FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Shilpa1
Staff
Staff
Article Id 198257

Description

 

This article describes how to entirely configure SD-WAN from CLI.

Solution

 

To configure SD-WAN in the CLI.

Configure the WAN1 and WAN2 interfaces.

# config system interface
    edit "wan1"
        set alias to_ISP1
        set mode dhcp
        set distance 10
next
    edit "wan2"
        set alias to_ISP2
        set ip 10.100.20.1 255.255.255.0
    next
end

Enable SD-WAN and add the interfaces as members.

# config system virtual-wan-link
    set status enable
# config members
    edit 1
        set interface "wan1"
    next
        edit 2
            set interface "wan2"
            set gateway 10.100.20.2
        next
    end
end

Create a static route for SD-WAN.

# config router static
    edit 1
        set virtual-wan-link enable
    next
end

Select the implicit SD-WAN algorithm.

# config system virtual-wan-link
    set load-balance-mode {source-ip-based | weight-based | source-dest-ip-based | measured-volume-based}
end

Create a firewall policy for SD-WAN.

# config firewall policy
    edit <policy_id>
        set name <policy_name>
        set srcintf internal
        set dstintf virtual-wan-link
        set srcaddr all
        set dstaddr all
        set action accept
        set schedule always
        set service ALL
        set utm-status enable
        set ssl-ssh-profile <profile_name>
        set av-profile <profile_name>
        set webfilter-profile <profile_name>           
        set dnsfilter-profile <profile_name>
        set application-list <app_list>
        set logtraffic all
        set nat enable
        set status enable
    next
end

Configure a performance SLA.

# config system virtual-wan-link
# config health-check

    edit "server"
        set server "208.91.112.53"
        set update-static-route enable
        set members 1 2
    next
end
end

Results.

To view the routing table in the CLI.

# get router info routing-table all
 
Routing table for VRF=0
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
       O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default
 
S*      0.0.0.0/0 [1/0] via 172.16.20.2, wan1
                  [1/0] via 10.100.20.2, wan2
C       10.100.20.0/24 is directly connected, wan2
C       172.16.20.2/24 is directly connected, wan1
C       192.168.0.0/24 is directly connected, internal

To diagnose the Performance SLA status.

# diagnose sys virtual-wan-link health-check
Health Check(server):
Seq(1): state(alive), packet-loss(0.000%) latency(15.247), jitter(5.231) sla_map=0x0
Seq(2): state(alive), packet-loss(0.000%) latency(13.621), jitter(6.905) sla_map=0x0