings
Many organizations use SNMP (simple network management protocol) to track the health of their
systems. FortiWAN supports SNMP v1, v2c, and v3.
SNMP depends on network devices that maintain standard management information bases (MIBs).
MIBs describe the structure of the management data maintained on the device. Some MIB definitions
are standard for all network devices, and some are vendor and product-family specific.
The FortiWAN system runs an SNMP agent to communicate with the SNMP manager. The agent
enables the system to respond to SNMP queries for system information and to send SNMP traps
(alarms or event messages) to the SNMP manager.
With SNMP v1 and v2c managers, configure SNMP communities to connect FortiWAN and the SNMP
manager. The SNMP Manager sends the community string along with all SNMP requests. If the
community string is correct, the device responds with the requested information. If the community
string is incorrect, the device simply discards the request and does not respond.
With SNMPv3 managers, configure SNMP users to connect FortiWAN and the SNMP manager.
Queries and traps include username/password authentication, along with an encryption key.
FortiWAN implements the user security model described in RFC 3414.
Prerequisites
l On the SNMP manager, you must verify that the SNMP manager is a member of the community
to which the FortiWAN system belongs, and you must compile the necessary Fortinet-pro-
prietary management information blocks (MIBs) and Fortinet-supported standard MIBs. For
more information, see Fortinet MIBs on page 282.
l In the FortiWAN interface settings, you must enable SNMP access on the network interface
through which the SNMP manager connects.
l Read-Write permission for System settings.
Access
l From the Dashboard, go to System > SNMP, then select the System Information (default)
tab.
Settings
Setting Guidelines
SNMP Agent Toggle ON to activate the SNMP agent, so the system can send traps
and receive queries.
Setting Guidelines
Location Physical location of the appliance, such as “floor_2”. The location can
be up to 35 characters long, and can contain only letters (a-z, A-Z),
numbers, hyphens ( - ) and underscores ( _ ).
See Download SNMP MIBs on page 55 for more information on the bottom section of the page.
FortiWAN allows you to download full FortiWAN and Fortinet Core MIB files, which provides more
options for server load balance, global serer load balance, link load balance, and firewall with SNMP
traps.
Prerequisites
Access
l From the Dashboard, go to System > SNMP, then select the System Information (default)
tab.
l At the bottom of the page, click Download FortiWAN MIB File or Download Fortinet Core
MIB File.
The file automatically downloads to your local drive.
SNMP threshold
Access
l From the Dashboard, go to System > SNMP, then select the Threshold tab.
Prerequisites
Settings
Setting Guidelines
Prerequisites
Access
l From the Dashboard, go to System > SNMP, then select the SNMPv1/v2 tab.
Settings
Setting Guidelines
SNMP Community Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Name of the SNMP community to which the FortiWAN system
and at least one SNMP manager belongs, such as management.
You must configure the FortiWAN system to belong to at least
one SNMP community so that community’s SNMP managers
can query system information and receive SNMP traps.
You can add up to three SNMP communities. Each community
can have a different con- figuration for queries and traps, and the
set of events that trigger a trap.
You can also add the IP addresses of up to eight SNMP
managers to each community to des- ignate the destination of
traps and which IP addresses are permitted to query the
FortiWAN sys- tem.
SNMP v1 Port Enter the port number on which the system listens for SNMP v1
queries from the SNMP managers in this community.
The default is 161. The range is 0 to 65535.
SNMP v2 Port Enter the port number on which the system listens for SNMP v2
queries from the SNMP managers in this community.
The default is 161. The range is 0 to 65535.
Trap v1 Local Port Enter the SNMP Trap v1 local port number.
The default is 162. The range is 0 to 65535.
Trap v1 Remote Port Enter the SNMP Trap v1 remote port number.
The default is 162. The range is 0 to 65535.
Setting Guidelines
Trap v2 Local Port Enter the SNMP Trap v2 local port number.
The default is 162. . The range is 0 to 65535.
Trap v2 Remote Port Enter the SNMP Trap v2 remote port number.
The default is 162. . The range is 0 to 65535.
Setting Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Configure SNMP v3
Prerequisites
Access
l From the Dashboard, go to System > SNMP, then select the SNMPv3 tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
This user name is what the SNMP Manager uses to
communicate with the SNMP Agent.
SNMP v3 Port Enter the port number on which the system listens for SNMP
queries from the SNMP managers for this
user.
The default is 161.
Trap Local Port Enter the source (Local) port number for trap packets sent to
SNMP managers for this user.
The default is 162.
Trap Remote Port Enter the destination (Remote) port number for trap packets sent
to SNMP managers for this user.
The default is 162.
Setting Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Networking
Configure basic settings for your network from this part of the UI.
Interface settings
You can edit the physical interface configuration. You can't create or delete a physical interface
configuration.
Prerequisites
Access
Settings
Setting Guidelines
Example: Test123.
Mode - Static
Setting Guidelines
Mode - DHCP
DNS Server Override Toggle ON to use the DNS addresses retrieved from the DHCP
server instead of the DNS server IP addresses on the DNS
page.
Mode - PPPoE
Discovery Retry Timeout Seconds the system waits before it retries to discover the
PPPoE server.
The default is 5 seconds. The valid range is 1-255.
PPPoE Service Defines the service that the router can provide to a PPPoE
client.
PPPoE IP FortiWAN will ask the PPPoE server for this specific IP.
DNS Server Override Enable this to use the DNS addresses retrieved from the DHCP
server instead of the DNS server settings in the Networking >
DNS page. (See DNS - Networking on page 79.)
Type l Physical
l VLAN
l Aggregate
l Loopback
l Softswitch
Setting Guidelines
Type - VLAN
Interface Physical interface associated with the VLAN; for example, port2.
Type - Aggregate
Type - Softwitch
General
Allow Access Allow inbound service traffic. Select from the following options:
l HTTP - Enables connections to the UI. We recommend this
option only for network interfaces connected to a trusted
private network, or directly to your management computer.
l HTTPS - Enables secure connections to the UI. We recom-
mend this option instead of HTTP.
Setting Guidelines
Status The Status column isn't the detected physical link status; it is the
administrative status
(Up/Down) that indicates whether you permit the network
interface to receive and/or transmit packets.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
You can also perform this action using CLI commands. See CLI
Configure Network Interfaces on page 237.
You can also perform this action using CLI commands. See CLI:
Configure a VLAN interface on page 235.
Types of Interfaces
Physical interfaces
Each physical network port (or, on FortiWAN-VM, a vNIC) has a network interface that directly
corresponds to it— that is, a “physical network interface.”
Physical ports have three uses:
l Management - The network interface named port1 is typically used as the management
interface.
l HA - If you plan to deploy HA, you must reserve a physical port for HA heartbeat and syn-
chronization traffic. Do not configure the network interface that is used for HA; instead,
leave it unconfigured or “reserved” for HA.
l Traffic - The remaining physical ports can be used for your target traffic—these are your
“traffic interfaces.”
Traffic interfaces can be associated with logical interfaces. The system supports three types of
logical interfaces: VLAN, Aggregate and Software switch.
VLAN interfaces
Use IEEE 802.1q VLAN to reduce the size of a broadcast domain, thereby reducing the amount of
broadcast traffic received by network hosts, improving network performance.
Unlike physical LANs, VLANs don't require you to install separate hardware switches and routers
to achieve this effect. Instead, VLAN-compliant switches restrict broadcast traffic based upon
whether its VLAN ID matches that of the destination network. As such, VLAN trunks can be used
to join physically distant broadcast domains as if they were close.
The VLAN ID is part of the tag that's inserted into each Ethernet frame in order to identify traffic for
a specific VLAN. FortiWAN appliances handle VLAN header addition automatically, so you don't
need to adjust the maximum transmission unit (MTU). Depending on whether the device receiving
a packet operates at Layer 2 or Layer 3 of the network, a VLAN tag might be added, removed, or
rewritten before forwarding to other nodes on the network. For example, a Layer 2 switch typically
adds or removes a tag when forwarding traffic among members of the VLAN, but does not route
tagged traffic to a different VLAN ID. In contrast, a FortiWAN content- based routing policy might
forward traffic between different VLAN IDs (also known as inter-VLAN routing).
Cisco Discovery Protocol (CDP) is supported for VLANs.
Aggregate interfaces
Link aggregation (also called NIC teaming-bonding or link bundling) forms a network interface that
queues and transmits over multiple wires (also called a port channel), instead of only a single wire
(as FortiWAN would normally do with a single network interface per physical port). This multiplies
the bandwidth that's available to the network interface, and therefore is useful if FortiWAN is
deployed inline with your network backbone.
Link aggregation on FortiWAN complies with IEEE 802.3ad and distributes Ethernet frames using
a modified round-robin behavior. If a port in the aggregation fails, traffic is redistributed
automatically to the remaining ports with the only noticeable effect being a reduced bandwidth.
When broadcast or multicast traffic is received on a port in the aggregation, reverse traffic will
return on the same port.
When link aggregation uses a round-robin that considers only Layer 2, Ethernet frames that
belong to an HTTP request can sometimes arrive out of order. Because network protocols at
higher layers often don't gracefully handle this (especially TCP, which may decrease network
performance by requesting retransmission when the expected segment does not arrive), the
FortiWAN frame distribution algorithm is configurable. For example, if you notice that performance
with link aggregation isn't as high as you expect, you could try configuring FortiWAN to queue
related frames consistently to the same port by considering the IP session (Layer 3) and TCP
connection (Layer 4), not simply the MAC address (Layer 2).
Also, configure the router, switch, or other link aggregation control protocol (LACP)-compatible
device to which FortiWAN is connected with the same speed/duplex settings, and with ports that
can be aggregated. In a deployment like this, the two devices use the cables between the ports to
form a trunk, not an accidental Layer 2 (link) network loop. FortiWAN uses LACP to detect the
following conditions:
l Suitable links between itself and the other device, and form a single logical link.
l Individual port failure so that the aggregate can redistribute queuing to avoid a failed port.
Loopback interfaces
A loopback interface is a logical interface that's always up (no physical link dependency) and the
attached subnet is always present in the routing table.
The IP address of the FortiWAN loopback interface does not depend on one specific external port,
and therefore you can access it through several physical or VLAN interfaces.
Loopback interfaces still require appropriate firewall policies to allow traffic to and from the
interfaces..
Loopback interfaces are a good practice for OSPF. To make troubleshooting OSPF easier, set the
OSPF router ID the same as the loopback IP address, and remember the management IP
addresses. You can enable dynamic routing protocols on loopback interfaces.
A software switch, is a virtual switch that's implemented at the software, or firmware level, rather
than the hardware level. A software switch can be used to simplify communication between
devices connected to different FortiWAN interfaces. For example, using a software switch, you can
place the FortiWAN interface connected to an internal network on the same subnet as your
wireless interfaces. Then devices on the internal network can communicate with devices on the
wireless network without any additional configuration such as additional security policies, on the
FortiWAN unit.
This is also useful if you require more hardware ports for the switch on a FortiWAN unit. For
example, if your FortiWAN unit has a 4-port switch, WAN1, WAN2 and DMZ interfaces, and you
need one more port, you can create a soft switch that can include the 4-port switch and the DMZ
interface all on the same subnet. These types of applications also apply to wireless interfaces and
virtual wireless interfaces and physical interfaces such as those with FortiWiFi and FortiAP unit.
Similar to a hardware switch, a software switch functions like a single interface. A software switch
has one IP address; all of the interfaces in the software switch are on the same subnet. Traffic
between devices connected to each interface are not regulated by security policies, and traffic
passing in and out of the switch are affected by the same policy.
Consider the following when setting up a software switch:
IPsec tunnels
Use IPsec VPN to tunnel traffic between pairs of FortiWAN appliances. See LLB overlay links on page
114.
The overlay link group configuration sets the list of overlay tunnel members, as well as load balancing
options, such as algorithm and weight.
When you add IPsec Tunnel configuration, you specify a local and remote IP address. These
addresses are IP addresses assigned to a network interface on the local and remote FortiWAN
appliance.
If the peer IP is a dynamic IP address (such as DHCP or PPPoE), you must specify Type as equal to
dynamic on the local site.
Prerequisites
Access
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Local IP Enter an IP address for the local end of the VPN tunnel. Select
one of the following:
l Local IP - When you select the corresponding interface, the
primary IP address of the specified interface will be used.
l Enter - Enter a IP address of the interface for the Primary IP
address or secondary IP address.
Key Life Enter a number that sets a limit on the length of time that a
Phase 2 key can be used.
The default is 86400 seconds. The range is 120 to 172800
seconds.
Setting Guidelines
768-bit modulus.
l 2 - MODP with a 1024-bit modulus.
l 5 - MODP with a 1536-bit modulus.
l 14 - MODP with a 2048-bit modulus.
Local ID Local identity ID. This Local ID value must match the peer ID
value given for th remote VPN peer’s Peer Options.
The length is from 1 to 254 characters
Interface The network interface that connects to the other VPN gateway.
Peer ID Peer identity ID. This Peer ID value must match the Local ID
value given for th remote VPN peer’s Local ID Options. The
length is from 1 to 254 characters
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
(regular or IPsec). However, you can configure a regular DHCP server on an interface only if the
interface is a physical interface with a static IP address.
You can configure one or more DHCP servers on any FortiWAN interface. A DHCP server
dynamically assigns IP addresses to hosts on the network connected to the interface. The host
computers must be configured to obtain their IP addresses using DHCP.
If an interface is connected to multiple networks through routers, you can add a DHCP server for each
network. The IP range of each DHCP server must match the network address range. The routers must
be configured for DHCP relay.
Prerequisites
Access
Settings
Setting
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
Guidelines No spaces. Once you Save, you can't change the name.
DNS Server The DNS that FortiWAN responds to the DHCP clients within
the DHCP OFFER messages if the clients are sat to
automatically get DNS information through DHCP.
l ALL: answer the DHCP clients with all the defined DNS
servers information.
l None: answer the DHCP clients without containing any
DNS server information.
l Enter: the DNS servers defined in Networking > DHCP
Server > DNS Server Address.
DNS Suffix The domain name suffix that FortiWAN responds to the DHCP
clients within the DHCP OFFER messages if the clients are set
to automatically get DNS information from DHCP.
l ALL: answer the DHCP clients with all the defined domain
name suffixes.
l None: answer the DHCP clients without containing any
domain name suffixes.
Setting
blank.
IP-Range The address pools that DHCP server assigns and manages IP
addresses from. Define the IP ranges by specifying IPv4 Starting
Address and IPv4 Ending Address.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
You can use the default link settings, or create your own. You can specify health checks, bandwidth
rate thresholds, and spillover threshold behavior for the gateway links you add to link groups.
Prerequisites
l Know the IP addresses of the ISP gateway links used in the network segment where the
FortiWAN appliance is deployed.
l Add health check configuration objects that you want to use to check the gateway links. See
Links - underlay or overlay on page 76.
l Read-Write permission for Networking module settings.
Access
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Address Enter the IP address. Appears when the WAN Type Static
Gateway is selected.
For example, 192.0.2.1
Interface Select an interface from the drop down list. Appears when the
WAN Type Dynamic Gateway or Tunnel are selected.
The default is port1.
Health Check List Move items to monitor into the Selected Items box. Appears
when Health Check is ON.
Health check list supports adding multiple health check objects
for one link at the same time. The up/down status depends on
the relationship of these health checks:
*OR
*AND
The default health check list for underlay links port1 and port2
include two health checks: LLB_HLTHCK_ICMP, LLB_
HLTHCK_HOPS. Their relationship is OR.
set health-check-list LLB_HLTHCK_ICMP LLB_
HLTHCK_HOPS
set health-check-relation OR
That means if any of the health checks succeed, the health
Setting Guidelines
Inbound Spillover Enter the maximum inbound bandwidth rate for a link in a
Threshold spillover load balancing pool.
The default is 2000000 Kbps. The valid range is 1 to
2147483647 Kbps.
Total Spillover Threshold Enter the maximum allowed spillover threshold in kbps.
The default is 2000000 Kbps. The valid range is 1 to
2147483647 Kbps.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
DNS - Networking
Prerequisites
Access
Settings
Network systems maintain route tables to determine where to forward TCP/IP packets. Routes for
outbound traffic are chosen according to the following priorities:
l Direct route
l LLB Link Policy route
l Policy based route
l Static /Dynamic route
l LLB default route
The system evaluates content route rules first, then policy routes, then static routes. The packets are
routed to the first route that matches. The LLB route table, therefore, is the one that must include a
“default route” to be used when no more specific route has been determined.
Static routes specify the IP address of a next-hop router that's reachable from that network interface.
Routers are aware of which IP addresses are reachable through various network pathways, and can
forward those packets along pathways capable of reaching the packets’ ultimate destinations. The
FortiWAN system itself does not need to know the full route, as long as the routers can pass along the
packet.
Note: in FortiWAN implementation, we don't use the standard method (adding a static route with
destination 0.0.0.0/0) to add a default route. Instead, the system will generate a default link-load-
balance flow-policy to do default routing.
Prerequisites
Access
l From the Dashboard, go to Networking > Static Routing, then select the Static tab.
Settings
Settings Guidelines
Gateway Enter the IP address of the next-hop router where the FortiWAN
system will forward packets for this static route. This router must
know how to route packets to the destination IP addresses that
you have specified, or forward packets to another router with this
information. For a direct Internet connection, this will be the
router that forwards traffic towards the Internet, and could belong
to your ISP. The gateway must be in the same subnet as the
interface used to reach it.
You can also perform this action using CLI commands. See CLI: Static
route settings on page 237.
Network systems maintain route tables to determine where to forward TCP/IP packets. Routes for
outbound traffic are chosen according to the following priorities:
l Link local routes – Self-traffic uses link local routes.
l Policy based route – Configured policy routes have priority over default routes.
l Static route – Default routes.
l LLB Link Policy route – Configured policy routes have priority over LLB default routes.
l Dynamic route – OSPF route have priority over LLB default routes.
l LLB default route – lower priority than configured routes.
The system evaluates content route rules first, then policy routes, then static routes. The packets are
routed to the first route that matches. The LLB route table, therefore, is the one that must include a
“default route” to be used when no more specific route has been determined.
Static routes specify the IP address of a next-hop router that's reachable from that network interface.
Routers are aware of which IP addresses are reachable through various network pathways, and can
forward those packets along pathways capable of reaching the packets’ ultimate destinations. The
FortiWAN system itself does not need to know the full route, as long as the routers can pass along the
packet.
Configure at least one static route that points to a router, often a router that’s the gateway to the
Internet. You might need to configure multiple static routes if you have multiple gateway routers,
redundant ISP links, or other special routing cases.
Prerequisites
Access
l From the Dashboard, go to Networking > Static Routing, then select the Static Routing or
Policy Routing tab.
Settings
Settings Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
OSPF settings
OSPF (Open Shortest Path First) is described in RFC2328, OSPF Version 2. It is a link-state interior
routing protocol. Compared with RIP, OSPF can provide scalable network support and faster
convergence times. OSPF is widely used in large networks such as ISP backbone and enterprise
networks. FortiWAN supports OSPF version 2.
Prerequisites
l Know how OSPF has been implemented in your network, including the configuration details of
the implementation.
Access
l From the Dashboard, go to Networking > Dynamic Routing, then select the OSPF tab.
Settings
Setting Guidelines
Router ID 32-bit number that sets the router-ID of the OSPF process. The
router ID uses dotted decimal notation.
The router-ID must be an IP address of the router, and it must be
unique within the entire OSPF domain to the OSPF speaker.
Redistribute Connected
Setting Guidelines
Redistribute Connected Add the items you want to the left side.
Interface List
Default Information Metric l 1 - Type 1 external metrics are equivalent to the link-state
Type metric, where the cost is equal to the sum of the internal
costs plus the external cost. This means that Type 1 external
metrics include the external cost to the destination as well as
the cost (metric) to reach the AS boundary router.
l 2 - Type 2 external metrics are greater than the cost of any
path internal to the AS. Type 2 external metrics use only the
external cost to the destination and ignore the cost (metric) to
reach the AS boundary router.
Redistribute Static
Redistribute Static Toggle ON to redistribute static routes into OSPF, with the metric
type and metric set if specified. Redistributed routes are
distributed into OSPF as Type-5 External LSAs into links to
areas.
Setting Guidelines
Area
Area 32-bit number that identifies the OSPF area. An OSPF area is a
smaller part of the larger OSPF AS. Areas are used to limit the
link-state updates that are sent out. The flooding used for these
updates would overwhelm a large network, so it is divided into
these smaller areas for manageability.
Setting Guidelines
Setting Guidelines
Network
Interface
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Restransmit Interval Interval for retransmitting Database Description and Link State
Request packets. The default is 5 seconds.
Cost Set link cost for the specified interface. The cost value is set to
router-LSA's metric field and used for SPF calculation. The
default is 0.
Priority The router with the highest priority will be more eligible to
become Designated Router. Set- ting the value to 0 makes the
router ineligible to become Designated Router. The default is 1.
Dead Interval Number of seconds for RouterDeadInterval timer value used for
Wait Timer and Inactivity Timer. This value must be the same for
all routers attached to a common network. The default is 40
seconds.
Setting Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Resources
All OSPF interfaces that want to learn routes from each other must be configured with the same
authentication type and password or MD5 key(one match is enough).
Use OSPF cryptographic authentication. A shared secret key is used to authenticate all router traffic
on a network. The key is never sent over the network in the clear—a packet is sent and a condensed
and encrypted form of the packet is appended to the end of the packet. A non-repeating sequence
number is included in the OSPF packet to protect against replay attacks that could try to use already
sent packets to disrupt the network. When a packet is accepted as authentic, the authentication
sequence number is set to the packet sequence number. If a replay attack is attempted, the packet
sent will be out of sequence and ignored.
Prerequisites
Access
l From the Dashboard, go to Resources > Routing, then select the OSPF MD5 Key List tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Health checks
In server load balancing deployments, the system uses health checks to poll the members of the real
server pool to test whether an application is available. You can also configure additional health
checks to poll related servers, and you can include results for both in the health check rule. For
example, you can configure an HTTP health check test and a RADIUS health check test. In a web
application that requires user authentication, the web server is deemed available only if the web
server and the related RADIUS server pass the health check.
In link load balancing deployments, the health check can poll either the ISP link group member itself
or a “beacon” server that's deployed on the other side of the ISP link. A beacon is an IP address that
must be reachable in order for the link to be deemed available. A beacon can be any IP address, such
as a main office, core router, or virtual server at another data center.
Listed are the predefined health checks. You can also create custom health check objects.
Predefined Description
LB_HLTHCK_HTTP Sends a HEAD request to the server port 80. Expects the server to
return an HTTP 200.
LB_HLTHCK_TCP_ECHO Sends a TCP echo to server port 7. Expects the server to respond
with the corresponding TCP echo.
LLB_HLTHCK_ICMP Pings the destination IP. If the Destination IP is set as default 0.0.0.0,
system will ping the default gateway of the link.
LLB_HLTHCK_HOPS Default hops number is 3. System will ping 8.8.8 by default, with ttl 3
(the default hop number). If the intermediate router responds "ICMP
time exceeded in-transit", health check will be successful.
Prerequisites
l Have a good understanding of TCP/IP and knowledge of the services running on your backend
servers.
l Know the IP address, port, and configuration details for the applications running on backend
servers. For some application protocol checks, you must enter user credentials.
l Read-Write permission for Shared Resources settings.
l After you have configured a health check, you can select it in the SLB server pool, LLB link
group, or GLB server configuration.
Access
l From the Dashboard, go to Resources > Health Check, then select the Health Check
(default) tab.
Settings
Setting Guidelines
General
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Setting Guidelines
Down Retry Attempts to retry the health check to see if a down server has
become available. The default is 1.
The valid range is 1-10.
Interval Seconds between each health check. Should be more than the
timeout to prevent overlapping health checks. The default is 10.
Timeout Seconds to wait for a reply before assuming that the health
check has failed. The default is 5.
ICMP
TCP Echo
Setting Guidelines
Local Cert For TCP SSL only. Click the down arrow and select a local SSL
Health Check Client certificate from the list menu. The certificate
titled "Factory" is the default certificate shipped with your
FortiWAN. The rest, if any, are the custom certificates that you
have created.
HTTP
HTTP CONNECT If the real server pool members are HTTP proxy servers, Enter
an HTTP CONNECT option:
l Local CONNECT - Use HTTP CONNECT to test the tun-
nel connection through the proxy to the remote server. The
member is deemed available if the request returns status
code 200 (OK).
l Remote CONNECT - Use HTTP CONNECT to test both
the proxy server response and remote server application
availability. If you select this option, you can configure an
HTTP request within the tunnel. For example, you can con-
figure an HTTP GET/HEAD request to the specified URL
and the expected response.
l No CONNECT - don't use the HTTP CONNECT method.
This option is the default. The HTTP CONNECT option is
useful to test the availability of proxy servers only.
Remote Host If you use HTTP CONNECT to test proxy servers, Enter the
remote server IP address.
Remote Port If you use HTTP CONNECT to test proxy servers, Enter the
Setting Guidelines
Receive String A string expected in return when the HTTP GET request is
successful.
Status Code The health check sends an HTTP request to the server. Enter
the HTTP status code in the server reply that indicates a
successful test. Typically, you use status code 200 (OK). Other
status codes indicate errors.
DNS
Setting Guidelines
Password Type l User - If the backend server does not use CHAP, select
this option.
l CHAP - If the backend server uses CHAP and does not
require a secret key, select this option.
SIP / SIP-TCP
Port Enter the port number. Valid values range from 0 to 65535.
SIP Request Type Enter the SIP request type to be used for health checks:
l SIP Options
l SIP Register
Status Code The expected response code. If not set, response code 200 is
expected. Enter 0 if any reply should indicate the server is
available.
SMTP
POP3
Setting Guidelines
IMAP4
Folder Select an email mailbox to use in the health check. If the mailbox
does not exist or isn't accessible, the health check fails. The
default is INBOX.
FTP
Port Listening port number of the backend server. Usually FTP is 21.
File Enter a file that exists on the backend server. Path is relative to
the initial login path. If the file does not exist or isn't accessible,
the health check fails.
SNMP
Disk Maximum normal disk usage. If the disk is too full, the health
check fails.
Setting Guidelines
Community Must match the SNMP community string set on the backend
server. If this does not match, all SNMP health checks fail.
Version v1 or v2c
SNMP-Custom
Community Must match the SNMP community string set on the backend
server. If this does not match, all SNMP health checks fail.
Version V1 or V2C
Setting Guidelines
SSH
Port Listening port number of the backend server. Usually SSH is 22.
L2 Detection
No specific options Link Layer health checker. Sends ARP (IPv4) or NDP (IPv6)
packets to test whether a physically connected system is
available.
RTSP
Port Enter the listening port number. Valid values range from 0 to
65535.
RTSP Method Type l RTSP OPTIONS - returns the request types that the server
accepts.
l RTSP DESCRIBE - includes an RTSP URL (rtsp://…), and
the type of reply data that can be handled.
Hops
l Click Clone at the right side of column to clone the configuration with a new name.
FortiWAN enables you to monitor the health of server in real time directly from your desktop.
Prerequisites
l Have a good understanding of TCP/IP and knowledge of the services running on your backend
servers.
l Know the IP address, port, and configuration details for the applications running on backend
servers. For some application protocol checks, you must enter user credentials.
l Read-Write permission for Shared Resources settings.
l After you have configured a health check, you can select it in the SLB server pool, LLB link
group, or GLB server configuration.
Access
l From the Dashboard, go to Resources > Health Check, then select the Immediate Health
Check tab.
Settings
Setting Guidelines
l Click Start to perform the health check. The result appears in the Monitor Information section.
Address
Create address objects to specify matching source and destination addresses in policies. The
following policies use address objects:
l Firewall - see Firewall on page 176
l QoS policies - see Bandwidth on page 169
l Connection limit on page 172
l Link load balance (LLB) - Services on page 160
Workflow
Prerequisites
For link load balancing, you can also add address objects to address
groups, which can then be used in link load balance policies.
Access
l From the Dashboard, go to Resources > Address, then select the Address (default) tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
IPv4/Netmask
IP Range
FQDN
Geography
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Address group
Configure address groups when you have more than one address object you want to specify in rules
that match source or destination addresses. For example, if you subscribe customer 1 and customer 2
to a group of links, then you can create rules that match the customer 1 OR customer 2 address space
and load balance the set of gateways assigned to them.
The following policies use address groups:
l Link load balancing policies
Workflow
Prerequisites
Access
l From the Dashboard, go to Resources > Address, then select the Address Group tab.
Settings
Settings Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Member List
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
ISP address
The province setting is used in GLB deployments in China to enable location awareness that's
province- specific. For example, a user can be directed to a data center in specific location inside the
country, such as Beijing or Guangdong, rather than simply China.
Three types of address book entries:
l Predefined - Addresses and associated province location settings for China Mobile, China
Telecom, and China Unicom. The IP subnet addresses in the predefined address books are not
exposed in the user interface. The predefined package is provided to make it easier for you to
configure a route when all you know and all you need to know is the name of the ISP that hosts
the link.
l Restored - Addresses imported from a text file. The IP subnet addresses in the restored
address books are not exposed in the user interface. “Restored” addresses can help you rap-
idly build an ISP address book configuration. “Restored” addresses can help you rapidly build
an ISP address book configuration.
l User-defined - In the ISP address configuration, you can modify the predefined and restored
address books by specifying subnets to add or exclude from them. This gives you flexibility in
case you encounter address conflicts or the ISP instructs you to add a subnet address manu-
ally.
You can also create new user-defined entries for other ISPs.
Prerequisites
Access
l From the Dashboard, go to Resources > Address, then select the ISP Address tab.
Settings
Applications
FortiWAN provides more than two dozen predefined applications, and allows you to create your
application objects. Application objects are an important part of the following policy configurations:
l Firewall policies
l QoS policies
Workflow
Prerequisites
Access
l From the Dashboard, go to Resources > Application, then select the Application (default)
tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Protocol This applies when Protocol Type is to set to IP. In that case, it
displays the protocol number without port.
The default value is 1
These options become available when TCP, UDP, SCTP, or TCP-AND-UDP is selected.
Source Port Min This applies only when the specify source port is enabled.
Setting Guidelines
Source Port Max This applies only when the specify source port is enabled.
The default value is 65535.
l Click Clone at the right side of column to clone the configuration with a new name.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page.
Application groups
Configure application groups when you have more than one application and you want to specify in a
rule a match to the application. You can group all Web applications and group all mail applications, for
example, if you want to have rules that treat those as groups.
The following policies use application groups:
l Link load balancing policies
Workflow
Prerequisites
Access
l From the Dashboard, go to Resources > Application, then select the Application Group tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Member List
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Create schedule objects to use in link load balancing policies. A policy rule can be time-bound: one
time, daily, weekly, or monthly.
Workflow
Prerequisites
Access
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and
-. No spaces. Once you Save, you can't change the name.
The system has a configuration framework that enables granular link load balancing rules.
The following shows the configuration objects used in the LLB configuration and the order in which
you create them. A LLB flow policy specifies the source-destination-application matches to which the
policy applies. Apply a link policy to a underlay link or an overlay link.
l The granular configuration of the underlay links configuration includes health checks and band-
width thresholds.
l The granular configuration of Overlay links includes spillover In/ Out/ Total thresholds, but don't
use health check configuration objects for inbound or outbound bandwidth.
l The granular configuration of link groups includes load balancing methods, persistence rules,
and proximity routes.
Workflow
1. Add address, address group, application, app group, and schedule group configuration objects
that can be used to match traffic to link policy rules. This step is recommended. If your policy
does not use match criteria, it will not have granularity. See Link load balance (LLB) - Services
on page 160.
2. Configure optional features. If you want to use health check rules, configure them before you
configure the gateway links. If you want to use persistence rules or proximity routes, configure
them before you configure a link group. See Links - underlay or overlay on page 76 and Link
group on page 116.
3. Configure IPsec Tunnels. See IPsec tunnels on page 71.
4. Configure LLB link for Underlay and Overlay. See below.
5. Configure link groups. See Link group on page 116.
6. Configure the flow policy. When you configure a link policy, you set the source-destination-
application matching tuple for your link groups or virtual tunnels. See Flow Policy on page 160.
The data path between a user’s computer from Hub device and a private network from Branch
device through a VPN is referred to as a tunnel. This IPSec tunnel is also called Overlay Links.
Like a physical tunnel, the data path is accessible only at both ends.
FortiWAN restricts that when all devices belong to the same group, only one device is allowed as
the HUB node role, and at the same time, multiple branch nodes are allowed. All the branch node
devices access the HUB node device to connect and communicate through the VPN tunnel.
When there are multiple Group communication, you need to establish VPNs between Hub nodes
of different Groups. The client packet is sent by the Branch node of the client to the Hub node of
the Local Group. The packet passes through the VPN tunnel between the HUB and the HUB to
reach the peer branch node, and finally descrypts and reaches the destination address.
Encapsulation makes this possible. IPsec packets pass from one end of the tunnel to the other
and contain data packets that are exchanged between the local user and the remote private
network. Encryption of the data packets ensures that any third-party who intercepts the IPsec
packets can not access the data.
An IPsec tunnel is a good choice when you want to load balance traffic from applications that
embed the source address in the packet payload, like VPN and VoIP traffic. Such traffic can be
difficult to load balance using traditional LLB methods. IPsec tunnels enable reliable, site-to-site
connectivity using IPSec tunnel. The local FortiWAN appliance encapsulates traffic so that it can
be routed according to your link flow policy rules. The link flow policy rules use LLB techniques to
identify the best available route among a group of links. If one of the links breaks down, the traffic
can be rerouted through another link in the tunnel group. When traffic egresses the remote
FortiWAN appliance, it is decapsulated and the original source and destination IP addresses are
restored.
The following shows the same network deployed with FortiWAN appliances. The LLB underlay
and overlay link policy load balances traffic among more affordable ADSL links.
The FortiWAN system evaluates traffic to determine the routing rules to apply. With regard to link
load balancing, the system evaluates rules in the following order and applies the first match:
1. Direct route
2. LLB route
3. Policy route
4. Static/Dynamic route
5. LLB default
The LLB underlay links option is useful for ISP links. It enables you to configure multiple ISP links
that are possible routes for the traffic. The link type FortiWAN supports both static IP and dynamic
type. The dynamic link includes DHCP and PPPoE to obtain IP.
The following shows an example topology when FortiWAN is deployed to support LLB link.
Link group
Link groups include Underlay link group and Overlay link group. Grouping links reduces the risk of
outages and provisions additional bandwidth to relieve potential traffic congestion.
The link group configuration specifies the load balancing algorithm. You can enable LLB options,
such as persistence rules and proximity routes.
Prerequisites
l Configure gateway links and persistence rules, so you can select them in the link group con-
figuration.
l Read-Write permission for Resources module settings.
After you have configured a link group configuration object, you can select it in the flow policy
configuration.
Access
l From the Dashboard, go to Resources > Link Load Balance, then select the Link Group tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Proximity Route Toggle ON to use the proximity route logic and configuration
when determining routes.
Link Member
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Setting Guidelines
Spillover Priority Assigns a priority to the link when using a spillover load
balancing method. Higher values have greater priority. When a
spillover method is enabled, the system dispatches new
connections to the link that has the greatest spillover priority until
its threshold is exceeded; then it dispatches new connections to
the link with the next greatest priority until its threshold is
exceeded, and so on.
If multiple links in a link group have the same spillover priority,
the system dispatches new connections among those links
according to round robin.
The default is 0. The valid range is 0-9.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Proximity route
The proximity route feature enables you to associate link groups with efficient routes. Proximity routes
can improve user experience over the WAN because traffic is routed over fast routes.
You can use either or both of these methods:
l Static Table - You specify the gateways to use for traffic on destination networks.
l Dynamic Detection - The system polls the network for efficient routes. The algorithm selects a
gateway based on latency.
If you configure both, the system checks the static table first for a matching route and, if any, uses it. If
there is no matching static route, the system uses dynamic detection.
Prerequisites
Access
l From the Dashboard, go to Resources > Link Load Balance, then select the Proximity Route
tab.
Settings
Setting Guidelines
Mode l Static Table First - Consult the static table first. If no match,
use dynamic detection.
l Static Table Only - Use the static table; don't use dynamic
detection.
l Dynamic Detect Only - Use dynamic detection; don't use
the static table.
l Disable - don't use the proximity route configuration.
Static Table
ISP Name When using the ISP configuration type, select an ISP address
book configuration object. If an address exists in multiple ISP
address books, the route entries have priority as follows:
1. User-defined entries.
2. Entries from an address book that has been impor-
ted.
3. Entries from the predefined address book (default
for the firmware image).
Dynamic Detect
Setting Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Traffic Shaper
Workflow
Prerequisites
Access
l From the Dashboard, go to Resources > Link Load Balance, then select the Traffic Shaper
tab.
Settings
Setting Guidelines
Name Enter a unique name. Enter a unique name. Valid characters are
A-Z, a-z, 0-9, _, and -. No spaces. Once you Save, you can't
change the name..
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Use this page to configure source address affinity and a timeout for GSLB persistence. You enable
persistence per host in the GSLB host configuration.
If the DNS query is for a host that has persistence enabled, the DNS server replies with an answer that
has the virtual server IP addresses listed in the order determined by the GSLB proximity algorithms,
and the client source IP address (for example 192.168.1.100) is recorded in the persistence table. If
source address affinity is set to 24 bits, subsequent queries for the host from the 192.168.1.0/24
network are sent an answer with the virtual servers listed in the same order (unless a server becomes
unavailable and is therefore omitted from the answer).
Persistence is required for applications that include transactions across multiple hosts, so the
persistence table is also used for queries for other hosts with the same domain. For example, a
transaction on a banking application might include connections to login.bank.com and
transfer.bank.com. To support persistence in these cases, the GSLB persistence lookup accounts for
domain as well. The first query for login.bank.com creates a mapping for the source address network
192.168.1.0/24 and the domain bank.com. When the DNS server receives subsequent requests, it
consults the persistence table for a source network match, then a domain match and a host name
match. In this example, as long as you have created host configurations for both login.bank.com and
transfer.bank.com, and persistence is enabled for each, the persistence table can be used to ensure
the DNS answers to queries from the same network list the resource records in the same order.
Prerequisites
Access
l From the Dashboard, go to Resources > Link Load Balance, then select the Persistence tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Source-Destination Pair
Source-Destination Address
Source IPv4 Netmask Bits Enter the number of bits in a subnet mask to specify a network
segment that follows the persistence rule.
The default is 32. The valid range is from 1 to 32.
Destination IPv4 Netmask The number of bits in a subnet mask to specify a network
Bits segment that follows the persistence rule.
For example, if you set this to 24, and the system chooses a
particular gateway router for destination IP 192.168.1.100, the
system selects that same gateway for traffic to all destination IPs
in subnet 192.168.1.0/24.
The default is 32. The valid range is from 1 to 32.
Source Address
Source IPv4 Netmask Bits Enter the number of bits in a subnet mask to specify a network
segment that follows the persistence rule.
Setting Guidelines
For example, if you set this to 24, and the system chooses a
particular gateway router for client IP 192.168.1.100, the system
selects that same gateway for subsequent client requests when
the subsequent client belongs to subnet 192.168.1.0/24.
The default is 32. The valid range is from 1 to 32.
Destination Address
Destination IPv4 Netmask Enter the number of bits in a subnet mask to specify a network
Bits segment that follows the persistence rule.
The default is 32. The valid range is from 1 to 32.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
You can’t modify a default persistence rule.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row. You can’t delete a default persistence
rule.
l Click Clone at the right side of column to clone the configuration with a new name.
Virtual Servers
These topics describe how to set up resources needed to create virtual servers.
Profiles
An application profile is a configuration object that defines how you want the FortiADC virtual server to
handle traffic for specific protocols.
The following lists usage by load balancing profile type, including compatible virtual server types, load
balancing methods, persistence methods, and content route types.
FTP Use with FTP servers. Layer 4 Round Robin, Source Address,
Least Source Address
Connections, Hash
Fastest Response
TCP Use for other TCP Layer 4, Round Robin, Source Address,
protocols. Layer 2 Least Source Address
Connections, Hash
Fastest Response
UDP Use for other UDP Layer 4, Round Robin, Source Address,
protocols. Layer 2 Least Source Address
Connections, Hash
Fastest Response
Listed are the default values of the predefined profiles. All values in the predefined profiles are view-
only, and cannot be modified. You can select predefined profiles in the virtual server configuration, or
you can create user-defined profiles.
Setting Guidelines
Prerequisites
l Create configuration objects for certificates, caching, and compression if you want the profile to
use them.
l Read-Write permission for Load Balance settings.
Access
l From the Dashboard, go to Resources > Virtual Server, then select the Profile (default) tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
TCP
Timeout TCP Session Client-side timeout for connections where the client has not sent
a FIN signal, but the connection has been idle. The default is
100 seconds. The valid range is 1 to 86,400.
Timeout TCP Session Client-side connection timeout. The default is 100 seconds. The
after FIN valid range is 1 to 86,400.
UDP
Timeout UDP Session Client-side session timeout. The default is 100 seconds. The
valid
range is 1 to 86,400.
FTP
Timeout TCP Session Client-side timeout for connections where the client has not sent
a FIN signal, but the connection has been idle. The default is
100 seconds. The valid range is 1 to 86,400.
Timeout TCP Session Client-side connection timeout. The default is 100 seconds. The
after FIN valid range is 1 to 86,400.
l Click Clone at the right side of column to clone the configuration with a new name.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Persistence rules identify traffic that should not be load balanced, but instead forwarded to the same
backend server that has seen requests from that source before. Typically, you configure persistence
rules to support server transactions that depend on an established client-server session, like e-
commerce transactions or SIP voice calls.
The system maintains persistence session tables to map client traffic to back end servers based on
the session attribute specified by the persistence rule.
The persistence table is evaluated before load balancing rules. If the packets received by the
SLBADC match an entry in the persistence session table, the packets are forwarded to the server that
established the connection, and load balancing rules are not applicable.
Typical source-address persistence rule have a timeout that you can specified. When the time that has
elapsed since the system last received a request from the client IP address is greater than the timeout,
the system does not use the mapping table to forward the request. Instead, it again selects the server
using the method specified in the virtual server configuration. Source address hash rule has a timeout
built into the hash algorithm so that you do not need to specify it.
Following lists the predefined persistence rules. You can get started with these commonly used
persistence methods or create custom objects.
Setting Guidelines
Prerequisites
l Have a good understanding and knowledge of the applications that require persistent sessions
and the methods that can be used to identify application sessions.
l Read-Write permission for Load Balance settings.
After you have configured a persistence rule, you can select it in the virtual server configuration.
Access
l From the Dashboard, go to Resource > Virtual Server, then select the Persistence tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Source Address
Subnet Mask Bits (IPv4) Number of bits in a subnet mask to specify a network segment
that should following the persistence rule.
For example, if IPv4 mask bits is set to 24, and the back end
server A responds to a client with the source IP 192.168.1.100,
server A also responds to all clients from subnet 192.168.1.0/24.
The default is 32. The valid range is from 1 to 32.
Subnet Mask Bits (IPv6) Number of bits in a subnet mask to specify a network segment
that should following the persistence rule.
The default is 128. The valid range is from 1 to 128.
Match Across Virtual Enable so clients continue to access the same back end server
Servers through different virtual servers for the duration of a session.
For example, a client session with a vSphere 6.0 Platform
Services Controller (PSC) has connections on the following
ports: 443, 389, 636, 2012, 2014, 2020. A FortiWAN deployment
to load balance a cluster of vSphere PSCs includes Layer 4
virtual server configurations for each of these ports. To ensure a
client’s connections for a session go to the same back end real
server:
l Create a persistence object based on Source Address affin-
ity and select the Match Across Servers option.
l Select this persistence object in each of the Layer 4 virtual
servers configured to load balance the vSphere PSC pool.
Setting Guidelines
l Select the same real server pool object in each of the Layer
4 virtual servers configured to load balance the vSphere
PSC pool.
When these options are enabled, FortiWAN dispatches the
initial connection to a real server destination (for example, RS1)
based on the virtual server’s load balancing method, and the
persistence object is noted in the connection table. Subsequent
connection attempts with the same source IP address to any
FortiWAN virtual server that has this persistence object and real
server pool are dispatched to RS1, as long as the session is
active.
Note: In the Layer 4 virtual server configuration, you specify a
packet forwarding method. You can use Source Address
persistence with Match Across Servers with any combination of
Direct Routing, DNAT, and Full NAT packet forwarding
methods. However, with NAT46 and NAT64 packet forwarding
methods, the source address type is different from the real server
address type. To use Match Across Servers with NAT46 or
NAT64, all virtual servers for the application must be configured
with the same packet forwarding method: all NAT46 or all
NAT64.
Source Address Hash Persistence is based on a hash of the IP address of the client
making an initial request.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
You can’t modify a default persistence rule.
l Click Clone at the right side of column to clone the configuration with a new name.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row. You can’t delete a default persistence
rule.
Real server
Real servers are the hosts providing service in the backend. Virtual servers forward service requests
to the real servers with specified load balancing method.
Prerequisites
After you have configured a real server, you can select it in the real server pool configuration. See
Real server pool on page 133.
Access
l From the Dashboard, go to Resources > Virtual Server, then select the Real Server tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.This is
the name of the real server.
Status Enable/Disable the real server. Virtual server will not forward
service requests to disabled real server.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Workflow
Prerequisites
l Have a good understanding and knowledge of the backend server boot behavior, for example,
how many seconds it takes to “warm up” after a restart before it can process traffic.
l The IP address and port of the applications.
l If you want to select user-defined health checks, you must create them before creating the pool
configuration.
l Read-Write permission for Load Balance settings.
After you have configured a real server pool, you can select it in the virtual server configuration.
Access
l From the Dashboard, go to Resources > Virtual Server, then select the Real Server Pool tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Reference this name in the virtual server configuration.
Health Check Enable health checking for the pool. You can override this for
individual servers in the pool.
Health Check l AND - All of the selected health checks must pass for the
Relationship server to the considered available.
l OR - One of the selected health checks must pass for the
server to be considered available.
Health Check List Select one or more health check configuration objects.
Member (Save the above configurations so that you can continue the members)
Setting Guidelines
Health Check Inherit Use the pool's health check settings. Disable to override those
settings by selecting a different health check to use with this
individual backend server.
Health Check l AND - All of the selected health checks must pass for the
Relationship server to the considered available.
l OR - One of the selected health checks must pass for the
server to be considered available.
Health Check List Select one or more health check configuration objects. Shift-click
to select multiple objects.
To configure a pool
1. Go to Resource > Virtual Server, and select the Real Server Pool tab.
2. Click Add to open the configuration editor.
3. Enter your information into the fields and add real server members.
In some deployments, it is advantageous to support listening port ranges for client requests. For
example, data centers or web hosting companies sometimes use port numbers to identify their
customers. Client A sends requests to port 50000, client B to port 50001, client C to port 50002,
and so on.
To support this scenario:
l On the real servers, configure the listening ports and port ranges according to your require-
ments.
l On the FortiWAN, when you configure the real server pool member, specify port 0 for the
port. The system handles port 0 as a “wildcard” port. When configured to use port 0, the sys-
tem uses the destination port from the client request. For example, if you specify 0, and the
destination port in the client request is 50000, the traffic is forwarded to port 50000.
l When you configure the virtual server, specify a listening port and port range. The port
range is like an offset. If the specified port is 50000 and the port range is 10, the virtual
server listens on ports 50000-50009.
Use the Source Pool page to create configuration objects for source IP addresses used for NAT in
Layer 4 virtual server configurations.
In a Layer 4 virtual server configuration, you select a “packet forwarding method” that includes the
following network address translation (NAT) options:
l Direct Routing - Does not rewrite source or destination IP addresses.
l NAT - Rewrites the destination IP address (DNAT) for packets before it forwards them.
l Full NAT - Rewrites both the source and destination IP addresses. Use for standard NAT,
when client and server IP addresses are all IPv4 or all IPv6.
l NAT46 - Rewrites both the source and destination IP addresses. Use for NAT 46, when client
IP addresses are IPv4 and server IP addresses are IPv6.
l NAT64 - Rewrites both the source and destination IP addresses. Use for NAT 64, when client
IP addresses are IPv6 and server IP addresses are IPv4.
Prerequisites
l You must have a good understanding of NAT. You must know the address ranges your network
has provisioned for NAT.
l Configure the backend servers to use the FortiWAN address as the default gateway so that
server responses are also rewritten by the NAT module.
l Read-Write permission for Load Balance settings.
After you have configured a source pool IP address range configuration object, you can select it in the
virtual server configuration. You can assign a virtual server multiple source pools (with the same or
different associated source pool interfaces).
Access
l From the Dashboard, go to Monitor > System, then select the tab name tab.
Settings
1. Go to Resource > Virtual Server, and click the NAT Pool tab.
2. Click Add to open the configuration editor.
3. Enter your information into the fields.
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and
-. No spaces. Once you Save, you can't change the name.
Reference this name in the virtual server configuration.
Setting Guidelines
Example: DNAT
The NAT module rewrites only the destination IP address. Therefore, if you configure destination
NAT, you do not need to configure a source pool. In this DNAT example, the destination IP
address in the packets it receives from the client request is the IP address of the virtual server—
192.168.1.101. The NAT module translates this address to the address of the real server selected
by the load balancer—in this example, 192.168.2.1. The system maintains this NAT table and
performs the inverse translation when it receives the server-to-client traffic..
Example: FullNAT
The source IP / destination IP pair in the packets received is SRC 192.168.1.1 / DST
192.168.1.101. The NAT module translates the source IP address to the next available address in
the source pool—in this example, 192.168.2.101. It translates the destination IP address to the
address of the real server selected by the load balancer—in this example, 192.168.2.1.
The system maintains this NAT table and performs the inverse translation when it receives the
server-to-client traffic..
The IPv6 client connects to the virtual server IPv4 address. The source IP / destination IP pair in
the packets received is SRC 192.168.1.1 / DST 192.168.1.101. The NAT module translates the
source IP address to the next available IPv6 address in the source pool—in this example,
2002::2:1001. It translates the destination IP address to the IPv6 address of the real server
selected by the load balancer—in this example, 2002::2:1.
The system maintains this NAT table and performs the inverse translation when it receives the
server-to-client traffic...
Features Notes
The IPv6 client connects to the virtual server IPv6 address. The source IP / destination IP pair in
the packets received is SRC 2001::1:1 / DST 2001::1:101. The NAT module translates the source
IP address to the next available IPv4 address in the source pool—in this example, 192.168.2.101.
It translates the destination IP address to the IPv4 address of the real server selected by the load
balancer—in this example, 192.168.2.1.
The system maintains this NAT table and performs the inverse translation when it receives the
server-to-client traffic...
Features Notes
Features Notes
Global load balancing (GLB) is a DNS-based solution that enables you to deploy redundant resources
around the globe that you can leverage to keep your business online when a local area deployment
experiences unexpected spikes or downtime. The FortiWAN system implements a hardened BIND 9
DNS server that can be deployed as the authoritative name server for the DNS zones that you
configure. Zone resource records can begenerated dynamically based on the global load balancing
framework. The DNS response to a client request is an ordered lists of answers that includes all
available virtual servers. A client that receives DNS response with a list of answers tries the first and
only proceeds to the next answers if the first answer is unreachable. The response list is based on the
following priorities:
1. Virtual server health - Availability is determined by real-time connectivity checking. When the
DNS server receives a client request, it checks connectivity for all possible matches and
excludes unavailable servers from the response list.
2. Persistence - You can enable persistence for applications that have transactions across mul-
tiple hosts. A match to the persistence table has priority over proximity algorithms.
3. Geographic proximity - Proximity is determined by matching the source IP address to either
the FortiGuard Geo IP database or the FortiWAN predefined ISP address book. Dynamic prox-
imity
4. Dynamic proximity - Proximity is determined by application response time (RTT probes) or
least connections.
5. Weighted round robin - If proximity algorithms are not configured or not applicable, available
virtual servers are listed in order based on a simple load balancing algorithm.
The following example shows global load balancing deployment with redundant resources at data
centers in China and the United States.
FortiWAN-1 is the local SLB for the data center in China. FortiWAN-2 is the local SLB for the data
center in theUnited States. FortiWAN-3 is a global SLB. It hosts the DNS server that's authoritative for
www.example.com. When a client clicks a link to www.example.com, the local host DNS resolver
commences a DNS query that's ultimately resolved by the authoritative DNS server on FortiWAN-3.
The set of possible answers includes the virtual servers on FortiWAN-1 or FortiWAN-2. The global
load balancing framework uses health status and proximity algorithms to determine the set of answers
that are returned, and the order of the answer list. Forexample, you can use the global SLB framework
geoproximity feature to direct clients located in China to the virtual server in China; or if the virtual
server in China is unavailable, then to the redundant resources in theUnited States.
You configure the global load balancing framework and DNS settings only on the global FortiWAN
(FortiWAN-3 in the example above). The virtual server IP addresses and ports can be discovered by
the FortiWAN global SLB from the FortiWAN local SLBs. The GLB DNS server uses the discovered IP
addresses in the DNS response. The framework also supports third-party IP addresses and health
checks for them.
The DNS server supports the following security features:
Data center
The data center configuration sets akey property, Location, which is used in the global load balancing
algorithm that selects the FortiWAN in closest proximity to the client.
Prerequisites
l To select a user-defined ISP address book, create it before creating the data center con-
figuration.
l Read-Write permission for Global Load Balancesettings.
l After you have created a data center configuration object, you can specify it in the global load
balance servers configuration.
Access
l From the Dashboard, go to Resources > Global DNS Server, then select the Data Center tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Servers
In the context of the global server load balance configuration, servers are the local SLB (FortiWAN
instances or third-party servers) that are to be load balanced. For FortiWAN instances, the GLB
checks status and synchronizes configuration from the local SLB so that it can learn the set of virtual
servers that are possible to include in the GLB virtual server pool.
The following shows configuration discovery. Placement in this list does not include them in the pool.
You also must name them explicitly in the virtual server pool configuration.
Prerequisites
l Create the data center configuration objects associated with the local SLB. See About server
load balancing (SLB) on page 245.
l Create virtual server configurations on the local FortiWAN SLB. In this procedure, the global
SLB discovers them. See About server load balancing (SLB) on page 245.
l Create link configuration objects on the local FortiWAN SLB if you want to configure a link
health check. In this procedure, the global SLB discovers them. See Global Load Balancing on
page 144.
l Read-Write permission for Global Load Balance settings.
l After creating a server configuration object, you can specify it the global load balancing virtual
server pool configuration.
Access
l From the Dashboard, go to Resources > Global DNS Server, then select the Server tab.
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Data Center Select a data center configuration object. The data center
configuration object
properties are used to establish the proximity of the servers and
the client requests.
FortiWAN VS
Synchronization Toggle ON to synchronize the virtual server status with the local
FortiWAN SLB. When enabled, synchronization occurs each
time there is a change in virtual server status.
Enabled by default.
Generic Host
Health Check Control If type is Generic Host, toggle ON to enable health checks for the
virtual server list.The health check settings at this configuration
level are the parent configuration. When you configure the list,
you can specify whether to inherit or override the parent
configuration.
Setting Guidelines
Health Check l AND - All of the specified health checks must pass for the
Relationship server to be considered available.
l OR - One of the specified health checks must pass for the
server to be considered available.
Health Check List The items in the left pane are used for the Health Check.
l Save, then double-click the item from the list, or click the Pencil icon at the end of the row to
continue entering your settings.
l Click Add to add a VS member.
l Click Discover to find members from the local FortiWAN SLB. If no window appears, there are
no entries.
After the list is populated, you can edit the configuration to add a gateway health check.
l Check Override to update the discovered virtual server configuration with the latest
configuration information whenever you use Discover (for example, additions or changes to
previously discovered configurations).
Don’t check this option if you want to preserve the previously discovered configuration and not
have it overwritten by Discover.
Setting Guidelines
Member
Name Enter a name that matches the virtual server configuration name
on the local FortiWAN.
Setting Guidelines
Custom External Toggle ON to have the GLB answer this IP address for DNS
requests coming from external IP networks.
Protocol l TCP
l UDP
The default is TCP.
Health Check Inherit Toggle ON to inherit the health check settings from the parent
configuration, if the type is Generic Host.
Health Check Control This option is available only when Health Check Inherit is
disabled.
Toggle ON to enable this option.
Health Check l AND - All of the specified health checks must pass for the
Relationship server to be considered available.
l OR - One of the specified health checks must pass for the
server to be considered available.
Health Check List The items in the left pane are used for the Health Check.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Link (GLB)
On this page you can set key properties: ISP and ISP province, which are used in global load
balancing to select the closest FortiWAN to the client.
Configure this to associate a ISP profile with the WAN link of a virtual server for the proximity of the
servers and the client requests.
Prerequisites
Access
l From the Dashboard, go to Resources > Global DNS Server, then select the Link tab.
Settings
Setting Guidelines
Data Center Select a data center from the list. You must first configure the
data centers. See Data center on page 146.
ISP Select an ISP from the list. See Resources > Address > ISP
Address.
ISP Province Select an ISP province from the list. See Resources > Address >
ISP Address.
WAN Link The WAN link of FortiWAN that can access to the virtual server.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
The virtual server pool configuration defines the set of virtual servers that can be matched in DNS
resource records, so it should include, for example, all the virtual servers that can be answers for DNS
requests to resolve www.example.com.
You also specify the key parameters of the global load balancing algorithm, including proximity
options, status checking options, load balancing method, and weight.
The DNS response is an ordered list of answers. Virtual servers that are unavailable are excluded.
Available virtual servers are ordered based on the following priorities:
1. Geographic proximity
2. Dynamic proximity
3. Weighted round robin
A client that receives DNS response with a list of answers tries the first and only proceeds to the next
answers if the first answer is unreachable.
Prerequisites
l Configure the GLB Servers. See DNS Server (DNS zones) on page 180.
l Read-Write permission for Global Load Balance settings.
After you have created a virtual server pool configuration object, you can specify it in the global load
balancing host configuration.
Access
l From the Dashboard, go to Resources > Global DNS Server, then select the Virtual Server
Pool tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Reference this name in the host configuration.
Setting Guidelines
Check Server Status Toggle ON to enable polling of the local FortiWAN SLB.
If the server is unresponsive, its virtual servers are not selected
for DNS answers.
Check Virtual Server Toggle ON to check whether the status of the virtual servers in
Existence the virtual server list is known. Virtual servers with unknown
status are not selected for DNS answers.
Member
Server Member Select the name of the virtual server that's in the servers virtual
server list configuration.
Setting Guidelines
Server Member Select the name of the virtual server that's in the servers virtual
server list configuration.
TTL Time to Live - Enter the number of seconds to keep the packet.
Setting Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
The remote server configuration is used to create a list of DNS forwarders. DNS forwarders are
commonly used when you don't want the local DNS server to connect to Internet DNS servers. For
example, if the local DNS server is behind a firewall and you don't want to allow DNS through that
firewall, you implement DNS forwarding to a remote server that's deployed in a DMZ or similar
network region that can contact Internet DNS servers.
Prerequisites
l Good understanding of DNS and knowledge of the remote DNS servers that are used to com-
municate with Internet domain servers.
l Read-Write permission for Global Load Balance settings. See DNS Server (DNS zones) on
page 180.
After you have configured remote DNS servers, you can select them in DNS zone and DNS policy
configurations.
Access
l From the Dashboard, go to Resources > Global DNS Server, then select the Remote DNS
Server tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Port Port number the remote server uses for DNS. The default is 53.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Services
FortiWAN enables you to configure link load balance, global DNS servers, and virtual servers.
Link load balancing (LLB) manages traffic over multiple internet service providers (ISP) or wide area
networks (WAN). If your ISP uses billing tiers based on bandwidth rate or peak/off-peak hours, you
can provision multiple links, reducing the risk of outages, obtaining additional bandwidth for peak
events, potentially saving costs.
In most cases, configure link load balancing for outgoing traffic. Outbound traffic might be user or
server traffic that's routed from your local network through your ISP transit links, leased lines, or other
WAN links to destinations on the Internet or WAN. Configure link policies that select the gateway for
outbound traffic.
When the FortiWAN system receives outbound traffic that matches a source-destination-application
tuple that you configure, it forwards it to an outbound gateway link according to system logic and
policy rules that you specify.
LLB supports load balancing among Underlay link groups or Overlay link (IPsec tunnels) groups.
Flow Policy
Prerequisites
l Configure any address, application, and schedule objects that you want to use as match criteria
for your policy.
l Configure a link group.
l Read-Write permission for Services module settings.
Access
l From the Dashboard, go to Services > Link Load Balance, then select the Flow Policy
(default) tab.
Settings
l To use the predefined configuration, from Default Link Group, choose underlay_all_wrr.
l To create a new policy, click Add to open the configuration editor.
Settings Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Ingress interface This field only appears then Ingress Type Interface is chosen.
Choose a port from the drop down list.
Source Zone This field only appears when Source Type Address Group is
chosen.
l WAN
l LAN
l DMZ
Settings Guidelines
Destination Address
Group
Schedule Choose from the drop down list. See Schedules and schedule
groups on page 111.
Link Group Choose from the drop down list. Don’t use the default link group.
See Link group on page 116.
Tunnel Quality Policy l Disable - Select to turn off the tunnel quality policy.
l Enable - Select to use the tunnel quality policy.
Traffic Log Toggle ON to log any traffic matching the link flow policy.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Source NAT
Use source NAT (SNAT) when clients have IP addresses from private networks. This ensures you
don't have multiple sessions from different clients with source IP 192.168.1.1, for example. Or, you can
map all client traffic to a single source IP address because a source address from a private network
isn't meaningful to the FortiWAN system or backend servers.
Shown below, the SNAT rule matches the source and destination IP addresses in incoming traffic to
the ranges specified in the policy. If the client request matches, the system translates the source IP
address to an address from the SNAT pool. In this example, a client with private address 192.168.1.1
requests a resource from the virtual server address at 192.0.2.1 (not the real server address 10.0.0.1;
the real server address isn't published). The two rule conditions match, so the system translates the
source IP to the next address in the SNAT pool—10.1.0.1. SNAT rules don't affect destination
addresses, so the destination address in the request packet is preserved.
The system maintains this NAT table and performs the inverse translation when it receives the server-
to- client traffic. Be sure to configure the backend servers to use the FortiWAN address as the default
gateway so that server responses are also rewritten by the NAT module.
Note: This SNAT feature isn't supported for traffic to virtual servers. Use the virtual server SNAT
feature instead.
Figure 18 - SNAT
Prerequisites
l Know the IP addresses your organization has provisioned foryour NAT design.
l Read-Write permission for Networking settings.
Access
l From the Dashboard, go to Services > Link Load Balance, then select the Source NAT tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Pool Address Range This option applies only when the Translation Type is set to IP
address. Enter the first IP address in the SNAT pool.
From Group This option applies only when the From Type is set to Address
Group. Select a address group as the source addresses.
To Type l Address
l Address Group
To Group This option applies only when the To Type is set to Address
Group. Select a address group as the destination addresses.
Application Group This option applies only when the Application is set to
Application Group. Select a application group which you want to
make SNAT.
Setting Guidelines
Out Interface Choose an out interface from the drop down list.
Out Link This option applies only when the Out type is set to Out Link.
Choose a link from the drop down list.
Trans to Random Port Toggle ON. FortiWAN translates the packets with a random
source port.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
1-to-1 NAT
Use 1-to-1 NAT when you want to publish public or “external” IP addresses for FortiWAN resources,
but want the communication among servers on the internal network to be on a private or “internal” IP
address range.
The NAT configuration example shown below assigns both external and internal (or “mapped”) IP
addresses to Interface 1. Traffic from the external side of the connection (such as client traffic) uses the
external IP address and port. Traffic on the internal side (such as the virtual server communication with
real servers) uses the mapped IP address and port.
1-to-1 NAT is supported for traffic to virtual servers. The address translation occurs before the
FortiWAN has processed its rules, so FortiWAN server load balancing policies that match source
address (such as content routing and content rewriting rules) should be based on the mapped address
space.
The system maintains this NAT table and performs the inverse mapping when it sends traffic from the
internal side to the external side.
Prerequisites
l Know the IP addresses your organization has provisioned for your NAT design.
l Read-Write permission for System settings.
Access
l From the Dashboard, go to Services > Link Load Balance, then select the 1-to-1 NAT tab.
Settings
Setting Guidelines
Name Enter a unique name. Enter a unique name. Valid characters are
A-Z, a-z, 0-9, _, and -. No spaces. Once you Save, you can't
change the name.
External Interface Choose the Interface that receives traffic from the drop down list.
External Address Enter the first address in the range. The last address is
calculated after you enter the mapped address range.
Mapped Address Range Enter the first and last addresses in the range.
Protocol l ICMP
l TCP
l UDP
External Port Enter the first port number in the range. The last port number is
calculated after you enter the mapped port range.
Mapped Port Range Enter the first and last port numbers in the range.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Bandwidth
The bandwidth policy feature isn't supported for traffic to virtual servers.
Workflow
1. Configure a traffic shaper for bandwidth management. See Traffic Shaper on page 122.
2. Configure a bandwidth policy.
Prerequisites
l Have a good understanding of traffic in your network that requires bandwidth provisioning.
l Create the address configuration objects and application configuration objects that define the
matching tuple for bandwidth policy.
l Create a traffic shaper configuration object.
l Read-Write permission for Link Load Balance settings.
Access
l From the Dashboard, go to Services > Link Load Balance, then select the Bandwidth tab.
Settings
Setting Guidelines
Name Enter a unique name. Enter a unique name. Valid characters are
A-Z, a-z, 0-9, _, and -. No spaces. Once you Save, you can't
change the name.
Traffic Shaper Choose the traffic shaper that will be used for packets that match
the bandwidth policy criteria.
This affects uploads or outbound traffic.
Reverse Traffic Shaper Choose the traffic shaper that will be used for packets that match
the bandwidth policy criteria.
This affects downloads or inbound traffic.
Application Type
Source Type
Destination Type
In type
Setting Guidelines
Out type
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Connection limit
The connection limit policy allows or denies traffic based on a matching tuple: source address,
destination address, and service; and connection count. The purpose is to detect anomalous
connection requests.
The limit you specify can be based on the following counts:
l Count of concurrent sessions that match the tuple.
l Count of concurrent sessions from a single host that match the tuple.
The FortiWAN system evaluates connection limit policy rules before other rules. It matches traffic
against the connection limit table, beginning with the first rule. If no rule matches, the connection is
forwarded for further processing. If a rule matches, and the limit has not been reached, the connection
is forwarded for further processing. If a rule matches and the limit has been reached, the connection is
dropped.
By default, if connection limit rules are not configured, the system does not perform connection limit
policy processing.
The purpose of the connection limit is different from the virtual server
connection limit. The connection limit setting is a security setting; the
virtual server connection limit is a capacity setting.
Prerequisites
Access
l From the Dashboard, go to Services > Link Load Balance, then select the Connection Limit
tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Traffic Shaper Select the traffic shaper that will be used for packets that match
the bandwidth policy criteria.
This affects uploads or outbound traffic. See Traffic Shaper on
page 122.
Reverse Traffic Shaper Select the traffic shaper that will be used for packets that match
the bandwidth policy criteria.
This affects downloads or inbound traffic.
Source Address Select a source address to use to form the matching tuple.
Destination Address Select a destination address to use to form the matching tuple.
In Interface Select the interface that receives traffic. See Interface settings on
page 63.
Setting Guidelines
In Link Choose a link from the drop down list. See Links - underlay or
Out Lint overlay on page 76.
Schedule Choose from the drop-down list. See Schedules and schedule
groups on page 111.
Firewall
A firewall policy is a filter that allows or denies traffic based on a matching tuple: source address,
destination address, and service. By default, firewall policy rules are stateful: if client-to-server traffic is
allowed, the session is maintained in a state table, and the response traffic is allowed.
The FortiWAN system evaluates firewall policies before other rules. It matches traffic against the
firewall policy table, beginning with the first rule. If a rule matches, the specified action is taken. If the
session is denied by a firewall policy rule, it is dropped. If the session is accepted, system processing
continues.
By default, if firewall rules are not configured, the system does not perform firewall processing; all
traffic is processed as if the system were a router, and traffic is forwarded according to routing and
other system rules.
You don't need to create firewall rules for routine management traffic
associated with the management port or HA ports. The interface “allow
access” option enables permitted protocols. The system automatically
permits from-self traffic, such as health check traffic, and expected
responses.
Prerequisites
Access
Settings
Setting Guidelines
Rule
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
In Interface
Out Interface
Source Address
Destination Address
Source Address Group This option applies only when the Source Type is set to Address
Group. Select a address group as the source address.
Destination Address This option applies only when the Destination Type is set to
Group Address Group.
Select a address group as the destination address.
Setting Guidelines
In Zone This option applies only when the In Type is set to Zone. Select
the zone that receives traffic.
In Link This option applies only when the In Type is set to Link. Select
the link that receives traffic.
Out Zone This option applies only when the Out Type is set to Zone.
Select the zone that forwards traffic.
Setting Guidelines
Application Group This option applies only when the Application is set to
Application Group.
Select a application group which you want to make SNAT
Deny Log Toggle ON to enable the deny log. The log records each time
traffic is dropped.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
l Use the arrow buttons to change the order of the rules. Rules are evaluated from top to
bottom. The first rule that matches is applied and subsequent rules are not evaluated.
The DNS zone configuration is the key to the global load balancing solution. This configuration
contains the key DNS server settings, including:
l Domain name and name server details.
l Type - Whether the server is the master or a forwarder.
l DNSSEC - Whether to use DNSSEC.
l DNSRR records - The zone configuration contains resource records (RR) used to resolve DNS
queries delegated to the domain by the parent zone.
Enter different DNS server settings for each zone you create. For example, the DNS server can be a
master for one zone and a forwarder for another zone.
The general settings configuration specifies the interfaces that listen for DNS requests. By default, the
system listens on the IPv4 and IPv6 addresses of all configured interfaces for DNS requests.
The other settings in the general settings configuration are applied when traffic does not match a
Global DNS policy.
Prerequisites
l A good understanding of DNS and knowledge of the DNS deployment in your network.
l Permission to create authoritative DNS zone records for your network.
l Read-Write permission for Global Load Balance settings. After you have configured a DNS
zone, you can select it in the DNS policy configuration.
Access
l From the Dashboard, go to Services > Global DNS Server, then select the DNS Server
(default) tab.
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
Reference the name in the global DNS policy configuration.
l FortiWAN supports third-party domain names.
Domain Name Enter a domain name, which must end with a period. For
example: example.com.
General Configurations
TTL The $TTL directive at the top of the zone file (before the SOA)
gives a default TTL for every RR without a specific TTL set.
The default is 86,400. The valid range is -1 to 2147483647.
Responsible Mail (required) Enter the email address of the person responsible for
this zone.
Don’t use “@”; instead, use a dot, because @ has other uses in
the zone file. For example, admin.example.com., including the
trailing dot. Email, however, is sent to [email protected].
Primary Server (required) Sets the server name in the SOA record.
Name
Reverse
Setting Guidelines
Negative TTL Negative Time to Live - Enter the number of seconds to keep the
packet.
The default is 86400. The range is from 1 to 2147483647.
DNSSEC Settings
l Save, then double-click the item from the list, or click the Pencil icon at the end of the row.
DNSSEC Settings
A/AAAA Record
TTL Time to Live - Enter the number of seconds to keep the packet.
The default is -1. The valid range is -1 to 2147483647.
-1 means it uses the zone level TTL.
Virtual Server Pool Select a defined virtual server pool so that GLB answers the IP
address of a virtual server from the pool dynamically with the
specified algorithm. See Configuring data centers, Configuring
servers and Configuring virtual server pools.
CNAME Record
example.com.
TTL Time to Live - Enter the number of seconds to keep the packet.
The default is -1. The valid range is -1 to 2147483647.
-1 means it uses the zone level TTL.
NS Record
Domain Name (required) The domain for which the name server has
authoritative answers, such as example.com.
FortiWAN supports third-party domain names.
TTL Time to Live - Enter the number of seconds to keep the packet.
The default is -1. The valid range is -1 to 2147483647.
-1 means it uses the zone level TTL.
Type l IPv4
l IPv6
MX Record
Domain Name (required) The domain for which the name server has
authoritative answers, such as example.com.
FortiWAN supports third-party domain names.
TTL Time to Live - Enter the number of seconds to keep the packet.
The default is -1. The valid range is -1 to 2147483647.
-1 means it uses the zone level TTL.
Type l IPv4
l IPv6
TXT Record
Name Hostname.
TXT records are name-value pairs that contain human readable
information about a host. The most common use for TXT records
is to store SPF records.
SRV Record
Priority A priority assigned to the target host: the lower the value, the
higher the priority.
Target Name The canonical name of the machine providing the service.
DName Record
Alias
Target (required)
TTL Time to Live - Enter the number of seconds to keep the packet.
The default is -1. The valid range is -1 to 2147483647.
-1 means it uses the zone level TTL.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Use this page to configure dynamic proximity. Dynamic proximity is used to order DNS lookup results
based on round-trip time (RTT) for ICMP or TCP probes sent by the local SLB to the DNS resolver that
sent the DNS request.
The system caches the RTT results for the period specified by the timeout. When there are
subsequent requests from clients that have a source IP address within the specified netmask, the RTT
is taken from the results table instead of a new, real-time probe. This reduces DNS response time.
Prerequisites
The settings you configure are applied if dynamic-proximity is enabled in the virtual server pool
configuration.
Access
l From the Dashboard, go to Services > Global DNS Server, then select the DNS Settings tab.
Settings
Setting Guidelines
Traffic log Toggle ON to enable the traffic log. See Traffic log on page 211.
Persistence
Proximity Mask Length Number of IPv4 netmask bits that define network affinity for the
RTT table.
The default is 24. The valid range is 1 to 32.
For example, if the GLB records an RTT for a client with source
IP address 192.168.1.100, the record is stored and applies to all
requests from the 192.168.1.0/24 network.
Proximity Mask Length6 Number of IPv6 netmask bits that define network affinity for the
RTT table.
The default is 64. The valid range is 1 to 128.
Proximity Aging Period RTT results are cached. This setting specifies the length of time
in seconds for which the RTT cache entry is valid.
The default is 86400. The valid range is 60 to 2,592,000
seconds.
Proximity Settings
Proximity Proto l ICMP- Use ICMP to detect routes. Calculate proximity by the
Setting Guidelines
smaller RTT.
l ICMP and TCP- Some hosts do not respond to ICMP
requests. Specify this option to use both ICMP and TCP to
detect routes and RTT. For TCP detection, a SYN packet is
sent to port 53. A connection refused or connection reset by
the destination is treated as successful detection
Proximity Mask Length Number of IPv4 netmask bits that define network affinity for the
RTT table.
The default is 24. The valid range is 1 to 32.
For example, if the GLB records an RTT for a client with source
IP address 192.168.1.100, the record is stored and applies to all
requests from the 192.168.1.0/24 network.
Proximity Mask Length6 Number of IPv6 netmask bits that define network affinity for the
RTT table.
The default is 64. The valid range is 1 to 128.
Proximity Aging Period RTT results are cached. This setting specifies the length of time
in seconds for which the RTT cache entry is valid.
The default is 86400. The valid range is 60 to 2,592,000
seconds.
Prerequisites
l Have a deep understanding of the backend servers and your load balancing objectives.
l Configure a real server pool (required) and other configuration objects that you can incorporate
into the virtual server configuration, such as persistence rules, user-defined profiles and NAT
pools if you are deploying NAT. See Real server pool on page 133.
l Read-Write permission for Load Balance settings.
After the configuration resources for virtual server are prepared (see Virtual Servers on page 126), you
can start setting the virtual server on the FortiWAN interface to receive service requests. Before
starting to configure the virtual server, know that:
l The FortiWAN virtual server supports only standard port 21 FTP for both active and passive
modes; other ALG applications are not supported.
l To implement FTP passive mode, the FortiWAN virtual server listens on any port higher than
1024 and take the received packets (with destination port higher than 1024) as connectivity of a
data link. This might break in on other services (such as SNAT and FortiWAN GLB man-
agement) that run via the same IP address as the virtual server. You might assign an exclusive
virtual IP address for the virtual server to make sure no other services share the same IP
address.
Access
Settings
Setting Guidelines
Name Enter a unique name. Valid characters are A-Z, a-z, 0-9, _, and -.
No spaces. Once you Save, you can't change the name.
This name appears in reports and in logs as the SLB “policy”.
Interface Network interface that receives client traffic for this virtual server.
Address Enter the IP address provisioned for the virtual server when IP
Type is set to Specify. You can specify a IP address which is
not physically bound on the interface via Networking >
Interface, FortiWAN takes the specified IP address as virtual IP
on the interface; you just make sure clients can access to this IP.
Packet Forwarding For Layer 4 virtual servers, select one of the following packet
Method forwarding methods:
l Direct Routing - Forwards the source and destination IP
addresses with no changes.
Note: For FTP profiles, when Direct Routing is selected, you
must also configure a persistence method.
l NAT - Replaces the destination IP address with the IP
address of the backend server selected by the load
balancer.
The destination IP address of the initial request is the IP
address of the virtual server. Be sure to configure FortiWAN
as the default gateway on the backend server so that the
reply goes through FortiWAN and can also be translated.
l Full NAT - Replaces both the destination and source IP
addresses. IPv4 to IPv4 or IPv6 to IPv6 translation.
l NAT46 - Replaces both the destination and source IP
addresses, translating IPv4 addresses to IPv6 addresses.
l NAT64 - Replaces both the destination and source IP
addresses, translating IPv6 addresses to IPv4 addresses.
For Full NAT, NAT46, and NAT64, the source IP address is
Setting Guidelines
Server Pool Name Select a real server pool configuration object. See Real server
pool on page 133.
Traffic Log Enable to record traffic logs for this virtual server.
Setting Guidelines
Connection Rate Limit With Layer 4 profiles, and with the Layer 2 TCP profile, you can
limit the number of new connections per second. The default is 0
(disabled). The valid range is 1 to 86,400 connections per
second.
You can apply a connection rate limit per real server and per
virtual server. Both limits are enforced. Attempted connections
that are dropped by security rules are not counted.
Not supported for FTP profiles.
l Click Clone at the right side of column to clone the configuration with a new name.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
Log
Local log disk settings are configurable. You can select a subset of
system events, traffic, and security logs.
FortiWAN-30E has no hard-disk embedded for local log database. Although FortiWAN-30E can store
logs in RAM and report logs through the UI. Logs are removed, however, after system reboots.
l If you have a Log Server, store FortiWAN logs on the Log Server to avoid resource usage asso-
ciated with writing logs to the local hard disk.
l If you don't need a traffic log, disable it to reduce the use of system resources.
l Reduce repetitive log messages. Use the alert email settings to define the interval that emails
are sent if the same condition persists following the initial occurrence.
l Avoid recording log messages using low severity thresholds, such as information or noti-
fication, to the local hard disk for an extended period of time. Excessive logging frequency saps
system resources and can cause undue wear on the hard disk and may cause premature fail-
ure.
Log Browsing
View logs that have been captured. You can filter your view and download complete logs.
Event log
The Event Log page shows logs related to system-wide status and administrator activity.
Use the following category filters to review logs of interest:
Prerequisites
Access
l From the Dashboard, go to Log > Log Browsing, then select the Event Log (default) tab.
Settings
l Within each category, use Filter Setting controls to filter the table based on the values of
matching data.
Click Download to download the logs. Filters are applied to the set that's collected for
download.
l You can filter the information within each log.
a. Select a log type.
b. Click Filter Setting, then choose an option from the drop-down list.
c. Click OK to apply the filter. The list is updated.
l Click the page icon in the last column to see log the log settings.
Configuration l Date
l Time
l Log Level
l User
l Message
l Action
System, l Date
Admin l Time
l Log Level
l User
l Message
l Action
l Status
l Time
l Log Level
l Policy
l Message
l Status
Sample Output
msg msg=added a new entry 'queue' for "firewall qos- Log message.
queue" on domain "root"
gateway 10.20.109.254
expire 1532248718
vd vd=root Virtual
domain.
was detected as UP by
Health Check
LB_HLTHCK_ICMP
msg msg=Link vpn1 rtt 707, jitter 45, packetloss 0 Log message.
msg=GLB Peer
msg 10.20.127.101 is Log message.
Disconnected
Event log - VS
The value "none" appears in logs when the value is irrelevant to the
status or action. For example, a health check log for a virtual server
shows "none" in the Group and Member columns even though its
real server pool and members are known because these details
aren’t relevant. Likewise, a health check log for a real server pool
member shows "none" in the Policy column although its virtual
server is known.
Security log
The security log automatically provides an aggregated view of security logs. There are two types of
security logs:
l Firewall - Log for traffic matching firewall deny policies.
l DoS - Log for traffic encountering DoS.
Prerequisites
Access
l From the Dashboard, go to Log > Log Browsing, then select the Security Log tab.
Settings
l Within each category, use Filter Setting controls to filter the table based on the values of
matching data.
Click Download to download the logs. Filters are applied to the set that's collected for
download.
l You can filter the information within each log.
a. Select a log type.
b. Click Filter Setting, then choose an option from the drop-down list.
c. Click OK to apply the filter. The list is updated.
l Click the page icon in the last column to see log the log settings.
vd vd=root Virtual
domain.
severity severity=high
vd vd=root Virtual
domain.
Traffic log
The Traffic Log table displays logs related to traffic (sent and received bytes) served by the FortiWAN
deployment.
Filter the following categories to see the logs:
l Flow - Logs for traffic transferred via LLB.
l DNS - Logs for traffic that DNS queries to GLB.
l VS - Logs for traffic of virtual servers.
Prerequisites
Access
l From the Dashboard, go to Log > Log Browsing, then select the Traffic Log tab.
Settings
l Within each category, use Filter Setting controls to filter the table based on the values of
matching data.
Click Download to download the logs. Filters are applied to the set that's collected for
download.
l You can filter the information within each log.
a. Select a log type.
b. Click Filter Setting, then choose an option from the drop-down list.
source IP to GEO-IP
database.
Traffic log - VS
vd vd=root Virtual
domain.
Log Setting
Local log
Access
l From the Dashboard, go to Log > Log Settings, then select the Local Log tab.
Prerequisites
Settings
Setting Guidelines
File Size Enter the maximum disk space used for a local log file.
The default is 200 MB.
When the current log file reaches this size, a new file is created.
Disk Full Select log behavior when the maximum disk space for local logs
(30% of total disk space) is reached:
l Overwrite - Continue logging. Overwrite the earliest logs.
Setting Guidelines
Event Category This option is available when Event is on. Select the types of events
to collect in the local log:
l Configuration—Configuration changes.
l Admin—Administrator actions.
l Health Check—Health check status changes.
l System—System operations, warnings, and errors.
l LLB—Notifications, such as bandwidth thresholds reached.
l VS—Notifications, such as connection limit reached.
l DNS—Notifications, such as the status of associated local SLB
and virtual servers.
l Bandwidth Management—Traffic matches bandwidth
management rule.
l Connection Limit—Traffic matches connection limit rule.
Traffic Category This option is available when Traffic is on. Select one.
l Flow - Link Load Balancing traffic logs related to sessions and
throughput.
l VS - Virtual server traffic logs related to sessions and throughput.
l DNS - Global DNS server traffic logs related to DNS requests.
Click Refresh to reset any modifications you made since the last Save.
Remote log
A remote syslog server collects logs for long-term storage. The logs can be used with your preferred
analytic tools.
Access
l From the Dashboard, go to Log > Log Setting, then select the Remote Log tab.
Prerequisites
Settings
Setting Guidelines
Port Enter the listening port number of the syslog server. Usually this
is UDP port 514.
Facility Choose an identifier that isn't used by any other device on your
network when sending logs to syslog.
Event Category This option is available when Event is on. Select the types of
events to collect in the local log:
l Configuration—Configuration changes.
l Admin—Administrator actions.
l Health Check—Health check status changes.
l System—System operations, warnings, and errors.
Setting Guidelines
Traffic Category Available when Traffic is on, choose at least one option.
l Flow - Link Load Balancing traffic logs related to sessions
and throughput.
l VS - Virtual server traffic logs related to sessions and
throughput.
l DNS - Global DNS server traffic logs related to DNS
requests.
Security Category Available when Security is on, choose at least one option.
l Firewall - Packets are denied by filewall rules.
l DoS - SYN flood protection logs.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Alert Email
Set up email alerts to let you know when critical events happen. Also, use alerts instead of logging to
improve performance.
Prerequisites
Access
l From the Dashboard, go to Log > Log Setting, then select the Alert Email tab.
Settings
Setting Guidelines
From Enter the email address you want the emails to appear to be
from.
This is useful if you want to assign a rule to incoming emails
based on From address.
Recipient
Settings
Setting Guidelines
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
Diagnostic
Packet capture
Prerequisites
Access
Settings
Setting Guidelines
Interface Choose an interface from the drop down list. See Interface set-
tings on page 63.
Protocol Flag Toggle ON to enable the Protocol Flag, then select the protocols
you want.
l arp
l tcp
l udp
l icmp
Maximum Packet Count Enter the number of maximum packets you want to allow.
The range is 1 to 10000.
l To modify, double-click the item from the list, or click the Pencil icon at the end of the row.
l To delete, check the box for the item you want to remove, then click Delete at the top of the
page, or click the Delete icon at the end of the row.
l Click Clone at the right side of column to clone the configuration with a new name.
l Click Run to start the packet capture.
l Click Stop to stop the packet capture.
l Click Download to save the packet capture to your local drive in .CAP format.
Packet capture can be useful for troubleshooting but can be resource intensive. To minimize the
impact on system performance, use packet capture only during periods of minimal traffic. Use a local
console CLI connection rather than a Telnet or SSH CLI connection, and be sure to stop the command
when you are finished.
Diff
Compare backups of the core configuration file with your current configuration. This can be useful if:
l A previously configured feature is no longer functioning, and you are not sure what in the con-
figuration has changed.
l You want to recreate something configured previously, but don't remember what the settings
were.
Difference-finding programs, such as WinMerge, can help you quickly compare various versions of
your output and easily find differences. They can compare your configurations, line by line, and
highlight parts that are new, modified, or deleted.
Console
You can use the FortiWAN Console to enter CLI commands.
l From the top of the UI, click Console .
The console window opens. Type your commands.
l To close the console window, click Console again.
You can also use CLI commands directly to the device using an SSH
client such as PuTTY.
You can use the command-line interface (CLI) execute commands to run system management utilities,
such as backups, upgrades and reboots; and network diagnostic utilities, such as nslookup, ping,
traceroute, and tcpdump.
Following is a list of execute commands:
FortiWAN-VM #
execute ?
backup backup
certificate certificate
clean clean
discovery-glb-vir- Sync virtual servers from glb server, add them to the virtual server list
tual-server
dumpsystem-file dumpsystem-file
ha ha
nslookup nslookup
packet-capture-file packet-capture-file
restore restore
saml-idp saml-idp
traceroute traceroute
vm vm
Use the CLI diagnose commands to gather diagnostic information that is useful to Fortinet Customer
Care when diagnosing any issues with your system. The commands are similar to the Linux
commands used for debugging hardware, system, and IP networking issues.
The most important command for customers to know is diagnose debug report. This prepares a
report you can give to your Fortinet support contact to assist in debugging an issue.
The following shows the diagnose commands:
FortiWAN-VM # dia-
gnose ?
debug debug
hardware hardware
llb llb
netlink netlink
server-load-balance server-load-balance
share-resource share-resource
sniffer sniffer
soft-switch soft-switch
system system
The system includes utilities for generating system dump files that can help Fortinet support engineers
analyze an issue for you. At present one can use CLI to generate and upload dump files:
Dump kernel and user space information when the system is still responsive
The system processes the update and disconnects your SSH session because the UI has a new IP
address. At this point, you should be able to connect to the CLI from a host on the management subnet
you just configured. You can verify the configuration remotely.
You can also access the UI from a browser. See Step 2: Configure the
management interface on page 8.
You can also perform this action in the UI. See Example: How to
configure a VLAN interface on page 68.
You can also perform this action in the UI. See Static route settings on
page 80.
Enable an interface
edit
<specified_name>
set type agg
set aggregate-mode {802.3ad | balance-alb | balance- rr | balance-tlb |
balance-xor | broadcast}
set member <port_name>
<port_name>
set ip
<ip&netmask>
end
To perform this action in the UI, simply delete the Health Check item.
See Health checks on page 92.
The CLI upgrade procedure replaces the firmware on the alternate partition and reboots. The alternate
(upgraded) partition becomes the active, and the active becomes the alternate.
Prerequisites
l Read the release notes for the version you plan to install. The release notes contain the latest
information and supersede anything in this documentation.
l Be able to use TFTP to transfer the firmware file to the FortiWAN. Download and install a TFTP
server, such as tftpd (Windows, Mac OSX, or Linux), on a server on the same subnet as the
FortiWAN.
l Download the firmware file from the Fortinet Customer Service & Support website: https://sup-
port.fortinet.com/.
l Copy the firmware image file to the root directory of the TFTP server.
l Back up your configuration before beginning this procedure. See Back up and restore on page
42.
l Have superuser permission (user admin) to upgrade firmware.
To install firmware
1. Connect your management computer to the FortiWAN console port using an RJ-45-to-DB-9
serial cable or a null- modem cable.
2. Initiate a connection to the CLI and log in as the user admin.
3. Use an Ethernet cable to connect FortiWAN port1 to the TFTP server directly, or connect it to
the same subnet as the TFTP server.
4. If necessary, start the TFTP server.
5. Use the following command to transfer the firmware image to the FortiWAN system:
execute restore image tftp <filename> <tftp_ipv4>
Example upgrade
FortiWAN-VM # execute restore image tftp FWN_VM-v501-build0166-
FORTINET.out
192.0.2.1 This operation will replace the current firmware version!
Do you want to continue? (y/n)y
Connect to tftp server
192.0.2.1 ... Please wait...
##############################################################
Get image from tftp server OK. Check image trailer OK. Check image
OK.
FortiWAN-VM
#
Example downgrade
FortiWAN-VM # execute restore image tftp FWN_VM-v501-build0165-
FORTINET.out
If the download fails after the integrity check with the error message
invalid compressed format (err=1, but the firmware matches the
integrity checksum on the Fortinet Customer Service & Support
website, try a different TFTP server.
You can also perform this action in the UI. See Updating firmware on
page 40.
By default, reverse path route caching is enabled. FortiWAN caches a reverse path route for inbound
traffic so itcan forward reply packets to the ISP link that forwarded the corresponding request packet.
This is useful when your site receives traffic from multiple ISP links. In the example below, the reverse
path pointer ensures that client traffic received from ISP1 is returned through ISP1.
When reverse path caching isn't enabled, the system forwards reply packets based on the results of
routing lookup.
l To enable/disable reverse path route caching, use the config router setting CLI com-
mand:
FortiWAN-VM # config router
setting FortiWAN-VM (setting) #
get
rt-cache-strict : disable
rt-cache-reverse : enable
ip-forward : enable
ip6-forward : enable
icmp-redirect-send : disable
FortiWAN-VM (setting) # set rt-cache-reverse
disable FortiWAN-VM (setting) # end
FortiWAN-VM # get router
setting rt-cache-strict : disable
rt-cache-reverse : disable
ip-forward : enable
ip6-forward : enable
icmp-redirect-send : disable
The rt-cache-strict option is disabled by default. Enable it when you want to send reply packets
only via the same interface that received the request packets. When enabled, source interface
becomes part of the matching tuple that FortiWAN uses to identify sessions, so reply traffic is
forwarded from the same interface thatreceived the traffic. (Normally each session is identified by a 5-
tuple: source IP, destination IP, protocol, sourceport, and destination port.)
If the rt-cache-reverse option is enabled, you can use the config rt-cache-reverse-
exception command to maintain an exceptions list for source IP addresses that should be handled
differently. For example, if you configure an exception for 192.168.1.0/24, FortiWAN will not maintain a
pointer to the ISP for traffic from source 192.168.1.18. Reply packets will be forwarded based on the
results of routing look up.
FortiWAN-docs # config router
setting FortiWAN-docs (setting) #
get
rt-cache-strict : disable
rt-cache- reverse : enable
ip- forward : enable
ip6-forward : enable
icmp-redirect-send : disable
FortiWAN-docs (setting) # config rt-cache-reverse- exception
FortiWAN-docs (rt-cache-rever~e) # edit 1
The purpose of an SLB is to give you multiple methods for optimizing server response times and
server capacity.
After you have deployed an SLB, traffic is routed to the SLB virtual server instead of the destination
real servers.
The following figure shows an example of a basic load balancing deployment. The FortiWAN
appliance is deployed in front of a server farm, and the network interfaces are connected to three
subnets: a subnet for management traffic; a subnet that hosts real servers A, B, and C; and a different
subnet that hosts real servers D, E, and F. The FortiWAN system performs health checks on the real
servers and distributes traffic to them based on system logic and user-defined settings.
The configuration object framework supports the granularity of FortiWAN application delivery control
rules. You can configure specific options and rules for one particular type of traffic, and different
options and rules for another type.
Workflow
1. Complete the zone configuration. The global load balancing framework generates the zone
configuration for zones that include the FortiWAN virtual servers.
2. Configure general DNS settings. Complete the zone configuration.
3. Configure remote DNS servers (forwarders) that you might reference in the zone configuration.
1. Create the data center, servers, virtual server pool, and host configurations that are the frame-
work for associating locations with virtual servers and generating the DNS zone configuration
and resource records. You can adjust the dynamic proximity and persistence settings at any
time.
2. Review the generated DNS zone configuration.
When a cluster is running, it runs in Active-Passive mode. Only the primary node is active, so it’s the
only node that receives traffic from adjacent routers. Typically, there’s one other node that’s in standby
mode. It assumes active status if the primary node undergoes maintenance or otherwise becomes
unavailable.
HA cluster topology
The following shows an active-passive cluster in a single network path. In an active-passive cluster,
the primary node is the active node that handles all traffic. In the event that the primary node
experiences hardware failure or system maintenance, fail over takes place. In fail over, the standby
node becomes the primary node and processes the traffic that's forwarded along the network path.
The new primary node sends gratuitous ARP to notify the network to direct traffic for the virtual MAC
addresses (vMAC) to its network interfaces. It takes the IP addresses of the unresponsive node.
The following figure hows an active-passive cluster in a redundant path. A topology like this is a best
practice because it is fully redundant, with no single point of failure. If the gateway, load balancer, or
switch were to fail, the fail over path is chosen.
HA synchronization
The master node pushes most of its configuration to the other member nodes. This is known as
synchronization. If automatic synchronization is enabled, synchronization occurs immediately when
an appliance joins the cluster, and thereafter every 30 seconds. If synchronization isn't enabled, you
must initiate synchronization manually.
Synchronization includes:
l Core CLI-style configuration file
l Health check status
For most settings, you configure only the primary node, and its settings are pushed to other members.
The following settings are not synchronized. All other settings are synchronized.
Setting Guidelines
host name The host names are not synchronized to enable you to use unique
names.
SNMP system information Each member node has its own SNMP system information so that
you can maintain accurate, separate data in SNMP collections.
However, the network interfaces of a standby node are not active, so
they can't be actively monitored with SNMP.
RAID level RAID settings are hardware-dependent and determined at boot time
by looking at the drives (for software RAID) or the controller
(hardware RAID), and are not stored in the system con- figuration.
Therefore, they are not synchronized.
You can view the status of cluster members from the dashboard of the primary node. You might need
to log into the system for the a non-primary member node (See ) in the following situations:
Monitoring an HA cluster
You can use also use log messages, alert emails, and SNMP to monitor HA events, such as when fail
over has occurred. The system logs HA node status changes as follows:
l When HA is initialized: HAdeviceInit
l When a member joins a group: Member(FWN2HE5118000002)jointotheHAgroup
l When the HA configuration is changed from standalone to an active-passive cluster mode:
HAdeviceintoSlavemode
You can upgrade firmware on all nodes in a cluster from the primary node. The following process
occurs when you perform the HA upgrade procedure:
1. The primary node pushes the firmware image to the member nodes.
2. The primary node notifies the member nodes of the upgrade, and it takes their user traffic dur-
ing the upgrade.
3. The upgrade command is run on the member nodes, the systems are rebooted, and the mem-
ber nodes send the primary node an acknowledgment that upgrade has been completed.
4. The upgrade command is run on the primary node, and it reboots. When the system is reboot-
ing, a member node assumes primary status, and the traffic fails over from the former primary
node to the new primary node.
After the upgrade process is completed, the system determines whether the original node becomes
the primary node, according to the HA Override setting:
l If Override is enabled, the cluster considers the Device Priority setting. Both nodes usually
make a second failover in order to resume their original roles.
l If Override is disabled, the cluster considers uptime first. The original primary node will have a
smaller uptime due to the order of reboots during the firmware upgrade. Therefore it will not
resume its active role; instead, the node with the greatest uptime will remain the new primary
node. A second failover will not occur.
Reboot times vary by the appliance model, and also by differences between the original firmware
version and the firmware version you are installing.
The administrator procedure for an HA cluster is similar to the procedure for installing firmware on a
standalone appliance. To ensure minimal interruption of service to clients, use the following steps.
The same procedure applies to both active-active and active-passive clusters.
Prerequisites
l Download the firmware file from the Fortinet Customer Service & Support website: https://sup-
port.fortinet.com/.
l Read the release notes for the version you plan to install.
l Back up your configuration before beginning this procedure. Reverting to an earlier firmware
version could reset settings that are not compatible with the new firmware.
l You must have super user permission (user admin) to upgrade firmware.
l Verify that the cluster node members are powered on and available on all of the network inter-
faces that you have configured. If required ports are not available, HA port monitoring could
inadvertently trigger an additional failover, resulting in traffic interruption during the firmware
update.
Access
Settings
1. From the Upgrade section, click Choose File and select your file.
2. HA Sync - toggle ON to activate.
3. Click Upload . The upgrade process starts.
After the new firmware has been installed, the system reboots.
When you update software, you are also updating the UI. To ensure the
UI displays the updated pages correctly:
l Clear your browser cache.
l Refresh the page.
In most environments, press Ctrl-F5 to force the browser to get a new
copy of the content from the web application. See the Wikipedia article
on browser caching issues for a summary of tips for many
environments: https://en.wikipedia.org/wiki/Wikipedia:Bypass_your_
cache.
In an active-passive cluster, one node is the active appliance; it processes traffic. The other node is
passive; it is ready to assume the role of the active appliance if the primary node is unavailable.
Configure the system to send heartbeat packets between the pair to monitor availability. The system
continually polls the activity of the heartbeat packets. If the active appliance becomes unresponsive,
fail-over occurs: the standby becomes active. This process is shown below:
1. The standby node sends gratuitous ARP to notify adjacent routers to direct traffic for the virtual
MAC addresses (vMAC) to its network interfaces.
2. It takes the IP addresses of the unresponsive node.
Figure 28 - An active-passive cluster at fail over - IP address transfer to the new active member
When the former active appliance comes back online, it might or might not assume its former active
role. The system selects the active member based on the following criteria:
l Link health (if monitor ports links are down, the node is considered down)
l Remote IP monitor health check results
l Override setting (prefers priority to up time)
l Most available ports
l Highest up time value
l Lowest device priority number (1 has greater priority than 2)
l Highest-sorting serial number - Serial numbers are sorted by comparing each character from
left to right, where 9 and z are the greatest values. The system gives preference to higher val-
ues over lower values.
Workflow
1. License all FortiWAN appliances in the HA cluster, and register them, including FortiGuard
services, with the Fortinet Customer Service & Supportwebsite:
https://support.fortinet.com/
2. Physically link the FortiWAN appliances that make up the HA cluster.
You must link at least one of their ports (for example, port4 to port4) for heartbeat and
synchronization traffic between members of the cluster. You can do either of the following:
3. Connect the two appliances directly with a crossover cable.
4. Link the appliances through a switch. If connected through a switch, the heartbeat interfaces
must be reachable by Layer 2 multicast.
5. Configure the secondary node:
6. Log into the secondary appliance as the admin user.
7. Complete the HA settings as described in High Availability (HA) settings on page 45.
Important: Set the Device Priority to a higher number than the preferred primary node; for
example, set it to 2.
8. Configure the primary node:
a. Log into the primary appliance as the admin user.
b. Enter your information into the fields for all features, as well as the HA configuration.
Important: Set the Device Priority to a lower number than the secondary node; for
example, set it to 1.
After saving the HA configuration changes, cluster members join or rejoin the cluster. When
configuration changes are saved on the primary node, its configuration is automatically pushed to the
secondary node.
l Be careful to maintain the heartbeat links. If the heartbeat is accidentally interrupted, such as
when a network cable is temporarily disconnected, the other nodes assume that the primary
node has failed. In an active-passive deployment, fail over occurs. If no failure has actually
occurred, both nodes can be operating as the active node. simultaneously.
l If you link HA appliances through switches, to improve fault tolerance and reliability, link the
ports through two separate switches. Also, don't connect these switches to your overall
network, which could introduce a potential attack point, and could also allow network load to
cause latency in the heartbeat, which could cause an unintentional fail over.
In an Active-Passive cluster, only the management IP address for the primary node is active. In an
active- passive cluster, you can log into a node only when it has primary node status and its IP
address is active. To access the user interface of an appliance in standby status (the active-passive
child), you must use a console port connection.
Use the execute ha manage command to log into the console of a mem-
ber node from the master node.
In most deployment scenarios, we recommend you deploy FortiGate to secure your network. Fortinet
includes security functionality within the FortiWAN system to support those times when deploying
FortiGate is impractical. FortiWAN includes the following security features:
l Firewall - Drop traffic that matches a source-destination-application tuple you specify. See Fire-
wall on page 176.
l Connection limit - Drop an abnormally high volume of traffic from a source-destination-applic-
ation match. See Connection limit on page 172.
Regular backups
l Delete or disable unused policies. The system allocates memory with each server policy,
regardless of whether it is actually in active use. Configuring extra policies will unnecessarily
consume memory and decrease performance.
l To reduce latency associated with DNS queries, use a DNS server on your local network as
your primary DNS.
l If the devices on your network support it, you can create one or more VLAN interfaces. VLANs
reduce the size of a broadcast domain and the amount of broadcast traffic received by network
hosts, thus improving network performance.
Troubleshooting
These topics offer troubleshooting tips.
Topology
FortiWAN uses Port1 and Port2, as the outbound interface, by default, is in DHCP mode. You can
directly connect the network cable to connect the device to the Internet.
The Link Load balance module has a predefined Link-Link group-Flow policy that you can use
without modification. See Link load balance (LLB) - Resources on page 113.
Make sure your FortiWAN device can connect to the Internet. By default, FortiWAN will actively detect
8.8.8.8 to determine network connectivity. If your FortiWAN device can’t connect to the Internet, we
recommend that you disable the health check function in Link. See Health checks on page 92.
Login issues
If an administrator is entering his or her correct account name and password, but can't log in from
some or all computers, examine the trusted host definitions for that account. It should include all
locations where that person is allowed to log in, such as your office, but should not be too broad.
Connectivity issues
One of your first tests when configuring a new policy should be to determine whether allowed traffic is
flowing to your servers. Investigate the following connectivity issues if traffic does not reach the
destination servers:
l Is there a FortiWAN policy for the destination servers? By default, FortiWAN allows traffic to
reach a backend server.
However, the virtual servers must also be configured before traffic can pass through.
l If your network utilizes secure connections (HTTPS) and there is no traffic flow, is there a prob-
lem with your certificate?
If there is no traffic flowing from the FortiWAN appliance, you want to rule out hardware problems.
l Ensure the network cables are properly plugged in to the interfaces on the FortiWAN appli-
ance.
l Ensure there are connection lights for the network cables on the appliance.
l Change the cable if the cable or its connector are damaged or you are unsure about the
cable’s type or quality.
l Connect the FortiWAN appliance to different hardware to see if that makes a difference.
l In the UI, go to Networking > Interface and ensure the link status is up for the interface. If
the status is down (down arrow on red circle), edit the configuration to change its status to
Up.
You can also enable an interface using CLI commands. See CLI
Configure Network Interfaces on page 237.
If any of these checks solve the problem, it was a hardware connection issue. You should still
perform some basic software tests to ensure complete connectivity.
If the hardware connections are correct and the appliance is powered on but you can't connect
using the CLI or UI, you may be experiencing bootup problems. See Restoring firmware (“clean
install”).
Check routing
The ping and traceroute utilities are useful for investigating issues with network connectivity
and routing.
Since you typically use these tools to troubleshoot, you can allow ICMP, the protocol used by
these tools, in firewall policies and on interfaces only when you need them. Otherwise, disable
ICMP for improved security and performance.
By default, FortiWAN appliances don't respond to ping and traceroute. However, if the
appliance does not respond, and there are no firewall policies that block it, ICMP type 0 (ECHO_
REPSPONSE) might be effectively disabled.
1. Go to Networking > Interface and click Edit on the network interface row.
2. Under Allow Access, check Ping.
3. Save.
The appliance should now respond when another device such as your management computer
sends a ping or traceroute to that network interface.
Disabling ping only prevents the system from receiving ICMP type 8
(ECHO_ REQUEST) and traceroute-related UDP. It does not disable
CLI commands ,such as execute ping or execute traceroute that
send such traffic.
1. Try to connect through the FortiWAN appliance, from a client to a backend server, via
HTTP or HTTPS. If the connectivity test fails, continue to the next step.
2. Use the ping command on both the client and the server to verify that a route exists
between the two. Test traffic movement in both directions: from the client to the server, and
the server to the client. Servers don't need to be able to initiate a connection, but must be
able to send reply traffic along a return path.
l If the routing test succeeds, check login or resource issues.
l If the routing test fails, continue to the next step.
3. Use the tracert or traceroute command on both the client and the server (depending
on their operating systems) to locate the point of failure along the route.
If the route is broken when it reaches the FortiWAN appliance, first examine its network
interfaces and routes. To display network interface addresses and subnets, enter the CLI
command:
On routers and firewalls between the host and the FortiWAN appliance, verify that they permit
HTTP and/or HTTPS connectivity between them.
The ping command sends a small data packet to the destination and waits for a response. The
response has a timer that may expire, indicating that the destination is unreachable via ICMP.
ICMP is part of Layer 3 on the OSI Networking Model. ping sends Internet Control Message
Protocol (ICMP) ECHO_REQUEST (“ping”) packets to the destination, and listens for ECHO_RESPONSE
(“pong”) packets in reply.
Some networks block ICMP packets because they can be used in a ping flood or denial of
service (DoS) attack if the network does not have anti-DoS capabilities, or because ping can be
used by an attacker to find potential targets on the network.
Beyond basic existence of a possible route between the source and destination, pingtells you the
amount of packet loss (if any), how long it takes the packet to make the round trip (latency), and
the variation in that time from packet to packet (jitter).
If ping shows some packet loss, investigate:
l cabling to eliminate loose connections
l ECMP, split horizon, or network loops
l all equipment between the ICMP source and destination to minimize hops If ping shows
total packet loss, investigate:
l cabling to eliminate incorrect connections
l all firewalls, routers, and other devices between the two locations to verify correct IP
addresses, routes, MAC lists, and policy configurations
If ping finds an outage between two points, use traceroute to locate exactly where the
problem is.
1. Log into the CLI via either SSH, Telnet, or the CLI Console widget of the UI.
2. To adjust the behavior of execute ping, first use the execute ping-options com-
mand.
3. Enter the command:
execute ping <destination_ipv4>
where <destination_ipv4> is the IP address of the device that you want to verify that the
appliance can connect to, such as 192.168.1.1.
If the appliance can reach the host via ICMP, output similar to the following appears:
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: icmp_seq=0 ttl=253 time=6.5 ms
64 bytes from 192.168.1.1: icmp_seq=1 ttl=253 time=7.4 ms
64 bytes from 192.168.1.1: icmp_seq=2 ttl=253 time=6.0 ms
64 bytes from 192.168.1.1: icmp_seq=3 ttl=253 time=5.5 ms
64 bytes from 192.168.1.1: icmp_seq=4 ttl=253 time=7.3 ms
If the appliance can't reach the host via ICMP, output similar to the following appears:
PING 10.0.0.1 (10.0.0.1): 56 data bytes
Timeout ...
Timeout ...
Timeout ...
Timeout ...
Timeout ...
The traceroute utility sends ICMP packets to test each hop along the route. It sends three packets
to the destination, and then increases the time to live (TTL) setting by one, and sends another
three packets to the destination. As the TTL increases, packets go one hop farther along the route
until they reach the destination.
Most traceroute commands display their maximum hop count—that's, the maximum number of
steps it will take before declaring the destination unreachable—before they start tracing the route.
The TTL setting may result in routers or firewalls along the route timing out due to high latency.
Where ping only tells you if the signal reached its destination and returned successfully, traceroute
shows each step of its journey to its destination and how long each step takes. If you specify the
destination using a domain name, the traceroute output can also indicate DNS problems, such as
an inability to connect to a DNS server.
By default, the traceroute utility uses UDP with destination ports numbered from 33434 to 33534.
The traceroute utility usually has an option to specify use of ICMP ECHO_REQUEST (type 8)
instead, as used by the Windows tracert utility. If you have a firewall and you want traceroute to
work from both machines (Unix- like systems and Windows) you will need to allow both protocols
inbound through your firewall (UDP ports 33434 - 33534 and ICMP type 8).
1. Log into the CLI via either SSH, Telnet, or the CLI Console widget of the UI.
2. Enter the command:
execute traceroute {<destination_ipv4> | <destination_fqdn>}
where {<destination_ipv4> | <destination_fqdn>}is a choice of either the device’s IP
address or its fully qualified domain name (FQDN).
For example, you might enter:
execute traceroute www.example.com
If the appliance has a complete route to the destination, output similar to the following appears:
traceroute to www.fortinet.com (66.171.121.34), 32 hops max, 84
bytepackets
1 172.16.1.2 0 ms 0 ms 0ms
2 209.87.254.221 <static-209-87-254-221.storm.ca> 2 ms 2 ms 2ms
3 209.87.239.129 <core-2-g0-1-1104.storm.ca> 2 ms 1 ms 2ms
4 67.69.228.161 2 ms 2 ms 3ms
5 64.230.164.17 <core2-ottawa23_POS13-1-0.net.bell.ca> 3 ms 3 ms 2ms
6 64.230.132.234 <core2-ottawatc_POS5-0-0.net.bell.ca> 20 ms 20 ms
20ms
7 64.230.132.58 <core4-toronto21_POS0-12-4-0.net.bell.ca> 24 ms 21
ms 24ms
8 64.230.138.154 <bx4-toronto63_so-2-0-0-0.net.bell.ca> 8 ms 9 ms
8ms
9 64.230.185.145 <bx2-ashburn_so2-0-0.net.bell.ca> 23 ms 23 ms 23ms
10 12.89.71.9 23 ms 22 ms 22ms
11 12.122.134.238 <cr2.wswdc.ip.att.net> 100 ms 12.123.10.130
<cr2.wswdc.ip.att.net> 101 ms 102ms
12 12.122.18.21 <cr1.cgcil.ip.att.net> 101 ms 100 ms 99ms
13 12.122.4.121 <cr1.sffca.ip.att.net> 100 ms 98 ms 100ms
14 12.122.1.118 <cr81.sj2ca.ip.att.net> 98 ms 98 ms 100ms
15 12.122.110.105 <gar2.sj2ca.ip.att.net> 96 ms 96 ms 96ms
16 12.116.52.42 94 ms 94 ms 94ms
17 203.78.181.10 88 ms 87 ms 87ms
18 203.78.181.130 90 ms 89 ms 90ms
19 66.171.121.34 <fortinet.com> 91 ms 89 ms 91ms
20 66.171.121.34 <fortinet.com> 91 ms 91 ms 89ms
Each line lists the routing hop number, the IP address and FQDN (if any) of that hop, and the 3
response times from that hop. Typically a value of <1ms indicates a local router.
If the appliance does not have a complete route to the destination, output similar to the following
appears:
traceroute to 10.0.0.1 (10.0.0.1), 32 hops max, 84 byte packets
1 172.16.1.2 0 ms 0 ms 0ms
2 172.16.1.10 0 ms 0 ms 0ms
3 * * *
4 * * *
The asterisks ( * ) indicate no response from that hop in the network routing.
When a route does not exist, or when hops have high latency, examine the routing table. The
routing table is where the FortiWAN appliance caches recently used routes.
If a route is cached in the routing table, it saves time and resources that would otherwise be
required for a routelookup. If the routing table is full and a new route must be added, the oldest,
least-used route is deleted to make room.
To check the routing table in the CLI, enter:
get router info routing-table all
If a route exists, but you can't connect to the UI using HTTP or HTTPS, an application-layer
problem is preventing connectivity.
Verify that you have enabled HTTPS and/or HTTP on the network interface. Also examine routers
and firewalls between the host and the FortiWAN appliance to verify that they permit HTTP and/or
HTTPS connectivity between them. Finally, you can also use the CLI command to verify that the
daemons for the UI and CLI, such as sshd, cli, nginx, and php-fpm are running and not
overburdened:
diagnose system top delay 10
Checkport assignments
When attempting to connect to FortiWAN on a given network port, and the connection is expected
to occur on a different port number, the attempt will fail. For a list of ports used by FortiWAN, see
Port Numbers on page 284.
When troubleshooting malformed packet or protocol errors, it helps to look inside the protocol
headers of packets to determine if they are traveling along the route you expect, and with the flags
and other options you expect.
If the packet trace shows that packets are arriving at your FortiWAN appliance’s interfaces but no
HTTP/HTTPS packets egress, check that:
l Physical links are firmly connected, with no loose wires
l Network interfaces are brought up
l Link aggregation peers, if any, are up
l VLANIDs, if any, match
l Virtual servers exist, and are enabled
l Matching policies exist, and are enabled
l If using HTTPS, valid server/CA certificates exist
l IP-layer and HTTP-layer routes, if necessary, match
l Servers are responsive, if server health checks are configured and enabled
Resource issues
Heavy traffic loads can cause sustained high CPU or RAM usage. If this is unusual, no action is
required. However, sustained heavy traffic load might indicate that you need a more powerful
FortiWAN model.
In the UI, you can view traffic load two ways:
l Monitor current HTTP traffic on the dashboard. Go to System > Dashboard > Link and exam-
ine the throughput graphs.
l Examine traffic history in the traffic log. Go to Logs > Log Browsing > Traffic Log.
DoS attacks
A prolonged denial of service (DoS) can bring your servers down if your FortiWAN appliance and your
network devices are not configured to prevent it. To prevent DoS attacks, enable the DoS and
connection limit features. Also, configure protections on your FortiGate and other network devices.
DoS attacks can use a variety of mechanisms. For in-depth protection against a wide variety of DoS
attacks, you can use a specialized appliance such as FortiDDoS.
In the UI, you can watch for attacks in two ways:
l Monitor current traffic on the dashboard. Go to System > Dashboard and examine the system-
wide throughput.
l Examine attack history in the traffic log. Go to Log > Log Browsing > Security Log.
If you intend to sell your FortiWAN appliance, or if you are not sure what part of your configuration is
causing a problem, you can reset it to its default settings and erase all data. If you have not updated
the firmware, this is the same as resetting to the factory default settings.
To delete your data from the system, connect to the CLI and enter this command:
execute formatlogdisk
To reset the configuration, connect to the CLI and enter this command:
execute factoryreset
This procedure applies to physical appliances. Restoring firmware re-images the boot device. Also,
restoring firmware can only be done during a boot interrupt, before network connectivity is available,
and therefore requires a local console connection to the CLI. It can't be done through an SSH or
Telnet connection.
For virtual appliances, you can use VMware to backup and restore virtual appliance images.
1. Download the firmware file from the Fortinet Customer Service & Support website: https://sup-
port.fortinet.com/.
2. Connect your management computer to the FortiWAN console port using a RJ-45-to-DB-9
serial cable or a null- modem cable.
3. Initiate a local console connection from your management computer to the CLI of the FortiWAN
appliance, and log in as the admin administrator, or an administrator account whose access
profile contains Read-Write permissions in the Maintenance category.
4. Connect port1 of the FortiWAN appliance directly or to the same subnet as a TFTP server.
5. Copy the new firmware image file to the root directory of the TFTP server.
6. If necessary, start your TFTP server. (If you don't have one, you can temporarily install and run
one such as tftpd (Windows, Mac OS X, or Linux) on your management computer.)
TFTP isn't secure, and it does not support authentication. Only run
it on trusted administrator-only networks, and never on computers
directly connected to the Internet. Turn TFTP off immediately after
completing this procedure.
7. Verify that the TFTP server is currently running, and that the FortiWAN appliance can reach
the TFTP server. To use the FortiWAN CLI to verify connectivity, enter the following command:
execute ping 192.168.1.168
where 192.168.1.168 is the IP address of the TFTP server.
8. Enter the following command to restart the FortiWAN appliance:
execute reboot
As the FortiWAN appliances starts, a series of system startup messages appear.
Press any key to display configuration menu........
9. Immediately press a key to interrupt the system startup.
You have only 3 seconds to press a key. If you don't press a key
quickly enough, the FortiWAN appliance reboots and you must
log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server. [F]:
Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware. [H]:
Display this list of options.
Enter G,F,B,Q,or H:
Please connect TFTP server to Ethernet port "1".
10. If the firmware version requires that you first format the boot device before installing firmware,
type F.
Format the boot disk before continuing.
11. Type Gto get the firmware image from the TFTP server. The following message appears:
Enter TFTP server address [192.168.1.168]:
12. Type the IP address of the TFTP server and press Enter. The following message appears:
Enter local address [192.168.1.188]:
13. Type a temporary IP address that can be used by the FortiWAN appliance to connect to the
TFTP server. The following message appears:
Enter firmware image file name [image.out]:
14. Type the file name of the firmware image and press Enter.
The FortiWAN appliance downloads the firmware image file from the TFTP server and
displays a message similar to the following:
MAC:00219B8F0D94
###########################
Total 28385179 bytes data downloaded. Verifying the integrity of
the firmware image..
Save as Default firmware/Backup firmware/Run image without saving:
[D/B/R]?
If the download fails after the integrity check with the error
message:
invalid compressed format (err=1)
but the firmware matches the integrity checksum on the Fortinet
CustomerService & Support website, try a different TFTP server.
15. Type D.
The FortiWAN appliance downloads the firmware image file from the TFTP server. The
FortiWAN appliance installs the firmware and restarts. The time required varies by the size of
the file and the speed of your network connection.
The FortiWAN appliance reverts the configuration to default values for that version of the
firmware.
16. To verify that the firmware was successfully installed, log in to the CLI and type: get system
status.
The firmware version number shows.
Either reconfigure the FortiWAN appliance or restore the configuration file.
Appendix
Fortinet MIBs
Listed are the management information bases (MIBs) used with FortiWAN.
Fortinet Core MIB This Fortinet-proprietary MIB enables your SNMP manager to query
for system information and to receive traps that are common to
multiple Fortinet devices.
RFC 1213 (MIB II) The FortiWAN SNMP agent supports MIB II groups, except: There is
no support for the EGP group from MIB II (RFC 1213, section 3.11
and 6.10). Protocol stat- istics returned for MIB II groups (IP, ICMP,
TCP, UDP, and so on) don't accur- ately capture all FortiWAN traffic
activity. More accurate information can be obtained from the
information reported by the FortiWAN MIB.
Download the Fortinet MIB files from the Fortinet Customer Service & Support website,
https://support.fortinet.com/.
To view a trap or query’s name, object identifier (OID), and description, open its MIB file in a plain text
editor.
To communicate with the FortiWAN SNMP agent, you must first compile these MIBs into your SNMP
manager. If the standard MIBs used by the SNMP agent are already compiled into your SNMP
manager, you don't have to compile them again. The FortiWAN SNMP implementation is read-only.
All traps sent include the message, the FortiWAN appliance’s serial number, and host name.
Port Numbers
Communications between the FortiWAN system, clients, servers, and FortiGuard Distribution Network
(FDN) require that any routers and firewalls between them permit specific protocols and port numbers.
The following tables list the default port assignments used by the FortiWAN system.
by a virtual server,
and if the destination
address is a virtual
server.
This table shows the maximum number of configuration objects or limits, and are not a guarantee of
performance. For values such as hardware specifications that don't vary by software version or
configuration, see the Quick Start Guide or data sheet for your model.
30E 200E
System
Access profiles 8 16
Schedule group 64 64
SNMP community 16 16
Host
SNMP user 16 16
Networking
30E 200E
Policy routes 32 64
Firewall
Connection Limit
NAT
Vip 32 64
Bandwidth Management
30E 200E
Server pool 32 64
Pool members 32 64
Resources Profiles 32 32
Persistence 32 32
IP pool 16 32
Remote 3 3
Syslog
Servers
IPFIX Servers 3 3
Diagnostics
Packet capture 5 5
System
Access profiles 8 16 64 64
Schedule group 64 64 64 64
SNMP user 16 16 16 16
Networking
Firewall
Connection Limit
NAT
Bandwidth Management
Server Load
Balancing
Resources Profiles 32 32 32 32
Persistence 32 32 32 32
IP pool 16 32 64 128
object
Remote 3 3 3 3
Syslog
Servers
IPFIX Servers 3 3 3 3
Diagnostics
Packet capture 5 5 5 5
Additional resources
Forums
If you have problem using FortiWAN, check within your organization first. You can save time and effort
during the troubleshooting process by checking if other FortiWAN administrators have experienced a
similar problem before.
If you can't resolve the issue on your own, contact Fortinet Customer Service & Support.
Index
1
1-to-1 NAT 167
A
administrator user 43
Aggregate Interface 237
B
bandwidth 24, 26, 39, 45, 69, 76, 113, 116, 122, 160, 169, 174, 197, 213, 219, 222, 230, 288
H
high availability 45, 251, 254, 260
I
interfaces
aggregate 237
physical 63, 73, 237
software switch 236
VLAN 68, 235
IPsec 71, 73, 114, 160
tunnel 71
L
link load balance 37, 55, 92, 103, 111, 113, 117, 120, 122, 124, 159-161, 165, 168, 170, 173, 230, 267, 271, 285
O
overlay 76, 113, 116, 160
P
persistence 113, 116, 123, 126, 128, 144, 155, 189, 191, 232, 247, 249, 289
Physical Interface 63, 73, 237
proximity route 120
R
responsible mail 181
S
settings
1-to-1 NAT 167
bandwidth 169
DNS 79
high availability 45
interface 63
link 152
schedule 111
traffic shaper 122
Software switch interface 236
T
traffic shaper 122, 169, 174, 288
tunnel quality 39, 162
U
underlay 76, 113, 116, 160
V
virtual server 25, 51, 92, 123, 126, 128, 133, 136, 152-153, 163, 167, 173, 183, 187, 191, 210, 247, 285
VLAN Interface 68, 235
VPN 39, 71, 114
W
workflow
active-passive cluster 260
address 103
address group 105
application groups 110
applications 108
DNS server 249
global load balancing 249
List of Figures