FortiGate 1 | FortiGate 2 |
# config system interface | # config system interface |
# config router staticOnce the above configuration has been applied, we can see BFD neighborship established between the two FortiGates.
edit 2
set dst 1.1.1.1 255.255.255.255
set gateway 10.180.4.136 via FGT-II
set device "port1"
set bfd enable
next
edit 3
set dst 1.1.1.1 255.255.255.255
set gateway 10.180.2.44 via another device
set distance 20
set device "port1"
next
end
# get router info bfd neighborIn the routing table, the route with lower distance is preferred.
OurAddress NeighAddress State Interface LDesc/RDesc
10.180.6.237 10.180.4.136 UP port1 1/1
# get router info routing-table allIf port1 on FortiGate 2 goes down or FortiGate 1 is unable to reach 10.180.4.136, the BFD neighborship will go down.
S 1.1.1.1/32 [10/0] via 10.180.4.136, port1
C 10.180.0.0/20 is directly connected, port1
# get router info bfd neighborAs BFD neighborship is down, FortiGate is unable to reach 1.1.1.1/32 from route entry 2 (via gateway 10.180.4.136).
OurAddress NeighAddress State Interface LDesc/RDesc
10.180.6.237 10.180.4.136 DOWN port1 1/1
# get router info routing-table allBFD removes a static route from the routing table if FortiGate can't reach the route's destination and returns the route to the routing table if the route's destination is restored.
S 1.1.1.1/32 [20/0] via 10.180.2.44, port1
C 10.180.0.0/20 is directly connected, port1
# get router info bfd neighbor
# get router info bfd requests
# diagnose sniffer packet any "port 3784" 4
# diagnose debug app bfdd -1
# diagnose debug enable
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.