Fortiwan 100B
Fortiwan 100B
VERSION 4.4.1
FORTINET DOCUMENT LIBRARY
http://docs.fortinet.com
FORTINET VIDEO GUIDE
http://video.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
CUSTOMER SERVICE & SUPPORT
https://support.fortinet.com
FORTIGATE COOKBOOK
http://cookbook.fortinet.com
FORTINET TRAINING SERVICES
http://www.fortinet.com/training
FORTIGUARD CENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
38-441-443218-20170731
TABLE OF CONTENTS
Introduction 8
Product Benefits 8
Key Concepts and Product Features 10
WAN load balancing (WLB) 10
Installation 10
Bidirectional load balancing 10
Auto Routing (Outbound Load Balancing) 10
Multihoming (Inbound Load Balancing) 11
Fall-back or Fail-over 11
Virtual Private Services (Tunnel Routing) 11
Virtual Servers (Server Load Balancing and High Availability) 11
Optimum Routing 11
Traffic Shaping (Bandwidth Management) 11
Firewall and Security 11
Scope 12
Installation 12
Functions 12
Monitoring 12
What's new 13
Document enhancements 21
How to set up your FortiWAN 26
Registering your FortiWAN 26
Planning the network topology 26
Glossary for FortiWAN network setting 26
WAN, LAN and DMZ 27
Network interfaces and port mapping 28
WAN link and WAN port 29
WAN types: Routing mode and Bridge mode 31
Near WAN 33
Public IP Pass-through (DMZ Transparent Mode) 34
Scenarios to deploy subnets 35
VLAN and port mapping 36
IPv6/IPv4 Dual Stack 36
FortiWAN in HA (High Availability) Mode 37
Web UI and CLI Overview 41
Connecting to the Web UI and the CLI 41
Using the Web UI 45
Console Mode Commands 49
Configuring Network Interface (Network Setting) 62
Set DNS server to FortiWAN 62
Aggregated, Redundant, VLAN Ports and Port Mapping 64
Configuring networks to FortiWAN 76
Configuring your WAN and DMZ 77
Routing-mode WAN link 83
Bridge-mode (multiple static IP) WAN link 98
Bridge-mode (one static IP) WAN link 103
Configurations for a WAN link in Brideg Mode: PPPoE 106
Configurations for a WAN link in Bridge Mode: DHCP 107
LAN Private Subnet 108
WAN/DMZ Private Subnet 113
Automatic addressing within a basic subnet 118
Deployment Scenarios for Various WAN Types 128
MIB fields for WAN links and VLANs 136
System Configurations 141
Dashboard 141
Optimum Route Detection 150
Port Speed/Duplex Settings 155
Backup Line Settings 156
IP Grouping 157
Service Grouping 159
Busyhour Settings 159
Diagnostic Tools 160
Setting the system time & date 163
Remote Assistance 163
Administration 164
Administrator and Monitor Password 164
RADIUS Authentication 165
Firmware Update (via Web UI) 166
Firmware Update via CLI 167
Configuration File 169
Maintenance 171
Web UI Port 171
License Control 172
Load Balancing & Fault Tolerance 174
Load Balancing Algorithms 174
Round Robin (weighted) 175
By Connection 175
By Downstream Traffic 177
By Upstream Traffic 177
By Total Traffic 178
By Optimum Route 179
By Response Time 179
By Static 179
By Fixed 179
Fail-Over 180
Hash 180
Outbound Load Balancing and Failover (Auto Routing) 181
Auto Routing Mechanism 181
Fault Tolerance Mechanism 181
Configurations 183
Inbound Load Balancing and Failover (Multihoming) 189
Multihoming 189
Introduction to DNS 189
SwiftDNS 190
How does SwiftDNS work? 190
Prerequisites for Multihoming 191
DNSSEC Support 191
Relay Mode 192
Enable Backup 192
Configurations 192
Scenarios 210
Tunnel Routing 214
How the Tunnel Routing Works 215
Tunnel Routing - Setting 222
How to set up routing rules for Tunnel Routing 229
Tunnel Routing - Benchmark 235
Scenarios 237
Virtual Server & Server Load Balancing 248
WAN Link Health Detection 255
IPSec 258
IPSec VPN Concepts 258
IPSec VPN overview 259
IPSec key exchange 260
How IPSec VPN Works 264
IPSec set up 265
About FortiWAN IPSec VPN 265
267
Limitation in the IPSec deployment 267
Planning your VPN 270
IPSec VPN in the Web UI 271
Define routing policies for an IPSec VPN 286
Establish IPSec VPN with FortiGate 295
Optional Services 303
Firewall 303
NAT 306
Persistent Routing 312
Bandwidth Management 315
Inbound BM and Outbound BM 315
Managing Bandwidth for Tunnel Routing and IPsec 317
Scenarios 318
Connection Limit 324
Cache Redirect 325
Internal DNS 328
DNS Proxy 331
SNMP 338
IP MAC Mapping 340
Statistics 341
Traffic 341
Bandwidth management statistics 341
Persistent Routing 343
WAN Link Health Detection 344
Dynamic IP WAN Link 344
DHCP Lease Information 345
RIP & OSPF Status 346
Connection Limit 346
Virtual Server Status 346
FQDN 347
Tunnel Status 347
Tunnel Traffic 348
IPSec 349
Traffic Statistics for Tunnel Routing and IPSec 351
Logs 354
Log View 354
Log format 355
Log Control 362
Notification 363
Enable Reports 366
Reports 367
Create a Report 368
Export and Email 369
Device Status 369
Bandwidth 369
CPU 370
Session 371
WAN Traffic 371
WAN Reliability 372
WAN Status 372
TR Reliability 372
TR Status 373
Bandwidth Usage 373
Inclass 374
Outclass 375
WAN 376
Services 377
Internal IP 378
Traffic Rate 379
Function Status 380
Connection Limit 380
Firewall 380
Virtual Server 381
Multihoming 381
Advanced Functions of Reports 382
Drill In 382
Custom Filter 386
Export 389
Report Email 389
Reports Database Tool 391
Reports Settings 399
Reports 400
IP Annotation 400
Dashboard Page Refresh Time 401
Email Server 401
Scheduled Emails 402
Disk Space Control 402
Database Data Utility 403
Appendix A: Default Values 405
Appendix B: Suggested Maximum Configuration Values 407
Introduction
Enterprises are increasingly relying on the internet for delivery of critical components for everyday business
operations. Any delays or interruptions in connectivity can easily result in reduced productivity, lost business
opportunities and a damaged reputation. Maintaining a reliable and efficient internet connection to ensure the
operation of critical applications is therefore key to the success of the enterprise.
FortiWAN is a separate and discrete hardware appliance with exclusive operating system, specifically designed to
intelligently balance internet and intranet traffic across multiple WAN connections, providing additional low-cost
incoming and outgoing bandwidth for the enterprise and substantially increased connection reliability. FortiWAN
is supported by a user-friendly UI and a flexible policy-based performance management system.
FortiWAN provides a unique solution that offers comprehensive multi-WAN management that keeps costs down
as well as keeping customers and users connected.
Product Benefits
FortiWAN load balances Internet service requests from Enterprise users, optimally distributing traffic across all
available access links. FortiWAN’s 7 different Load Balancing algorithms provide the flexibility to maximize
productivity from any network scenario.
FortiWAN gives you high-performance inter-site connectivity without the need to lease expensive links such as T1
and T3. FortiWAN aggregates multiple low-cost Internet access links to create site-to-site Virtual Private Line
8 FortiWAN Handbook
Fortinet Technologies Inc.
Product Benefits Introduction
(VPL) Tunnels for LAN-like performance between company locations. By using multiple carriers and media,
reliability of these VPL Tunnels can exceed that of traditional engineered carrier links.
Traditional point-to-point private lines for company intranets are still priced by distance and capacity. Replacing or
augmenting dedicated point-to-point services with Virtual Private Line Tunnels reduces costs substantially while
increasing available bandwidth and reliability.
FortiWAN makes low-cost network access links behave and perform like specially-engineered carrier services at a
fraction of the cost.
l Deploy DSL services and get DS-3/STM-1-like speed and reliability while waiting for the carrier to pull fiber.
l Add and remove bandwidth for seasonal requirements quickly and easily.
l Increase bandwidth to web servers and use multiple ISPs without BGP4 management issues.
FortiWAN can be deployed in High Availability mode with fully redundant hardware for increased reliability. Larger
FortiWAN models also feature redundant power supplies for further protection from hardware failures.
FortiWAN gives you the flexibility to customize your network, giving you complete control. Direct cloud-based
applications to links optimized for them and reduce the bandwidth demand on expensive dedicated circuits.
Combine access links and/or dedicated circuits into Virtual Private Line Tunnels that will support the fastest video
streaming or video conferencing servers that Headquarters can offer.
FortiWAN is designed for easy deployment and rapid integration into any existing network topology.
FortiWAN Handbook 9
Fortinet Technologies Inc.
Introduction Key Concepts and Product Features
FortiWAN is managed via a powerful Web User Interface. Configuration changes are instantly stored without the
need to re-start the system. Configuration files can be backed-up and restored remotely. Traffic measurements,
alarms, logs and other management data are stored for trend analysis and management overview.
Installation
FortiWAN is an edge device that typically connects an internal local area network (LAN) with an external wide
area network (WAN) or the Internet. The physical network ports on FortiWAN are divided into WAN ports, LAN
ports and DMZ (Demilitarized Zone) ports, which are used to connect to the WAN or the Internet, subnets in LAN,
and subnets in DMZ respectively. Please refer to FortiWAN QuickStart Guides for the ports mapping for various
models.
10 FortiWAN Handbook
Fortinet Technologies Inc.
Key Concepts and Product Features Introduction
Fall-back or Fail-over
FortiWAN detects local access link failures and end-to-end failures in the network and can either fall-back to
remaining WAN links or fail-over to redundant WAN links, if needed. Fall-back and Fail-over behavior is under
complete control of the administrator, with flexible rule definitions to meet any situation likely to occur. Links and
routes are automatically recovered when performance returns to acceptable levels. Notifications will be sent
automatically to administrators when link or route problems occur.
Optimum Routing
FortiWAN continuously monitors the public Internet to select the shortest and fastest route for mission-critical
applications. Non-critical traffic can be routed away from the best links when prioritized traffic is present on the
links or traffic can be assigned permanently to different groups of WAN links.
FortiWAN Handbook 11
Fortinet Technologies Inc.
Introduction Scope
Scope
This document describes how to set up your FortiWAN appliance. For first-time system deployment, the
suggested processes are:
Installation
l Register your FortiWAN appliance before you start the installation. Please refer to the topic: [Register your
FortiWAN] for further information.
l Planning the network topology to introduce FortiWAN to current network. It requires a clear picture of your WAN link
types the ISP provides and how to use the available public IP addresses of a WAN link. The topic [Planning the
Network Topology] provides the sub-topics that are necessary concepts for planning your network topology.
l Topic [Web UI Overview] and its sub-topics provide the instructions to connect and log into the Web management
interface. System time and account/password resetting might be performed for FortiWAN while the first-time login,
please refer to topics [Setting the System Time & Date] and [Administrator] for further information.
l For implementation of the network topology you planned, topic [Configuring Network Interface (Network Setting)]
and its sub-topics give the necessary information about the configurations of network deployments on Web UI.
FortiWAN's diagnostic tools is helpful for trouble shooting when configuring network, please refer to topic
[Diagnostic Tools] .
Functions
l After installing FortiWAN into your network, the next step is to configure the major features, load balancing and fail-
over, on FortiWAN. Topic [Load Balancing & Fault Tolerance] and its sub-topics contain the information about
performing FortiWAN's load balancing and failover mechanisms for incoming and outgoing traffic, virtual servers
and single-session services.
l Topic [Optional Services] gives the information about configurations of FortiWAN's optional services, such as
Bandwidth Management, Firewall, Connection Limit, NAT, SNMP, Cache Redirect, and etc.
Monitoring
l After FortiWAN works a while, related traffic logs, statistics and report analysis might be required for monitor or
trouble shooting purposes. Topics [Logs], [Statistics] and [Reports] provide the information how to use those logs,
statistics and reports to improve management policies on FortiWAN.
l Appliance installation—Refer to the quick start guide for your appliance model.
l Virtual appliance installation—Refer to the FortiWAN-VM Install Guide.
12 FortiWAN Handbook
Fortinet Technologies Inc.
Scope What's new
What's new
FortiWAN 4.4.1
Bug fixes only. Please refer to FortiWAN 4.4.1 Release Notes.
FortiWAN 4.4.0
l Tunnel Routing -
l Tunnel Routing dynamically determines whether to distribute traffic to a tunnel according to quality of the
tunnel, which is evaluated with the values of RTT and Jitter between two endpoints of the tunnel. See
Monitoring quality of a tunnel.
l You can configure the settings of detection period, number of retries and number of successful detections
for tunnel health detection. See Configuring the parameters for tunnel health detection.
l CLI can display tunnel quality and health detection status of tunnels.See showtrstat.
l Geo IP Database - A built-in Geo IP databsed is supported. This database is the mapping between
geographical regions or countries and the public IP addresses that are known to originate from them.
FortiWANcan recognize the countries that connections originate from or destined to, and take the
corresponding actions to the traffic according to the policies. See Geo IP database.
l Network Setting - Applying network settings will restart a network interface if this interface is using PPPoE or
DHCP, or the applying involves changes related to MAC address or MTU of this network interface. A warning is
added in the original pop-up confirmation for notifying users that applying network settings might restart
network interfaces and disrupt established connections. Applying network settings will no longer cause static-
IP-based network interfaces to restart.
l New Dashboard - The original Web UI pages, System > Summary and Reports > Dashboard, are integrated
as System > Dashboard with new look and feel. Page Reports > Dashboard is removed. See Dashboard.
l Bandwidth Management -
l A warning is added for notifying users that applying bandwidth management settings causes traffic loss for
a short period. See Bandwidth Management.
l A limit line is displayed in BM traffic statistics charts (Statistics > BM) to indicate the maximum allowed
bandwidth that the default BM class defines to the WAN link when the real traffic is very close to the
limitation. See Bandwidth management statistics.
l Moving the mouse over the BM statistics chart displays the corresponding traffic distribution. See
Bandwidth management statistics.
l Multihoming -
l Add a new inbound traffic distribution algorithm called Fail-Over. When this algorithm is enabled,
Multihoming evaluates the WAN link candidates of an A/AAAA policy from top to bottom and responses the
first-available WAN link for DNS queries. See Policy Settings: A/AAAA Record Policy.
l Allow configuring CNAME records with wildcard characters. See Support wildcard in CName records.
l You can enable/disable the WAN links defined in a A/AAAA policy. See Policy Settings: A/AAAA Record
Policy.
l Reports - Supports visibility of individual application in a Tunnel Routing transmission. Although the entire
FortiWAN Handbook 13
Fortinet Technologies Inc.
What's new Scope
Tunnel Routing traffic in each tunnel consists of various applications and originates from internal network
behind the FortiWAN appliance, these applications and source IPs of traffic in the tunnel were identified as
GRE and the WAN port IP in Reports. From this release, Reports can recognize individual application and its
internal IP of a tunnel traffic. See Managing Bandwidth for Tunnel Routing and IPsec and Traffic Statistics for
Tunnel Routing and IPSec.
Annotation: Bandwidth Management and Traffic Statistics support visibility to Tunnel Routing traffic since
FWN 4.2.0.
l Virtual Server - Process of configuring virtual servers on the Web UI is improved by separating the original
configuration into two different configurations, Server Pool and Virtual Server. A server pool can be easily
associated with a virtual server without lots of config modifications when it requires to change the mapping
between the backend servers and the virtual server. See Virtual Server & Server Load Balancing.
l Log - Logs displayed on Log > View are now stored in FortiWAN's hard disk. These logs are no longer cleared
because of system reboot. It supports pushing logs through syslog, FTP and SMTP. See Logs.
FortiWAN 4.3.1
l Tunnel Routing - From this release, the Generic Receive Offload (GRO) mechanism on each of
FortiWAN's network interfaces is disabled by default for better Tunnel Routing transmission
performance. The parameter "generic-receive-offload" of CLI command sysctl added in release 4.2.3 to
enable/disable GRO is removed; it is unable to enable GRO on FortiWAN. Related descriptions were
removed from Console Mode Commands, How the Tunnel Routing Works and How to set up routing
rules for Tunnel Routing
FortiWAN 4.3.0
l Tunnel Routing -
l Supports large-scale Tunnel Routing network deployment with allowing a maximum of
l FWN-200B: 100 tunnel groups
For all FortiWAN models, each tunnel group supports up to 16 enabled GRE tunnels, and a
maximum total of 2500 enabled GRE tunnels is supported. See Tunnel Routing Scale,
Tunnel Routing - Setting and How to set up routing rules for Tunnel Routing.
l IPSec - Supports Internet Key Exchange Protocol Version 2 (IKEv2) for the establishments of Security
Association. Please note that a specific procedure will be required when you switch IKE version to an
existing IPSec VPN connectivity. See Specifications of FortiWAN's IPsec VPN and IKE Phase 1 Web UI
fields - Internet Key Exchange.
l DHCP Relay - Supports up to two DHCP servers for a relay agent. Once two DHCP servers are
configured, the relay agent will forward a DHCP request to both of the DHCP servers. The first response
received by the relay agent will be first apply to the DHCP client, and the subsequent responses will be
ignored. See DHCP Relay.
14 FortiWAN Handbook
Fortinet Technologies Inc.
Scope What's new
l Reports - Supports scheduled report email. According to the scheduling, system performs automatic
report email sending periodically (daily, weekly or monthly). See Report Email and Scheduled Emails.
l CLI command - A new parameter PORT is added to command resetconfig for specifying port
mapping to LAN port while resetting configurations to factory default. See CLI Command - resetconfig.
l DNS Proxy - It is acceptable to configure the Intranet Source field of a DNS Proxy policy with an IPv4
range or subnet. See DNS Proxy Setting Fields.
l WAN link health detection - A new parameter that is used to indicate the number of continuously
successful detections for declaring a WAN link indeed available is added to WAN link health detection
policies. See WAN Link Health Detection.
l Web UI account - The ability for Monitor accounts to reset their own password is removed. From this
release, Web UI page System > Administration is not available to Monitor accounts and only
Administrator accounts have the permission to reset passwords. Also the Apply button is greyed-out and
inactive for Monitor users. See Administrator and Monitor Password.
l Multihoming - Supports SOA and NS records for the reverse lookup zones. See Global Settings:
IPv4/IPv6 PTR Record.
FortiWAN 4.2.6
Bug fixes only. Please refer to FortiWAN 4.2.6 Release Notes.
FortiWAN 4.2.5
Bug fixes only. Please refer to FortiWAN 4.2.5 Release Notes.
FortiWAN 4.2.4
Bug fixes only. Please refer to FortiWAN 4.2.4 Release Notes.
FortiWAN 4.2.3
l Tunnel Routing - Performance of transmission in a tunnel group can be greatly enhanced (increased)
by disabling Generic Receive Offload (GRO) mechanism on each of participated network interfaces on
both the participated FortiWAN units. A new parameter "generic-receive-offload" is added to CLI
command sysctl to enable/disable the GRO module. See How the Tunnel Routing Works, Tunnel
Routing - Setting and Console Mode Commands.
l DHCP - Supports Vender Specific Information (Vender Encapsulated Options, option code: 43) and
TFTP Server Name (option code: 66). The two DHCP options are used by DHCP clients to request
vender specific information and TFTP server IP addresses from the DHCP server for device
configuration purposes. FortiWAN's DHCP server delivers the specified information to clients according
to the two option codes. See Automatic addressing within a basic subnet.
l Bandwidth Management - A new field Input Port is added to Bandwidth Managment's outbound
IPv4/IPv6 filters to evaluate outbound traffic by the physical ports where it comes from. Corresponding
network ports (VLAN ports, redundant ports, aggregated ports and etc.) will be the options for setting
the field, if they are configured in Network Setting. See Bandwidth Management.
FortiWAN Handbook 15
Fortinet Technologies Inc.
What's new Scope
l Port Mapping - The original configuration panels "Aggregated LAN Port" and "Aggregated DMZ Port"
are merged into one panel "Aggregated Port". Instead of mapping the member-ports to LAN/DMZ
before aggregating them, it requires creating the logical aggregated port with two non-mapping member
ports first, and then mapping LAN/DMZ or defining VLANs to the aggregated port. See Configurations
for VLAN and Port Mapping.
l Multihoming -
l Supports wildcard characters for configuring the Host Name field of A/AAAA records. A single
wildcard character matches the DNS queries for any hostname that does not appear in any NS
record, primary name server, external subdomains and other A/AAAA records of a domain, and
so that the specified A/AAAA policy matches. Note that wildcard characters are not acceptable
to records (NS, MX, TXT and etc.) except A/AAAA. See Inbound Load Balancing and Failover
(Multihoming).
l Supports configuring CName records for DKIM signing. It is acceptable to configure the Name
Server, Alias, Target, Host Name and Mail Server fields of NS, CName, DName, MX and TXT
records within dot characters. A dot character is still not acceptable to A/AAAA records. See
Inbound Load Balancing and Failover (Multihoming).
l Auto Routing - All the WAN links (WAN parameters) of an Auto Routing policy were set to checked by
default when you create it on the Web UI for configuring. To programe it for the real networks, you might
to uncheck the unused WAN links one at a time. From this release, the WAN parameters of an AR policy
are checked by default only if the corresponding WAN links have been enabled via Network Setting. See
Outbound Load Balancing and Failover (Auto Routing).
l Statistics - Measurement of Round Trip Time (RTT) is added to Statistics > Tunnel Status for each
GRE tunnel of configured tunnel groups. See Tunnel Status.
FortiWAN 4.2.2
Bug fixes only. Please refer to FortiWAN 4.2.2 Release Notes.
FortiWAN 4.2.1
Bug fixes only. Please refer to FortiWAN 4.2.1 Release Notes.
FortiWAN 4.2.0
l IPSec VPN - Supports standard IPSec VPN which is based on the two-phase Internet Key Exchange
(IKE) protocol. FortiWAN's IPSec VPN provides two communication modes, tunnel mode and transport
mode. Tunnel mode is a common method used to establish IPSec VPN between two network sites.
FortiWAN IPSec tunnel mode transfers data traffic within single connection (single WAN link), therefore
bandwidth aggregation and fault tolerance are not available to the VPN. On the other hand, FortiWAN's
transport mode is designed to provide protections to Tunnel Routing transmission on each of the TR
tunnels, so that the IPSec VPN with ability of bandwidth aggregation and fault tolerance can be
implemented.
FortiWAN's IPSEC tunnel mode supports single-link connectivity between FortiWAN devices, FortiWAN
and FortiGate and FortiWAN and any appliance supporting standard IPSEC. FortiWAN's IPSEC
transport mode supports multi-link Tunnel Routing between FortiWAN devices. IPSEC Aggressive Mode
is not supported in this release. See "IPSec VPN".
l Tunnel Routing - Supports IPSec encryption. With cooperation with FortiWAN's IPSec tunnel mode,
the Tunnel Routing communication can be protected by IPSec Security Association (IPSec SA), which
provides strict security negotiations, data privacy and authenticity. The VPN network implemented by
16 FortiWAN Handbook
Fortinet Technologies Inc.
Scope What's new
Tunnel Routing and IPSec transport mode has the advantages of high security level, bandwidth
aggregation and fault tolerance. See "Tunnel Routing".
l Basic subnet- Supports DHCP Relay on every LAN port and DMZ port. FortiWAN forwards the DHCP
requests and responses between a LAN or DMZ subnet and the specified DHCP server (standalone), so
that centralized DHCP management can be implemented. With appropriate deployments of Tunnel
Routing (or Tunnel Routing over IPSec Transport mode), the DHCP server of headquarters is capable to
manage IP allocation to regional sites through DHCP relay. FortiWAN's DHCP relay is for not only a
local network but also a Tunnel Routing VPN network. See "Automatic addressing within a basic
subnet".
l DHCP - Supports static IP allocation by Client Identifier (Options code: 61).According to the client
identifier, FortiWAN's DHCP recognizes the user who asks for an IP lease, and assigns the specified IP
address to him. See "Automatic addressing within a basic subnet".
l Bandwidth Management - Supports the visibility to Tunnel Routing traffic. In the previous version,
individual application encapsulated by Tunnel Routing was invisible to FortiWAN's Bandwidth
Management. Bandwidth Management is only capable of shaping the overall tunnel (GRE) traffic. From
this release, Bandwidth Management evaluates traffic before/after Tunnel Routing
encapsulation/decapsulation, so that traffic of individual application in a Tunnel Routing transmission
can be controlled. See "Bandwidth Management".
l Administration - Ability of changing their own password for Monitor accounts is added. In the previous
version, password of accounts belonging to Monitor group can be changed by only administrators. From
this release, Monitor accounts can change their own password. See "Administration".
l HA synchronization - After system configuration file is restored (System > Administration >
Configuration File), the master unit automatically synchronizes the configurations to slave unit. See
"Administration".
l DNS Proxy - Supports wildcard character for configuration of Proxy Domains on Web UI. See "DNS
Proxy".
l Account - The default account maintainer was removed from FortiWAN's authentication.
FortiWAN 4.1.3
Bug fixes only. Please refer to FortiWAN 4.1.3 Release Notes.
FortiWAN 4.1.2
Bug fixes only. Please refer to FortiWAN 4.1.2 Release Notes.
FortiWAN 4.1.1
l New CLI command shutdown - Use this command to shut FortiWAN system down. All the system
processes and services will be terminated normally. This command might not power the appliance off,
please turn on/off the power switch or plug/unplug the power adapter to power on/off the appliance. See
"Console Mode Commands".
l Firmware upgrade - A License Key will no longer be required for upgrading system firmware to any
release.
FortiWAN 4.1.0
l The timezone of FortiWAN's hardware clock (RTC) is switched to UTC from localtime. The
system time might be incorrect after updating firmware from previous version to this version
FortiWAN Handbook 17
Fortinet Technologies Inc.
What's new Scope
due to mismatched timezone. Please reset system time and synchronize it to FortiWAN's
hardware clock (executing Synchronize Time in System > Date/Time via Web UI), so that the
hardware clock is kept in UTC.
l New models - FortiWAN introduces two models, FortiWAN-VM02 and FortiWAN-VM04, for
deployment on VMware. FortiWAN V4.1.0 is the initial version of the two models. FortiWAN-VM02
supports the maximum of 2 virtual CPUs, and FortiWAN-VM04 supports the maximum of 4 virtual
CPUs. Both of the two models support 9 virtual network adapters. Each port can be programmed as
WAN, LAN or DMZ. Each of the two models. FortiWAN-VM supports the deployments on VMware
vSphere ESXi. Refer to "FortiWAN-VM Install Guide".
l FortiWAN 1000B - The basic bandwidth is upgraded to 1 Gbps from 500Mbps. With a bandwidth
license, system supports advanced bandwidth up to 2 Gbps.
l FortiWAN 3000B - The basic bandwidth is upgraded to 3 Gbps from 1 Gbps. With a bandwidth
license, system supports advanced bandwidth up to 6 Gbps and 9 Gbps.
l Notification - Supports delivering event notifications via secure SMTP. See "Notification".
l Connection Limit - Customers can manually abort the connections listed in Connection Limit's
Statistics. FortiWAN's Connection Limit stops subsequent connections from malicious IP addresses
when system is under attacks with high volumes of connections. However, system takes time to
normally terminate the existing malicious connections (connection time out). Connection Limit's
Statistics lists the existing connections; aborting these connections recovers system immediately from
memory occupied. See "Statistics > Connection Limit".
l Multihoming - Supports specifying an IPv6 address in an A record and an IPv4 address in an AAAA
record to evaluate the source of a DNS request. See "Inbound Load Balancing and Failover
(Multihoming)".
l Automatic default NAT rules - Supports for all the types of IPv6 WAN link. Previously, system
generates automatically the default NAT rules for any type of IPv4 WAN link and PPPoE IPv6 WAN link
after the WAN links are applied. From this release, all the types of IPv6 WAN links are supported. See
"NAT".
l Firmware update under HA deployment - Simple one-instruction update to both master and slave
units. The master unit triggers firmware update to slave unit first, and then runs update itself. See
"FortiWAN in HA (High Availability) Mode".
l Auto Routing - A new field Input Port is added to Auto Routing's rules to evaluate outbound traffic by
the physical ports where it comes from. Correspondent VLAN ports, redundant LAN ports, redundant
DMZ ports, aggregated LAN ports and aggregated DMZ ports are the options for setting the field, if they
are allocated. See "Using the Web UI".
18 FortiWAN Handbook
Fortinet Technologies Inc.
Scope What's new
l Pagination - Paginate the output of a command if it is longer than screen can display.
l FortiWAN CLI accepts logins of any customized account belongs to group Administrator. A
special account maintainer is provided to reset admin password to factory default via CLI for
case that no one with the password is available to login to the WEB UI and CLI. See
"Administration".
l All the accounts belong to group Administrator are acceptable to login to FortiWAN over SSH.
l Web UI Supports multiple sign-in. System accept the maximum of 20 concurrent logins. Note
that system does not provide concurrent executions of Tunnel Routing Benchmark for multiple
logins. See "Using the Web UI".
FortiWAN 4.0.6
Bug fixes only. Please refer to FortiWAN 4.0.6 Release Notes.
FortiWAN 4.0.5
Bug fixes only. Please refer to FortiWAN 4.0.5 Release Notes.
FortiWAN 4.0.4
Bug fixes only. Please refer to FortiWAN 4.0.4 Release Notes.
FortiWAN 4.0.3
FortiWAN 4.0.3 is the initial release for FortiWAN 3000B. For bug fixes, please refer to FortiWAN 4.0.3 Release
Notes.
FortiWAN 4.0.2
Bug fixes only. Please refer to FortiWAN 4.0.2 Release Notes.
FortiWAN 4.0.1
FortiWAN introduces new hardware platforms FortiWAN 1000B and FortiWAN 3000B, and new FortiWAN 4.0.1
firmware based on the AscenLink series of Link Load Balancing appliances already in the market. FortiWAN 4.0.1
is substantially similar to AscenLink V7.2.3 with the additions noted below.
To assess the impact of deploying FortiWAN 4.0.1 on your network and processes, review the following new and
enhanced features.
FortiWAN Handbook 19
Fortinet Technologies Inc.
What's new Scope
l FortiWAN 3000B supports 8 GE RJ45 ports, 8 GE SFP ports and 8 10GE SFP+ ports. Each port
can be programmed as WAN, LAN or DMZ. Redundant LAN and DMZ ports can be configured.
2-link LACP/LAG LAN or DMZ ports can be configured. Default LAN port is Port 11 and default
DMZ port is Port 12.
l HDD - FWN 1000B and FWN 3000B add internal 1TB HDDs for Reports data storage.
l Hardware Support - FortiWAN 4.0.1 for FortiWAN supports FortiWAN 200B and FortiWAN 1000B.
AscenLink series models are not supported. Note that FortiWAN 4.0.1 does not support FortiWAN
3000B, please look forward to the sequential releases.
FortiWAN 4.0.0
FortiWAN introduces new hardware platform FortiWAN 200B and new FortiWAN 4.0.0 firmware based on the
AscenLink series of Link Load Balancing appliances already in the market. FortiWAN 4.0.0 is substantially similar
to AscenLink V7.2.2 with the additions noted below.
To assess the impact of deploying FortiWAN 4.0.0 on your network and processes, review the following new and
enhanced features.
l Data Port Changes - FortiWAN 200B supports 5 GE RJ45 ports. Each port can be programmed as
WAN, LAN or DMZ. Redundant LAN and DMZ ports can be configured. 2-link LACP/LAG LAN or DMZ
ports can be configured. Default LAN port is Port4 and default DMZ port is Port 5.
l HA Port Change - FortiWAN supports one GE RJ45 HA Port. This port must be direct-cabled via
Ethernet cable, to a second FWN unit HA port for HA operation. HA will not interoperate between
AscenLink and FortiWAN and will not interoperate between different FortiWAN models.
l HDD - FWN 200B adds an internal 500BG HDD for Reports data storage. See below for more
information on Reports.
l New Functionality - FortiWAN 4.0.0 has the same functionality as AscenLink V7.2.2 PLUS the
addition of built-in Reports which is the equivalent functionality to the external LinkReport for AscenLink.
l Reports - Reports captures and stores data on traffic and applications across all WAN links in the
system. Reports include connections, link and aggregate bandwidth, link and VPN reliability, and data
on Multi-Homing requests, Virtual Server (SLB) requests, and more. Reports can be viewed on-screen,
exported to PDF or CSV files or emailed immediately in PDF or CSV format.
20 FortiWAN Handbook
Fortinet Technologies Inc.
Scope Document enhancements
Document enhancements
FortiWAN 4.4.1
l Content of Connection Limit was updated. See Connection Limit.
l Content of upgrading firmware via TFTP was added. See Firmware Update via CLI.
FortiWAN 4.4.0
l Content of tunnel quality policy was added. See Monitoring quality of a tunnel, Configuring tunnel quality
policies, Configuring a routing rule and Example for using quality policies.
l Content of Tunnel Routing health detection was updated. See Configuring the parameters for tunnel health
detection.
l Content of the CLI command showtrstat was added. See showtrstat.
l Content of Geo IP was added. See Geo IP database.
l Content of the updated dashboard was added. See Dashboard.
l Content of Bandwidth Management statistics was updated for the updated statistics chart. See Bandwidth
management statistics.
l Content of Multihoming was updated for the new algorithm, wildcard support for CName record and the ability
to enable/disable individual A/AAAA record policy. See Policy Settings: A/AAAA Record Policy.
l Content of Load Balancing Algorithms was updated for the new Multihoming algorithm. See Load Balancing
Algorithms.
l Content of Bandwidth Management and Statistics was updated for the support that individual application of a
Tunnel Routing transmission is visible in Reports. See Managing Bandwidth for Tunnel Routing and IPsec and
Traffic Statistics for Tunnel Routing and IPSec.
l Content of Virtual Server was updated for the updated configuration interface. See Virtual Server & Server Load
Balancing.
l Content of Log and Log View was updated for the support storing log files in hard disk. See Logs and Log View.
FortiWAN 4.3.1
l Parameter generic-receive-offload of command sysctl was removed from Console Mode Commands.
Related descriptions about disabling GRO were removed as well from How the Tunnel Routing Works
and How to set up routing rules for Tunnel Routing.
l An appendix was added for suggested maximum configuration values, see Appendix B: Suggested
Maximum Configuration Values
l A topic about possible query loop was added in DNS Proxy.
l A description was added for suggested IPSec encryption algorithms, see IPSec VPN in the Web UI.
FortiWAN 4.3.0
l Content of Tunnel Routing was updated for large-scale TR network support and the updated
benchmark. See Tunnel Routing Scale, Tunnel Routing - Setting, How to set up routing rules for Tunnel
Routing and Tunnel Routing - Benchmark.
l Content of IPSec was updated for IKEv2 support. See Specifications of FortiWAN's IPsec VPN and IKE
Phase 1 Web UI fields.
FortiWAN Handbook 21
Fortinet Technologies Inc.
Document enhancements Scope
l Content of automatic IP addressing was updated for dual DHCP servers support in a DHCP relay. See
DHCP Relay.
l Content of Report Email and Reports Settings was updated, and a new page Scheduled Emails was
added for the new Reports feature - scheduled report email.
l Content of Reports Settings and Reports Database Tool was updated, andA new page Database Data
Utility was added for the new Reports feature - Web-based Rpeorts database management tool.
l Content of CLI commands was updated for the new parameter PORT of resetconfig and the change
to init_reports_db. See CLI Command - resetconfig.
l Content of DNS Proxy was updated for the changes to the Source configuration. See DNS Proxy Setting
Fields.
l Content of WAN link health detection was updated for the new condition "Number of successful
detection" to declare a WAN link available. See WAN Link Health Detection.
l Content of Administrator was updated for the changes to Monitor account. See Administrator and
Monitor Password.
l Content of Multihoming was updated for the new configurations to support SOA and NS records for the
reverse lookup zones. See Global Settings: IPv4/IPv6 PTR Record.
l Diagrams related to Web UI were updated for the new look and feel.
l A glossary for FortiWAN network setting was added. See Glossary for FortiWAN network setting.
l Content about network deployment was enhanced: Configuring networks to FortiWAN, Configuring
Network Interface (Network Setting), Configuring your WAN and DMZ, Network interfaces and port
mapping, WAN, LAN and DMZ, WAN link and WAN port, WAN types: Routing mode and Bridge mode,
Public IP Pass-through (DMZ Transparent Mode), Aggregated, Redundant, VLAN Ports and Port
Mapping, Bridge-mode (one static IP) WAN link, Routing-mode WAN link and Bridge-mode (multiple
static IP) WAN link.
l Description about default rule was added to Firewall section. See Firewall.
l A note about accessing to WebUI through WAN ports was added, see Connecting to the Web UI and the
CLI.
FortiWAN 4.2.7
l None
FortiWAN 4.2.6
l None
FortiWAN 4.2.5
l Content of section Performance in How the Tunnel Routing Works was enhanced by adding two
subsections, Throughput of bidirectional TR transmission and Persistent Route in Tunnel Routing. A
description about configuring for better bidirectional TR transmission was added in Tunnel Routing -
Setting.
FortiWAN 4.2.4
l None
FortiWAN 4.2.3
l Content about how to enhance Tunnel Routing performance was added to section Performance in How
the Tunnel Routing Works and section Tunnel Group in Tunnel Routing - Setting.
22 FortiWAN Handbook
Fortinet Technologies Inc.
Scope Document enhancements
FortiWAN Handbook 23
Fortinet Technologies Inc.
Document enhancements Scope
l Content of "Global Settings: IPv4 / IPv6 PTR Record" in "Inbound Load Balancing and Failover
(Multihoming)" was changed.
FortiWAN 4.1.1
l Content was added to "Console Mode Commands" for the new CLI command shutdown.
l Requirement of License Key was removed from section Firmware Upgrade in "FortiWAN in HA (High
Availability) Mode" and "Administration".
l Two deployment scenarios were added to "Tunnel Routing > Scenarios".
l Correspondent MIB fields and OIDs were added to "FortiWAN in HA (High Availability) Mode",
"Summary", "Administration" and "Network Setting > MIB fields for WAN links and VLANs".
l Content of "SNMP" and "Notification" was enhanced.
l Content of "Statistics > WAN Link Health Detection" was enhanced.
FortiWAN 4.1.0
l Content was added to "Scope", "Default Port Mapping", "FortiWAN in HA (High Availability) Mode",
"Connecting to the Web UI and the CLI", "Configurations for VLAN and Port Mapping" and "Summary"
for the new model FortiWAN-VM.
l Content of "Administration > License Control" was updated for new bandwidth capabilities that
FortiWAN supports.
l Content was added to "Notification" for the support to notify via secure SMTP.
l Content was added to "Statistics > Connection Limit" for the Abort function.
l Content was added to "Multihoming" for the support to evaluate an A record query by its IPv6 source and
an AAAA record query by its IPv4 source.
l Content of "Configurations for a WAN link in Bridge Mode: One Static IP" and "Configurations for a WAN
link in Bridge Mode: Multiple Static IP" was updated for supporting IPv6 default NAT rule.
l Content of "Administration > Firmware Update" and "FortiWAN in HA (High Availability) Mode" was
updated for the new firmware update mechanism under HA deployment.
l For the new features that Reports supports, new topics "Dashboard", "Reports Settings", "Reports
Settings > Reports", "Reports Settings > IP Annotation", "Reports Settings > Dashboard Page Refresh
Time", "Reports Settings > Email Server" and "Reports Settings > Disk Space Control" were added , and
content of "Reports" and "Create a Report" was updated.
l Content was added to "Using the Web UI" for the support to evaluate traffic by its Input Port.
l For the new CLI command arp and enhanced command resetconfig, correspondent content was
added and updated to "Console Mode Commands".
l Content of "Connecting to the Web UI and the CLI", "Administration > Administrator and Monitor
Password" and "Appendix A: Default Values" for the updated local authentication mechanism.
l Content was added to "Using the Web UI" for supporting concurrent multiple logins.
l The parameters of CLI command sysctl were fixed from "sip_helper" and "h323_helper" to "sip-
helper" and "h323-helper" (See "Console Mode Commands").
FortiWAN 4.0.6
l None
FortiWAN 4.0.5
l None
FortiWAN 4.0.4
24 FortiWAN Handbook
Fortinet Technologies Inc.
Scope Document enhancements
l Content was enhanced for Reports > Session (See "Reports > Session").
l Content was enhanced for Virtual Server (See "Load Balancing & Fault Tolerance" and "Virtual Server" )
and Persistent Routing (See "Persistent Routing").
FortiWAN 4.0.3
l Revision 2
l Topic "Web UI and CLI Overview" was reorganized and content was enhanced on connecting to
Web UI and CLI (See "Connecting to the Web UI and the CLI"), Web UI operations (See "Using
the web UI") and CLI commands (See "Console Mode Commands").
l Content was enhanced on account management, RADIUS, and firmware update (See
"Administration").
l Content was enhanced for NAT, NAT default rule in pages "NAT", "Configurations for a WAN
link in Routing Mode", "Configurations for a WAN link in Bridge Mode: Multiple Static IP" and
"Configurations for a WAN link in Bridge Mode: One Static IP".
l Content was enhanced for the state of peer information in page "Summary".
l A new topic "Reports Database Tool" was added, and Reports related topics are enhanced (See
"Reports Database Tool", "Reports", and "Enable Reports").
l Revision 1
l Add a new page "Default port mappings" in section "How to set up your FortiWAN > Planning the
network topology".
l Content was changed and enhanced for pages "Configurations for VLAN and Port Mapping",
"WAN, LAN and DMZ", "WAN link and WAN port" and "Configuring your WAN".
l Content was changed and enhanced for Tunnel Routing. New subsections were added "GRE
Tunnel", "Routing", "How the Tunnel Routing Works". Subsections were enhanced "Tunnel
Routing - Setting" and "Tunnel Routing - Benchmark".
FortiWAN 4.0.2
l A note about the restrictions on duplicate configurations of group tunnel was added in Tunnel Routing.
l Content was enhanced for Multihoming in sections "Prerequisites for Multihoming", "DNSSEC Support",
"Enable Backup", "Configurations", "Relay Mode"and "External Subdomain Record".
l Content was changed and enhanced for WAN Link Health Detection and FortiWAN in HA (High
Availability) Mode.
l A typographical error in Introduction > Scope was fixed.
FortiWAN 4.0.1
l The default username to login to Command Line Interface (Console Mode) was fixed from
"administrator" to "Administrator" in Using the web UI and the CLI and Appendix A: Default Values.
l The reference for information on console command in Administration > Maintenance was fixed from
"Appendix A: Default Values" to "Console Mode Commands".
FortiWAN Handbook 25
Fortinet Technologies Inc.
How to set up your FortiWAN
These topics describe the tasks you perform to initially introduce a FortiWAN appliance to your network. These
topics contain the necessary information and instructions to plan network topology, using Web UI and Configure
network interfaces on FortiWAN. These topics introduce some key concepts for deploying FortiWAN, but you are
assumed to have and be familiar with the fundamental concepts related networking knowledge.
Before you begin, take a moment to register your Fortinet product at the Fortinet Technical Support web site:
https://support.fortinet.com
Many Fortinet customer services such as firmware updates, technical support, and FortiGuard
services require product registration.
For more information, see the Fortinet Knowledge Base article Registration Frequently Asked Questions.
FortiWAN is the appliance designed to perform load balancing and fault tolerance between different networks.
The network environment that a FortiWAN is introducing into might be various, especially with multiple WAN links
and various WAN type. A plan of network topology before adding FortiWAN recklessly into current network would
be suggested to avoid damages.
This glossary gives definitions of the key terms and concepts that are frequently used in the following chapters. It
will be a great help for making a deployment plan, configuring and using the FortiWAN if you are clearly
understand the these terms and concepts.
Near WAN
26 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
l Wide Area Network: WAN (Wide Area Network) is the network that geographically covers a large area which
consists of telecommunications networks. It can be simply considered the Internet as well. An internal user can
communicate with the Internet via a telecommunications (called Internet Service Provider as well) network
connected to FortiWAN’s WAN ports. The transmission lines can be classified as xDSL, leased line (T1, E1 and
etc.), ISDN, frame relay, cable modem, FTTB, FTTH and etc.
l Local Area Network: LAN (Local Area Network) is the computer networks within a small geographical area without
leased telecommunication lines involved. In this document, a LAN is considered as an internal private network
which is a closed network to WAN.
l Demilitarized Zone: DMZ (Demilitarized Zone) is a local subnetwork that is separated from LAN for security
issues. A DMZ is used to locate external-facing server farm which is accessible from an untrusted network (usually
the Internet), but inaccessible to LAN. FortiWAN provides physical ports for the DMZ purpose.
A network site generally consists of the three basic components, WAN, LAN and DMZ. As an edge device of a
network site, FortiWAN basically plays the role routing packets and provides services for communications among
LAN, WAN and DMZ. The FortiWAN connects those networks (WAN, LAN and DMZ) to its network interfaces
(called network ports as well) and so that the networks can communicate with each other appropriately. This
involves two configurations, defining the purpose of a network port (see Network interfaces and port mapping)
and correct network settings on the network port for the connected network (see Configuring Network Interface).
FortiWAN Handbook 27
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
The diagram above shows the port mapping of a FortiWAN that ports 1~3 are WAN ports, port 4 and port 5 are a
LAN port and a DMZ port respectively. Port mapping can be programmed from FortiWAN's Web UI, see
Configurations for VLAN and Port Mapping.
Note: To make a FortiWAN operate correctly with the connected networks, it requires not only the
correspondence between types of network ports and the connected networks, but also corresponding
configurations to the network port (see Configuring Network Interface).
28 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
FWN 1000B 3 GE RJ45 ports and 4 GE SFP ports Port 1 ~ Port 5 Port 6 Port 7
FWN 3000B 8 GE RJ45 ports, 8 GE SFP ports and 8 10GE SFP+ Port 1 ~ Port 10 Port 11 Port 12
ports
FortiWAN 3000B's Prot 13 ~ Port 24 and FortiWAN VM's vNIC 5 ~ vNIC 10 are undefined by default, they can be
defined via Web UI (see VLAN and Port Mapping). After logging onto the Web UI, you can also check and
program the network port mapping on System > Network Setting > VLAN and Port Mapping.
FortiWAN Handbook 29
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
As previous description, whether a physical or a logical network interface, it requires the network interface
mapped to a port type (WAN, DMZ or LAN) for connecting to corresponding network type. A WAN port is a
physical or logical network port that is port mapped to the WAN type. A WAN link is a connectivity between a
FortiWAN and an ISP network. Actually, a WAN link connects a WAN port of FortiWAN with the remote device
(modem or ATU-R) of an ISP, so that the internal networks and the Internet can communicate to each other
through the WAN link. A WAN link requires corresponding settings on the WAN port. Configuration of a WAN port
contains the information provided by the ISP, such as the IP addresses, default gateway, network mask or
username/password, it depends on the WAN link type you apply to the ISP (See "WAN types: Routing mode and
Bridge mode"). You will see the two terms, WAN link and WAN port, frequently in this document.
For purposes of traffic load balancing and fault tolerance, you will need multiple WAN links to connect to the
Internet. In case that the WAN links demanded are more that the physical network ports of a FortiWAN appliance
in quantity, you can have enough WAN ports for the WAN links by creating multiple logical network ports (VLAN
ports) on a physical port (See "Configurations for VLAN and Port Mapping"). Although you can create VLAN ports
on a physical port without limitation in quantity, FortiWAN supports limited WAN links. FortiWAN 200B supports
up to 25 WAN links, FortiWAN 1000B and 3000B support up to 50 WAN links, even if you create more than
50 VLAN ports. These WAN links are named with numbers, such as WAN 1, WAN 2 and WAN 3. You will see this
when you configure settings of a WAN port (See "Configuring your WAN").
The above diagram shows how to create N WAN ports (WAN 1 ~ WAN N) through the three physical network ports
of a FortiWAN. Two of the WAN ports use two of the physical network ports and the rest of the WAN ports use the
VLAN ports. The N WAN links connect the N WAN ports with N ISP networks. Traffic of WAN link 1 and 2 will be
transferred through physical port 2 and port 3 respectively, and traffic of the remaining WAN link (WAN link 3 ~
WAN link N) will be transferred through physical port 1.
See also
30 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
Routing mode
If you apply to ISP for a routing-mode WAN link, you will obtain an individual IP network (layer 3) which is
separated from any other networks of the ISP. In that case, the ATU-R at a customer premises plays the role of a
gateway to route packets between your network and the Internet. In the other words, the ATU-R connects your
network with the ISP central office in routing mode. The IP addresses, default gateway and netmask that the ISP
provides you can tell you whether a WAN link is routing mode or not. If the number of deducting 3 (network IP,
gateway IP and broadcast IP) from the IP range that the netmask determines matches the number of usable IP
addresses that ISP provides you, it means you are given a separate network, a routing-mode WAN link. For
example, the ISP gives you five usable IP addresses 203.69.118.10 - 203.69.118.14, default gateway
203.69.118.9 and netmask 255.255.255.248. The netmask 255.255.255.248 divides eight IP addresses which
contains five host addresses, one gateway address, one broadcast address and one address for the network ID. It
FortiWAN Handbook 31
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
just matches the number of the usable IP addresses the ISP provides. In that case you are strongly
recommended to configure the WAN link on FortiWAN as Routing Mode.
Bridge mode
Opposite to the routing mode, the ATU-R will play the role of a bridge to combine network segments (data link
layer, layer 2) of customer premises and the ISP central office, if the WAN link is in bridge-mode. In that case, ISP
allocates a block of IP addresses (or a network segment) of an IP network (layer 3) for you rather than a separate
IP network. It implies that you and other customers (other network segments) of the ISP that in the same IP
network use the same gateway, which is located at the ISP's central office.
You can identify a bridge-mode WAN link by the IP addresses, default gateway and netmask that the ISP
provides you. If the number of deducting 3 (network IP, gateway IP and broadcast IP) from the IP range that the
netmask divides is larger than the number of usable IP addresses that ISP provides you, it means you are given a
segment of a IP network, a bridge-mode WAN link. For example, the ISP gives you three usable IP addresses
61.88.100.1 - 61.88.100.3, default gateway 61.88.100.254 and netmask 255.255.255.0. The netmask
255.255.255.0 divides 256 IP addresses which contains 253 host addresses, one gateway address, one
broadcast address and one address for the network ID. The number of host addresses that the netmask divides
(253) is larger than number of IP addresses the ISP provides (3). You have to configure a WAN link to FortiWAN
as Bridge Mode: One Static IP if the WAN link is in bridge-mode and ISP allocates only one IP address for you, or
Bridge Mode: Multiple Static IP if the WAN link is in bridge-mode and ISP allocates multiple IP addresses for you.
32 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
Traffic going to or coming from the near WAN (see Near WAN) is treated by FortiWAN in two different ways for
routing-mode WAN link and bridge-mode WAN link. Configuring WAN links to FortiWAN as mismatched WAN
type results in unexpected behaviors to traffic.
See also
Near WAN
FortiWAN defines an area in WAN as near WAN, which traffic transferred in/from/to the area would not be
counted to the WAN links. That means traffic coming from or going to near WAN through a WAN port would not
be controlled by FortiWAN.
FortiWAN defines a near WAN for a WAN link in different ways between routing mode and bridge mode.
l In routing mode, the default gateway of a subnet deployed in WAN or in WAN and DMZ is near to FortiWAN.
Therefore, the area between the default gateway and FortiWAN is called near WAN. In the other words, FortiWAN
treats directly the subnet deployed on the WAN port as near WAN. The near WAN contains the default gateway.
FortiWAN Handbook 33
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
l In bridge mode, the default gateway is located at ISP’s COT and the IP addresses allocated on FortiWAN are just a
small part of a subnet shared with others. Therefore, only the IP addresses deployed in WAN are treated as near
WAN (not include the remote gateway).
This is the reason FortiWAN separates WAN link configuration into different type: routing mode and bridge mode
(See "WAN types: Routing mode and Bridge mode"). If you configure a bridge-mode WAN link that ISP provides
on FortiWAN as Routing Mode and the bridge-mode WAN link might belong to a shared class C subnet,
FortiWAN treats the whole class C network as near WAN, traffic goes to or comes from the class C network would
be ignored for FortiWAN’s balancing, management and statistics functions. That would be a big mistake.
See also
34 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
See also
To deploy the available subnet that ISP provides (routing mode) on FortiWAN, there are four different scenarios
(be called subnet types as well) for your options:
FortiWAN Handbook 35
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
Subnet in WAN and DMZ : Deploy the subnet in both WAN and DMZ. FortiWAN’s Public IP Pass-
through function makes the two Ethernet segments in WAN and in DMZ one
IP subnetwork (See "Public IP Pass-through").
See also
See also
36 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
Except a WAN IPv6 subnet used to deploy for a WAN link, ISP might provide an extra LAN IPv6 subnet for
deploying your LAN. Depending on the demand, the LAN IPv6 subnet can be deployed as basic subnet in DMZ as
well for the WAN link.
FortiWAN supports hot backup in HA by heartbeat mechanism. When both FortiWAN are on, one unit (the
master) performs operations, with the other (the slave) in standby. If the master fails for power failure or hardware
failure (including normal power off and system reboot), hot backup performs a switch-over to the slave (heartbeat
detection fails). This function logically promotes the slave to activate HA and to resume the role of the master.
The failed master unit will take the role of slave after it resumes from reboot. The HA hot-backup solution
significantly limits the downtime, and secures uninterrupted operation for critical applications.
Hot backup also implies data synchronization. FortiWAN HA performs system configurations synchronization
between the master and slave units. Applying configurations to the master unit from Web UI triggers a
synchronization to the slave unit. Besides, as long as the peer unit resumes as slave mode from system
rebooting, the master also synchronizes system configures with it. This mechanism guarantees the identical
system configurations for the two units.
In case that two units are inconsistent with firmware version, FortiWAN model and throughput license, only one
unit takes the role of master while the peer unit stay the booting status. A master unit cannot synchronize system
configurations with the unit that is in booting status. A message "Incompatible" is displayed for Peer Information
in the Summary page of the master's Web UI.
Setting Up HA
FortiWAN's double-device backup setup is easy to use. Simply connect the HA RJ-45 ports on both FortiWAN
units with a Ethernet cable. Note that HA deployment requires identical firmware version, model and throughput
license on the two units.
Activating HA Mode
FortiWAN-VM uses the vNIC1 as the HA port. To deploy FortiWAN-VM appliances as HA mode, allocate the
vNIC1 of two appliances to the same virtual network (vSwitch). HA deployment is not supported for two
FortiWAN-VM appliances that both are 15-day trails. It requires one 60-day trial or a permanent license for the
two appliances (in DH mode) at least.
FortiWAN Handbook 37
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
After HA mode has been activated, the Master emits 4 beeps, and the Slave does 3. The status of the Slave is
displayed under [System] > [Summary] > [Peer Information] on the master's Web UI. Note that a slave's Web UI
is not available.
Once the master is down, the slave emits 1 beep and resumes the role of the master to keep network alive.
Switching on the two units together, then the unit with larger Up Time or Serial Number takes the role of master,
while the peer unit takes the role of slave.
Note: Ensure the cable is solidly plugged in both units. Otherwise, it may cause errors. After the master locates
the slave, system will activate HA mode.
38 FortiWAN Handbook
Fortinet Technologies Inc.
Glossary for FortiWAN network setting How to set up your FortiWAN
Firmware update on both master and slave units under HA deployment can be completed at once (one firmware
update instruction). The firmware update procedure in HA deployment is similar to the non-HA (single unit)
procedure:
1. Log onto the master unit as Administrator, go to [System]→[Summary], double check and make sure the peer
device is under normal condition (See "Summary").
2. Execute the firmware update with uploading the firmware file (See "Administrator"). Please wait as this may take a
while.
The master unit starts with verifying the uploaded firmware file for master and slave units (system can not be
uploaded with a firmware file that is earlier than the version system is running on). The slave unit then receives a
duplicate of firmware file from master unit, and starts to update firmware. The master unit holds on updating
itself until the update on slave unit completes. Once slave completes its update, the master unit starts updating
itself then, while slave gets into reboot procedure. The whole update procedure will complete after the two units
recover from system reboot. The asynchronous update procedure on the two units causes the peer unit
recovering from reboot earlier than local unit, and the master-slave relationship will switch therefore.
The whole firmware update will be aborted if any abnormality happens during updating on slave. The master unit
will not get updating itself without updating successfully on slave unit. Abnormal termination of firmware update
does not trigger system reboot, and therefore the master-slave relationship will not switch.
During the firmware update, the heartbeat mechanism over master and slave units stops temporarily until the
firmware update succeeds or is terminated by abnormality.
After the firmware update is complete, the firmware version number displayed in fields [System Information] and
[Peer Information] on Web UI page [System > Summary] should be updated and identical. The information
displayed in field [Peer Information] gives reference to judge the update.
Version = Updated version number, State = Slave: Firmware update succeeds on both units.
Version = Non-updated version number, State = Slave: Firmware update is aborted by abnormalities. Both
units fail to update. Please perform the HA firmware update again (with [Update Slave] being checked).
Version = Updated version number, State = Incompatible: The peer unit succeeds in updating, but the
local unit fails. Please perform the single unit firmware update (without [Update Slave] being checked).
Version = Non-updated version number, State = Incompatible: The local unit succeeds in updating, but
the peer unit fails. Please reboot local unit to switch the master-slave relationship of the two units. Reconnect and
login to Web UI, and perform the single unit firmware update (without [Update Slave] being checked).
Note: If there are abnormal behaviors in the DMZ or public IP servers, go to [System] → [Diagnostic Tools] →
[ARP Enforcement] and execute [Enforce] for troubleshooting. Also notice that if the Ethernet cable for HA
between the master and slave is removed or disconnected.
If abnormal behaviors appear consistently, please remove the network and HA cable, and perform the firmware
update procedure again to both system individually.Then reconnect them to the network as well as the HA
deployment.
If repetitive errors occur during the firmware update process, DO NOT ever switch off the device and contact your
dealer for technical support.
FortiWAN Handbook 39
Fortinet Technologies Inc.
How to set up your FortiWAN Glossary for FortiWAN network setting
Long-distance HA deployment
Sometimes the two FortiWAN appliances used to establish HA deployment are apart from each other
geographically. It requires several Ethernet switches or bridges to connect the two appliances across areas or
buildings. Since FortiWAN is designed to join a HA deployment by directly connecting the two RJ-45 ports (HA
ports) with a Ethernet cable, it is supposed that there is not any non-HA Ethernet frames broadcasted between
the two appliances. The HA messages interchanged for availability detection are raw Ethernet frames of
EtherType 0x88B6 (LOCAL2), not 0x0800 (IPv4); and the mechanism of FortiWAN's HA deployment is very
sensitive to non-HA Ethernet frames. For this reason, it requires STP and ARP being disabled on the switch
(connecting the two FortiWAN units) to avoid misleading the judgment on HA takeover. Besides, please create a
port base VLAN on the switch to isolate the HA connectivity from other subnets if necessary.
Get HA information via SNMP and event notifications via SNMP trap
You can use SNMP manager to get slave unit information and receive notifications when the slave unit fails,
recovers and take over the master unit. Configure SNMP for your FortiWAN unit (See "SNMP") to get the
information in a MIB field via SNMP manager. Configure the SNMP manager on your FortiWAN and enable the
event types "HA slave failure and recovery" and "HA takeover" to notify (See "Notification"), then notifications will
be delivered to your SNMP manager for the events. The correspondent MIB fields and OIDs are listed as
following:
40 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
fwnSysSlaveUptime 1.3.6.1.4.1.12356.118.1.4 Uptime of the slave unit deployed with this local
unit in HA mode.
fwnSysSlaveState 1.3.6.1.4.1.12356.118.1.5 State of the slave unit deployed with this local
unit in HA mode.
See also
l Summary
l Configurations for VLAN and Port Mapping
l Administrator
FortiWAN provides the Web User Interface (Web UI) which is the primary interface for network deployments,
administration, configurations and traffic statistics and analysis. FortiWAN's Command Line interface (CLI)
provides basic commands for trouble shooting and system recovery. This section starts with the steps to connect
to FortiWAN's Web UI and CLI while the first time using FortiWAN product. Afterward a basic and common
concept about using Web UI is introduced.
Before setting up FortiWAN in your network, ensure the following are taken care of:
l Check network environment and make sure the following are ready before FortiWAN installation and setup: well-
structured network architecture, and proper IP allocation.
l Use cross-over to connect PC to FortiWAN LAN port instead of straight-through.
FortiWAN Handbook 41
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
For the first time accessing to the Web UI, you can get the connection via a computer matching with the default
LAN subnet (See the section "Access via a computer that matches the default LAN IP address" below). However,
the default subnet configured on LAN port might conflict with or be unreachable from your existing network,
especially for the deployments of FortiWAN-VM. If you want to have the connection to LAN port from a subnet
that does not match the default LAN IP address, such as an existing subnet 10.10.10.0/255.255.255.0, you have
to change the network setting of LAN port via CLI to match the subnet (See the section "Access via a computer
that does not match the default LAN IP address" below).
Requires: Microsoft Internet Explorer 6, Mozilla Firefox 2.0, or Google Chrome 2.0 or newer.
l Using the Ethernet cable, connect LAN port of the appliance to your computer. For a FortiWAN-VM appliance,
connect your computer to the virtual network (vSwitch) of the LAN port of FortiWAN-VM appliance.
l Switch on FortiWAN. It will emit 3 beeps, indicating the system is initialized and activated. Meanwhile, the LAN port
LED blinks, indicating a proper connection.
l By default, the LAN IP address is 192.168.0.1. Configure your computer to match the appliance’s default LAN
subnet. For example, on Windows 7, click the Start (Windows logo) menu to open it, and then click Control Panel.
Click Network and Sharing Center, Local Area Connection, and then the Properties button. Select Internet Protocol
Version 4 (TCP/IPv4), then click its Properties button. Select Use the following IP address, then change your
computer’s settings to:
l IP address: 192.168.0.2 (or 192.168.0.X)
l Subnet mask: 255.255.255.0
l To connect to FortiWAN’s web UI, start a web browser and go to https://192.168.0.1. (Remember to include the “s”
in https://.)
l Login to web UI with the default username,admin, and leave the password field blank (case sensitive).
Access via a computer that does not match the default LAN IP address
l Connect to the CLI (See the section "To connect to the CLI" below).
l Configure the network setting of LAN port to match the existing LAN subnet (See the section "Change network
setting to LAN port via CLI" below).
42 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
l After system reboots, connect the subnet to the LAN port of FortiWAN appliance.
l To connect to FortiWAN’s web UI, start a web browser on a computer in the subnet and go to
https://xxx.xxx.xxx.xxx, where xxx.xxx.xxx.xxx is the IP address assigned to LAN port. (Remember to include the “s”
in https://.)
l Login to web UI with the default username,admin, and leave the password field blank (case sensitive).
Note:
1. Make sure the proxy settings of the web browser are disabled. For example, open Internet Explorer and select
"Internet Option" on "Tools" menu. Click the "Connection" tab, "LAN settings" and open "Local Area Network
Settings" dialog box, then disable "Proxy server".
2. Default account admin has the Administrator permission (See "Administration/Administrator and Monitor
Password"). It is strong recommended to reset the passwords ASAP, and take good care of it.
3. Web UI supports concurrent multiple sign-in (See "Using the Web UI/Multi-user Login").
4. The default Username/Password, Administrator/1234 and Monitor/5678, used for V4.0.x remain in
this version, but will be removed in next version.
5. FortiWAN supports Web UI access from the Internet by connecting to the WAN ports. For example, start the web
browser and go to https://xxx.xxx.xxx.xxx, where xxx.xxx.xxx.xxx is the IP address assigned to a WAN port (see
Configuring Network Interface). However, FortiWAN's Firewall denies any access to FortiWAN's localhost coming
from the Internet (WAN) by default (see Firewall). Therefore, LAN port is the only way for your first time Web UI
accessing. Then it is your option to configure network setting to a WAN link (WAN port) and modify the firewall
rules to accept localhost accessing from the Internet.
l Using the console cable, connect the appliance’s console port to your terminal server or computer. On your
computer or terminal server, start the terminal emulator
l Use these settings:
l Bits per second: 9600
l Data bits: 8
l Parity: None
l Stop bits: 1
l Flow control: None
l Press Enter on your keyboard to connect to the CLI
l Login with the default username, admin, and leave the password field blank (case sensitive)
FortiWAN maintains a common local authentication database for its Web UI and CLI. Accounts defined as group
Administrator are able to CLI with its username and password.
Note: FortiWAN CLI has limited functionality and cannot fully configure the system. Normal configuration
changes should be done via the WebUI.
FortiWAN Handbook 43
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
44 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
Web UI Overview
Once you log in, you will see the operating page that is divided into three parts, the header is locate the upper
side of the screen, the navigation menu is located on the left side of the screen, and the content pane is
located on the center of the screen.
FortiWAN Handbook 45
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
[System/Summary] shown above indicates page contents are displayed of [System] > [Summary], and
[[email protected]] indicates Administrator account log in from IP 125.227.251.80. Note that do
not use your browser’s Back button to navigate, pages may not operate correctly.
Navigation Menu consists of six main categories: System, Service, Statistics, Log, Reports and
Language. Each category contains sub-menu of individual functions. To expand a category, simply click it.To
display the operating page of a function from a sub-menu, click the name of the function and it will display on the
content pane.
l System: Contains necessary items to maintain the FortiWAN; they are Summary, Network Setting, WAN Link
Health Detection, Optimum Route Detection, Port Speed/Duplex Setting, Backup Line Setting, IP Grouping,
Service Grouping, Busyhour Setting, Diagnostic Tools, Date/Time, Remote Assistance and Administration (See
"System Configurations" and "Configuring Network Interface (Network Setting)"). Administration is not available to
Monitor permission, it is invisible on the menu to a Monitor account.
l Service: Contains the services the FortiWAN provides; they are Firewall, NAT, Persistent Routing, Auto Routing,
Virtual Server, Bandwidth Management, Connection Limit, Cache Redirect, Multihoming, Internal DNS, DNS
Proxy, SNMP, IP-MAC Mapping and Tunnel Routing (See "Load Balancing & Fault Tolerance" & "Optional
Services").
l Statistics: Contains basic statistics of FortiWAN's system, services and traffic; they are Traffic, BM, Persistent
Routing, WAN Link Health Detection, Dynamic IP WAN Link, DHCP Lease Information, RIP & OSPF Status,
Connection Limit, Virtual Server Status, FQDN, Tunnel Status and Tunnel Traffic (See "Statistics").
l Log: Contains managements of system logs; they are View, Control, Notification and Reports (See "Log").
l Reports: Contain the advanced analysis and long-term statistics of FortiWAN's system, services and traffic; they
are Bandwidth, CPU, Session, WAN Traffic, WAN Reliability, WAN Status, TR Reliability, TR Status, In Class, Out
Class, WAN, Service, Internal IP, Traffic Rate, Connection Limit, Firewall, Virtual Server, Multihoming, Dashboard
and Settings (See "Reports").
l Language: Support English, Traditional Chinese and Simplified Chinese for options to display Web UI in multiple
languages,
Content Pane displays related items of a function specified from the left menu.
Multi-user Login
FortiWAN's Web UI supports multiple sign-in. The maximum limit for users can log-in concurrently is 20 users,
account permission (See "Administration\Administrator and Monitor Password") insensitive. An user get failed to
log-in if there have been 20 users in the Web UI concurrently. FortiWAN Web UI does not accept multiple login
from the same host and the same browser. Users that attempt to login to Web UI via the same host and browser
(different tabs or windows) will be logged out (including the one who is already in Web UI).
Configurations to FortiWAN applied concurrently via Web UI by the multiple users are arranged and processed in
order (one by one). It takes time for system to complete every single configuration applying; therefore, when
multiple configurations are in the queue to be applied, it might take a little extra time to wait for system getting
previous applications complete for the users after clicking the Apply button. Configurations to different functions
are queued up together to be applied. For example, an configuration to Auto Routing (made by user A) will be
queued if a configuration to Multihoming (made earlier by user B) has being processed.
FortiWAN does not provide multi-thread to run concurrent Tunnel Routing Benchmark (See "Tunnel Routing -
Benchmark"). An alert displays to the users who try to start Tunnel Routing Benchmark Client\Server via WebUI if
the Benchmark Client\Server is already running (started earlier by one user).
46 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
FortiWAN manages most of its rules/filters/policies with top-down evaluation method where the rules are
prioritized in descending order.
Click this button, to add a new rule below the current rule.
This symbol indicates a default policy, rule or filter, which is unmodifiable and indelible.
Configuration on When
This is for filtering traffic by different time period which is predefined in "Busyhour Settings".
This is for filtering the established sessions from/to specified source/destination. The options are:
IPv4/IPv6 Address : Matches sessions coming from or going to a single IPv4/IPv6 address. e.g.
192.168.1.4.
IPv4/IPv6 Range : Matches sessions coming from or going to a continuous range of IP addresses.
e.g. 192.168.1.10-192.168.1.20.
FortiWAN Handbook 47
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
IP Grouping Name : Matches sessions coming from or going to the IP addresses that predefined in IP
groups (See "IP Grouping").
This is for filtering the traffic coming from specified physical ports. Input Port are the item used to evaluate
outbound traffic for only Auto Routing (See "Auto Routing") so far. Ports (normal ports, VLAN ports, redundant
LAN\DMZ ports and aggregated LAN\DMZ ports) defined in [Network Setting > VLAN and Port Mapping] (See
"Configurations for VLAN and Port Mapping") are listed for options:
Port X.[VLAN Tag] : Matches sessions coming from the specified VLAN port.
LAN Bridge: [Lable] : Matches sessions coming from the specified redundant LAN port.
DMZ Bridge: [Lable] : Matches sessions coming from the specified redundant DMZ port.
LAN Bonding: [Lable] : Matches sessions coming from the specified aggregated LAN port.
DMZ Bonding: [Lable] : Matches sessions coming from the specified aggregated DMZ port.
Configuration on Service
This is for filtering the established sessions running specified service. It contains some well-known services for
options and user-defined services (TCP@, UDP@ and Protocol#):
l FTP (21)
l SSH (22)
l TELNET (23)
l SMTP (25)
l DNS (53)
l GOPHER (70)
l FINGER (79)
48 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
l HTTP (80)
l POP3 (110)
l NNTP (119)
l NTP (123)
l IMAP (143)
l SNMP (161)
l BGP (179)
l WAIS (210)
l LDAP (389)
l HTTPS (443)
l IKE (500)
l RLOGIN (513)
l SYSLOG (514)
l RIP (520)
l UUCP (540)
l H323 (1720)
l RADIUS (1812)
l RADIUS-ACCT (1813)
l pcAnywhere-D (5631)
l pcAnywhere-S (5632)
l X-Windows (6000-6063)
l GRE
l ESP
l AH
l ICMP
l TCP@
l UDP@
l Protocol#
l Any
Note that for some standard utilities such as tcpdump or traceroute, the options that are not listed here are
not supported by FortiWAN.
help:
FortiWAN Handbook 49
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
arp:
Manipulate (add and delete entries) or display the IPv4 network neighbor cache.
arp [-i <port>] -a [<hostname>]
arp [-i <port>] -e
arp -i <port> -s <hostname> <hw_addr>
arp -i <port> -d <hostname>
-a [<hostname>]: Display the entries of the specified hostname. All the entries will be displayed if no
hostname is specified. Hostnames will be displayed in alternate BSD style output format.
-s <hostname> <hw_addr> : Manually create an ARP entry mapping for the host hostname with the
hardware address hw_addr. This requires specifying a port via -i port.
-d <hostname>: Remove the entries for the specified host hostname. This requires specifying a port via -i
port.
-i <port> : Specify an network interface (port) of FortiWAN to display, create or remove entries.
<port> : Specify an network interface (port) of FortiWAN in format port#, e.g. port1, port2 and etc.
Note: If domain name is to be used in the hostname parameter, the DNS Server must be set in the Web UI
[System]->[Network Settings]->[DNS Server].
arping:
<hostname>: Specify the target IP address or domain name (MAC address is not supported). Note that domain
name is valid only if parameter <link> is specified as "wan".
<link> : Specify the link or ports that the ARP request is sent through. The valid values are "wan", "dmz" and
"lan".
<index> : Specify the index of a WAN link if <link> is specified as "wan". The valid values are 1, 2, 3, ...,etc.
Example:
arping 192.168.2.100 lan will send an ARP request through LAN ports to ask the MAC address of host
192.168.2.100.
arping 10.10.10.10 wan 1 will send an ARP request through WAN link 1 to ask the MAC address of host
10.10.10.10.
Note: If domain name is to be used in the hostname parameter, the DNS Server must be set in the Web UI
[System]->[Network Settings]->[DNS Server].
50 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
diagnose:
disablefw:
enforcearp:
export:
<config_name>: Specify the configuration to be displayed. Values of the parameter are nat, multihoming
and virtual-server for options.
get:
FortiWAN Handbook 51
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
httpctl:
setport : Set the port number for the web server with indicating parameter port.
import:
Example:
> import
Please enter configuration. terminate with a line constaining exactly:
1) 'apply' to apply, or
2) 'abort' to abort.
import> nat {
import> wan-array {
import> wan@1 {
import> rule-array {
import> rule { #1
import> source 10.10.10.55-10.10.10.77
import> destination 10.12.10.55-10.12.10.70
import> translated 10.12.104.232
import> }
import> }
import> }
import> }
import> }
import> apply
Start to apply configuration of nat...
Settings are applied for page Service -> Nat
>
Type abort in command prompt import> to leave the prompt any time. Please refer to the exported
configurations (displayed by command export or saved via Web UI. See "Configuration File" in "Administration")
for the import format.
init_reports_db:
52 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
Set FortiWAN's Reports database to factory default. All the report data will be deleted. Please make sure the
database is backed up if it is necessary (See Reports Database Tool and Database Data Utility). Note that
executing this command will bring system an automatic reboot.
jframe:
Enable jumbo frames to support specified MTU size for FortiWAN's LAN ports
jframe show
Get the port number and the MTU size of FortiWAN's LAN ports
jframe set <port> <mtu>
Enable jumbo frames on the LAN port by specifying a MTU size that is larger than 1500.
Note that applying for Network Setting resets the MTU on LAN ports to 1500.
logout:
ping:
<hostname>: The parameter in specifying the target IP address or domain name. Note that domain name is
valid only if parameter <link> is specified as "wan".
<link> : The parameter in specifying the link or ports that the ICMP PING REQUEST packets are sent through.
The valid values are "wan", "dmz" and "lan".
<index> : The parameter in specifying the index of a WAN link if <link> is specified as "wan". The valid values
are 1, 2, 3, ...,etc. (0 for private subnet).
Example:
Note: If domain name is used in the hostname parameter, DNS Server must be set in the Web UI [System]->
[Network Settings]->[DNS Server] (See "Set DNS server for FortiWAN").
For more on ICMP related error messages please refer to other ICMP/PING materials.
reactivate:
FortiWAN Handbook 53
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
l Reset all system configurations to factory default (See "Appendix A: Default Values" for the details)
l Return the system to base-bandwidth (See "License Control" in "Administration")
l Reset Reports database to factory default. All the report data will be deleted.
Using this command will result in all system data being deleted as well as all bandwidth licenses. Before you
attempt a reactivation, please make sure the following are complete:.
reboot:
Restart FortiWAN
reboot [-t <second>]
Restart FortiWAN immediately or restart it after a time period.
<second> : The parameter in specifying the time period (in second) system waits for to reboot.
Example:
resetconfig:
Since command resetconfig will return IP address of LAN and WAN ports to the default values such as
192.168.0.1/255.255.255.0, 192.168.1.1/255.255.255.0 and 192.168.2.1/255.255.255.0, users might need to
change the IP address of their local computer to reconnect to the Web UI via the LAN or WAN port (See
"Connecting to the Web UI and the CLI"). Note that resetconfig resets the port mappings to factory default,
please connect to the correct network port (LAN or WAN) for accessing to Web UI (see Network interfaces and
port mapping).
resetconfig provides two optional parameters, ip_address/netmask and @port, to specify a LAN port
address and a LAN port mapping (map the LAN port to the specified physical port) while resetting the
configurations. All the configurations will be reset to factory default and the LAN settings will be configured to the
specified value, so that users can reconnect to Web UI via this port without changing network topology.
54 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
Furthermore, a static routing entry can be specified to the FortiWAN appliance, so that you can access Web UI
across subnets.
Example:
Considering that the LAN port of a FortiWAN 200B appliance is mapped to the first physical port (port1), IP
address 192.168.100.1/255.255.255.0 is assigned to the LAN port and a static routing rule is created to route
packets destined to 192.168.200.0/255.255.255.0 to 192.168.100.254. Administrators in
192.168.100.0/255.255.255.0 and 192.168.200.0/255.255.255.0 can access Web UI via the LAN port. Here are
the usages of command resetconfig in different ways:
Type “resetconfig [IP address/Netmask]” to specify IP configuration to LAN port from resetting system to factory
default.
l resetconfigresets all the configurations to factory default including LAN settings. In the default port mapping,
port1 is mapped to WAN and port4 is mapped to LAN. IP address of the LAN port returns to
192.168.0.1/255.255.255.0. Administrators in 192.168.100.0/255.255.255.0 and 192.168.200.0/255.255.255.0
can not access to Web UI until appropriate changes to cable installation and network topology are done manually.
l resetconfig 192.168.100.1/255.255.255.0 resets system to factory default, but set
192.168.100.1/255.255.255.0 to LAN port. However, without a specifying, port1 is mapped to WAN and port4 is
mapped to LAN by default. Besides, the static routing rule for responding access requests coming from
192.168.200.0/255.255.255.0 is deleted as well. Therefore, it still requires manual changes to cable installation
and network topology for administrators in 192.168.100.0/255.255.255.0 and 192.168.200.0/255.255.255.0 can
access the Web UI.
l resetconfig 192.168.100.1/255.255.255.0@port1 resets system to factory default, but map port1 to
LAN and set 192.168.100.1/255.255.255.0 to the LAN port. Administrators in 192.168.100.0/255.255.255.0 can
access Web UI via the LAN port without any change, but administrators in 192.168.200.0/255.255.255.0 can not
access the Web UI until a correct routing rule is created.
l resetconfig 192.168.100.1/255.255.255.0@port1
192.168.200.0/[email protected] resets system to factory default, but map port1 to
LAN, set 192.168.100.1/255.255.255.0 to the LAN port and create a routing rule for packets destined to
192.168.200.0/255.255.255.0, where 192.168.100.254 is the router connecting subnets
192.168.100.0/255.255.255.0 and 192.168.200.0/255.255.255.0. Administrators in 192.168.100.0/255.255.255.0
and 192.168.200.0/255.255.255.0 so that can access Web UI via the LAN port without any change to network
deployment.
Note that executing resetconfig without specifying the LAN port settings will reset port mapping to factory
default, which implies the WAN links assigned to the default WAN ports are enabled. However, except the LAN
port, there will be not port mappings set for WAN and DMZ if resetconfig is executed with specifying any
parameter. In the case, there will be not default WAN and DMZ ports available (no default WAN links neither)
after resetconfig, administrators have to re-login to Web UI via the LAN port to set the port mappings (see
Connecting to the Web UI ).
resetpasswd:
FortiWAN Handbook 55
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
resetpasswd
System will re-confirm, press [y] to proceed or [n] to cancel.
setupport:
change : Change the transmission mode of the specified port to AUTO or specified speed and mode.
<port> : The parameter in specifying the port number. The valid values are 1, 2, 3, ...,etc.
<speed> : The parameter in specifying the transmission speed. The valid values are 10, 100 and 1000.
<mode> : The parameter in specifying the transmission mode. The valid values are half and full.
Example:
setupport show
Note:
The port is the port number of the FortiWAN port interface; exact number varies according to product models.
shownetwork:
Note: This Console command can only show the current network status. This setting can be changed in the Web
UI under “Network Settings” (See "Configuring Network Interface (Network Setting)").
showtrstat:
56 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
|[Local_IP]--[Remote_IP]|[Status]|[RTT_value]|[Jitter_value]|
--------------------------------
shutdown
This is command is used to shut FortiWAN system down, all the system processes and services will be
terminated normally. Note that this command might not power the appliance off, please turn on/off the power
switch or plug/unplug the power adapter to power on/off the appliance.
Type sslcert set to set new SSL certificate for working with FortiWAN WebUI. You have to manually input
the SSL private key and its correspondent certificate in text after the command prompt sslcert> line by line.
The content inputted for the private key and certificate must start with “-----BEGIN CERTIFICATE-----” and “-----
BEGIN RSA PRIVATE KEY-----”, and end with “-----END CERTIFICATE-----” and “----END RSA PRIVATE KEY-----”.
Example:
> sslcert set
Please enter the certificate. It should starts with
-----BEGIN CERTIFICATE-----
and end with
-----END CERTIFICATE-----
To abort please enter an empty line:
sslcert> -----BEGIN CERTIFICATE-----
sslcert> ...(data encoded in base64)...
sslcert> -----END CERTIFICATE-----
Please enter the private key. It should starts with
-----BEGIN RSA PRIVATE KEY-----
and end with
-----END RSA PRIVATE KEY-----
To abort please enter an empty line:
sslcert> -----BEGIN RSA PRIVATE KEY-----
sslcert> ...(data encoded in base64)...
sslcert> -----END RSA PRIVATE KEY-----
>
Type sslcert reset to reset to factory default, the self-signed certificate.
sysctl
Display the values of the system parameters.
sysctl <parameter>=<value|default>
Set the system parameter with the specified value. The system parameters are as followings:
sip-helper h323-helper
FortiWAN Handbook 57
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
sysctl sip-helper=<0|1|default>
sysctl h323-helper=<0|1|default>
sip-helper : to enable [1] or disable [0] SIP application gateway modules. Type default to set it default,
which is disabled.
h323-helper : to enable [1] or disable [0] H323 application gateway modules. Type default to set it default,
which is disabled.
Example:
sysctl sip-helper=default set the SIP application gateway modules to default, which is disabled.
Note: SIP and H323 application gateway modules execute NAT transparent for SIP and H323. For some SIP and
H323 devices that NAT transparent is a built-in function, it is suggested to disable the SIP or H323 gateway
module in FortiWAN.
icmp-timeout icmpv6-timeout
sysctl icmp-timeout=<value|default>
Set ICMP timeout, where <value> is the timeout in seconds. Type default to set the timeout to default
value, which is 3 seconds.
sysctl icmpv6-timeout=<value|default>
Set ICMPv6 timeout, where <value> is the timeout in seconds. Type default to set the timeout to default
value, which is 3 seconds.
tcp-timeout-unacknowledged
sysctl tcp-timeout-close=<value|default>
Set timeout for TCP connections in CLOSING state, where <value> is the timeout in seconds. Type default
to set the timeout to default value, which is 10 seconds.
sysctl tcp-timeout-close-wait=<value|default>
Set timeout for TCP connections in CLOSE WAIT state, where <value> is the timeout in seconds. Type
default to set the timeout to default value, which is 60 seconds.
sysctl tcp-timeout-established=<value|default>
Set timeout for TCP connections in ESTABLISHED state, where <value> is the timeout in seconds. Type
default to set the timeout to default value, which is 43200 seconds.
sysctl tcp-timeout-fin-wait=<value|default>
58 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
Set timeout for TCP connections in FIN WAIT state where <value> is the timeout in seconds. Type default
to set the timeout to default value, which is 120 seconds.
sysctl tcp-timeout-last-ack=<value|default>
Set timeout for TCP connections in LAST ACK state, where <value> is the timeout in seconds. Type default
to set the timeout to default value, which is 30 seconds.
sysctl tcp-timeout-max-retrans=<value|default>
Set timeout for the TCP connections that reach three retransmission without receiving an acceptable ACK from
destinations, where <value> is the timeout in seconds. Type default to set the timeout to default value,
which is 300 seconds.
sysctl tcp-timeout-syn-recv=<value|default>
Set timeout for TCP connections in SYN RECV state, where <value> is the timeout in seconds. Type default
to set the timeout to default value, which is 60 seconds.
sysctl tcp-timeout-syn-sent=<value|default>
Set timeout for TCP connections in SYN SENT state, where <value> is the timeout in seconds. Type default
to set the timeout to default value, which is 120 seconds.
sysctl tcp-timeout-time-wait=<value|default>
Set timeout for TCP connections in TIME WAIT state, where <value> is the timeout in seconds. Type
default to set the timeout to default value, which is 60 seconds.
sysctl tcp-timeout-unacknowledged=<value|default>
Set timeout for the segments that receive no acceptable ACKs from destinations, where <value> is the timeout
in seconds. Type default to set the timeout to default value, which is 300 seconds.
udp-timeout udp-timeout-stream
sysctl udp-timeout=<value|default>
Set UDP timeout, where <value> is the timeout in seconds. Type default to set the timeout to default value,
which is 30 seconds.
sysctl udp-timeout-stream=<value|default>
Set UDP stream timeout, where <value> is the timeout in seconds. Type default to set the timeout to default
value, which is 180 seconds.
Other Timeout
frag6-timeout generic-timeout
sysctl frag6-timeout=<value|default>
Set timeout to keep an IPv6 fragment in memory, where <value> is the timeout in seconds. Type default to
set the timeout to default value, which is 60 seconds
sysctl generic-timeout=<value|default>
Set generic timeout for layer 4 unknown/unsupported protocols, where <value> is the timeout in seconds. Type
default to set the timeout to default value, which is 600 seconds.
FortiWAN Handbook 59
Fortinet Technologies Inc.
How to set up your FortiWAN Web UI and CLI Overview
generic-receive-offload-<port>
sysctl generic-receive-offload-<port>=<0|1|default>
Disabling GRO (General Receive Offload) mechanism on the corresponding LAN ports and/or DMZ ports of a
Tunnel Routing network can enhance the Tunnel Routing transmission performance (see How the Tunnel
Routing Works and How to set up routing rules for Tunnel Routing).
generic-receive-offload-<port>: Enable [1] or disable [0] GRO (General Receive Offload) mechanism
on the specified physical network interface <port>, where <port> is a variable. Type default to set the GRO
on <port> to default, which is enabled.
<port> : Specify an network interface (port) of FortiWAN in format port#, e.g. port1, port2 and etc.
Example:
Note that disabling GRO module on a network port can enhance the Tunnel Routing transmission performance
on the port, but it also results in slight impact to non-Tunnel-Routing transmission on the port when the system is
under heavy loading (there might be a slight decrease in transmission performance of non-Tunnel-Routing traffic
through the network port). We suggest keeping GRO modules enabled on the network ports that does not
participate in the Tunnel Routing transmission.
sysinfo
Get the usage of FortiWAN’s CPU, memory and disk space in percentage.
tcpdump [-aAdDeflLnNOpqRStuUvxX] [-c count] [-E algo:secret] [-i PORT] [-s snaplen] [-T
type] [-y datalinktype] [expression]
<port> : The parameter in specifying an network interface (port) of FortiWAN in format port#, e.g. port1, port2
and etc.
For details of the options and parameters, please refer to http://www.tcpdump.org/tcpdump_man.html. Note that
options not listed here are not supported by FortiWAN.
traceroute: Shows the packet routes between FortiWAN's port to a specified destination
<hostname>: The parameter in specifying the target IP address or domain name. Note that domain name is
valid only if parameter <link> is specified as "wan".
<link> : The parameter in specifying the link or ports that the traceroute packets start from. The valid values are
"wan", "dmz" and "lan".
60 FortiWAN Handbook
Fortinet Technologies Inc.
Web UI and CLI Overview How to set up your FortiWAN
<index> : The parameter in specifying the index of a WAN link if <link> is specified as "wan". The valid values
are 1, 2, 3, ...,etc.
Example:
traceroute www.hinet.net wan 1 showes the trace routes from WAN link1 to www.hinet.net.
Note: If domain name is to be used in the hostname parameter, the DNS Server must be set in the Web UI
[System]->[Network Settings]->[DNS Server] (See "Set DNS server for FortiWAN").
FortiWAN Handbook 61
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Set DNS server to FortiWAN
As an edge router of a network site, FortiWAN is supposed to operate with connected networks, the WAN, LAN
and DMZ networks. FortiWAN must guarantee general communication among the connected networks (routing),
and so that can provide the advanced load balancing and fault tolerance functions. To establish connectivity
between FortiWAN and the networks, you need to complete the following basic network settings:
1. Decide a FortiWAN's network port for connecting the FortiWAN with the network. This network port can be a
physical port, an aggregated, redundant or VLAN port. Whether it is a physical or logical port, you have to
program it as what the type that the connected network is (WAN, LAN or DMZ). VLAN and Port Mapping
is the configuration that you can create logical network ports (aggregated, redundant and VLAN ports) and
define the port mapping to the physical and logical ports (see Configurations for VLAN and Port Mapping).
2. Configure the basic IP network setting and static routing information to the network port for the connected
network. The settings here are necessary for FortiWAN to guarantee basic communication among the
connected networks, packets can be routed correctly between the networks. According to the type of
connected network, settings are divided into:
l WAN Setting (DMZ setting is included): WAN Settings is the major part to deploy FortiWAN
in various types of WAN links (see Configuring your WAN).
l WAN/DMZ Private Subnet: This includes settings for deploying private subnets to
WAN/DMZ port (see WAN/DMZ Private Subnet).
l LAN Private Subnet: This includes settings for deploying private subnets to LAN port (see
LAN Private Subnet).
Generally speaking, a network site consists of a WAN link and a private LAN network at least. WAN Setting
and LAN Private Subnet are the necessary configurations for FortiWAN to connect the internal and external
networks.
Some of FortiWAN's functions, such as system time synchronization, log push, ping and trace commands, require
cooperating with external servers. When FortiWAN itself (localhost) communicates with those external servers,
such as NTP, FTP, SMTP servers, an appropriate DNS server is required for domain name resolving.
Configuration of DNS Server is part of the basic network setting (see Set DNS server for FortiWAN).
As an edge router, FortiWAN connects the external and internal networks to provide necessary valuable functions
for incoming and outgoing service accesses. Among the functions, domain name resolution plays an important
role for service accesses. The following is an overview about the DNS deployment on FortiWAN, according to
source of the DNS query.
62 FortiWAN Handbook
Fortinet Technologies Inc.
Set DNS server to FortiWAN Configuring Network Interface (Network Setting)
On the other hand, if you want to maintain an internal DNS server in your site, FortiWAN provides Internal DNS
(see "Internal DNS") for managing your domain to internal users (the users in LAN or DMZ subnet). An user in
LAN or DMZ subnet need to manually configure the DNS server on his computer for using the FortiWAN's Internal
DNS (set DNS server as IP address of the gateway he connects to). It is unable to automatically allocate
FortiWAN's internal DNS to users by FortiWAN's DHCP. The Internal DNS is recursive, which allows users to
resolve other people's domains (external domains). The DNS servers set here (System > Network Setting > DNS
Server) will be asked by Internal DNS while it recursively resolve an unknown domain. Of cause that you can also
set up a standalone internal DNS server to manage your domain for internal users, but this is the category of
FortiWAN.
The last feature about DNS that FortiWAN provides is DNS Proxy, which is a mechanism to redirect outgoing
DNS queries to other DNS servers according to WAN links loading. This is not the well-known DNS proxy, but is a
solution for ISP peering issue (See "DNS Proxy" and "Optimum Route Detect").
Back to System > Network Setting > DNS Server, it enables administrators to define the host name the
FortiWAN in the network, the IPv4/IPv6 address of domain name servers used by FortiWAN, and the suffix of the
domain name. The following is the list of FortiWAN's functions that might require the DNS servers set here.
System > Diagnostic Tools Ping and Trace (See "Diagnostic Tools")
System > Date/Time Synchronize system time through NTP server (See "Setting the system time &
date")
Service > Internal DNS Recursively resolve an unknown domain (see "Internal DNS")
Log > Control SMTP and FTP Server Settings (See "Log Control")
FortiWAN Handbook 63
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Aggregated, Redundant, VLAN Ports and Port Mapping
FQDN Maintain the FQDN mapping in system for supporting FQDN in management
policies (See "Basic concept to configure via Web UI" in "Using the Web UI").
IPv4 Domain Name Server IPv4 DNS servers for this FortiWAN itself to resolve unknown domains. The
maximum of three IPv4 addresses is allowed. The DNS servers set here will be
used in a top-down order, if the DNS request timed out.
IPv6 Domain Name Server IPv6 DNS servers for this FortiWAN itself to resolve unknown domains. The
maximum of three IPv6 addresses is allowed. The DNS servers set here will be
used in a top-down order, if the DNS request timed out.
Note: Incomplete DNS server configurations will not influence the performance of the functions listed above. Only
IP address is necessary instead of the FQDN.
Go to System > Network Setting from the Web UI, click the label VLAN and Port Mapping in the upper-right
corner to expand the configuration panel. This is a configuration that you can create logical network ports and
define the port mapping to the physical and logical ports. The VLAN and Port Mapping panel consists of four
tables, VLAN and Port Mapping, Redundant LAN Port, Redundant DMZ Port and Aggregated Port,
which are described as followings:
Port
In the VLAN and Port Mapping table, each of the FortiWAN's physical ports is listed in the Port column
(indicated as Port1, Port2, Port3 ..., corresponding to the numbers presented on the front panel of the FortiWAN
device), so that port mapping can be programed and VLAN tags can be created on it. Moreover, the created
aggregated ports (an logical port that is created by aggregating two physical ports, see Aggregated Port below for
64 FortiWAN Handbook
Fortinet Technologies Inc.
Aggregated, Redundant, VLAN Ports and Port Mapping Configuring Network Interface (Network Setting)
more details) will also be listed here for defining mappings and VLAN tags to them. As for a FortiWAN-VM
appliance, the ports listed in Port column are indicated as vNIC2, vNIC3, vNIC4 ..., mapping of the ports and the
vNICs is as bellow (vNIC 1 is used for HA port and can not be changed):
Ports Port 1 Port 2 Port 3 Port 4 Port 5 Port 6 Port 7 Port 8 Port 9
vNICs vNIC 2 vNIC 3 vNIC 4 vNIC 5 vNIC 6 vNIC 7 vNIC 8 vNIC 9 vNIC 10
Mapping
For the ports listed in the table, there are four options available for mapping them to a function (click the pull-
down menus of Mapping column):
WAN Specify a physical port or a VLAN port as a WAN port. This option is
not available for an aggregated port.
None Specify any port for non-purpose. To aggregate two physical ports, it
requires to map the two ports to None first (see Aggregated Port
below).
Whether a physical port or a logical port (aggregated, redundant or VLAN port) is, it must be programed as one of
the port types (WAN, LAN and DMZ) first to be used by other services. A port that is programmed as a WAN, LAN
or DMZ port will become an option to setting items of some configurations:
l Port that is programed as a WAN port will be listed in the pull-down menus:
l [WAN Port] of WAN Setting for configuring and deploying a WAN subnet to the ports (see Configuring your
WAN).
l [WAN Port] of WAN/DMZ Private Subnet for configuring and deploying a private WAN subnet to the ports
(see WAN/DMZ Private Subnet).
l [Input Port] of Auto Routing's IPv4/IPv6 Filters for creating a filter rule to evaluate packets by the port
receiving the packets (see Outbound Load Balancing and Failover).
l [Input Port] of Bandwidth Management's IPv4/IPv6 Filters of Outbound BM for creating a filter rule to
evaluate packets by the port receiving the packets (see Bandwidth Management).
l Port that is programed as a DMZ port will be listed in the pull-down menus:
l [DMZ Port] of WAN Setting for configuring and deploying a DMZ subnet to the ports (see Configuring your
WAN).
l [DMZ Port] of WAN/DMZ Private Subnet for configuring and deploying a private DMZ subnet to the ports
(see WAN/DMZ Private Subnet).
l [Input Port] of Auto Routing's IPv4/IPv6 Filters for creating a filter rule to evaluate packets by the port
receiving the packets (see Outbound Load Balancing and Failover).
l [Input Port] of Bandwidth Management's IPv4/IPv6 Filters of Outbound BM for creating a filter rule to
evaluate packets by the port receiving the packets (see Bandwidth Management).
FortiWAN Handbook 65
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Aggregated, Redundant, VLAN Ports and Port Mapping
l Port that is programed as a LAN port will be listed in the pull-down menus:
l [LAN Port] of LAN Private Subnet for configuring and deploying a LAN subnet to the ports (see
Configuring your WAN).
l [Input Port] of Auto Routing's IPv4/IPv6 Filters for creating a filter rule to evaluate packets by the port
receiving the packets (see Outbound Load Balancing and Failover).
l [Input Port] of Bandwidth Management's IPv4/IPv6 Filters of Outbound BM for creating a filter rule to
evaluate packets by the port receiving the packets (see Bandwidth Management).
Changes to port mappings here will be updated immediately to the corresponding pull-down menus. If a port has
been configured and deployed with a network, or been associated with a filter rule, a change to mapping of the
port will fail the original deployments and settings. Please remember to reconfigure relative settings if a port
mapping is changed.
VLAN Tag
FortiWAN supports IEEE 802.1Q, which is also known as VLAN Tagging (Cisco’s ISL is not supported). A
FortiWAN's physical port can be mapped to several VLAN ports. In a large-scale network that is segmented into
smaller groups of subnets by a VLAN switch, FortiWAN allows data being exchanged between these subnets.
Moreover, the VLAN switch ports can be programmed as DMZ, WAN or LAN ports. To introduce a VLAN Switch
into the network working with FortiWAN, here is a example:
66 FortiWAN Handbook
Fortinet Technologies Inc.
Aggregated, Redundant, VLAN Ports and Port Mapping Configuring Network Interface (Network Setting)
FortiWAN's Port 1 is connected with the VLAN switch, and appropriate VLAN settings have been configured on
the VLAN switch. Now, it requires to have VLAN tagging configured on FortiWAN to get the VLAN deployment
workable. The steps are:
1. In the VLAN and Port Mapping table, click the Add button in the VLAN Tag field of Port 1 to create a new VLAN
tag. A VLAN tag input will then available to replace the original string "no VLAN Tag".
2. Enter the VLAN tag into the input field to define a VLAN to Port1.
3. This VLAN tage can be edited, deleted, moved up/down by buttons aside it.
4. Map the VLAN tag to WAN, LAN or DMZ in Mapping column.
5. Define the next VLAN to Port1 by the same processes.
102 WAN
103 LAN
104 DMZ
After the configuration is applied, FortiWAN's port 1 will no longer accept untagged VLAN packets. Through the
VLAN switch, both Port 1.101 and port 1.102 are connected with a WAN link (Port 1.101 and Port 1.102 will be
listed in the WAN Port pull-down menu for WAN Setting), while port 1.103 is connected the LAN subnet
(Port 1.103 will be listed in the LAN Port pull-down menu for Private LAN Subnet setting) and port
1.104 is connected with the DMZ subnet (Port 1.104 will be listed in the DMZ Port pull-down menu for
DMZ Setting). You can also define VLAN tags to an aggregated port from the table (it requires to create an
aggregated port first for defining VLAN tags to it).
Note: This field (VRID) is only available when VRRP mode is enabled in LAN Private Subnet settings. The VRID
indicates the virtual router identifier for every VR.
FortiWAN Handbook 67
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Aggregated, Redundant, VLAN Ports and Port Mapping
Label Name of the logical redundant LAN/DMZ port. Only the ASCII characters “0-
9 a-z A-Z” are acceptable for a label and the first character must be non-
numeric. After applying the settings, the specified label, in the format
Bridge: label name, will become one of the port options in corresponding
pull-down menus used for configurations of LAN setting (see LAN Private
Subnet), DMZ setting (see Configuring your WAN), Auto Routing and
Bandwidth Management (FortiWAN's Auto Routing and Bandwidth
Management support managing outbound traffic by input ports where the
traffic received on, see Auto Routing and Bandwidth Management). All the
configurations refer to the logical redundant port instead of its member
physical ports.
Mapping There are two menus in the Mapping field for selecting the two member-
ports under a LAN/DMZ redundant port. All the physical ports and VLAN tags
mapped to LAN/DMZ in the VLAN and Port Mapping table are listed here
for options. It requires at least two are mapped to LAN/DMZ in VLAN and
Port Mapping first for creating a LAN/DMZ redundant port, or there will be
no items here for options.
Select a LAN/DMZ port from each of the two pull-down menus to add the
member-ports to the redundant port. By default, the first configured
member-port becomes the active one for the redundant port, while the
second one is in hot standby state.
Note that the physical member ports that are redundant to each other must
be equal in port speed and duplex (See "Port Speed/Duplex Settings").
l The two member-ports of a redundant port can be two physical network ports, two VLAN tages, or a pair of one
physical port and a VLAN tag.
l It requires to exactly map two member-ports to LAN or DMZ in VLAN and Port Mapping table before pairing the two
ports to a logical LAN/DMZ redundant port.
l VLAN tags can not be defined to an redundant port.
To configure an redundant LAN port or redundant DMZ port, perform the following steps:
Step 1 Map two ports (two physical port, two VLAN ports, or a pair of one physical port and one VLAN port) to
LAN or DMZ in VLAN and Port Mapping table.
68 FortiWAN Handbook
Fortinet Technologies Inc.
Aggregated, Redundant, VLAN Ports and Port Mapping Configuring Network Interface (Network Setting)
Step 2 Create a new redundant port configuration by clicking the add button on Redundant LAN Port or
Redundant DMZ Port table.
Step 3 Assign the redundant port a name by entering it in Label filed.
Step 4 Select a member-port from each of the two pull-down menus in Mapping field (the ports mapped to LAN
or DMZ in VLAN and Port Mapping table are listed here for options).
Aggregated Port
FortiWAM's port aggregation is implementation of IEEE 802.3ad active mode, which bundles two physical ports
into a single logical aggregated port to provide the aggregated bandwidth of the two physical links. If single point
failure occurs on connectivity of one of the physical member ports under an aggregated port, traffic will be carried
within the remaining port channel. The related parameters of IEEE 802.3ad active mode are sat as follows:
all_slave_active 0 as default
downdelay 0 as default
max_bonds 1 as default
min_links 0 as default
updelay 0 as default
use_carrier 1 as default
FortiWAN Handbook 69
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Aggregated, Redundant, VLAN Ports and Port Mapping
Label Name of the logical aggregated port. Only the ASCII characters “0-9 a-z A-Z”
are acceptable for a label and the first character must be non-numeric. After
entering a label here, this label will be listed in VLAN and Port Mapping
table at the same time so that the logical aggregated port can be mapped to
LAN or DMZ, or have VLAN tags defined on it. After applying the settings,
the specified label will become one of the port options in corresponding pull-
down menus, in the format Bonding: label name, used for configurations
of LAN setting (see LAN Private Subnet), DMZ setting (see Configuring your
WAN), Auto Routing and Bandwidth Management (FortiWAN's Auto Routing
and Bandwidth Management support managing outbound traffic by input
ports where the traffic received on, see Auto Routing and Bandwidth
Management). All the configurations refer to the logical aggregated port
instead of its member physical ports.
Mapping There are two menus in the Mapping field for selecting the two member-
ports under a aggregated port. All the physical ports and VLAN tags mapped
to None in the VLAN and Port Mapping table are listed here for options. It
requires at least two are mapped to None in VLAN and Port Mapping first
for creating an aggregated port, or there will be no items here for options.
Select a port from each of the two pull-down menus to add the member-ports
to the aggregated port. After this, you need to enable the aggregated port by
mapping it to LAN/DMZ or defining VLAN tags on it from VLAN and Port
Mapping table, or the aggregated port is mapped to None by default.
Note that the physical member ports that are aggregated must be equal in
port speed and duplex (See "Port Speed/Duplex Settings").
l The two member-ports of an aggregated port can be two physical network ports, two VLAN tages, or a pair of one
physical port and a VLAN tag.
l A logical aggregated port requires two purposeless member-ports (both are mapped to None in VLAN and Port
Mapping table).
l An aggregated port can only be mapped to a DMZ or LAN port.
l VLAN tags can be defined to an aggregated port.
Step 1 Disable two ports (two physical port, two VLAN ports, or a pair of one physical port and one VLAN port) by
mapping them to None in VLAN and Port Mapping table.
70 FortiWAN Handbook
Fortinet Technologies Inc.
Aggregated, Redundant, VLAN Ports and Port Mapping Configuring Network Interface (Network Setting)
Step 2 Create a new port aggregation configuration by clicking the add button on Aggregated Port table.
Step 3 Assign the aggregated port a name by entering it in Label filed.
Step 4 Select a member-port from each of the two pull-down menus in Mapping field (the disabled ports in VLAN
and Port Mapping table are listed here for options).
Step 5 The label name of the aggregated port will be listed in VLAN and Port Mapping table. Map the logical
aggregated port to LAN or DMZ by selecting it from the pull-down menu in Mapping field. You can also define
VLAN tags to the aggregated port in VLAN Tag field and Mapping field.
Scenarios
As illustrated in the topology below, FortiWAN port1 are mapped to WAN port. Port2 and port3 are paired to a
logical redundant LAN port which is connected to Switch1, port4 and port5 are paired to a logical aggregated
DMZ port which is connected to Switch2.
FortiWAN Handbook 71
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Aggregated, Redundant, VLAN Ports and Port Mapping
Step 1 To configure the settings for the deployment, you need to map Port1, Port2, Port3, Port4 and Port5 to
WAN, LAN, LAN, None and None respectively in VLAN and Port Mapping table.
72 FortiWAN Handbook
Fortinet Technologies Inc.
Aggregated, Redundant, VLAN Ports and Port Mapping Configuring Network Interface (Network Setting)
Step 2 Create a new redundant LAN port labeled lan23 and mapped it to Port2 and Port3 in Redundant LAN Port
table.
Label Mapping
lan23 Port 2
Port 3
Step 3 Create a new aggregated port labeled dmz45 and mapped it to Port4 and Port5 in Aggregated Port table.
Label Mapping
dmz45 Port 4
Port 5
Step 4 Map the created logical aggregated port dmz45 to DMZ in VLAN and Port Mapping table.
After the configurations are applied, labels "Bridge: lan23" and "Bonding: dmz45" will be listed respectively in LAN
Port and DMZ Port pull-down menus of LAN and DMZ subnets settings (see LAN Private Subnet and Configuring
your WAN) for options. Moreover, the two labels will be also listed in Input Port pull-down menu of Auto Routing
and Bandwidth Management (see Auto Routing and Bandwidth Management) for your options.
You can also have the deployment configured in an advanced way. First, if you need the LAN ports being defined
with several VLAN tags and also having them in redundant pairs; second, if you need the aggregated port being
mapped to one LAN and one DMZ by defining it with VLAN tags, the configurations will be the following steps:
FortiWAN Handbook 73
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Aggregated, Redundant, VLAN Ports and Port Mapping
Step 1 To configure the settings for the deployment, you need to define Port2 and Port3 with VLAN tags and map
all of them to LAN in VLAN and Port Mapping table. Leaving Port4 and Port5 being mapped to None as previous.
Port2 01 LAN
02 LAN
Port3 01 LAN
02 LAN
74 FortiWAN Handbook
Fortinet Technologies Inc.
Aggregated, Redundant, VLAN Ports and Port Mapping Configuring Network Interface (Network Setting)
Step 2 Create a new redundant LAN port labeled lan23tag01 and mapped it to Port2.01 and Port3.01 in
Redundant LAN Port table.
Label Mapping
Port 3.01
Step 3 Create another new redundant LAN port labeled lan23tag02 and mapped it to Port2.02 and Port3.02 in
Redundant LAN Port table.
Label Mapping
Port 3.02
Step 4 Create a new aggregated port labeled agg45 and mapped it to Port4 and Port5 in Aggregated Port table.
Label Mapping
agg45 Port 4
Port 5
Step 5 In VLAN and Port Mapping table, map the created logical aggregated port agg45 to a LAN and a DMZ by
defining it with VLAN tags.
Port2 01 LAN
02 LAN
Port3 01 LAN
02 LAN
agg45 01 LAN
02 DMZ
FortiWAN Handbook 75
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
As the previous description, FortiWAN is an intelligent WAN load balancing device providing services to increase
connection efficiency and reliability between the internal and external networks, but basically as an router it is
fundamental to route IP packets among the connected networks. According to different purpose and functionality,
a connected network could be one of the three types: WAN, LAN and DMZ networks. When you configure setting
of a network to a FortiWAN, you are registering the network to the FortiWAN (majorly adding related routing
information about the network to the FortiWAN), so that the FortiWAN can find the path to correctly route packets
destined to the network. Network settings establish the necessary routing rules to FortiWAN so that the
connected WAN, LAN and DMZ networks can communicate to each other. Besides setting routing rules, network
setting requires other necessary information used to guarantee a well-cooperation between the connected
network and FortiWAN. No matter what types those connected networks are, there are some common concepts
among the settings:
Basic subnet: Any subnet connected directly to FortiWAN's network port is called a basic subnet. Setting for a
basic subnet tells FortiWAN the network IP, netmask of the subnet and the connected port, so that FortiWAN is
aware of the network port used to directly deliver the packets destined to the subnet.
Static routing subnet: Any subnet connected directly or indirectly to a FortiWAN's basic subnet is called a static
routing subnet. Setting for a static routing subnet tells FortiWAN the network IP, netmask of the subnet and the
gateway, so that FortiWAN can fine the next hop to forward packets destined to the subnet, although the static
routing subnet does not connect directly to the FortiWAN.
Basically, all the network configurations in WAN Setting (see Configuring your WAN and DMZ), WAN/DMZ
Private Subnet (see WAN/DMZ Private Subnet) and LAN Private Subnet (see LAN Private Subnet) contain
settings of basic subnet and static routing subnet, except IPv4-based bridge-mode WAN links. FortiWAN's basic
subnets and static routing subnets are static routes, therefore, any physical change to deployment of the subnets
requires corresponding modifications to the routing entries. The basic static route is supposed to be suitable for
simple topologies. When you have a large-scale network with complex topologies, dynamic routing would be
much suitable for it. FortiWAN supports RIP (v1 and v2), OSPF and VRRP on its LAN ports.
76 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
Auto addressing
FortiWAN supports auto addressing on each of the WAN, LAN and DMZ ports, so that hosts in any of the
connected basic subnet can be automatically assigned IP addresses and relative information. FortiWAN provides
the addressing mechanisms including DHCP, DHCP relay, DHCPv6 and SLAAC (see Automatic addressing within
a basic subnet).
FortiWAN Handbook 77
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Internet. FortiWAN's DMZ is designed to be associated with a WAN link, therefore, configuration of a DMZ must
be included in a WAN link.
Compared with a LAN network, there are more concerns need to be taken care of for a WAN link and its DMZ.
Besides port mapping for the WAN ports on a FortiWAN, you need to decide the WAN types and the subsequent
subnet deployments for a WAN link as well. Generally, ISP provides a connectivity in various ways. Here is a table
telling what you will have from ISP for a connectivity in different types:
FortiWAN supports WAN links in both routing mode and bridge mode (See WAN types: Routing mode and Bridge
mode).
Since ISP provides the available IP addresses in different ways for the above Internet connectivity, FortiWAN has
equal mechanisms to identify the near WAN areas and define the static route. Before continuing on the topic, let
us review what a near WAN is to FortiWAN first. As previous descriptions, FortiWAN defines the area that is
between a FortiWAN's WAN port and the ISP's modem as a near WAN of the WAN link. Individual IP addresses,
segments and subnets deployed within this area are considered the near WAN of a WAN link. Opposite to the
WAN area (the Internet), although near WAN is located on the WAN side, it can be considered as a part of your
network site, just like the LAN and DMZ areas. Within the network site, FortiWAN delivers packets among the
near WAN, DMZ and LAN according to the static routes. Services of load balancing, fail-over, traffic shaping and
statistics (Auto Routing, Bandwidth Management and NAT) will not be applied to those packets. Only packets
that are destined to somewhere not defined in the routing table (the traffic communicating with hosts out of the
site) will be handled by Bandwidth Management, Auto Routing and NAT, and forwarded to the gateway (the
Internet). Note that traffic within near WAN and traffic communicating with near WAN will not be counted in
outbound and inbound traffic of the WAN link, but they do occupy part of bandwidth of the WAN link. You should
be careful about usage of your near WAN. A lot of near WAN traffic impacts on FortiWAN's WAN load-balancing
and traffic shaping.
Configurations of WAN links are mainly about setting the static routing information to FortiWAN for the near WAN
(and DMZ). Comparing with a LAN, setting the static route for near WAN and DMZ of a WAN link is more complex
78 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
and variable. According to the distinguishing characteristics of different WAN types, FortiWAN identifies the near
WAN and DMZ areas of a WAN link in different ways. Configuring a WAN link as a unsuitable type on FortiWAN
will result in a mistake for near WAN identification; miscalculation and misjudgment then happen when
performing traffic statistics, traffic shaping and load-balancing. The followings are the mechanisms FortiWAN
uses for different WAN types:
Routing-mode WAN link l It requires at least one IPv4 network being configured for a IPv4-based Internet
connectivity, or a pair of IPv4 and IPv6 networks for a dual-stack connectivity.
l Any IP address of the network is considered either in near WAN or DMZ (except
the IP used by localhost).
l The whole IPv4/IPv6 network (indicated by the specified netmask) is considered
belonging to your site, either in form of a near WAN or a combination of near
WAN and DMZ.
l A near WAN is considered an IPv4/IPv6 network and the gateway of the WAN
link is counted in the near WAN.
l Traffic that matches routing entries of the network will bypass Bandwidth
Management and Auto Routing. If a bridge-mode Internet connectivity is
incorrectly configured as a routing-mode WAN link on FortiWAN, all the IP
addresses of the network (usually a large-scale network such as a class C) will
be considered belonging to your site. However, the problem is that most of the
IP addresses do not actually belong to your site (they are outside of your site,
over the Internet); WAN load-balancing, fail-over and traffic shaping should not
be bypassed for those traffic.
Bridge-mode WAN link with l It requires exactly specifying the individual IPv4/IPv6 address or IPv4/IPv6
multiple static IP ranges to deploy near WAN and/or DMZ for a IPv4-based or dual-stack WAN
link.
l Only the specified IPv4/IPv6 addresses are considered belonging to your site
(located in near WAN or DMZ). Unspecified IP addresses are considered the
outside of your site, belonging to the Internet.
l A near WAN is considered a segment of an IPv4/IPv6 network. The gateway of
the WAN link will not be count in the near WAN.
l Incorrectly configuring a routing-mode Internet connectivity as a bridge-mode
WAN link on FortiWAN will result in abnormal behaviors to traffic
communicating with the gateway and unspecified IP addresses.
Bridge-mode WAN link with l Near WAN and DMZ are not supported for this WAN type on FortiWAN.
one static IP l Only the IPv6/IPv4 address assigned to localhost of the WAN link is considered
PPPoE bridge-mode WAN link belonging to your site. All the other IP addresses (including the gateway) within
the same network (indicated by the specified netmask) are considered the
DHCP bridge-mode WAN link outside of your site.
l Incorrectly configuring a routing-mode Internet connectivity as a bridge-mode
WAN link on FortiWAN will result in abnormal behaviors to traffic
communicating with the gateway and unspecified IP addresses.
FortiWAN Handbook 79
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
You have to figure out the type of your link, so that you can correctly configure it to FortiWAN. The netmask and
number of IP addresses indicate whether you have an complete IP subnet (routing mode) or just some IP
addresses of a large-scale subnet (bridge mode). If you have ISP links belonging to Routing Mode and Bridge
Mode: Multiple Static IP, you will have more than one IP address to use. The localhost of a WAN port will require
one IP address, and the rest of the IP addresses are available to hosts connected to the WAN port and a DMZ
port. Deploying IP addresses to WAN and DMZ are so that included in configurations of Routing Mode and
Bridge Mode: Multiple Static IP. As for links belonging to Bridge Mode: One Static IP, Bridge Mode: PPPoE and
Bridge Mode: DHCP Client, the only IP address must be used by the localhost of the WAN port and there will be
no more IP addresses available to other hosts in WAN and DMZ.
[WAN Settings] is the major part to deploy FortiWAN in various types of WAN links. If your network has several
WAN links, you have to configure one after another. Select any link from [WAN link] and check [Enable] to start a
configuration of the WAN connection (See "WAN link and WAN port"). A configuration of WAN link is divided into
three parts: Basic Settings, Basic Subnet and Static Routing Subnet. Before starting configuration, here are
several important concepts you should know.
Configuration of a WAN link, no matter what the WAN type it is, contains the following parts:
Basic setting
The basic setting will require you to set the maximum upload/download bandwidth of a WAN link,
upload/download threshold and the MTU for transmission between FortiWAN and ISP's network. These settings
are necessary for FortiWAN Bandwidth Management (see Bandwidth Management), Auto Routing (see Auto
Routing) and Multihoming (Multihoming) refer to process the real WAN traffic that is between FortiWAN and the
Internet (traffic between FortiWAN and its near WAN is not included).
For bridge-mode WAN links, the basic setting also contains extra fields:
80 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
Allocating the one IPv4/IPv6 address to localhost of the WAN port, and arrange others to network segments in
WAN and/or DMZ if necessary. Opposite to routing-mode WAN links, ISP provides you a range of IP addresses of
a large-scale network for the bridge-mode WAN link, not a network subnet. These IP addresses can be deployed
in WAN and/or DMZ, and the corresponding static roue will be established as well, but it is just not a basic subnet
(in routing-mode, IP addresses of a WAN link in WAN and/or DMZ are treated as )
FortiWAN Handbook 81
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Configuration for near WAN In Basic Subnet and Static Routing In Basic Setting
and/or DMZ Subnet
WAN Link Select the WAN link that you are configuring to FortiWAN from the drop-down menu.
Depending on the model, FortiWAN supports up to 25 or 50 WAN links. All the WAN links
are numbered from 1 to 25 or 50, such as WAN link 1, WAN link 2, ... and WAN link 50.
Each number indicates a WAN link. The number is nothing about the WAN port that the
WAN link is installed to. For example, you can install WAN link 1 to WAN Port 3, or WAN
link 3 to WAN Port 1.
Number of WAN links that a FortiWAN supports is always more than its physical network
port. For example, FortiWAN 200B supports 25 WAN links, but 5 physical network ports
are provided only. You will need to create VLAN ports on FortiWAN's ports to install more
than 4 WAN links.
Enable Check/uncheck to enable/disable the WAN link. Enabling/disabling of a WAN link does not
represent the connectivity status of the WAN link. Connectivity statuses of the enabled WAN
links will be listed in in WAN Link State panel on Web UI page System > Summary.
Note Text descriptions for the WAN link. You can see the notes of the enabled WAN link in WAN
Link State panel on Web UI page System > Summary.
82 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
WAN Type
The first step to start a WAN link configuration is deciding the WAN type (See "WAN types: Routing mode and
Bridge mode"). Configuration varies on [WAN Type] in [Basic Settings]. The [WAN Type] could be one of:
See also
Basic Setting
Besides the WAN Type, the rest setting fields of Basic Setting of a routing-mode WAN link are as followings:
WAN Port A FortiWAN's network port used to connect the WAN link with the FortiWAN (you
need to physically install the network cable to this port for the WAN link). All the
physical and VLAN ports that are mapped to WAN (see Aggregated, Redundant,
VLAN Ports and Port Mapping) are listed here for your options. The WAN link
field is unrelated to the WAN port. For example, you can install WAN link 1 to
WAN Port3, or WAN link 3 to WAN Port 1. (See WAN link and WAN port).
FortiWAN Handbook 83
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Down/Up Stream The WAN link's transfer speed at which you can download/upload data from/to
the Internet. Please input the value in Kbps, e.g. 10240Kbps/640Kbps.
FortiWAN Bandwidth Management's default inbound and outbound classes use
the two values actively to limit the download and upload rates on the WAN link
(see Bandwidth Management).
Down/Up Stream Threshold Specify upstream/downstream (Kbps) threshold to the WAN link. WAN links
with traffic exceeding the thresholds will be considered as failed.
FortiWAN’s Auto Routing and Multihoming will ignore the WAN links failed
by exceeding traffic while distributing traffic over WAN links, if the
Threshold function is enabled in their load-balancing policies (See
Outbound Load Balancing and Failover (Auto Routing) and Inbound Load
Balancing and Failover (Multihoming)).
Leave it blank or zero if you do not apply threshold to the WAN link.
MTU (Maximum Transmission unit) refers to the size of the largest packet or frame
that a given layer of a communications protocol can pass onwards on the WAN
port. It allows dividing the packet into pieces, each small enough to pass over a
single link. It is set to 1500 by default.
IPv4 Gateway IPv4 address of the default gateway of the WAN link. This field is mandatory.
IPv6 Gateway IPv6 address of the default gateway of the WAN link. This field is optional.
Ignore it for IPv4-based links or configure it for IPv4/IPv6 dual stack links.
Applying network settings involving changes related to MTU of a network interface will
restart the interface and disrupt established connections.
A routing-mode WAN link is attached with an IP network which should be deployed as a basic subnet to the WAN
link. Since localhost of the WAN port is a part of the subnet, at least one basic subnet is necessary for configuring
a routing-mode WAN link. For the reason, IP(s) on Localhost and Netmask fields of a routing-mode WAN link are
contained in configuration of Basic Subnet, rather than Basic Setting.
l Subnet in WAN: A subnet deployed in WAN. This type requires at least one IP for localhost of the WAN port, and
the rest of the subnet can be used for hosts in WAN (near WAN).
84 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
l Subnet in DMZ: A subnet deployed in DMZ. This type requires at least one IP for localhost of the DMZ port, and
the rest of the subnet can be used for hosts in DMZ.
l Subnet in WAN and DMZ: A subnet deployed in two segments, WAN and DMZ. Proxy ARP combines the two
segments into a logic segment for the IP subnet (see ). Proxy ARP logically combines the specified WAN port and
DMZ port into a logical port. This type requires at least one IP for localhost of the WAN port, and the rest of the
subnet can be used for hosts in WAN (near WAN) and DMZ.
l Subnet on Localhost: A subnet deployed on the localhost of a WAN port (This is not supported for IPv6 basci
subnets). All the IP addresses of the subnet will be deployed on the WAN port.
A subnet in WAN and DMZ might be the most practical deployment for a routing-mode WAN link. If the ISP
provides only one network with your IPv4 WAN link (this is the most general case for a routing-mode link), you can
deploy it as any of the subnet types but a subnet in DMZ. Remember, at least one IP address must be assigned
to localhost of a WAN port for the IPv4 link, therefore, at least one subnet must be associated with the WAN port.
If you get more than one network from the ISP with the IPv4 link, you still have to deploy at least one of them as a
subnet in WAN, a subnet in WAN and DMZ or a subnet on localhost, but there is not limitation to the rest
networks. Briefly, if you are given only one network for the WAN link, you can not deploy it as a subnet in DMZ. As
for configuring a dual stack link, similarly, it requires at least one IPv4 network and one IPv6 network get deployed
individually as a subnet in WAN, a subnet in WAN and DMZ or a subnet on localhost. Next comes the
configuration of basic subnet for each type:
Click the add button on the IPv4 Basic Subnet panel or IPv6 Basic Subnet panel to add a configuration, and select
Subnet in WAN from the Subnet Type drop-down menu. The rest configuration fields to deploy a IPv4/IPv6
network as a subnet in WAN are as followings:
IP(s) on Localhost The IP address(es) that you want to assign to localhost of the specified WAN
port (the WAN port that is specified in Basic Setting panel) for the WAN link. At
least one IP address is required here. You can type a range of IP addresses
here in format "IPstart-IPend" or click the add button to individually add more IP
addresses to the localhost.
Note that the rest IP addresses of the network that are not assigned to the
localhost here will be automatically considered as being located in WAN area.
Netmask/Prefix Length Netmask/Prefix Length of the IPv4/IPv6 network that you are deploying to the WAN
link as a subnet in WAN.
This topology is frequently used for where cluster hosts being deployed in WAN.
FortiWAN Handbook 85
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
In the this diagram, we have a WAN link attached with a given network that netmask is 255.255.255.248,
gateway is 203.69.118.9 and the available IP addresses are 203.69.118.10 – 203.69.118.14. The WAN link is
connected to FortiWAN's Port2 (mapped to a WAN port) with IP address 203.69.118.10 being assigned to the
localhost. In this case, FortiWAN will consider that the rest IP addresses 203.69.118.11 – 203.69.118.14 are
located in the WAN area (actually, the near WAN) of the WAN link. The following is the configuration for this case:
Basic Setting
86 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
Netmask 255.255.255.248
Configuration of the settings implies a route to FortiWAN that any packet destined to 203.69.118.9 –
203.69.118.14 will be directly forwarded through this WAN port, without Auto Routing and Bandwidth
Management processes. In this case, subnet 203.69.118.8/29 (203.69.118.9 – 203.69.118.14) is the near WAN
of the link.
Click the add button on the IPv4 Basic Subnet panel or IPv6 Basic Subnet panel to add a configuration, and select
Subnet in DMZ from the Subnet Type drop-down menu. The rest configuration fields are as followings:
IP(s) on Localhost The IP address(es) of the IPv4/IPv6 network that you want to assign to
localhost of the specified DMZ port (the DMZ port that is specified below) of
the WAN link. At least one IP address is required here. You can type a range of
IP addresses here in format "IPstart-IPend" or click the add button to
individually add more IP addresses to the localhost.
Note that the rest IP addresses of the network that are not assigned to the
localhost here will be automatically considered as being located in DMZ area.
Netmask/Prefix Length Netmask/Prefix Length of the IPv4/IPv6 network that is being deployed as a subnet
in DMZ and associated with the WAN link.
DMZ Port A FortiWAN's network port used to connect a subnet of the WAN link with the
FortiWAN as a DMZ subnet (you need to physically install the network cable to this
port for the DMZ subnet). All the physical, logical and VLAN ports that are mapped
to DMZ (see Aggregated, Redundant, VLAN Ports and Port Mapping) are listed here
for your options.
Enable DHCP/DHCP Click to enable automatic addressing on the specified DMZ port for hosts in the
Relay/SLAAC/DHCPv6 connected IPv4/IPv6 DMZ subnet (see Automatic addressing within a basic
Service subnet for configuration details).
Note that only the IP addresses of the IPv4/IPv6 basic subnet defined here are
the candidates for related IP pools of automatic addressing.
This topology is frequently used for where a cluster of hosts being deployed in DMZ. The following example for a
subnet in DMZ is based on the above example that a WAN link with a subnet being deployed in WAN. Please click
the [+] button on IPv4/IPv6 Basic Subnet panel to add a subnet to the WAN link. Remember a subnet in DMZ
must coexist with a subnet in WAN, a subnet in WAN and DMZ or a subnet on localhost.
FortiWAN Handbook 87
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
As described in the topology, since the cluster of hosts are deployed in DMZ. FortiWAN port5 has to be mapped
to DMZ with IP address 140.112.8.9. Thus the hosts in the subnet take the default gateway as 140.112.8.9. In
this case, IP addresses 203.69.118.9 – 203.69.118.14 are treated as in near WAN, while IP addresses
140.112.8.9 – 140.112.8.14 in DMZ do not belong to near WAN. Check [Enable DHCP] if hosts in the subnet in
DMZ require DHCP service. And enter the starting and ending address in [DHCP Range]. If any host in the subnet
uses static IP address, then in [Static Mapping], enter its IP and MAC address. Similarly, if ISP provides another
LAN IPv6 subnet, you can deploy it in DMZ. The SLAAC and DHCPv6 in FortiWAN are designed to work together,
which SLAAC responses router advertisement (including default gateway and DNS server) to a host and DHCPv6
responses the host an appropriate IPv6 address. Note: FortiWAN assumes that IP addresses that are unlisted in
[IP(s) on Localhost] can be used for hosts in the subnet.
In the this diagram, we have another network that ISP provides to the WAN link, which the netmask is
255.255.255.248, gateway is 140.112.8.9 and the available IP addresses are 140.112.8.10 – 140.112.8.14. This
network is connected to FortiWAN's Port5 (mapped to a DMZ port) with IP address 203.69.118.10 being assigned
88 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
to the localhost. In this case, FortiWAN will consider that the rest IP addresses 203.69.118.11 – 203.69.118.14
are located in the WAN area (actually, the near WAN) of the WAN link. The following is the configuration for this
case:
Basic Setting
Netmask 255.255.255.248
Netmask 255.255.255.248
For the details about DHCP, DHCP Relay, SLAAC and DHCPv6, see "Automatic addressing within a basic
subnet".
Click the add button on the IPv4 Basic Subnet panel or IPv6 Basic Subnet panel to add a configuration, and select
Subnet in WAN and DMZ from the Subnet Type drop-down menu. The rest configuration fields are as
followings:
IP(s) on Localhost The IP address(es) of the IPv4/IPv6 network that you want to assign to
localhost of the specified WAN port (the WAN port that is specified in Basic
Setting panel) and DMZ port (the DMZ port that is specified below) of the WAN
link. The WAN port and DMZ port will be logically combined for Public IP Pass-
through. At least one IP address is required here. You can type a range of IP
addresses here in format "IPstart-IPend" or click the add button to individually
add more IP addresses to the localhost.
FortiWAN Handbook 89
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
IP(s) in WAN The IP address(es) of the IPv4/IPv6 network that you want to assign to the
WAN area (near WAN) of the WAN link. You can leave it blank, type one IP
address or a range of IP addresses (in format "IPstart-IPend" ) here. You can
also click the add button to individually add more IP addresses to the near
WAN.
Note that the rest IP address(es) of the network that are not assigned to the
localhost (above) and WAN (here) will be automatically considered as being
located in DMZ. Therefore, no matter how you deploy IP addresses in WAN
area, at least one IP address, IP address of gateway of the WAN link (what you
set in Basic Setting for IPv4 Gateway and/or IPv6 Gateway), must be
contained in this field.
Netmask/Prefix Length Netmask/Prefix Length of the IPv4/IPv6 network that you are deploying to the WAN
link as a subnet in WAN.
DMZ Port A FortiWAN's network port used to connect a part of the subnet to the WAN link as
segment in DMZ (you need to physically install the network cable to this port for the
DMZ subnet). All the physical, logical and VLAN ports that are mapped to DMZ (see
Aggregated, Redundant, VLAN Ports and Port Mapping) are listed here for your
options.
Enable DHCP/DHCP Click to enable automatic addressing on the specified DMZ port for hosts in the
Relay/SLAAC/DHCPv6 connected IPv4/IPv6 DMZ segment (see Automatic addressing within a basic
Service subnet for configuration details).
Note that only the IP addresses assigned to the DMZ part of the defined basic
subnet are the candidates for related IP pools of automatic addressing.
This topology is frequently found where a cluster of hosts in one subnet are deployed in both WAN side and DMZ
side.
90 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
As described in the topology, port2 and port5 are connected in dotted line, indicating an IP range in the same
subnet 203.69.118.8/29 spreads across WAN (port2) and DMZ (port5). FortiWAN employs Proxy ARP to connect
those hosts becoming in the same network segment (See "Public IP pass through (DMZ Transparent Mode)").
Note that although IP address 203.69.118.9 has been configured as default gateway in Basic Setting table, you
are still required to add it in the field [IP(s) in WAN]. When you select [Subnet in WAN and DMZ] from [Subnet
Type], FortiWAN will assume the IP addresses that are unlisted in [IP(s) on Localhost] and [IP(s) in WAN] are all
in DMZ. Thus, in this example, except 203.69.118.10, 203.69.118.9 and 203.69.118.11-203.69.118.12, the rest
IP addresses of subnet 203.69.118.8/29 are assigned to DMZ for Public IP Pass-through. In this case, IP
addresses 203.69.118.9 – 203.69.118.12 in WAN side are treated as in near WAN, while IP addresses
203.69.118.13 – 203.69.118.14 in DMZ side do not belong to near WAN.
Check [Enable DHCP] if hosts in the subnet in DMZ require DHCP service. And enter the starting and ending
address in [DHCP Range]. If any host in the subnet uses static IP address, then in [Static Mapping], enter its IP
and MAC address. Similarly, the configuration to deploy an IPv6 public subnet in WAN and DMZ.
FortiWAN Handbook 91
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Basic Setting
Netmask 255.255.255.248
For the details about DHCP, DHCP Relay, SLAAC and DHCPv6, see "Automatic addressing within a basic
subnet".
Click the add button on the IPv4 Basic Subnet panel (this subnet type is not supported for IPv6 basic subnets) to
add a configuration, and select Subnet on Localhost from the Subnet Type drop-down menu. The rest
configuration fields are as followings:
Network IP The network IP of the subnet that you want to assign to localhost of the
specified WAN port (the WAN port that is specified in Basic Setting panel).
Netmask Netmask of the IPv4 subnet that you are deploying to the WAN link as a subnet
on localhost.
This topology is found where subnet is designated on FortiWAN to better use Virtual Server.
92 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
This deployment is much simpler than other subnet types. Except the gateway, all the IP addresses of the subnet
are assigned to the WAN port of the WAN link; there is no IP addresses available for deployment in WAN and/or
DMZ areas. All of the IP addresses will indicate the associated WAN link to services NAT, Multihoming and
Virtual Server. For this example, the configuration just requires 203.69.118.8 and 255.255.255.248 being entered
in [Network IP] and [Netmask] respectively.
Basic Setting
Network IP 203.69.118.8
Netmask 255.255.255.248
FortiWAN Handbook 93
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Note that, for all of the subnet types described above, the IP addresses (IPv4 or IPv6) specified to field [IP(s) on
Localhost] can be used for NAT to transfer the source IP address of packets to. The first IP address on the list of
[IP(s) on Localhost] will be used for the NAT default rules of the WAN link. System generates NAT default rules
automatically for a WAN link so that a host with private IP address in LAN can access Internet without setting
NAT rules manually. For FortiWAN V4.0.x, system does not generate NAT default rules for IPv6 WAN
links, setting NAT rules manually is required (See "NAT").
l Subnet in WAN: A static routing subnet deployed in WAN, connected to a basic subnet in WAN or basic subnet in
WAN and DMZ.
l Subnet in DMZ: A static routing subnet deployed in DMZ, connected to a basic subnet in DMZ or basic subnet in
WAN and DMZ.
Next comes a few examples to further illustrate configurations in [Basic Subnet] and [Static Routing Subnet].
Click the add button on the IPv4 Static Routing Subnet panel or IPv6 Static Routing Subnet panel to add a
configuration, and select Subnet in WAN from the Subnet Type drop-down menu. The rest configuration fields
are as followings:
Network IP The network IP of the IPv4 static routing subnet that you want to deploy in (near)
WAN area of the WAN link. This field is in IPv4 Static Routing Subnet panel.
Netmask Netmask of the IPv4 static routing subnet that you want to deploy in (near) WAN
area of the WAN link. This field is in IPv4 Static Routing Subnet panel.
Subnet The IPv6 static routing subnet that you want to deploy in (near) WAN area of the
WAN link in format such as 2000::123f:0:0:1/32. This field is in IPv6 Static Routing
Subnet panel.
Gateway IPv4/IPv6 address of the gateway (router) connecting a basic subnet with the static
routing subnet. This IP address is the path that FortiWAN uses to forward packets
destined to the static routing subnet to. This field is in both IPv4 and IPv6 Static
Routing Subnet panels.
Proxy ARP Check to enable Proxy ARP on FortiWAN for the static routing subnet; FortiWAN will
answer the ARP queries for a network address that is in the static routing subnet. This
field is in IPv4 Static Routing Subnet panel.
This topology is rarely seen in actual network where static routing subnet is located on the WAN. In other words,
the subnet in WAN does not connect to FortiWAN directly, but needs a router instead to transfer packets. In this
94 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
example, a subnet 202.3.1.8/29 located on the WAN connects to the basic subnet 203.69.118.8/29 via a router
(202.3.1.9 and 203.69.118.10). Subnet 202.3.1.8/29 is so that a static routing subnet of the WAN link.
Configuration of the static routing subnet indicates the route to FortiWAN for packets destined to subnet
202.3.1.8/29.
As described in the UI, FortiWAN transfers packets to the gateway 203.69.118.10 to deliver them to subnet
202.3.1.8/255.255.255.248.
Basic Setting
FortiWAN Handbook 95
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Netmask 255.255.255.248
Network IP 202.3.1.8
Netmask 255.255.255.248
Gateway 203.69.118.10
Click the add button on the IPv4 Static Routing Subnet panel or IPv6 Static Routing Subnet panel to add a
configuration, and select Subnet in DMZ from the Subnet Type drop-down menu. The rest configuration fields
are as followings:
Network IP The network IP of the IPv4 static routing subnet that you want to deploy in DMZ
area of the WAN link. This field is in IPv4 Static Routing Subnet panel.
Netmask Netmask of the IPv4 static routing subnet that you want to deploy in DMZ area
of the WAN link. This field is in IPv4 Static Routing Subnet panel.
Subnet The IPv6 static routing subnet that you want to deploy in DMZ area of the WAN link in
format such as 2000::123f:0:0:1/32. This field is in IPv6 Static Routing Subnet panel.
Gateway IPv4/IPv6 address of the gateway (router) connecting a basic subnet with the static
routing subnet. This IP address is the path that FortiWAN uses to forward packets
destined to the static routing subnet to. This field is in both IPv4 and IPv6 Static
Routing Subnet panels.
Proxy ARP Check to enable Proxy ARP on FortiWAN for the static routing subnet; FortiWAN will
answer the ARP queries for a network address that is in the static routing subnet. This
field is in IPv4 Static Routing Subnet panel.
This topology is very similar with the Static Routing Subnet: Subnet in WAN in last example. The only difference
is, the subnet is in DMZ area.
96 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
As described in the UI, FortiWAN transfers packets to the gateway 203.69.118.14 to deliver them to subnet
139.3.1.8/255.255.255.248
Basic Setting
FortiWAN Handbook 97
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
Netmask 255.255.255.248
Network IP 202.3.1.8
Netmask 255.255.255.248
Gateway 203.69.118.14
See also
98 FortiWAN Handbook
Fortinet Technologies Inc.
Configuring networks to FortiWAN Configuring Network Interface (Network Setting)
Basic Setting
Besides the WAN Type, the rest setting fields of Basic Setting of a multiple-static-IP bridge-mode WAN link are as
followings:
WAN Port A FortiWAN's network port used to connect the WAN link with the FortiWAN (you
need to physically install the network cable to this port for the WAN link). All the
physical and VLAN ports that are mapped to WAN (see Aggregated, Redundant,
VLAN Ports and Port Mapping) are listed here for your options. The WAN link
field is unrelated to the WAN port. For example, you can install WAN link 1 to
WAN Port3, or WAN link 3 to WAN Port 1. (See WAN link and WAN port).
Up/Down Stream The WAN link's transfer speed at which you can download/upload data from/to
the Internet. Please input the value in Kbps, e.g. 10240Kbps/640Kbps. FortiWAN
Bandwidth Management's default inbound and outbound classes use the two
values actively to limit the download and upload rates on the WAN link (see
Bandwidth Management).
Up/Down Stream Threshold Specify upstream/downstream (Kbps) threshold to the WAN link. WAN links
with traffic exceeding the thresholds will be considered as failed.
FortiWAN’s Auto Routing and Multihoming will ignore the WAN links failed
by exceeding traffic while distributing traffic over WAN links, if the Threshold
function is enabled in their load-balancing policies (See Outbound Load
Balancing and Failover (Auto Routing) and Inbound Load Balancing and
Failover (Multihoming)).
Leave it blank or zero if you do not apply threshold to the WAN link.
MTU (Maximum Transmission unit) refers to the size of the largest packet or frame
that a given layer of a communications protocol can pass onwards on the WAN
port. It allows dividing the packet into pieces, each small enough to pass over a
single link. It is set to 1500 by default.
IPv4 IP(s) on Localhost The IPv4 addresses that are deployed on localhost (See "Scenarios to deploy
subnets"). IP addresses specified here can be used for NAT to transfer the source
IP address of packets to. The first IP address listed here will be used to generate
the NAT default rules of the WAN link (See "NAT").
IPv4 IP(s) in WAN The IPv4 addresses that are deployed in WAN.
IPv4 IP(s) in DMZ The IPv4 addresses that are deployed in DMZ.
Different from configuration of Routing mode's basic subnets, it requires exactly specifying IPs to fields IP(s) in WAN
and IP(s) in DMZ for a Bridge mode WAN link if you want to deploy those IP addresses in the WAN and DMZ areas.
FortiWAN would not automatically classifies the rest IPs of a subnet as IPs in WAN or IPs in DMZ for bridge-mode
WAN links (FortiWAN does it for a routing-mode WAN link), since the bridge mode is supposed to work with certain
IPs of a large-scale network (see WAN types: Routing mode and Bridge mode) and FortiWAN is not aware of what
the IPs are that an ISP provides you for the WAN link (the remaining IPs of the large-scale subnet are not valid to be
deployed in your network).
FortiWAN Handbook 99
Fortinet Technologies Inc.
Configuring Network Interface (Network Setting) Configuring networks to FortiWAN
IPv6 IP(s) on Localhost The IPv6 addresses that are deployed on localhost (See "Scenarios to deploy
subnets"). IP addresses specified here can be used for NAT to transfer the source
IP address of packets to. The first IP address listed here will be used to generate
the NAT default rules of the WAN link. For FortiWAN V4.0.x, system does
not generate NAT default rules for IPv6 WAN links, setting NAT rules
manually is required (See "NAT").
IPv6 IP(s) in WAN The IPv6 addresses that are deployed in WAN.
IPv6 IP(s) in DMZ The IPv6 addresses that are deployed in DMZ.
DMZ Port The network port of FortiWAN used to connect the DMZ area. All the physical
and logical ports that are mapped to DMZ (see Configurations for VLAN and Port
Mapping) are listed here for options. Hosts deployed in the DMZ are required to
connected to this port. Public IP pass-through (see Public IP Pass-through) is
supported to combine the selected WAN port and DMZ port.
Enable DHCP/DHCP Click to enable automatic addressing on the specified DMZ port for hosts in
Relay/SLAAC/DHCPv6 the connected IPv4/IPv6 DMZ segment (see Automatic addressing within a
Service
basic subnet for configuration details).
Note that only the IP addresses defined in fields IPv4 IP(s) in DMZ and
IPv6 IP(s) in DMZ are the candidates for related IP pools of automatic
addressing.
Applying network settings involving changes related to MTU of a network interface will
restart the interface and disrupt established connections.
The SLAAC and DHCPv6 in FortiWAN are designed to work together, which the SLAAC responses router
advertisement (including default gateway and DNS server) to a host and DHCPv6 responses the host an
appropriate IPv6 address.
This topology can be seen where a group of valid IP addresses ranging 211.21.40.32~211.21.40.34 have been
given by ISP and assigned to port1 on FortiWAN. And their default gateway is 211.21.40.254 given by ISP as
well. If there are other hosts deployed on the WAN, then configure their IP addresses in [IP(s) in WAN]. And if
there are hosts deployed on the DMZ, then configure their IP addresses in [IP(s) in DMZ].
Basic Setting
This is the only type that FortiWAN provides for basic subnets of a bridge-mode WAN link. Click the add button on
the IPv6 Basic Subnet panel to add a configuration, and select Subnet in DMZ from the Subnet Type drop-down
menu. The rest configuration fields are as followings:
IP(s) on Localhost The IP address(es) of the IPv6 network that you want to assign to localhost of
the specified DMZ port (the DMZ port that is specified below) of the WAN link.
At least one IP address is required here. You can type a range of IP addresses
here in format "IPstart-IPend" or click the add button to individually add more IP
addresses to the localhost.
Note that the rest IP addresses of the network that are not assigned to the
localhost here will be automatically considered as being located in DMZ area.
Prefix Length Prefix Length of the IPv6 network that is being deployed as a subnet in DMZ and
associated with the WAN link.
DMZ Port A FortiWAN's network port used to connect a subnet of the WAN link with the
FortiWAN as a DMZ subnet (you need to physically install the network cable to this
port for the DMZ subnet). All the physical, logical and VLAN ports that are mapped to
DMZ (see Aggregated, Redundant, VLAN Ports and Port Mapping) are listed here for
your options.
Enable SLAAC/DHCPv6 Click to enable automatic addressing on the specified DMZ port for hosts in the
Service connected IPv6 DMZ subnet (see Automatic addressing within a basic subnet
for configuration details).
Note that only the IP addresses of the IPv6 basic subnet defined here are the
candidates for related IP pools of automatic addressing.
This is the only type that FortiWAN provides for static routing subnets of a bridge-mode WAN link. Click the add
button on the IPv6 Static Routing Subnet panel to add a configuration, and select Subnet in DMZ from the
Subnet Type drop-down menu. The rest configuration fields are as followings:
Subnet The IPv6 static routing subnet that you want to deploy in DMZ area of the WAN link in
format such as 2000::123f:0:0:1/32.
Gateway IPv6 address of the gateway (router) connecting a basic subnet with the static routing
subnet. This IP address is the path that FortiWAN uses to forward packets destined
to the static routing subnet to.
See also
Basic Setting
Besides the WAN Type, the rest setting fields of Basic Setting of a one-static-IP bridge-mode WAN link are as
followings:
WAN Port A FortiWAN's network port used to connect the WAN link with the FortiWAN (you
need to physically install the network cable to this port for the WAN link). All the
physical and VLAN ports that are mapped to WAN (see Aggregated, Redundant,
VLAN Ports and Port Mapping) are listed here for your options. The WAN link field
is unrelated to the WAN port. For example, you can install WAN link 1 to WAN
Port3, or WAN link 3 to WAN Port 1. (See WAN link and WAN port).
Up/Down Stream The WAN link's transfer speed at which you can download/upload data from/to the
Internet. Please input the value in Kbps, e.g. 10240Kbps/640Kbps. FortiWAN
Bandwidth Management's default inbound and outbound classes use the two
values actively to limit the download and upload rates on the WAN link (see
Bandwidth Management).
Up/Down Stream Threshold Specify upstream/downstream (Kbps) threshold to the WAN link. WAN links
with traffic exceeding the thresholds will be considered as failed.
FortiWAN’s Auto Routing and Multihoming will ignore the WAN links failed by
exceeding traffic while distributing traffic over WAN links, if the Threshold
function is enabled in their load-balancing policies (See Outbound Load
Balancing and Failover (Auto Routing) and Inbound Load Balancing and
Failover (Multihoming)).
Leave it blank or zero if you do not apply threshold to the WAN link.
MTU (Maximum Transmission unit) refers to the size of the largest packet or frame that
a given layer of a communications protocol can pass onwards on the WAN port. It
allows dividing the packet into pieces, each small enough to pass over a single
link. It is set to 1500 by default.
IPv4 Localhost IP The IPv4 address that ISP provides (See "Scenarios to deploy subnets"). IP
addresses specified here can be used for NAT to transfer the source IP address of
packets to, and will be used to generate the NAT default rules of the WAN link
(See "NAT").
IPv6 Localhost IP The IPv6 address that ISP provides (See "Scenarios to deploy subnets"). IP
addresses specified here can be used for NAT to transfer the source IP address of
packets to, and will be used to generate the NAT default rules of the WAN link.
For FortiWAN V4.0.x, system does not generate NAT default rules for
IPv6 WAN links, setting NAT rules manually is required (See "NAT").
Applying network settings involving changes related to MTU of a network interface will
restart the interface and disrupt established connections.
[Bridge Mode: One Static IP] is used when ISP gives one static IPv4 address to a user. Usually, the IPv4 address
a user obtained is one IP address of a C class IPv4 network; it is indicated by the netmask 255.255.255.0. The
default gateway that ISP assigned is located at ISP’s network, while the ATU-R works in bridge mode.
FortiWAN’s Bridge Mode: One Static IP is suggested to apply for this case. IPv6/IPv4 dual static is supported for
FortiWAN’s Bridge Mode: One Static IP. In the dual static similar as previous case, ISP might provide you a WAN
IPv6 subnet and a LAN IPv6 subnet. You can deploy the LAN IPv6 subnet as a basic subnet in DMZ. Although the
deployment is under FortiWAN’s Bridge Mode, FortiWAN routes packets between WAN and DMZ for the IPv6
subnets. Basic subnets are not supported for IPv4 network deployed in Bridge Mode. The following topology is
widely seen where a user gets one static IP from ISP.
See also
Basic Setting
WAN Port The physical port (network interface) on FortiWAN used to connect the WAN link.
For the deployment of multiple WAN links on one WAN port, set this field with the
same value for those WAN links. For example, select Port1 for configurations of
WAN link1, WAN link2 and WAN link3 for deploying the three WAN links on WAN
port1. Note: The port has to be mapped to [WAN] beforehand in [VLAN and Port
Mapping] (See "WAN link and WAN port", "VLAN and port mapping" and
"Configurations for VLAN and Port Mapping").
Up/Down Stream The WAN link's transfer speed at which you can upload/download data to/from the
Internet e.g. 512Kbps.
Up/Down Stream Threshold Specify upstream/downstream (Kbps) threshold for the WAN link. WAN link with
traffic that exceeds the threshold values will be considered as failed. FortiWAN’s
Auto Routing and Multihoming (See "Outbound Load Balancing and Failover
(Auto Routing)" and "Inbound Load Balancing and Failover (Multihoming)") use
the value while balancing traffic between WAN links if the Threshold function is
enabled. Leave it blank or zero if you do not apply threshold to the WAN link.
MTU (Maximum Transmission unit) refers to the size of the largest packet or frame that
a given layer of a communications protocol can pass onwards. It allows dividing
the packet into pieces, each small enough to pass over a single link.
Service Name Fill in service name provided by ISP. Left it blank if ISPs do not require it.
IPv4 Address Fill in the IPv4 address provided by ISP. Left it blank if ISPs do not require it.
Redial Enable Since some ISPs tend to turn off PPPoE connection at a certain schedule,
FortiWAN will automatically re-establish every disconnected PPPoE link when
detected. In order to prevent simultaneous re-connection of multiple links,
different re-connection schedules can be configured for different WAN links to
avoid conjunction. After reconnection schedule is configured (HH:MM), the
system will perform PPPoE reconnection as scheduled daily.
Applying network settings will restart a network interface if this interface is using
PPPoE or DHCP and disrupt established connections.
See also
Basic Setting
WAN Port The physical port (network interface) on FortiWAN used to connect the WAN link.
For the deployment of multiple WAN links on one WAN port, set this field with the
same value for those WAN links. For example, select Port1 for configurations of
WAN link1, WAN link2 and WAN link3 for deploying the three WAN links on WAN
port1. Note: The port has to be mapped to [WAN] beforehand in [VLAN and Port
Mapping]. (See "WAN link and WAN port", "VLAN and port mapping" and
"Configurations for VLAN and Port Mapping")
Up/Down Stream The WAN link's transfer speed at which you can upload/download data to/from the
Internet e.g. 512Kbps
Up/Down Stream Threshold Specify upstream/downstream (Kbps) threshold for the WAN link. WAN link with
traffic that exceeds the threshold values will be considered as failed. FortiWAN’s
Auto Routing and Multihoming (See "Outbound Load Balancing and Failover
(Auto Routing)" and "Inbound Load Balancing and Failover (Multihoming)") use
the value while balancing traffic between WAN links if the Threshold function is
enabled. Leave it blank or zero if you do not apply threshold to the WAN link.
MTU (Maximum Transmission unit) refers to the size of the largest packet or frame that
a given layer of a communications protocol can pass onwards. It allows dividing
the packet into pieces, each small enough to pass over a single link.
Applying network settings will restart a network interface if this interface is using
PPPoE or DHCP and disrupt established connections.
See also
Basic Subnet
Here is a simple example to demonstrate a configuration for the basic subnet in the typical LAN environment.
As the illustration, FortiWAN port3 has been mapped to LAN port via [System / Network Setting / VLAN and Port
Mapping] (See "VLAN and Port Mapping"), and is assigned with private IP 192.168.34.254. Enter this IP address
in the field [IP(s) on Localhost]. For hosts in LAN, port3 (192.168.34.254) serves as gateway as well. Enter the
netmask (255.255.255.0) for the subnet in the field [Netmask]. Select the LAN port.
Netmask 255.255.255.0
Check the field in [Enable DHCP], to allocate IP address (any of 192.168.34.175~192.168.34.199) dynamically
via DHCP to PCs in LAN. If any host in LAN requires static IP addresses, then enter in [Static Mapping] the IP
addresses to designate, and MAC addresses of the PCs as well. Check the field in [NAT Subnet for VS], which is
an optional choice. When users in LAN or DMZ access the WAN IP of virtual server, their packets may bypass
FortiWAN and flow to internal server directly. This function can translate the source IP address of the users'
packets into IP address of FortiWAN, to ensure the packets flow through FortiWAN. If no check is made, the
system will determine which IP address it may translate into by itself. Similarly, to deploy an IPv6 private LAN on
FortiWAN port4 which has been mapped to LAN port, with IPv6 address 2001:a:b:cd08::1 served as gateway for
PCs in LAN. Check the field in [Enable SLAAC] or [Enable DHCPv6 Service] to allocate IP addresses dynamically
to PCs in LAN. [NAT Subnet for VS] is not supported in IPv6 private LAN. The SLAAC and DHCPv6 in FortiWAN
are designed to work together, which the SLAAC responses router advertisement (including default gateway and
DNS server) to a host and DHCPv6 responses the host an appropriate IPv6 address.
For the details about DHCP, DHCP Relay, SLAAC and DHCPv6, see "Automatic addressing within a basic
subnet".
Network IP 192.168.99.0
Netmask 255.255.255.0
Gateway 192.168.34.50
RIP
FortiWAN supports the Routing Information Protocol (RIP v1, v2), RIP employs hot count as the metric, and uses
timer broadcast to update the router. As RIP features configuration simplicity and operation convenience, it has
been widely used across all fields. RIP version 1 (v1)1 was designed to suit the dynamic routing needs of LAN
technology-based IP internetworks, and to address some problems associated with RIP v1, a refined RIP, RIP
version 2 (v2) was defined. RIP v2 supports sending RIP announcements to the IP multicast address and
supports the use of authentication mechanisms to verify the origin of incoming RIP announcements.
Check the field in [RIP] if you have enabled RIP on your private subnet router. Check the field in [RIP v1] if you
have enabled RIP v1 on your private subnet router behind FortiWAN. Thus, FortiWAN can forward packets from
the RIP v1-enabled private subnet. Otherwise, check the field in [RIP v2] if you have enabled RIP v2 on your
private subnet router. Thus, FortiWAN can forward RIP v2 packets. Moreover, if you have enabled RIP v2
authentication, type the password in [Password]. Otherwise, keep [Password] blank.
OSPF
Apart from RIP, FortiWAN also supports OSPF (Open Shortest Path First), to assign LAN port router with given
preference. Like RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of several
Interior Gateway Protocols (IGPs). Rather than simply counting the number of hops, OSPF bases its path
descriptions on "link states" that take into account additional network information. Using OSPF, a host that
obtains a change to a routing table or detects a change in the network immediately multicasts the information to
all other hosts in the network so that all will have the same routing table information.
OSPF Interface Displays the LAN port in the network. Check the box to enable OSPF over the
port.
Area Setting Network is logically divided into a number of areas based on subnets.
Administrators can configure area ID, which accepts numbers or IPs only.
Authentication Setting Routers in different areas require authentication to communicate with each other.
Authentication types: Null, Simple Text Password, MD5.
Router Priority Set router priority. Router that sends the highest OSPF priority becomes DR
(Designated Router). The value of the OSPF Router Priority can be a number
between 0 and 255.
Hello Interval Set the interval, in seconds, to instruct the router to send out OSPF keepalive
packets to inform the other routers.
Dead Interval Set the length of time, in seconds, that OSPF neighbors will wait without
receiving an OSPF keepalive packet from a neighbor before declaring the
neighbor router is down.
Retransmit Interval Set the interval, in seconds, between retransmissions of Link ups. When routers
fail to transmit hello packets, it will retransmit packets in the defined interval.
Authentication Type This specifies whether the router will perform authentication of data passing the
LAN. Choices are: Null, Simple Text Password, MD5.
FortiWAN provides statistics for the RIP & OSPF service, see "RIP & OSPF Status".
VRRP
VRRP is a Virtual Router Redundancy Protocol that runs on a LAN port. A system can switch between VRRP or
HA mode; when switched, the system will reboot first for changes to take effect. When VRRP mode is enabled,
the HA mode will be automatically disabled, and also a VRID field will appear available for input in [VLAN and
Port Mapping] setting page (See "VLAN and Port Mapping"). In general, VRRP is faster in detecting the master
unit compared to HA mode. Although FortiWAN's VRRP implementation is based on VRRP version 3, some
restrictions may apply:
In addition, DHCP servers in LAN and DMZ should let clients use FortiWAN virtual IP and the default gateway (as
FortiWAN's DHCP service does). If RIP and OSPF is used in LAN, FortiWAN uses real IP at OSPF and virtual IP
at RIP to exchange route information. Clone-MAC settings will be ignored if VRRP function is enabled. FortiWAN
doesn't exchange NAT table with VRRP peers. When VRRP master changes, existing connection might break.
Local Priority The priority field specifies the sending VRRP router's priority for the virtual router.
Select a number from 1 to 254 as the priority for the VR.
Advertisement Interval Set the time interval in centi-seconds between advertisements. (Default is 100)
Double-check Link Click the checkbox to enable. When enabled, the backup router will check
whether the master is responding ARP on the specified WAN port.
See also
On its UI, [IPv4 Basic Subnet] and [IPv6 Basic Subnet] could be one of:
l Subnet in WAN
l Subnet in DMZ
l Subnet in WAN and DMZ
l Subnet on Localhost (Not support in [IPv6 Basci Subnet])
And [IPv4 Static Routing Subnet] and [IPv6 Static Routing Subnet] could be one of:
l Subnet in WAN
l Subnet in DMZ
Note: FortiWAN assumes that IP addresses that are unlisted in [IP(s) on Localhost] are all in WAN.
Check [Enable DHCP] if hosts in the subnet in DMZ require DHCP service. And enter the starting and ending
address in [DHCP Range]. If any host in the subnet uses static IP address, then in [Static Mapping], enter its IP
and MAC address. Note: FortiWAN assumes IP addresses that are unlisted in [IP(s) on Localhost] are all in DMZ.
Thus there is no need to configure them.
DHCP
FortiWAN acts a DHCP server on the specified LAN port or DMZ port if checkbox Enable DHCP is checked.
FortiWAN receives DHCP requests and responds related information from/to hosts (DHCP clients) in the subnets
connect to the LAN or DMZ ports.
Domain Name Server The DNS that FortiWAN responds to the DHCP clients within the
DHCP OFFER messages if the clients are sat to automatically get
DNS information through DHCP.
l Single DNS server: the DNS servers defined in System > Network
Setting > DNS Server > IPv4 Domain Name Server are listed here
for your options.
l ALL: answer the DHCP clients with all the defined DNS servers
information.
l None: answer the DHCP clients without containing any DNS server
information.
This option is only available for LAN private subnet. For the DMZ-
sided subnets (hosts in the two subnets are supposed to be
deployed with public IP addresses), system behaves answering the
DHCP clients with all the defined DNZ servers information.
Domain Name Suffix The domain name suffix that FortiWAN responds to the DHCP
clients within the DHCP OFFER messages if the clients are sat to
automatically get DNS information from DHCP.
TFTP Server Name This option is used to deliver a TFTP server name to DHCP clients.
When the DHCP server see the request in a DHCP discover from a
DHCP client, it returns the TFTP server name in its DHCP offer to
the client as DHCP option 66. Usually, option 66 is used for IP
phone auto-provisioning. You will need to refer to a vender's
documentation to configure this option.
DHCP Range The address pools that DHCP server assigns and manages IP
addresses from. Define the IP ranges by specifying IPv4 Starting
Address and IPv4 Ending Address.
Static Mapping DHCP server assigns and manages IP addresses according to clients'
MAC addresses. An IP address that is mapped to a MAC address is only
available to the client with the MAC address. It will not be assigned to
other client even it is idle. Define the mapping by specifying MAC
Address and the correspondent IPv4 Address.
Client ID Mapping DHCP server assigns and manages IP addresses according to the client
ID of DHCP client (the Client Identifier, options code 61, in the options
field of DHCP request). An IP address that is mapped to a client ID here
is only available to this client. It will not be assigned to other clients even
it is idle. Define the mapping by specifying Client ID and the
correspondent IPv4 Address. Corresponding setting of client ID on a
DHCP client is required.
Note that IP addresses defined in DHCP Range, Static Mapping or Client ID Mapping must be also defined
in filed IPv4 IP(s) in DMZ for a bridge-mode (multiple static IP) WAN link, the DMZ side of basic subnets
(subnet in WAN and DMZ, and subnet in DMZ) for a routing-mode WAN link and the basic subnets of private
LAN subnets.
DHCP Relay
DHCP relay is a proxy forwarding DHCP requests and responses between hosts and DHCP server across different
subnets. A router called DHCP relay agent acts the proxy receiving DHCP requests from hosts in the same subnet
and resending them to the DHCP server located in another subnet. The DHCP relay agent then delivers the
DHCP messages responded by the DHCP server to the hosts in the subnet, so that the hosts are assigned the IP
addresses and related information.
FortiWAN is the DHCP relay agent in the network once the DHCP Relay function is enable. Address allocation for
multiple subnets (subnet in LAN, subnet in DMZ, subnet in WAN and DMZ and IPs in DMZ) can be managed by a
centralized DHCP server. As the example below, FortiWAN relays the DHCP messages between the connected
subnets and the standalone DHCP server, so that one DHCP server manages the address allocation for the three
subnets, LAN 1, LAN 2 and a DMZ 1. As for subnet LAN 3, it employs FortiWAN's DHCP server on LAN port 3.
The enabled DHCP server on LAN port 3, which is independent from the standalone DHCP server, serves only
subent LAN 3. Note that you can only enable either DHCP or DHCP Relay for a subnet.
To implement the deployment, you need to enable DHCP Relay for each of the subnets (enable DHCP Relay on
each of the ports). In the example above, DHCP Relay is enabled on ports of LAN 1, LAN 2 and subnet in DMZ 1,
and all the DHCP requests received on the ports will be forwarded to the DHCP server in the subnet DMZ 2. A
LAN port or DMZ port with DHCP Relay being enabled on will forward the DHCP requests it received (coming
from the subnet it connects to) to the DHCP server.
FortiWAN supports up to two DHCP servers in a DHCP relay deployment. Once two DHCP servers are
configured, the relay agent will forward a DHCP request to both of the DHCP servers. The first response received
by the relay agent will be first apply to the DHCP client, and the subsequent responses will be ignored then.
DHCP Relay Server 2 IP address of the second standalone DHCP server. Leave it blank if only
one DHCP server is required for the DHCP relay deployment.
DHCP Relay Agent IP The IP address of the DHCP Relay agent on the port. It indicates
the source of a relayed DHCP request to the DHCP server. This IP
will be contained in a relayed DHCP message, so that the DHCP
server could recognize the relay agent that the relayed DHCP
request came from and respond the corresponding IP address to the
DHCP client (according to this DHCP Relay Agent IP and the
addressing policy).
Next are the configurations of DHCP Relay on the LAN 1, LAN 2 and DMZ ports in the example above.
LAN 1 subnet
From the example above, we have configured the localhost of LAN 2 port with three IP addresses 192.168.10.1,
192.168.10.2 and 192.168.10.3 for subnet 192.168.10.0/24. To enable DHCP Relay on this port, you need to
check the check-box "Enable DHCP Relay" on the Web UI and configure the settings as follows:
The DHCP server (10.10.10.10) recognizes the relay agent (the LAN 1 port) that relayed the DHCP message
through the "DHCP Relay Agent IP" contained in the relayed message. Then according to the DHCP addressing
policy, it selects an IP belongs to 192.168.10.x from its IP pool and responds to the relay agent on LAN 1 port.
LAN 2 subnet
From the example above, we have configured the localhost of LAN 1 port with three IP addresses
192.168.11.254 and 192.168.11.253 for subnet 192.168.11.0/24. To enable DHCP Relay on this port, you need
to check the check-box "Enable DHCP Relay" on the Web UI and configure the settings as follows:
The DHCP server (10.10.10.10) recognizes the relay agent (the LAN 2 port) that relayed the DHCP message
through the "DHCP Relay Agent IP" contained in the relayed message. Then according to the DHCP addressing
policy, it selects an IP belongs to subnet 192.168.11.x from its IP pool and responds to the relay agent on LAN 2
port.
DMZ 1
As the previous description, DHCP relay agent enabled on a DMZ port forwards the DHCP messages between
DMZ and a DHCP server. In FortiWAN, a DMZ can be deployed according the following WAN types:
The DHCP server (10.10.10.10) recognizes the relay agent (the DMZ 1 port) that relayed the DHCP message
through the "DHCP Relay Agent IP" contained in the relayed message. Then according to the DHCP addressing
policy, it selects an IP belongs to subnet 20.20.20.x from its IP pool and responds to the relay agent on DMZ 1
port.
Note that the DHCP server working with FortiWAN's DHCP Replay must be a standalone server.
FortiWAN's DHCP function is not supported to work with DHCP Relay; a port with DHCP being enabled can not
cooperate with the ports that DHCP Relay is enabled on. The centralized DHCP server working in a DHCP Relay
deployment must be well-configured in the IP pools for the multiple IP subnets it is managing.
FortiWAN's DHCP Relay is capable of forwarding DHCP messages through Tunnel Routing (See "Tunnel
Routing") so that the centralized IP addressing over a FortiWAN Tunnel Routing network can be implemented.
This is useful for the application that a headquarters centrally manages IP allocation to its regional branches. The
following shows the example that a DHCP server located in the headquarters site (deployed in the LAN subnet)
manages the IP addressing to its branches through Internet.
With Tunnel Routing connectivity, a VPN network is established among networks of the two sites. DHCP relay in
the VPN network serves for the subnets just as normal. FortiWAN A (the branch) delivers the relayed DHCP
requests from its private subnet 192.168.10.0/24 to the DHCP server located in remote private subnet
192.168.100.0/24 over Internet; conversely, FortiWAN B (the headquarters) delivers the DHCP responses to the
branch site over Internet and FortiWAN A will forward the response to its LAN to allocate a host the IP address.
DHCP messages are delivered by Tunnel Routing encapsulation and decapsulation, just like normal Tunnel
Routing transmission. The localhost of LAN port on FortWAN A is configured to 192.168.10.254. Configuration of
IP pool for subnet 192.168.10.0/24 is required on the DHCP server. The related configurations on the two
FortiWAN units are as follows:
Configurations on FortiWAN A
Go to Network Setting > LAN Private Subnet > IPv4 Basic Subnetand select the subnet 192.168.10.0/24
to configure.
Check the checkbox Enable DHCP Relay and configure the setting below.
Go to Service > Tunnel Routing and define a Tunnel Group with the two tunnels below:
Local IP Remote IP
10.10.10.10 11.11.11.11
20.20.20.20 21.21.21.21
Configurations on FortiWAN B
Go to Service > Tunnel Routing and define a Tunnel Group with the two tunnels below:
Local IP Remote IP
11.11.11.11 10.10.10.10
21.21.21.21 20.20.20.20
Note that the DHCP Relay can only work with Tunnel Routing or Tunnel Routing over IPSec Transport Mode. It
does not support relaying DHCP requests through IPSec Tunnel Mode (See "IPSec VPN").
Stateless Address Autoconfiguration (SLAAC) is a standard mechanism to equip hosts with IPv6 addresses
and related routing information through the IPv6 router advertisements (RA). SLAAC has two properties:
l SLAAC is a stateless mechanism which is short of the IP management. SLAAC is incapable of controlling the
mapping between a host and an IPv6 address.
l DNS information is absent from the traditional Router Advertisement messages. SLAAC with options of RDNSS
and DNSSL included in RA messages (what is called SLAAC RDNSS) can convey information about DNS recursive
servers and DNS Search Lists.
Comparing with SLAAC, DHCPv6 takes the advantage of IP management, so that is called stateful. By
specifying the IP pool and static IP mapping, administrators are able to control how the IPv6 addresses be
allocated via DHCPv6. FortiWAN provides both SLAAC RDNSS and DHCPv6 for the stateless and stateful IPv6
automatic addressing
Enabling the stateless IPv6 addressing for the "IPv6 Basic Subnets" or "IPv6 (IPs) in DMZ" by checking the check-
box Enable SLAAC .
DNS Server The recursive DNS servers used to serve the IPv6 subnet you are
configuring (the Subnet field below). FortiWAN conveys it through
router advertisement (RA) messages. Depending on the subnet
type (DMZ-sided or LAN-sided), this could be the DNS server
serving the global IPv6 subnets (public) that your ISP provides or the
DNS server for the unique local IPv6 subnet (private).
l Single DNS server: the IPv6 addresses defined in System > Network
Setting > DNS Server > IPv6 Domain Name Server are listed here for
your options
l ALL: answer the hosts with all the defined IPv6 DNS servers information.
l None: answer the hosts without containing any IPv6 DNS server
information.
This option is only available for IPv6 LAN private subnet. For the
DMZ-sided subnets (hosts in the subnets are supposed to be
deployed with IPv6 global addresses), system behaves answering
the hosts with all the defined DNZ servers information.
Subnet The subnet deployed on the port (LAN port or DMZ port) you are
configuring. SLAAC services the subnet. The subnet is used by
SLAAC to allocate the prefix information to the hosts, so that an
IPv6 address can be determined (with the Host ID) on a host.
Depending on the subnet type, it could be a global IPv6 subnet or a
unique local IPv6 subnet.
DNS Search List A search list to be used when trying to resolve a name by means of
the DNS. This option is only available for IPv6 LAN private subnet.
To enable the stateful IPv6 addressing for the "IPv6 Basic Subnets" or "IPv6 (IPs) in DMZ", you are required to
enable and configure both SLAAC and DHCPv6 on Web UI. FortiWAN will not respond for any Router
Advertisement (RA) if it SLAAC is disabled. The stateful IPv6 addressing via DHCPv6 requires RA to discover the
default gateway for hosts, and therefor hosts fail to get default gateway if SLAAC is disabled. Please enable and
configure the SLAAC as the introduction above if DHCPv6 is enable and make sure the network interface of a
host is sat to automatically get the IPv6 address through DHCPv6.
FortiWAN acts a DHCPv6 server on the specified LAN port or DMZ port if checkbox Enable DHCPv6 Service is
checked. All the hosts running as DHCPv6 client could gain the routing and DNS information from DHCPv6
server. DHCPv6 provides configuring and management to the IPv6 addresses to be assigned, which is a shortage
of SLAAC.
DNS Server The DNS DNS servers used to serve the IPv6 subnet you are
configuring (the Subnet field below). FortiWAN responds to the
DHCPv6 clients within the DHCPv6 messages if the clients are sat
to automatically get DNS information through DHCPv6. Depending
on the subnet type (DMZ-sided or LAN-sided), this could be the
DNS server serving the global IPv6 subnets (public) that your ISP
provides or the DNS server for the unique local IPv6 subnet
(private).
l Single DNS server: the IPv6 addresses defined in System > Network
Setting > DNS Server > IPv6 Domain Name Server are listed here
for your options.
l ALL: answer the hosts with all the defined IPv6 DNS servers information.
l None: answer the hosts without containing any IPv6 DNS server
information.
This option is only available for IPv6 LAN private subnet. For subnet
in DMZ and subnet in WAN and DMZ (hosts in the subnets are
supposed to be IPv6 global address deployment), system behaves
answering the hosts with all the defined DNZ servers information.
DHCP Range The address pools that DHCPv6 server assigns and manages IPv6
addresses from. Define the DHCP ranges by specifying IPv6 Starting
Address and IPv6 Ending Address.
Static Mapping DHCPv6 server assigns and manages IPv6 addresses according to client
IDs. An IPv6 address that is mapped to a client ID is only available to this
client. It will not be assigned to other clients even it is idle. Define the
mapping by specifying Client ID and the correspondent IPv6 Address.
DNS Search List A search list to be used when trying to resolve a name by means of the
DNS. This option is only available for IPv6 LAN private subnet.
Note that IPv6 addresses defined in DHCP Range and Static Mapping must be also defined in filed IPv6 IP(s)
in DMZ for a bridge-mode (multiple static IP) WAN link, the DMZ side of IPv6 basic subnets (subnet in
WAN and DMZ, and subnet in DMZ) for a routing-mode WAN link and the IPv6 basic subnets of private LAN
subnets.
In this example it is assumed that WAN port 1 is connected to the bridge-mode ATU-R.
Please refer to the ATU-R User manual provided by your ISP to connect the ATU-R to FortiWAN’s WAN #1.
Connect LAN to FortiWAN’s LAN port via a switch or hub. In this example, FortiWAN’s Port2 is treated as LAN
port. Please map FortiWAN’s LAN port to the Port2 in [System] → [Network Setting] → [VLAN and Port
Mapping]. Note: FortiWAN is treated as a normal PC when connecting to other networking equipments.
WAN configuration:
3. In the WAN LINK scroll menu, select "1", and choose "Enable" in the Basic Settings.
4. In the WAN type scroll menu, select [Bridge Mode: One static IP].
5. Select [Port 1] in the WAN Port field.
6. Enter the up/down stream bandwidth associated with this WAN link. Example: If the ADSL Line on WAN1 is
512/64, then enter [64] and [512] in the Up Stream and Down Stream fields respectively. Note: The up/down
stream values entered will ONLY affect the BM and statistics reporting. Bandwidth will not increase if the values
are greater than the actual bandwidth.
7. Enter [211.100.3.35] in the Localhost IP field.
8. Enter [255.255.255.0] in the Netmask field.
9. Enter [211.100.3.254] in the Default Gateway IP field.
10. Apply the bridge mode configuration.
11. If the configuration above has been correctly established, in the [System] →[Summary] page, the status color on
the WAN Link State for WAN Link #1 will turn green.
LAN configuration:
Assume an SMTP server with IP 192.168.1.1 provides SMTP services to the outside via the virtual server.
FortiWAN will perform NAT on this machine so that the outside clients can get SMTP services via FortiWAN’s
public IP on WAN1. The settings for this are in [Service] → [Virtual Server].
1. Click [+] to create a new rule.
2. Check [E] to enable this rule.
3. Select [All-Time] in the "When" field.
4. Enter [211.100.3.35] in the WAN IP field.
5. Select [SMTP(25)] in the Service field.
6. Select [Round-Robin] in the Algorithm field.
7. Click [+] to create a new server in Server Pool.
8. Enter [192.168.1.1] in the Server IP field.
9. Select [SMTP(25)] in the Service field.
10. Enter [1] in the Weight field.
11. Selection of the L field is optional. (If an Administrator wishes to log Virtual Server activities, please select "L").
12. Configuration complete.
Administrators can set up different types of services inside the LAN and use the Virtual Server to make these
services available to public once the configurations are completed.
Servers with public IP addresses can be deployed in two places in the network (as illustrated in the figure below).
It can be deployed either between the ATU-R and FortiWAN, i.e., behind the ATU-R but in front FortiWAN or
inside the FortiWAN DMZ segment.
Client side IP segment is 211.102.30.0/24, Gateway (i.e. the IP for the router) is 211.102.30.254, while the
netmask is 255.255.255.0.
Servers in between ATU-R and FortiWAN occupy the IP range between 211.102.30.70-100.102.30.99.
Hardware Configuration:
Connect the router with FortiWAN in WAN1 by referring to router's user manual. Note: FortiWAN is viewed as a
normal PC when connected to other network equipment.
Configuration Steps:
Sample Configuration:
l Assume the private IP subnet (192.168.0.0/24) is between the WAN link router and FortiWAN WAN port.
l FortiWAN's port 1 IP (192.168.0.253) is connected to the WAN link router (192.168.0.254).
l FortiWAN's Port 3 is DMZ with a public IP subnet (211.20.103.254/24).
l The LAN part behind FortiWAN has another public IP subnet (211.20.104.0/24 behind a router (211.20.103.253).
Configuration Steps:
Configuration Example:
Configuration Steps:
1. Go to FortiWAN Web UI: [System] → [Network Settings] → [WAN Settings] management page.
2. Select [1] in the WAN Link menu.
3. Click Enable to activate the WAN link.
4. Select [Routing Mode] in the WAN Type menu.
5. Select [Port 1] in the WAN Port field.
6. Enter the corresponding up/down-stream bandwidth.
7. In the IPv4 Gateway field, enter [192.168.0.254].
8. In the Static Routing Subnet field, use [+] to add a new rule with Subnet Type as "Subnet in DMZ". In this
example, there is a Core Switch in the DMZ port for the public IP subnet and the subnet does not connect to the
FortiWAN directly. Therefore the subnet info should be filled in the "Static Routing Subnet" field.
9. In the Network IP field, enter [211.70.3.0].
10. In the Netmask field, enter [255.255.255.0].
11. In the IPv4 Gateway field, enter [192.168.2.254].
12. In the WAN Link menu, select 2 to switch to WAN2.
13. Click on Basic Settings to enable the WAN link.
14. In the WAN type menu, select [Routing Mode].
15. In the WAN Port field select [Port 2].
16. Enter the corresponding up and down stream bandwidth parameters.
17. In the IPv4 Gateway field, enter [192.168.1.254].
18. In the Static Routing Subnet field, use [+] to add a new rule with the Subnet Type field as "Subnet in DMZ".
19. In the Network IP field, enter [53.244.43.0].
20. In the Netmask field, enter [255.255.255.0].
21. In the Gateway IP field, enter [192.168.2.254].
22. WAN/DMZ Private Subnet Management Page
23. In the WAN and DMZ ports, all three subnets should be completed as below:
24. In the IPv4 Basic Subnet field, click on [+] to add a new rule with 192.168.0.0/24 as the IP, and select "Subnet in
WAN" under Subnet Type.
25. In the IP(s) on Localhost field, enter [192.168.0.253].
26. In the Netmask field, enter [255.255.255.0].
27. In the WAN port field, select [Port 1].
28. WAN Port 1 settings are complete; proceed onto WAN Port 2.
29. In the IPv4 Basic Subnet field, click on [+] to add a new rule with 192.168.1.0/24 as the subnet IP address, and
select "Subnet in WAN" under Subnet Type.
30. In the IP(s) on Localhost field, enter [192.168.1.253].
31. In the Netmask field, enter [255.255.255.0].
32. In the WAN port field, select [Port 2].
33. The WAN Port2 settings are complete, proceed onto the DMZ port.
34. In the IPv4 Basic Subnet field, click on [+] to add a new rule. Select "Subnet in DMZ" under Subnet Type.
35. In the IP(s) on Localhost field, enter [192.168.2.253].
36. In the Netmask field, enter [255.255.255.0].
37. In the DMZ Port field, select [Port3].
38. Configuration is complete.
The example above illustrates a common FortiWAN deployment scenario where a private IP subnet is placed
inside a WAN and DMZ, and a public IP subnet is connected to FortiWAN DMZ via a Core Switch.
notify (See "Notification"), then notifications will be delivered to your SNMP manager for the events. The
correspondent MIB fields and OIDs are listed as following:
System Configurations
This topic elaborates on [System] and its submenus. Simple examples are given to illustrate how to configure
[system] settings.
Dashboard
System > Dashboard is the first-displayed page after you log in to the Web UI. Various system information,
hardware states and real-time reporting are summarized in the dashboard, so that you can have an overview of a
FortiWAN appliance at a glance. The provided widgets are:
l System Information
l License Information
l System Resources
l WAN Link State
l Throughput
l Connections
l Recent 10 System Log
The dashboard only displays current states and statistics between a very short period (about six minutes). For
medium-term and long-term statistics and deep look inside the items, please see Statistics and Reports.
System Information
The System Information widget displays basic system information of a single FortiWAN appliance or a HA pair of
FortiWAN appliances. The Host column indicates information of local appliance, while the Peer column indicates
the information of peer unit if HA network is deployed. The Peer column keeps blank while no HA peer device is
deployed. System information is auto-refreshed every 5 seconds.
Fields Description
HA State A symbol located on the upper-left corner of the panel indicates the HA state between the
local FortiWAN unit and the peer unit.
: The HA mode is enabled. Both the master and slave units are working correctly.
: The HA mode is enabled, and two units are during HA initiation (HA negotiation is
processing).
: The HA mode is enabled, but errors occur between the two HA units.
Fields Description
Uptime Host: Time period for which local FortiWAN appliance has been up and running.
Peer: Time period for which HA peer has been up and running. Available only when
HA is deployed.
State When the FortiWAN appliance is deployed alone, it displays None in both Host and Peer
columns.
State
Packets/Second The number of the packets that are processed per second.
VRRP State The state of VRRP (Virtual Router Redundancy Protocol) - Enabled or Disabled. Note that
enabling VRRP will disable existing HA deployment. (See LAN Private Subnet)
Hard Disk FortiWAN's hard disk for Reports is being consumed by increasing report database. Once
the disk space is used up, Reports will fail to continue log processing. This field monitors
the disk space status of Reports by displaying the total space and consumed space. (See
"Reports")
License Information
The License Information widget displays license state of a FortiWAN-VM. This widget is visible only when you are
running a FortiWAN-VM unit. License information is auto-refreshed every 5 seconds.
Fields Description
System Resources
The System Resources widget displays instance usage of CPU, RAM and hard disk. Information of system
resources is auto-refreshed every 5 seconds.
Fields Description
l Number of available CPU: depends on the model it would be 1 CPU, 2 CPU or 4 CPU.
l CPU usage in percentage
l CPU usage in color-code: Green (< 30%), Yellow (30% ~ 60%), Orange (60% ~ 90%) and
Red (90% ~ 100%)
Fields Description
Hard Disk FortiWAN's hard disk is being consumed by increasing report database and system logs.
Once the disk space is used up, Reports and system log will fail to continue log
processing. (See Log and Reports)
All the WAN links are listed with a WAN link number and a state color. The number indicates the WAN link and the
color indicates its state. When you move mouse over a WAN link, a corresponding element of the circle matrix
pops up to enlarge the colored state.
Clicking a WAN link can remove/add the WAN link from/into the state widget. You can remove the disabled WAN
links to have a clear WAN link state widget for the active WAN links.
All the selected WAN links are circled. Each element in the circle indicate a WAN link with its state color. When
you move mouse over an element, a small panel displaying information of the WAN link pops up on the left side
of the widget.
Fields Description
WAN link The WAN link number and its state (in color).
Note The annotation of the WAN link (see Configuring your WAN).
IPv4 The IPv4 address deployed on the WAN port (see Configuring your WAN).
IPv6 The IPv6 address deployed on the WAN port (see Configuring your WAN).
Throughput
The Throughput widget displays the total bandwidth usage in the past 6 minutes. The inbound and outbound
throughput are indicated with a blue line and a orange line respectively. The statistics is auto-refreshed every 6
seconds.
When you move mouse over the line chart, a small panel displaying the exact bandwidth usage at the moment
pops up:
l Time
l Outbound Throughput
l Inbound Throughput
Moving mouse over the Inbound Throughput or Outbound Throughput options under the line chart can highlight
the corresponding statistics line in the chart.
The statistics lines can be hid from the widget by clicking the Inbound Throughput and Outbound Throughput
options. Clicking it again brings the lines back to the chart.
Connections
The Connections widget displays statistics of concurrent connections in the past 6 minutes. The statistics is auto-
refreshed every 6 seconds.
When you move mouse over the line chart, a small panel displaying the exact number of concurrent connections
at the moment pops up:
l Time
l Concurrent Connections
After FortiWAN just starts up, you may see more than 100 concurrent connections in this widget for a while.
These connections are because of the standard procedure to detect WAN links and the related networks after
FortiWAN starts up, such as ICMP-based health detection.
Positioning widgets
Each of the widgets can be positioned to suit your need via mouse drag-and-drop. When you drag a widget to
somewhere between any two widgets, an white block expands. Dropping the widget in the white block sets it to
the new position. You can only arrange the widgets into a maximum of two columns.
Get system information, peer information and WAN link state via SNMP
You can use SNMP manager to get the system information, HA peer information and WAN link state. Configure
SNMP for your FortiWAN unit (See "SNMP") and you can get the information in a MIB field via SNMP manager.
The correspondent MIB fields and OIDs are listed as following:
See also
FortiWAN's Optimum Route is a particular load balancing algorithm which determines the best WAN link for Auto
Routing and Multihoming by involving real Internet conditions in calculation, while the other algorithms, such as
By Round-Robin, By Connection and By Upstream/Downstream/Total Traffic, only focus on the loading between
the FortiWAN device and ISP's gateways. Optimum Route is used mainly to avoid the inefficient transmission
due to bad peering between ISPs. Peering between two ISPs is an interconnection of administratively separated
Internet networks (belonging to the two ISPs individually) for the purpose of exchanging traffic between the users
in each network. It allows the two ISP to directly hand off the traffic between each other's customers, which might
be the most efficient way to communicate between two networks if it is settlement-free. However, two situations
might cause the transmission between two ISP networks inefficient;
l If there is no agreement by the two ISP networks to peer, the transit service, which is a method to carry that traffic
across one or more third-party networks (a few exchange points), will be required.
l An ISP restricts the bandwidth for peering with another ISP on the purpose of competition in business. The peering
point thus becomes a bottleneck and might make the transmission extremely slow between each other's customers.
Although the other balancing algorithms determine a good WAN link among multiple WAN links (multiple ISP
networks) for inbound and outbound traffic, they are not aware of the real situations between those ISPs. For
example, two WAN links of a FortiWAN device are connected to ISP-A and ISP-B networks and the peering
between each other is bad. Those non-optimum-route balancing algorithms might determine ISP-B WAN link for
Auto Routing to transfer the traffic which is destined to a server located in ISP-A network (see Auto Routing). If
the bad peering between ISP-A and ISP-B is the only exchange point, which is the bottleneck, for delivering the
traffic, the transmission will become slow. Conversely, those balancing algorithms may also determine the IP of
ISP-B WAN link for Multihoming (see Multihoming) to answer DNS queries coming from ISP-A network. Then the
users in ISP-A network suffer the bad peering when accessing services on FortiWAN through ISP-B network.
Algorithm Optimum Route is just the opposite of those algorithms. It determines the optimum WAN link by going
deep into the real Internet conditions in two modes: static IP table and dynamic detect.
l Static IP table: A static IP table is a set of the IP addresses of an ISP network. Optimum Route evaluates the
destination IP of out-going sessions against the IP tables for Auto Routing, and evaluates the source IP of DNS
queries against the IP tables for Multihoming. If the evaluated IP matches the IP table of an ISP, which implies the
ISP network that the evaluated IP belongs to is recognized, this ISP WAN link will be the optimum routing.
Conceptually, it directly asks traffic being delivered directly through a WAN link connected to the ISP network that
traffic source or destination belong to, so that traffic will not suffer a peering. This can be also implemented by
specifying the source or destination filter with IP groups (See "IP Grouping") in Multihoming or Auto Routing rules.
l Dynamic detect: It dynamically evaluates WAN links according to the detected round-trip time (RTT) and the
bandwidth loading. Bad peering brings bad RTT value.
The following configurations define how Optimum Route detect to determine an optimum WAN link. To use the
Optimum Route algorithm in Auto Routing and Multihoming, it requires specifying the algorithm "By Optimum
Route" for a Auto Routing policy and A/AAAA Record policy, and applying the policy to corresponding filter rules
and A/AAAA records. Without this, Optimum Route would never work even if the detection is configured.
FortiWAN provides DNS Proxy to cooperate with Optimum Route to resolve an advanced issue caused by bad
peering (See "DNS Proxy").
Static, Dynamic Uses static detection first, then switches over to dynamic detection if static
detection fails. [Static, Dynamic] is the default detection method.
Dynamic, Static Uses dynamic detection first, then switches over to static detection if dynamic
detection fails.
The static IP-ISP tables are the reference for Optimum Route to recognize the ISP network that the source or
destination IP of traffic belongs to and so that point the traffic to corresponding WAN link, which is the optimum
routing. A static IP-ISP table contains the IP subnets of an ISP network. You have to maintain these IP subnets in
a text file for creating an IP-ISP table. Each line of the text file indicates a IP subnet in format Network
IP/Prefix, for example:
3.0.0.0/8
211.1.0.0/16
Note that it is strongly suggested that an IP file contains the IP subnets of only ISP, or Optimum Route might not
run as expected. Please prepare the IP files for the IP-ISP tables. Another component of static IP-ISP table is the
WAN parameter, which indicates the FortiWAN's WAN links connecting to the ISP's network. Once traffic
matches the IP subnets of an IP-ISP table, Optimum Route determines a WAN link from the candidates. It is not
such strictly limited that an ISP's IP subnets can only be recorded in one IP-ISP record (just make sure an IP-ISP
table contains only one ISP). The IP subnets of an ISP can be separated into multiple IP-ISP tables, just
remember Optimum Route evaluates traffic against the tables top down by first match, and it picks up one of the
corresponding WAN links if a table is matched.
Table Name Name for the IP-ISP Table, such as an ISP's name.
Upload Upload the IP file of a ISP to save the ISP's IP subnets to the static IP-
ISP table. Click "Browse" to locate the IP file and click "Upload" to
upload the file. You are required to upload an IP file (click "Upload")
first, then apply (click "Apply") the settings of the IP-ISP table. Note that
an IP table file is necessary to create a static IP-ISP table.
After saving the IP subnets to the table, you might continue maintaining
(add or remove) the IP subnets of the ISP. You can make it by editing
the subnets in the following field Rule Setting or manually editing the IP
file and re-upload it to the table. IP file re-uploading overwrites the
original IP subnets of the table.
Rule Setting After uploading the IP file to the table, you can manually edit it by
adding/removing subnets to/from the IP table if necessary. Without
uploading an IP file to the table first, it is ineffective to add/remove IP
subnets to/from the table.
Parameter Select the WAN links that are connected to the ISP network that this IP-ISP table indicates.
Check the field of WAN link to select it. Multiple selection is allowed if more than one WAN link is
connected to the same ISP network. Be ensure that the selected WAN links are exactly
connected to the ISP network that the table indicates, or the Optimum Route might not run as
excepted.
When the source or destination IP of a packet matches an static IP-ISP table, Optimum Route determines a WAN
link from the intersections of the WAN parameters here and the corresponding WAN parameters of a Auto
Routing policy or Multihoming A/AAAA record policy, according to the traffic loading on the WAN ports. For
example:
Traffic matches a Auto Routing filter rule is processed by Auto Routing according to the corresponding policy "By_
OR". Optimum Rout is set to detect network by static IP-ISP table. Packet destination IP of the traffic matches
the ISP's network of IP-ISP table "ISP_A", which WAN links 2, 3 and 4 are connected to the ISP network.
Optimum Route determines a WAN link for Auto Routing from WAN link 2 and WAN link3, which are the
intersections of WAN links 1, 2, 3 (WAN parameters set in the AR policy) and WAN links 2, 3, 4 (WAN parameters
set in the IP-ISP table). If traffic loading on WAN port 2 is currently heavier than WAN port 3, WAN link 3 will be
the optimum link that Optimum Route decides for Auto Routing. The traffic will then be transferred through WAN
link 3 by Auto Routing. For Multihoming with algorithm By Optimum Rout, the process is similar.
Here are the situations cause Optimum Route by IP-ISP table detection returning nothing to Auto Routing and
Multihoming:
l Optimum Route returns nothing when the evaluated packet source and destination IP does not match any of the IP-
ISP tables. This might because of incomplete collection of IP subnets of ISP networks. You can make the IP-ISP
tables more complete by continuing IP subnets collecting and adding them to the tables. The more complete the IP
subnets are, the better effect Optimum Route brings.
l Even if traffic matches an IP-ISP table, Optimum Route returns nothing when there is no intersection of Optimum
Route's WAN parameters and Auto Routing (or Multihoming) policy's WAN parameters. Please make sure at least
one intersected WAN link between the policies.
The traffic will be processes by Auto Routing according to the specified fail-over policy (see Auto Routing), if
Optimum Route returns nothing to Auto Routing for the traffic. Multihoming will answer the IP address defined to
the first WAN link in the A/AAAA record policy (see Multihoming), if Optimum Route returns nothing to
Multihoming for the query.
Dynamic Detect
Optimum Route's dynamic detection detects the round-trip time (RTT) of traffic targets and involves it to a
dynamic calculation to determine the optimum WAN link for Auto Routing and Multihoming. Optimum Route
spreads detection packets to a target through all the enabled WAN links to collect the transmission latency
between the FortiWAN device and the target via each WAN link (ISP). In Optimum Route, this RTT will also
represent the latency for data transmission through each WAN link between the FortiWAN device and the class C
that the detection target belongs to. Fort example, if Optimum Route detects 20 ms, 30 ms and 40 ms RTTs
between FortiWAN and a target 211.21.1.100 through WAN link 1, 2 and 3, a reference table as follow will be
maintained and cached for a wile:
Subnet=211.21.1.0/24, WAN1=20ms, WAN2=30ms, WAN3=40ms
During the cache period, Optimum Route uses the values directly to calculate the optimum WAN link for any
subsequent traffic that the target belongs to subnet 211.21.1.0/24. As for the target we are talking about,
Optimum Route takes the destination IPs of out-going session packets as the targets if they matches the relevant
Auto Routing policies, and takes the source IPs of DNS queries as the targets if they matches the relevant
Multihoming A/AAAA record policies.
To determine an optimum WAN link, Optimum Route evaluates on availability of the candidates by calculating
the weight of each WAN link. The calculation of weight involves the detected RTT and current traffic loading,
which are combined in specified ratio. It seems making sense that the less the RTT is the optimum the WAN link
is, but practically it is not necessarily that data transmission to a target through a WAN link with less RTT but
serious traffic congestion on the WAN port is better than through a WAN link with higher RTT but the WAN port is
in full-availability.
To enable dynamic detection for Optimum Route, it requires to have the following settings configured. It contains
three parts:
Detection Protocol ICMP and TCP are the protocols used to detect the RTT (Default:
ICMP). ICMP (ping) or TCP (TCP connect request) packets are sent
to a target through each of the enabled WAN links. So that system
gets RTTs from the responses. Here are the options for the
detection protocol:
TCP, ICMP: Using TCP for detections first. System will try ICMP
detection if the TCP detections are declared failed.
Detection Period, in Seconds The time interval between retries if there is no response received for
current detection. (Default: 3 seconds).
Number of Retries The times that system will retry if detections continue receiving no
responses (Default: 3 retries). Retry will stop as long as a response is
received, or system will declare the RTT detection is failed if all the retries
receive no responses.
Cache Aging Period, in Minutes The time period to cache the detected results (Default: 2880mins, ie.
2days). After the cache is cleaned, system will re-trigger detections for
the same request.
Weight of Round Trip Time : A parameter used to calculate the optimum route. It shows how much
Weight of Load round trip time (RTT) and link load account for in calculating the optimum
route. Note: The smaller the field value is, the less it accounts for in
optimum route calculation.
[Port Speed/Duplex Settings] enables to configure port speed and duplex transfer mode. Generally it is set to
auto-detect by default which works properly in most cases. Manual speed/duplex mode configuration is still
necessary in event that some old devices are either not supporting auto-detect, or incompatible with FortiWAN.
Status : The physical connection status of the port. It shows whether the port has been connected
to other detectable network devices e.g. a hub.
Speed : The current speed of the port. It can be a value either manually set or auto-detected.
Duplex : The current duplex of the port. It can be a value either manually set or auto-detected.
Settings : You can opt for desirable settings, which can be manually set or auto-detected.
HA : Click to enable HA (switch between master and slave units) based on the status of
network ports. While HA is enabled in FortiWAN, the port status of both master and slave
FortiWAN units will be compared to determine which unit should be selected as master.
Once the number of functioning network ports on the master unit becomes lower than that
on the slave unit, the slave unit will then be switched as master instead. (Only the status
of selected network ports will be compared.) Note: This field is not available if VRRP has
been enabled in [Networking Setting > LAN Private Subnet] setting page.
In the deployment of multiple links, a link might serve as backup line which is inactive unless it matches the
enabling criteria. The choice of backup lines mostly depends on cost, especially in areas where charges are based
on data traffic. Backup lines in standby do not cost a cent, thus only basic fees are charged. Contrary to backup
lines, main lines are lines commonly in use. The concept is to be used below.
FortiWAN provides log mechanism to the Backup Line service, see "Log".
Threshold Parameters
Backup Line Enable Time : The interval to enable backup lines after main lines have broken down.
Backup Line Disable Time : The interval to disable backup line after main lines have returned to normal.
l All fail: when all lines defined in [Main line] are down
l One fails: when one of the lines defined in [Main line] is down
l Inbound bandwidth usage reached: when the inbound bandwidth
consumption of all lines defined in [Main Line] reaches the defined level
l Outbound bandwidth usage reached: when the outbound bandwidth
consumption of all lines defined in [Main Line] reaches the defined level
l Total traffic reached: when the total bandwidth consumption of all lines
defined in [Main Line] reaches the defined level
Parameter : When the latter 3 options are chosen in [Algorithm], you can define here the
bandwidth usage of the main lines over which backup lines are to be enabled.
IP Grouping
IP Grouping is the configuration collect a group of IP addresses together for management purpose. An IP group
could be the IP addresses belonging to a department, a physical region or some servers. It simplifies the
configurations to most of the FortiWAN's policies. The predefined IP groups can be applied to the IP-based
policies of the following FortiWAN's features:
l Firewall
l NAT
l Persistent Routing
l Auto Routing
l Virtual Server
l Bandwidth Management
l Connection Limit
l Cache Redirect
l Multihoming
Geo IP database
The built-in Geo IP database contains mappings between geographical regions or countries and all public IP
addresses that are known to originate from them. By specifying countries to IP groups and applying them to
policies, FortiWANcan recognize the countries that connections originate from or destined to, and take the
corresponding actions to the traffic according to the policies. For example, you can
l apply a geo IP to the destination field of a Auto Routing policy to route all the traffic destined to the country to
specified WAN links.
l apply a geo IP to the source field of a Firewall policy to block all the accesses originated from the country.
l apply a geo IP to the source field of a Virtual Server policy to redirect all the connections originated from the country
to the specified backend servers.
You can simply apply a geo IP to a policy to cover all the IP addresses of the country in the policy, rather than
exactly knowing each of the IP addresses and manually setting policies for each of them.
Configuring IP groups
To add an IP group, click the add button to create a configuration panel and complete the following fields:
Fields Description
The group name will be listed in the drop-down menus of the Source and
Destination fields of the features that support IP Grouping.
IPv4/IPv6 Rules An IP group can contain multiple IP rule settings. Click the add button to create
Setting a new setting and complete the following fields.
Action Specify whether the specified IP address(es) belongs to the group or not.
To collapse or expand configurations of an IP group or IP rule settings, click the arrow buttons on the banners.
Service Grouping
[Service Grouping] lets you create and manage service groups exclusively and efficiently. You can group an
ICMP, a TCP/UDP Port, and a group of TCP/UDP Ports, particular applications and server ports. These
predefined service groups are available and easy to use in the drop-down list of the fields of [Source] and
[Destination] on such [Service] submenus as [Firewall], [NAT], [Virtual Server], [Auto Routing], [Inbound BM],
[Outbound BM].
Group Name : Assign a name to a service group e.g. MSN File Transfer. The name will
appear in the drop-down list of [Source] and [Destination] in [Service]
submenus mentioned previously.
Enable : Check the field to enable a service group. Once the service group has been
enabled, it will show in the drop-down list of [Source] and [Destination] in
[Service] submenus mentioned previously.
Show/Hide IPv4/IPv6 Detail : Click the button to show or hide the table details. After Hide Detail has been
clicked, the table only shows the name of the service group and whether it
has been enabled.
IPv4/IPv6 Rule Settings Table:
E : Check the field to add the list of services to the current service group.
Service : Enter a single or a set of ICMP / ICMPv6 or TCP / UDP ports. Single port
follows the the format: port (xxx). A set of ports follow the format: xxx-yyy e.g.
6891-6900.
Action : Two options, to belong and not to belong, to determines whether service port
defined in [Service] belongs to the service group. For exceptions in a set of
service ports that belongs to the service group, the action of not to belong
makes the configuration easier than separating the set of service ports into
several groups.
Here is an example to elaborate on how to configure [Service Grouping]. Create a service group "MSN File
Transfer", which uses TCP 6891-6900. Then enter TCP@6891-6900 in the [Service] field.
Busyhour Settings
[Busyhour Settings] plays a crucial role in managing bandwidth. .Generally opening hours Mon-Fri: 09h00 to
18h00 is configured to be busy hours, for this period sees the advent of bandwidth-intensive applications in both
intranet and extranet.
Default Type : Time segment unspecified in [Rules] below fall into this Default type either as idle or
busy hours.
Rules : Defines time segment. The time segments are matched in sequence on a first-match
basis. If none of the rules match, the default type is used. If time segment in [Default
Type] is defined as idle hours, then unspecified time segment in this [Rules] is taken
as idle hours as well.
E : Check the field box to add time segments in this list to [Rules].
To : End time.
As is shown in the figure, Sunday and hours beyond Mon-Sat: 09h00-18h00 are set to be idle hours. Remaining
hours of the week belong to busy hours.
Diagnostic Tools
Click the tabs [IPv4] and [IPv6] on the upper side to choice diagnostic tools for IPv4 and IPv6.
IPv4
IPv4 ARP
Enforcement [ARP Enforcement] forces FortiWAN's attached PCs and other devices to update ARP table. Click
[Enforce] and system will send out ARP packets force ARP updates throughout the attached devices. Generally
the function is used only when certain devices in DMZ cannot access the Internet after FortiWAN has been
installed initially.
IP Conflict Test
[IP Conflict Test] checks if any PC's IP address runs into conflict with that in WAN or DMZ settings in [Network
Settings].
Click [Test] to start testing. And IP conflict message may be one of:
The function is used to clean up non-TCP session tables in FortiWAN. In FortiWAN, protocols are managed with
a session timer. Old sessions may be continuously retried by users that they keep unexpired. These old sessions,
are always being valid and active instead of new ones. Hence, new sessions will not get into use unless session
tables are cleaned up.
Ping
[Ping] is used to detect network status. Enter an IP address or host name of target device. Select a port (WAN,
LAN, or DMZ). If WAN port is selected, specify the WAN link number index. Details of ICMP error message and
ping are outside the scope of this manual. Please refer to other documents for more information.
Note: If you ping a domain name, ensure DNS server have been specified in [System]->[Network Settings]->[DNS
Server] (See "Set DNS server for FortiWAN").
Trace
[Trace] is used to trace the route path of a packet from a specific port to destination host. Enter an IP address or
host name of target device in [Target]. Select a link port (WAN, LAN, or DMZ). If WAN port is selected, specify
the WAN link number index. [Host] can be an IP address or domain name of the target device.
Note: If you trace route with a domain name, ensure DNS server has been specified in [System]->[Network
Settings]->[DNS Server] (See "Set DNS server for FortiWAN").
Arping
[Arping] is used to detect the MAC address of a PC. Enter an IP address or host name of target device. Select a
port (WAN, LAN, or DMZ). If WAN port has been selected, specify the WAN link number index. Details of ARP
and error message are out of the scope of this manual; please refer to other documents for more information.
Note: If you arping with a domain name, ensure DNS server has been specified in [System]->[Network Settings]->
[DNS Server] (See "Set DNS server for FortiWAN").
[IPv4 ARP Table Show & Clear] is used to display or clear the ARP information of certain port. Select a [port] and
click [Show], to display the ARP information of this port. Or select a [port], click [Clear] to clean up the ARP
information of this port, and confirm the message to clear. After this, a message shows that ARP table has been
cleared successfully.
Nslookup Tool
[Nslookup Tool] is used to inquire domain name of hosts. Enter a host in Target Domain. Select a host type from
optical [Type] list: Any, A, AAAA, CNAME, DNAME, HINFO, MX, NS, PTR, SOA, SRV, TXT; and select a server
from optical [Server] list: Internal DNS, Multihoming, etc. Click [Nslookup] to start the inquiring session, and the
domain name of target host will show in the field. Click [Stop] to halt the session.
IPv6
When IPv6 Neighbor Discovery is enforced, FortiWAN will send out a “neighbor discovery” packet to neighbor
servers or network devices within the same network to request for a reply of IPv6 and MAC address of devices
found.
The function is used to clean up non-TCP session tables in FortiWAN. In FortiWAN, protocols are managed with
a session timer. Old sessions may be continuously retried by users that they keep unexpired. These old sessions,
are always being valid and active instead of new ones. Hence, new sessions will not get into use unless session
tables are cleaned up.
Ping
[Ping] is used to detect network status. Enter an IP address or host name of target device. Select a port (WAN,
LAN, or DMZ). If WAN port is selected, specify the WAN link number index. Details of ICMP error message and
ping are outside the scope of this manual. Please refer to other documents for more information.
Note: If you ping a domain name, ensure DNS server have been specified in [System]->[Network Settings]->[DNS
Server] (See "Set DNS server for FortiWAN").
Trace
[Trace] is used to trace the route path of a packet from a specific port to destination host. Enter an IP address or
host name of target device in [Target]. Select a link port (WAN, LAN, or DMZ). If WAN port is selected, specify
the WAN link number index. [Host] can be an IP address or domain name of the target device.
Note: If you trace route with a domain name, ensure DNS server has been specified in [System]->[Network
Settings]->[DNS Server] (See "Set DNS server for FortiWAN").
Arping
[Arping] is used to detect the MAC address of a PC. Enter an IP address or host name of target device. Select a
port (WAN, LAN, or DMZ). If WAN port has been selected, specify the WAN link number index. Details of ARP
and error message are out of the scope of this manual; please refer to other documents for more information.
Note: If you arping with a domain name, ensure DNS server has been specified in [System]->[Network Settings]->
[DNS Server] (See "Set DNS server for FortiWAN").
[IPv6 Neighbor Table Show & Clear] is used to display or clear the IPv6 and MAC address of neighbor servers or
devices. Select a [port] and click [Show], to display the neighbor information of this port. Or select a [port], click
[Clear] to clean up the neighbor information of this port, and confirm the message to clear. After this, a message
shows that neighbor table has been cleared successfully.
Nslookup Tool
[Nslookup Tool] is used to inquire domain name of hosts. Enter a host in Target Domain. Select a host type from
optical [Type] list: Any, A, AAAA, CNAME, DNAME, HINFO, MX, NS, PTR, SOA, SRV, TXT; and select a server
from optical [Server] list: Internal DNS, Multihoming, etc. Click [Nslookup] to start the inquiring session, and the
domain name of target host will show in the field. Click [Stop] to halt the session.
Tcpdump
Interface : Tcpdump can capture FortiWAN data packets and download captured packets to local host for
analysis and debug. Firstly, select an interface from [Interface] to capture packets. In its drop-
down list, tunnel will display if Tunnel Routing has been configured. Option [Any] enables all
interfaces to capture packets.
Timeout : Set [Timeout] value. Once time is over, capture will stop. Lastly, click [Start] to start capturing and
download intercepted packets to local host. It should be noted that FortiWAN does not store the
Tcpdump packets. Click [Stop] to stop capturing.
[Date/Time] lets you configure time, date, and time zone. [Date] follows the year/month/day date format, and
[Time] uses 24-hour time system in the hour:minute:second format. [Time Zone] is represented by continent and
city, [America] and [New York], for example. FortiWAN uses NTP time server for accurate time synchronization,
simply by clicking the [Synchronize Time] button. And other time servers are also included in the drop-down list
which can be added or deleted at your preference.
Remote Assistance
Enabling this function allows Fortinet's technical support specialist to enter your system for further
troubleshooting when assistance is needed. FortiWAN allows technical support specialist to access the Web UI
and backend system remotely, so as to assist users promptly upon the occurrence of problems. Remote
assistance opens both TCP ports 443 for web UI and 23 for SSH debug.
Note: To enter the backend system via SSH login, a debug patch file is required.
Server : Enter the server IP address given by Fortinet's technical support specialist.
Security Code : Displays the security code required for remote logins. This security code is automatically
generated after clicking Apply to complete Remote Assistance settings, and is updated
after every system reboot.
Administration
Go to System > Administration, Administration lets you perform administrative tasks, including changing
passwords of Administrator and Monitor. Every FortiWAN is shipped with the same default passwords. For
security concerns, it is thus strongly recommended that the passwords shall be changed.
By default, FortiWAN uses 443 as the Web UI login port. And it allows administrators to change the port, to avoid
possible port conflict caused for virtual server services.
Update/downgrade section enables to update or downgrade firmwares once new firmwares are available (from
our website or dealers). Simply click the Update/Downgrade button and follow exactly the on-screen instructions.
Configuration Files gives you the ability to back up configuration files, by clicking the [Save] button. Or you can
click [Restore] to reload the previous backup files to FortiWAN. System configurations can be recovered from
failures via the backup configuration files.
In Maintenance, you can restore factory default configurations and reboot FortiWAN. Due to the limitation of
HTML syntax, no hint displays after reboot has been completed. Thus you have to wait about two minutes before
navigating to Web UI in browser.
Default account/password
While the first time you login to Web UI, you see the default accounts here. "Administrator" and "admin" are the
default accounts of group Administrator, and "Monitor" is the default account of group Monitor. Passwords of
accounts "Administrator" and "Monitor" are "1234" and "5678" respectively; password of account "admin" is null
(See "Appendix A: Default Values"). All the accounts (default and customized) of group Administrator are able to
log into Web UI, CLI and SSH login. All the accounts are case sensitive.
Create, modify and delete the account and password for Administrators or Monitors.
Select Account You can select and configure an account (old or new). If you select the current login
account, [Add Account] button will change to [Set Account].
New Account Allows you to add a new account. Enter the new account ID here.
New Password Enter the new password after you have added or modified an account.
RADIUS Authentication
Except FortiWAN's local authentication database described above, FortiWAN supports RADIUS authentication
for Web UI login. Please make sure the following settings are complete on the RADIUS server working with
FortiWAN.
END‐VENDOR Fortinet
"12356" is Fortinet's vender ID, "Fortinet-FWN-AVPair" is the attribute used for working with FortiWAN and
"26" is the attribute ID. If the RADIUS server serves with other Fortinet products, please add the correspondent
attributes between BEGIN‐VENDOR Fortinet and END‐VENDOR Fortinet.
Construct user database on RADIUS server for authentication. For example, we have accounts
"Administrator/1234" and "admin/(null)" belong to Administrator group, and "Monitor/5678" belongs to Monitor
group.
To enable FortiWAN's RADIUS authentication, please click the checkbox and complete the configuration below.
RADIUS, Local Database: Authorize a login via RADIUS first, then try local
database if the authentication failed in RADIUS.
Local Database, RADIUS: Authorize a login via local database first, then try
RADIUS if the authentication failed in local database.
Server Port UDP port number of the RADIUS server (The standard port is 1812, but it might be
1645 for earlier RADIUS).
NAS Port Enter the correspondent NAS-Port attribute for Request/Response Authenticator if it is
necessary, or leave it blank. See RFC2865 for details.
l Before proceeding with the firmware update, ALWAYS backup system configurations.
l Obtain the latest firmware upgrade pack from https://support.fortinet.com.
l Log onto the Web UI with administrator account and go to [System]→ [Administration].
l Click on "Update".
l Use [ Browse...] to select the path of the new firmware image.
l For High Availability (HA) deployment (See "FortiWAN in HA (High Availability) Mode"), check [ Update Slave]
to perform firmware update on the slave unit at the same time. Please double check and make sure the peer device
is under normal condition (from page [System > Summary]) before HA firmware update.
l Click [ Upload File] to start updating.
l The firmware update will take a while, so please be patient. During the update process, be sure NOT to turn off the
system or unplug the power adapter. DO NOT click on the [Upload] button more than once.
l Update is completed when the "Update succeeded" message appears. FortiWAN unit(s) will reboot automatically
then.
Errors that occur during the update can be caused by any reason below:
TFTP is not secure, and it does not support authentication. You should run it only on
trusted administrator-only networks, and never on computers directly connected to
the Internet. Turn off tftpd off immediately after completing this procedure.
Enter TFTP server address [192.168.1.168]: The IP address of the TFTP server, such
as 192.168.0.12.
Enter local address [192.168.1.188]: The IP address assigned to the HA port for TFTP
transmission, such as 192.168.0.2.
Enter firmware image file name [image.out]: The file name of the firmware image file,
such as FWN2HB-V400-build0267-FORTINET.out.
8. It starts get the firmware image file from the TFTP server
9. Enter D to locate the firmware in default partition when you see the following information:
MAC:000D48309D17
##################################################################################
#######
Total 94177227 bytes data downloaded.
Verifying the integrity of the firmware image..
Please make sure that you are using the correct firmware image file corresponding to
your FortiWAN model, or it might block the FortiWAN from booting. This procedure
replaces the firmware image on the default partition without validating the image.
Incompatible configurations may also cause failure to system booting after firmware
downgrade, for example that configuration of link aggregation on releases later than
4.3 is incompatible to 4.1 and 4.0.
Configuration File
Click [Save] to back up the current configurations of all functions in one binary file on your PC. Click [Show] to
display a binary configuration file (.cfg) as readable content. Click [Restore] to recover whole system with the
backed up configurations. Note that Restore will apply the configurations to system and then perform
synchronization to the slave unit if HA mode is deployed. After this, system automatically reboot. The
configuration file here is in binary format and should NOT be edited outside of FortiWAN tools and systems. The
configuration file here contains all the configurations of FortiWAN’s functions. You can have individual
configuration file of every single function via the export function in every function page. Do NOT to turn off the
power while restoring the configuration file, or repetitively clicking on the [Restore] button.
l Log on to FortiWAN as administrator. On every single function page of Web UI, click [Export Configuration] to back
up the configuration in an editable text file.
l To import the previously saved configuration file, click [Browse] on the function page of Web UI to select the
configuration file previously saved, and then click [Import Configuration] to import previous configurations. The
imported configuration will be displayed on the Web UI, but not be applied to system. Click [Apply] button to apply it
to system.
During the configuration file restoration process, if an error occurs, it is most likely the result of one of the
following:
l The total WAN bandwidth setting in the restored configuration file exceeds the max bandwidth defined for the
current system. The bandwidth can be either upload stream and download stream.
l The restored configuration file contains port numbers exceeding the port numbers defined by the system.
l The restored configuration file contains VLAN parameters not supported by the machine.
l The total number of WAN links in the restored configuration file exceeds the current system definition.
l Incompatible versions and/or systems.
Note:
l FortiWAN does not guarantee full compatibility of configuration files for different models.
l After the firmware upgrade, it is encouraged to backup the configuration file.
Configuration file backup and restore are available in the following function page:
[System > IP Grouping] l Click [Import] & [Export], you may backup and restore
configurations of ip list in a file named ip-list.txt.
l Click [Import Configuration] & [Export Configuration],
you may backup and restore configurations of IP
Grouping saved in ip-group.txt.
[System > Service Grouping] l Click [Import] & [Export], you may backup and restore
configurations of service list in a file named service_
list.txt.
l Click [Import Configuration] & [Export Configuration],
you may backup and restore configurations of Service
Grouping saved in service-group.txt.
Maintenance
Click [Factory Default] to reset configurations to factory default. Or you can perform “resetconfig” command in
console. Click [Reboot] to reboot FortiWAN. For information on console command, please refer to Console Mode
Commands.
Web UI Port
Type the port number in [New Port] and then click [Setport]. Enter the new port number when you log in again into
Web UI. Additionally, the new port shall avoid conflict with FortiWAN reserved ports when configuring the port.
Otherwise, FortiWAN will display error message of port settings failure and resume to the correct port number
that was configured last time.
License Control
License Control provides users with all the License Key configurations, including:
FortiWAN provides various bandwidth capabilities for individual model. Bandwidth upgrade on models is
supported via a license key. You could ask your distributor for bandwidth upgrade license keys.
l FortiWAN 200B provides 200 Mbps, 400 Mbps and 600 Mbps bandwidth capability.
l FortiWAN 1000B provides 1 Gbps, and 2 Gbps.
l FortiWAN 3000B provides 3 Gbps, 6 Gbps, and 9 Gbps bandwidth capability.
Product Model Bandwidth Capability
Note: Conditional bandwidth upgrade is provided for old models. Please contact customer support to gain further
information.
With the rapid proliferation and decreasing prices of broadband solutions, more and more small and medium
enterprises are opting for the use of multiple WAN links from various ISPs. The benefits include:
l Single link failure does not result in a total loss of internet connectivity, thus WAN reliability increases.
l Traffic can be evenly dispersed across multiple WAN links, resulting in increased efficiency and improved
performance of bandwidth.
l Multiple WAN links for fault tolerance and load balancing has two advantages:
l The outbound traffic, i.e. traffic originating from LAN traveling outwards, can be load-balanced across multiple
WAN links. This is Auto Routing.
l Traffic from the WAN, i.e. traffic originating from WAN traveling towards the LAN, can be load-balanced across
multiple WAN links. This is Multihoming.
Load balancing algorithm is one of the important components for achieving purpose of traffic load balancing via
FortiWAN's various services, such as Auto Routing, Multihoming, Tunnel Routing, Virtual Server and DNS Proxy.
These services distribute inbound or outbound traffic over multiple resources (WAN links or internal servers)
according to predefined policies, which consist of a load balancing algorithm and the participating resources. A
Load balancing algorithm dynamically evaluates on the availability of the participants against factors such as
weight, connections or traffic, and picks an appropriate one for the load balancing services assign traffic to. When
traffic (sessions or packets) matches a filter rule or policy of a load balancing service, the corresponding algorithm
(specified to the policy) determines the appropriate one from the specified resources for the service to handle the
traffic. All the load balancing services detect and label the unavailable resources by their own mechanism, such
as WAN link health detection (see WAN Link Health Detection). The algorithms will ignore the failed resources
and work with the available ones.
The followings are the algorithms that FortiWAN provides for services Auto Routing, Multihoming, Tunnel
Routing, Virtual Server and DNS Proxy.
Round-Robin O O O O O
By Connection O O
By Upstream O O O O
By Downstream O O O
By Total Traffic O O O
By Optimum Route O O
By Response Time O
By Static O
By Fixed O
Fail-Over O
Hash O
See also
Tunnel Routing
DNS Proxy
Round Robin works similarly for Multihoming, Tunnel Routing, Virtual Server and DNS Proxy. For the details of
configuring a policy of a service, see the section relevant to each of them.
By Connection
By connection picks one of the participating resource (WAN links or internal servers) for Auto Routing and Virtual
Server, but the processes that By Connection works for Auto Routing and Virtual Server are totally different. For
Auto Routing, an idea of weighted Round Robin is involved in the By Connection algorithm. The goal of Auto
Routing's By Connection is to guarantee the number of connections being processed by each participating WAN
link in a fixed weight. By Connection counts the number of connections running on each participating WAN link
and picks one for a new-coming connection to keep the ration of connections running on the WAN links closely
fixed after adding the new connection to the picked one. For example, there are three WAN links (WAN1, WAN2
and WAN3) are defined in an Auto Routing policy with weight 1:1:2. By Connection will respectively return WAN1,
WAN2 and WAN3 to Auto Routing for the first three connections, if all the three WAN links are idle. So far, the
count of connections running on WAN1, WAN2 and WAN3 goes to 1:1:1. To match the specified weight 1:1:2 of
the policy, By Connection will return WAN3 for the forth connection. Next, By Connection returns WAN1 and
WAN2 respectively for the fifth and sixth connections and so the count goes to 2:2:2. Obviously, By Connection
will return WAN3 for the next two (seventh and eighth) connections, so that the count will be 2:2:4 which is in the
ratio 1:1:2. Considering the two connections on WAN2 are closed (the counts become 2:0:4), By Connection
must return WAN2 for the next two connections to keep the counts be in ratio 1:1:2. If some of the participants
get failed, By Connection will ignore them and work with the rest participants. For example, if WAN2 goes to
failure, By Connection will work by keeping the connection count on WAN1 and WAN3 in weight 1:2.
Weight 1 1 2
Connection 1 V
Connection 2 V
Connection 3 V
Connection 4 V
Connection counts 1 1 2
Connection 5 V
Connection 6 V
Connection 7 V
Connection 8 V
Connection counts 2 2 4
Connection counts 2 0 4
Connection 9 V
Connection 10 V
Connection counts 2 2 4
Connection 11 V
Connection counts 3 2 4
One of the connections on WAN2 and one of the connections on WAN4 are
cloased.
Connection counts 3 1 3
Connection 12 V
Connection 13 V
Connection 14 V
Connection 15 V
Connection 16 V
Connection counts 3 3 6
As for Virtual Server, By connection treats service requests coming from the same source IP address as the same
connection. The algorithm determine an internal server from server pool for incoming requests of a connection by
hashing source IP address of the connection. The hash mechanism that By connection uses is the same as
algorithm Hash (see section Hash later). Every internal server in the server pool has the same weight for By
connection's hash mechanism.
By Downstream Traffic
By Downstream Traffic picks one of the participating resources (WAN links) according to the weight mainly
relevant to their data downloading availability. Each of the participating WAN links is weighted every three
seconds by summing 80% available inbound bandwidth and 20% available outbound bandwidth up. For example,
there is an Auto Routing policy with participants WAN1, WAN2 and WAN3. If, at some time, the available
inbound bandwidth on WAN1, WAN2 and WAN3 is 4Mbps, 10Mbps and 6Mbps, and the available outbound
bandwidth on WAN1, WAN2 and WAN3 is 8Mbps, 5Mbps and 20Mbps, the weight of each WAN link is so that
calculated as:
Before the weights are updated next time , By Downstream Traffic returns one of the three WAN links for the load
balancing policy in circular order with weight 40:85:68. Weights will be updated by calculating with real-time
available bandwidth every three seconds. By Downstream Traffic serves for Auto Routing, Multihoming and DNS
Proxy.
By Upstream Traffic
By Upstream Traffic serves Auto Routing, Multihoming, Tunnel Routing and DNS Proxy. However, the process
that By Upstream Traffic works for Tunnel Routing is different from Auto Routing, Multihoming and DNS Proxy.
For working with Auto Routing, Multihoming and DNS Proxy, By Upstream Traffic picks one of the participating
resources (WAN links) according to the weight mainly relevant to their data uploading availability. Each of the
participating WAN links is weighted every three seconds by summing 80% available outbound bandwidth and
20% available inbound bandwidth up. For the same example, there is an Auto Routing policy with participants
WAN1, WAN2 and WAN3. If, at some time, the available inbound bandwidth on WAN1, WAN2 and WAN3 is
4Mbps, 10Mbps and 6Mbps, and the available outbound bandwidth on WAN1, WAN2 and WAN3 is 8Mbps,
5Mbps and 20Mbps, the weight of each WAN link is so that calculated as:
Before the weights are updated next time , By Upstream Traffic returns one of the three WAN links for the load
balancing policy in circular order with weight 40:40:92. Weights will be updated by calculating with real-time
available bandwidth every three seconds.
As for working with Tunnel Routing, By Upstream Traffic divides the available uploading bandwidth of each
participating WAN link by the number of GRE tunnel deployed on the WAN link, and picks one with the most
available uploading bandwidth. For example, there is a Tunnel Routing Group consisting of three GRE tunnels
deployed on WAN1, WAN2 and WAN3 respectively. Other Tunnel Routing Groups deploy 2 GRE tunnels on
WAN1, 3 GRE tunnels on WAN2 and 1 GRE tunnel on WAN3. Totally, there are 3 tunnels on WAN1, 4 tunnels on
WAN2 and 2 tunnels on WAN3. If, at a time, the available uploading bandwidth of WAN1, WAN2 and WAN3 is
6Mbps, 20Mbps and 12Mbps, By Upstream Traffic will picks WAN3 for transferring packets matching this Tunnel
Routing Group because:
By Upstream Traffic for Tunnel Routing is not a Round-Robin based algorithm, it always picks the resource with
most available uploading bandwidth.
By Total Traffic
By Total Traffic serves Auto Routing, Multihoming and DNS Proxy. By Total Traffic picks one of the participating
resources (WAN links) according to the weight evenly relevant to their data downloading and uploading
availability. Each of the participating WAN links is weighted every three seconds by summing 50% available
inbound bandwidth and 50% available outbound bandwidth up. For example, there is an Auto Routing policy with
participants WAN1, WAN2 and WAN3. If, at some time, the available inbound bandwidth on WAN1, WAN2 and
WAN3 is 4Mbps, 10Mbps and 6Mbps, and the available outbound bandwidth on WAN1, WAN2 and WAN3 is
8Mbps, 5Mbps and 20Mbps, the weight of each WAN link is so that calculated as:
Before the weights are updated next time , By Total Traffic returns one of the three WAN links for the load
balancing policy in circular order with weight 400:625:800. Weights will be updated by calculating with real-time
available bandwidth every three seconds.
Algorithms By Upstream, Downstream and Total Traffic measure the transmission ability of a WAN link only
between the FortiWAN device and the gateway of its ISP network (last mile). The available bandwidth of a WAN
link is measured on the network interface of the WAN link. Algorithms By Upstream, Downstream and Total
Traffic do not guarantee transmission ability between the ISP network and destinations.
By Optimum Route
Relative to algorithms By Upstream, Downstream and Total Traffic , By Optimum Route evaluates a WAN link
with not only its traffic loading but also the round-trip time (RTT) between FortiWAN and the destinations. The
evaluation involves bandwidth usage of a WAN link and the RTT, which responses the network conditions closer
to reality. For example a WAN link with the most available bandwidth might not be the best choice for data
transferring to a destination, if it has the worst RTT. Conversely, the WAN link with fewer available bandwidth
might be picked by Optimum Route if the RTT is good. By Optimum Route works for Auto Routing and
Multihoming to mainly avoid the peering issue between ISP networks. Optimum Route works via various
detections and measures. It requires to have the details configured first to make sure it works appropriately (See
Optimum Route Detection).
By Response Time
By Response Time is only used by Virtual Server (see Virtual Server & Server Load Balancing) for distribute
incoming service requests to internal servers to achieve server load balancing. By Response Time measures the
response time of each internal server by sending a detection packets, and picks one server with the lowest
response time for Virtual Server routes the matched requests to it.
By Static
By Static is only used by Multihoming for responding fixed IP addresses to DNS requests for an A/AAAA record
without considering the traffic loading and connectivity state of each WAN link. By Static deprives Multihoming of
inbound load balancing and WAN link failover; retrogrades it back to general DNS service. Note that the external
clients will access to the responded IP addresses, and the accesses might be stuck or failed if the WAN link is
congested or unavailable.
By Fixed
By Fixed is only used by Auto Routing for routing outbound traffic to a fixed WAN link without considering the
traffic loading on the WAN link. Different from Multihoming's By Static, By Fixed will not return the WAN link to
Auto Routing if it is unavailable. It requires a fail-over policy (configured in a filter rule) to achieve WAN link
failover when the fixed WAN link is failed. By Fixed deprives Auto Routing of outbound load balancing.
Fail-Over
The Fail-Over algorithm is only used by Multihoming to response the IP address of the first-available WAN link to
a DNS request. When this algorithm is applied, Multihoming check the health status of each WAN link candidate
of an A/AAAA policy from top to bottom, and always responses the first-available WAN link to DNS queries.
Hash
Hash is only used by Virtual Server for distribute incoming service requests to weighted internal servers to achieve
server load balancing. The source IP addresses of a service request will be translated from dot-decimal address
to a decimal value first. This value is then hashed by calculating the reminder of the division of the value by the
sum of weights (modulo operation), and the reminder indicates the internal server that the service request should
be directed to. For example, if there are three servers (serv1, serv2 and serv3) weighted with 1:2:3 in the server
pool, requests that their IP addresses are congruent modulo 6 (sum of the servers' weight:1+2+3) will be assigned
to the same server according to the weights (reminder 0 indicates serv1, reminders 1 and 2 indicate serv2,
reminders 3, 4 and 5 indicate serv3). The following table lists the examples how the hash function works for
Virtual Server:
The traditional method of backing up WAN links by having a secondary WAN link taking over the failed link.
Basically having a main line and a second line as backup, aided by any standard router’s backup policy, minimum
fault tolerance can be achieved. This kind of approach means certain lines remain idle for most of the time and it
is a waste of resources. In addition, the router configurations can be tedious.
Another approach for multiple WAN links backup is by dividing the LAN into multiple segments, each doing its
own thing as they are all independent WAN links. Under standard conditions, each segment has its own way
using separate routers. When one of the WAN links fails, the administrator has to change the router configuration
to bypass the failed link. The obvious drawback to this approach is the unnecessary workload for administrators.
Whenever WAN link status changes, the LAN environment settings (such as gateway, netmask, router policies,
proxy settings, etc) all need to be adjusted.
FortiWAN has an internal “Virtual Trunk” circuit, which is essentially a combination of the multiple WAN links.
Auto routing is capable of adjusting the ‘Virtual Trunk” to include only the WAN links that are functioning normally
and to direct outbound traffic through the “Virtual Trunk circuit” without human intervention. Network users will
therefore not be able to notice any change of status in WAN links (See "WAN Link Health Detection").
The figure above illustrates auto routing securing uninterrupted connection to the internet even during WAN link
failures. Compared to the traditional multiple WAN link usage, auto routing can effectively use all available WAN
links to balance outbound traffic even when all the WAN links are in perfect working condition. Auto routing
cannot prevent data loss on a WAN link when it fails, but all subsequent sessions will be automatically routed to
other working links.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Auto Routing service, see
"Log", "Statistics: Traffic", "Statistics: Bandwidth" and "Reports".
Configurations
It allows administrators to determine the way traffic is routed to WAN links. Multiple WAN links have a variety of
ideal auto-routing methods for any network environment. Auto routing is configured in 2 steps: Policies and
Filters.
Policy
An Auto Routing policy defines how to dynamically distribute outbound traffic (sessions) over multiple WAN links
according to traffic loading of the WAN links, which achieve the outbound load balancing. The basic items to
define a policy are the load balancing algorithm and the related WAN parameters. By associating an Auto Routing
filter rule with a policy, Auto Routing can determine a good WAN link among the candidates and route the out-
going sessions that match the filter rule to the WAN link.
Label Enter a name to the auto routing policy. The label (policy name) will be listed in
the Routing Policy drop-menu later for assigning a policy to a filter.
Algorithm Select an load balancing algorithm from the drop-down menu for this routing
policy. System distributes sessions that match this policy among WAN links
according to the algorithm. The algorithms for options are:
l Fixed
l Round-Robin
l By Connection
l By Downstream Traffic
l By Upstream Traffic
l By Total Traffic
l By Optimum Route
See Load Balancing Algorithms for the details.
Parameter Select the WAN links from the WAN parameters for this routing policy to
distribute sessions among. Numbering schemes indicate the WAN links.
According to the algorithm, system dynamically routes each matched
session to one of the participating WAN links. The WAN parameters varies
from the chosen algorithm:
Filter
Auto Routing filters are used to evaluate against the outbound sessions (sessions from LAN and DMZ to the
Internet through the FortiWAN). The routing policy and fail-over of a matching filter rule are applied to the
evaluated sessions. Base on the specified policies, Auto Routing determines which WAN port to use for
forwarding packets of the sessions. A filter rule consists of a set of filter terms (When, Input Port, Source,
Destination and Service) and the related policies (Routing policy and Fail-over policy) for action.
When Select a time period for this filter term to evaluate the outbound sessions by
the receiving time, or leave it as All-Time. See Busyhour Settings for details.
Input Port Select a interface that packets are received on for this filter term to evaluate
the outbound sessions, or leave it as Any Port. See Using the web UI for
details.
Source Define the source that packets come from for this filter term to evaluate the
outbound sessions, or leave it as Any Address. See Using the web UI for details.
Destination Define the destination that packets are destined to for this filter term to evaluate
the outbound sessions, or leave it as WAN. See Using the web UI for details.
Service Define the service that the packets belong to for this filter term to evaluate the
outbound sessions, or leave it as Any. See Using the web UI for details.
Routing Policy Specify a routing policy for sessions that match this filter rule, or leave it as
Default Policy. A matched session will be dynamically routed to a WAN link
according to the policy. All the predefined routing policies are list here for options.
Fail-over Policy Once all the WAN links defined to a routing policy get failed, the fail-over
policy will take effect. The fail-over policy could be one of the following
options:
L Check to enable logging. Whenever the rule is matched, system will record the
event to log file.
Example 1
Note: Labeling the policies alone does not mean the policy has been set up. Configuring WAN link bandwidth
must be done under [System] -> [Network Settings].
Example 2
6. Route connections through WAN#1 and WAN#2 depending on the bandwidth left in the downstream traffic of
each WAN link.
7. Route connections through WAN#2 and WAN#3 depending on the bandwidth left in the total traffic of each WAN
link.
Round-Robin 1:1:1 Round-Robin Enter “1” for WAN #1, WAN #2, and
WAN #3
Round-Robin 1:2:3 Round-Robin Enter “1” for WAN #1, “2” for WAN
#2, "3" for WAN #3
See also
Multihoming
Multihoming is a technique when external users request any server’s IP address; Multihoming promptly returns
DNS response according to the link quality. This provides unmatched availability of bandwidth and load-balances
incoming traffic across the multiple ISP lines.
Simultaneously using multiple IP address provided by the ISP connections can result in problems with inbound
traffic. For example, if the network is currently using an IP provided by ISP1, and a problem occurs with this ISP,
then the inbound query will not be received because the external traffic only knows the IP address provided by
ISP1. Also, by using the IP provided ISP1, ISP2 cannot manage the inbound traffic of ISP1. Therefore the
concern with multiple ISP links is how to effectively display IP address to the external environment.
Multihoming uses DNS fault-tolerance technique to resolve this problems with the simultaneous use of multiple
ISP connections. For example, if the web server for external traffic uses a single ISP connection, then any
problems with that connection will affect the network. However, if the DNS periodically assigns different IP
addresses provided by different ISP connections, then the external traffic will always have a valid IP to connect to.
The actual implementation is assigning a name of different IP, and any query to this name will receive an IP
address. As a result, different users can access the web server through different IPs, which is the purpose of
Multihoming.
Assuming, there are three WAN links (therefore three different IPs) for the web site of www.example.com, the
DNS record has three entries:
www IN A 211.21.10.3
www IN A 63.98.110.123
www IN A 192.136.1.243
All DNS requests to www.example.com will be sent to FortiWAN. Multihoming will constantly measure the health
conditions as well as the state of each WAN link and compute the optimal return answer to the DNS queries,
defined as the SwiftDNS technology. The SwiftDNS technology will not only ensure fault tolerance for inbound
traffic, it also supports powerful and flexible load balancing algorithms as in the Auto Routing mechanism to
enable users with heavy web presence to maximize the reliability and efficiency of their web services.
The SwiftDNS Multihoming mechanism requires network administrators to understand the details of the system
behavior. The fundamental concept of the DNS mechanism is shown in the next section. A step by step
deployment tutorial will also be provided.
Introduction to DNS
DNS server differs from the host file based on name resolution. Host file contains information of IP address
mapping information. It is only useful for intranet where the information of host machines is relatively static.
Name resolution by DNS server is dynamic because it can adapt to changes easily. The way it works is based on
DNS server hierarchy on the Internet. If a DNS server cannot resolve a name (the information is not in its cache),
it will ask other DNS servers. There is a protocol on how and where to ask other DNS servers.
A name resolution request may go through a number of DNS servers. When an answer is found, it will be saved in
cache so that the same request can be answered immediately without asking other DNS servers again. Each
name resolution result saved in cache has a TTL (Time To Live). After the period of TTL, it will be discarded in
order to avoid stale information.
The whole internet has a large DNS hierarchy. The top of the hierarchy is called Root. It consists of a set of Root
DNS servers coordinated by ICANN. The next level below Root is Top Level Domain (TLD). TLD registration
database contains information about top level domains such as CA, COM, EDU, GOV, NET, etc. The next level
below TLD is Second Level Domain (such as whitehouse.gov, Microsoft.com, inforamp.net, etc.) followed by
Third Level Domain, and so on.
You can apply for domains for your organization. First, go to the Internet’s Network Information Center (InterNIC)
to find out if the domain has been registered already. You can also consult the ICANN-accredited registrar
database. Second, register the domain with a registrar. You have to provide at least two DNS servers to serve
DNS requests. If your registration has been approved, then any DNS request to your domain will be forwarded to
the DNS servers you are registered with. For example, xtera.com is registered and InterNIC has put the name
“xtera” into the COM DNS servers.
Once the domain is registered, sub-domains can be created. Example: a part or the network can be named
“sales.xtera.com”. InterNIC’s approval is not required for creating sub-domains. However, it is important to put
DNS information about sales.xtera.com into the DNS servers of xtera.com.
Here is an example of how DNS hierarchy works. A user at a university sees a link to sales.xtera.com on a web
page and clicks it. The browser will ask the local DNS server dns.utexas.edu about sales.xtera.com. Suppose it is
not in the cache of dns.utexas.edu. The DNS server goes to a Root DNS server to find the DNS server for COM
TLD. The DNS server for COM TLD tells dns.utexas.edu to go to dns1.xtera.com. Finally dns.utexas.edu is given
the IP address of sales.xtera.com by dns1.xtera.com.
SwiftDNS
One of the problems with traditional DNS servers are facing is TTL. A long TTL means a long update time when
IPs have been changed. Before the update time is up (i.e. TTL is expired), DNS requests may be answered with
incorrect information. FortiWAN employs SwiftDNS for multihoming based on the health state of the link and a
traffic re-directing algorithm. SwiftDNS dynamically answers DNS requests to prevent broken or congested links.
In order to solve the TTL issue stated above, SwiftDNS maintains a very short TTL and actively sends out
updates to internal DNS in case of link status changes.
In this case, a web site at 192.168.100.1 in LAN is exposed to these two IPs. When both ISP links are working
properly, FortiWAN replies to DNS requests for www.example.com with 210.58.100.1 and 215.59.100.1 at ratio
of 1:2 (weight ratio).
Assuming ISP1 is down and a DNS request for www.example.com comes in, it would not be able to go through
210.58.100.1 but it will be able to reach 215.59.100.1. Multihoming detects the link status of WAN1 and answer
the request with 215.59.100.1.
DNSSEC Support
The DNS Security Extensions (DNSSEC) is a specification that adds data authentications and integrity to
standard DNS. To resist tampering with DNS responses, DNSSEC introduces PKI (Public Key Infrastructure) to
sign and authenticate DNS resource record sets within the zone. A signed zone includes a collection of new
resource records: RRSIG, DNSKEY and DS.
l RRSIG contains the DNSSEC signature for the corresponded DNS records (A, AAAA, MX, CNAME and etc.) within
the zone.
l DNSKEY contains the public key corresponded to the private key used to generate RRSIG records. A DNS resolver
uses it to verify DNSSEC signatures in RRSIG.
l DS (Delegation Signer) references to the public key used to verify the RRSIG in your zone. Every DS record should
be signed by your parent zone and stored in the parent zone to establish trust chain between DNS zones.
Multihoming supports basic DNSSEC which employs only one key pair KSK (Key Sign Key) to generate DNSKEY
and RRSIG records for the zone (NSEC is not supported). The supported algorithm and key size are only
RSASHA512 and 2048 bits. Note that Multihoming’s DNSSEC is not supported for Relay Mode.
Remember that you have to configure DS records with your domain registrar after you complete configurations for
DNSSEC. Please contact your domain registrar for further details about managing DS records.
Relay Mode
For the case that a DNS server already exists in you network, Relay Mode is the way to combine the existing DNS
servers with Multihoming's inbound load balance and fault tolerance. With Relay Mode enabled, FortiWAN will
forward all the DNS requests it receives to the specified name servers, in stead of processing the requests
directly. Answer of the DNS request will be responded to FortiWAN from the name server. FortiWAN's
Multihoming then reprocess the answer with appropriate IP address according to the AAAA/A records and AAAA/A
policies (load balancing algorithm). The DNS answer that contains appropriate IP address will finally responded to
client, so that the inbound access could connect via the appropriate WAN link.
Enable Backup
FortiWAN Multihoming employs Backup mechanism to provide disaster recovery approach for network across
various regions. Under this mechanism, the same backup service is set up across different regions. Therefore,
when master site is down, backup site will immediately take over to resume the service.
To deploy Multihoming Backup between two FortiWAN units for one domain, at least one of the WAN links'
localhost IPv4 addresses of each FortiWAN unit must be registered with the parent domain (so that a DNS
request for the domain can be delivered to the two FortiWAN units). Check "Enable Backup" on the Slave
FortiWAN Web UI and specify the IPv4 addresses (which are registered with parent domain) of the Master
FortiWAN in "Remote Master Servers". Configurations for Multihoming Backup deployment is only necessary on
the Slave unit, please do not check "Enable Backup" on the Master unit.
Then the Slave unit will detect the state of the Master unit periodically with its built-in Dig tool. The detect packets
will be delivered to Master unit via the IP addresses specified on the Slave unit. When the Master's Multihoming
works properly, the Slave's Multihoming will get into non-active mode (Unit that is in non-active mode will not
answer to any DNS request); when the Master's Multihoming is down, the Slave will get into active mode and take
over to resume Multihoming. After takeover, the Slave will continuously detect Master's state. Once the Master
recovers, the Slave will return Multihoming service back to Master and get into non-active mode. This is how the
Backup mechanism offers disaster recovery function. DNS database synchronization is not provided for
Multihoming Backup deployment, so that DNS database can be maintained individually on the two units for local
and remote-backup services. In case that multiple IP addresses of FortiWAN are registered with parent domain
(to avoid single WAN links failure), those IP addresses should be configured into the "Server IPv4 Address" field
on the Slave unit.
Configurations
Auto-routing is a trunking technology that provides load balancing and fault tolerance for all outbound requests,
but it does not apply to inbound requests. These are handled by a unique technology called SwiftDNS, a
multihoming service which includes load balancing and fault tolerance for inbound requests. The minimum
requirements for multihoming are networks must have multiple WAN links and registered domain names for
publicly accessible servers. Note that a DNS request from client is delivered to FortiWAN via a fixed WAN link,
whose the IP address is registered with parent domain. It would be better to have multiple IP addresses
registered to avoid single WAN link failure.
When FortiWAN receives a DNS query, it replies with a public IP assigned to one of the WAN links based on the
settings of the answering policies. Therefore, subsequent requests to server will be sent to a public IP of the WAN
link based on FortiWAN’s previous response. The policies are based on weight for each WAN link and are
definable. Multihoming is also capable of automatically detecting the best links by “Optimum Route”, and if WAN
link failure occurs, the public IP assigned to that failed link will not be returned even though the servers are still
reachable via other links.
FortiWAN offers two options for Multihoming: Non Relay Mode and Relay Mode. The details of will be explained
in this section.
The section explains how to configure Multihoming. First, check the box to enable Multihoming in "Enable
Multihoming". Multihoming supports Backup mechanism. To enable this function, check “Enable Backup” and
enter the IP addresses of the backup server.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Multihoming service, see
"Log", "Statistics: Traffic", "Statistics: Bandwidth" and "Reports".
Non-Relay Mode
To enable Multihoming in non-relay mode, go to Service > Multihoming on the Web UI, check the box Enable
Multihoming, and uncheck the box Enable Relay. FortiWAN will performs DNS analysis on local host if the
relay mode is disabled. It contains three blocks to get non-relay mode Multihoming configured: Global Settings,
Policy Settings and Domain Name Settings.
PTR (Pointer Record) is used to resolve the IPv4/IPv6 address to a domain or hostname.
TTL Set the TTL for the PTR record. TTL (Time To Live) Specifies the amount of time that the
record will stay in cache on systems requesting the record (other resolving nameservers,
applications, browsers and etc.).
Reverse Lookup Set the reverse lookup zone (domain) of the hosts for the PTR record. Click the add
Zone button to create new tables for configuring other zones.
Zone Name The reverse lookup zone name. For hosts in IPv4 subnet 1.2.3.0/24
(such as 1.2.3.4, 1.2.3.5 and etc.), the reverse lookup zone for its
PTR records is 3.2.1.in-addr.arpa. Thus, this field should be filled in
with "3.2.1". For host with IPv6 2001:470:0:64::2 (/64), the reverse
lookup zone is 4.6.0.0.0.0.0.0.0.7.4.0.1.0.0.2.ip6.arpa and this
field should be filled in with "4.6.0.0.0.0.0.0.0.7.4.0.1.0.0.2".
Primary Name The primary name server for the reverse lookup
Server zone or the first name server in the name server
list below.
NS1 NS record. The primary name server for the reverse lookup zone.
NS2 NS record. The secondary name server for the reverse lookup zone.
Entries Set the PTR entries in the reverse lookup zone. Click the add button to
create multiple PTRs.
An A/AAAA record policy defines how to dynamically answer to the requests for an A/AAAA record according to
traffic loading of WAN links, which achieve the inbound load balancing. The basic items to define a policy are the
load balancing algorithm and the related WAN parameters. By associating an A/AAAA record with a policy,
Multihoming can determine a good WAN link among the candidates and answer the WAN port IP to the requests
for the A/AAAA record. Click the add button to create a new policy and get the following settings configured.
Policy Name Enter a name to the A/AAAA record policy. The policy name will be listed in the To
Policy drop-menu of an A/AAAA configuration for assigning a policy to an A/AAAA
record.
Algorithm Select an load balancing algorithm from the drop-down menu for this A/AAAA
policy. Multihoming determines a WAN link among the candidates according
to the selected algorithm and replies its IP to requests for a A/AAAA record.
The algorithms for options are:
Policy Advanced Setting Set the WAN parameters to the selected algorithm for this policy. By clicking the
add button aside the WAN Link field, you add one or more WAN links to the policy
for the select algorithm. The algorithm selects one of them for Multihoming to reply
a DNS query. For algorithm By Static, only the IP addresses are required, no WAN
link is involved. Click the add button to add one or more static IPs for it. The
followings are the WAN parameters need to be configured.
Domain Settings
Non-relay mode Multihoming not only performs the inbound load balancing, but also manages domains and
resolves hostnames. Thus, Multihoming supports the resource records, NS, A/AAAA, CName, DName, SRV, MX
and TXT, for a managed domain. Among the records, A/AAAA records are required to associate with predefined
policies to achieve the idea of inbound load balancing. It contains the following settings to get a domain
configured to Multihoming: basic domain information, DNSSEC, related resource records and external sub-
domain of the domain.
The table below configures Domain Settings: multihoming domain names, DNS servers names (for querying
domain), and answering policies to be applied when being given a prefix of the domain name.
It usually requires to assign a DNS/Host Server Name and the corresponding IP address to a domain when you
register it to a domain name registrar. It tells the registrar that the domain is delegated to the specific name
server. Let's assume that a domain example.com is registered to a registrar with specifying "DNS Server
Name=ns1.example.com" and "IP address=10.10.10.10". ns1.example.com is the name server responsible
(authoritative) for the domain example.com and its IP is 10.10.10.10. This is what for the TLD authorities to
place NS records in the TLD name servers to point to the domain, and so that the recursive name servers can
work out who is really in charge of this domain. For non-relay mode Multihoming, the FortiWAN device would be
the name server authoritative for this domain. The DNS Server Name (name server) you used to register the
domain can be named without restrictions (such as ns1 in the example), but the IP address (10.10.10.10) must
be an IP that is deployed on one of the WAN links of the FortiWAN, so that requests for the domain can be finally
delivered to FortiWAN's Multihoming.
The following settings is actually for the SOA record of the domain in Multihoming.
TTL Set the TTL (Time to Live) for the domain information.
Responsible Mail Enter an administrator's email for this domain. Note that the @ symbol is not
acceptable to Multihoming. You are required to replace the symbol @ of the email
address with a dot ".", such as admin.mail.example.com.
Primary Name Server Enter the hostname of name server authoritative for this domain. Usually, it
is the prefix of DNS Server Name that you specified for registering the
domain, such as ns1 for ns1.example.com. Dot characters within a
hostname is acceptable, such as abc.ns1 for abc.ns1.example.com or
abc.d.ns1 for abc.d.ns1.example.com. The domain name specified above
is appended automatically to this hostname in Multihoming system backend.
A hostname ends with a dot character, such as ns1. is not acceptable.
Note that after applying the configurations, this primary name server and the
corresponding IP addresses (set in the following fields) for the domain will be
automatically added to the NS and A/AAAA records.
IPv4 Address The IPv4 address that you specified for registering the domain, such as
10.10.10.10 in the above example.
IPv6 Address The IPv6 address that you specified for registering the domain if it is necessary.
DNSSEC
As the previous descriptions, Multihoming supposes the DNSSEC to protect the DNS resource records in the
domain. To enable it, the followings are the settings need to get configured.
Private Key Click the [+] button to generate DNSSEC private key used to sign the domain. This
private key information will be listed. DNSKEY record and RRSIG record set for this
domain are generated while applying the domain configuration. (For multiple keys,
use the [+] key)
Signing States for the key, Active or Standby for options. Keys in the active state are those that
are in use. Keys in standby state are not introduced into the zone.
Algorithm Only RSASHA512 is supported. This field is visible only for Administrator permission.
Key Size Only 2048 bits is supported. This field is visible only for Administrator permission.
Hash Hash of the public key. Send the hash value to parent zone to generate a DS record.
Modulus Public modulus for the keypair. This field is visible only for Administrator permission.
PublicExponent Exponent for the public key. This field is visible for only Administrator permission.
PrivateExponent Exponent for the private key. This field is visible for only Administrator permission.
Prime1 Prime number 1 for the keypair. This field is visible for only Administrator permission.
Prime2 Prime number 2 for the keypair. This field is visible for only Administrator permission.
Notice:
1. You can generate multiple key pairs in batches from the configuration panel. Generally one key pair is in Active
state for using while the other key pairs are in Standby state for manually key rollover at the appropriate time as
determined by your key management policy.
2. In case of replacement keys, it is strongly suggested to keep both new and old keys in Active state for at least one
TTL value. When the caching of records using the old keys in external name servers has expired, the old keys can
be deleted.
3. Before deleting DNSSEC keys from your domain, you have to delete the corresponded DS record from the parent
zone. Be careful that any mistake in the process of key replacement or delete might cause DNS queries to your
domain failure.
NS Record
Name Server (NS) records identify the name servers that are authoritative for a DNS domain. It requires at least
one NS record for a domain to tell other name servers who to ask for resolving the domain name. For
Multihoming, after the previous settings Domain Name, Primary Name Server and IPv4 Address are configured,
the values will be automatically set to a NS record and an A/AAAA record for the domain. For example:
example.com. 86400 IN NS ns1.example.com
You do not need to manually add a NS record and an A/AAAA record for the primary name server through the
Web UI.
You can have multiple NS records in a domain, if there are multiple name servers authoritative for the domain for
redundancy purpose. So that if the primary name server is unavailable, the domain will still be accessible.
Configure the following settings to add the redundant NS records.
Name Server The other name server authoritative for the domain, except the primary name
server. This field can be configured in two formats: a hostname (prefix) or a
FQDN.
Hostname (prefix)
Text string (dot characters within is acceptable) specified here that does not end
with a dot character is regarded as a hostname (prefix) of the name server, and
the base domain specified previously will be appended automatically to this
hostname in Multihoming system backend. For example entering "ns2", "abc.ns2"
or "abc.d.ns2" here, if the name server’s FQDN is ns2.example.com,
abc.ns2.example.com or abc.d.ns2.example.com. The corresponding NS record
in backend will be:
example.com. 86400 IN NS ns2.example.com
or
example.com. 86400 IN NS abc.ns2.example.com
or
example.com. 86400 IN NS abc.d.ns2.example.com
FQDN
On the contrary, text string (dot characters within is acceptable) specified here that
ends with a dot character is regarded as a FQDN of the name server, and the base
domain specified previously will not be appended to it in backend. For example
entering "ns2.example.com.", "abc.ns2.example.com." or "ns.otherdomain.com."
here, if the name server’s FQDN is ns2.example.com, abc.ns2.example.com or
ns.otherdomain.com. The corresponding NS record in backend will be:
example.com. 86400 IN NS ns2.example.com
or
example.com. 86400 IN NS abc.ns2.example.com
or
example.com. 86400 IN NS ns.otherdomain.com
A NA record configuration entry implies a NS record and an A/AAAA record in the domain. For example:
example.com. 86400 IN NS ns2.example.com
You do not need to manually add an A/AAAA record for the NS record through the Web UI.
A/AAAA Record
A/AAAA record (Address Record) points a FQDN (fully qualified domain name) to an IP address, so that a host
(such as www.example.com) can be found. A traditional A/AAAA record is configured with a specific host and a
fixed IP for connecting to the host. However, Multihoming dynamically determines the IP according predefined
policies. Thus, the settings of an A/AAAA record will associate a host with a policy (please get the A/AAAA record
policies configured first).
Host Name Hostname (prefix) of a computer or server within the domain. Enter "www" if the FQDN
to be resolved is www.example.com, or enter the wildcard character * (see Support
wildcard in A/AAAA records). Dot characters within the hostname here is not
acceptable.
When Select a time period for this filter term to evaluate the DNS queries by the receiving
time, or leave it as All-Time. See Busyhour Settings for details.
Source Define the source IPv6/IPv4 address for this filter term to evaluate DNS queries by
where they come from, or leave it as Any Address. This could be a single IP, a range of
IPs or an IP subnet.
To Policy Select a predefined A/AAAA record policy used for the domain settings. Specify an
A/AAAA policy for DNS queries that match filter items: Host Name, When and Source.
According to the policy, Multihoming determines an IP for answering the matched
query. All the predefined A/AAAA record policies are list here for options.
TTL Set the TTL (Time to Live) for the A/AAAA record.
You can associate a hostname with multiple policy by the filter items When and Source. Multihoming resolves the
same domain name with different policies by the receiving time and source of the DNS queries. For example:
Host Name=www, When=Idel, Source=Any Address, To Policy=Policy_A
For example, we have a domain example.com and its resource records as followings:
Primary name server=ns1, IPv4 Address=10.10.10.1
NS Record: Name Server=ns2, IPv4 Address=10.10.10.2
A Record: Host Name=www, To Policy=policy_www
A Record: Host Name=ftp, To Policy=policy_ftp
A Record: Host Name=*, To Policy=policy_wildcard
External Sudomain Record: Subdomain Name=subdomain1
NS Record of the subdomain: Name Server=ns3, IPv4 Address=20.20.20.1
Any DNS query for hostnames and subdomain excepting "www", "ftp", "ns1", "ns2", "subdomain1" and
"ns3.subdomain1" will match the wildcard A record and be answered according to the wildcard policy policy_
wildcard.
l Request for ns1.example.com will be answered with 10.10.10.1.
l Request for ns2.example.com will be answered with 10.10.10.2.
l Request for ns3.subdomain1.example.com will be answered with 20.20.20.1.
l Request for ftp.example.com will be answered by policy_ftp.
l Request for www.example.com will be answered by policy_www .
l Requests for FQDNs such as abc.example.com, abc.d.example.com and abc.d.e.example will be answered by
policy_wildcard.
Note that wildcard character is only supported for A/AAAA and CName records.
CName Record
CName (Canonical Name) records are used to alias one hostname to another, so that a host can be known by
more than one hostname. The hostname of a host that is stated in an A/AAAA record is called the canonical
name of the host. It always require an A/AAAA record for the host first to point an alias to the canonical name in a
CName record then. An host can have multiple alias name, but an alias can only be assigned to one host.
Alias Alias name for a host. This field can be configured in two formats: a hostname
(prefix) or a FQDN.
Hostname (prefix)
Text string (dot characters within is acceptable) specified here that does not end
with a dot character is regarded as a prefix of the alias name, and the base
domain specified previously will be appended automatically to this prefix in
Multihoming system backend. For example entering "www" or "www.abc" here, if
you want to alias a target host1.example.com to www.example.com or
www.abc.example.
FQDN
On the contrary, text string (dot characters within is acceptable) specified here that
ends with a dot character is regarded as a FQDN of the alias name, and the base
domain specified previously will not be appended to it in backend. For example
entering "www.example.com." or "www.abc.example.com." here, if you want to
alias a target host1.example.com to www.example.com or www.abc.example.
Target Canonical name (the real name) of the host that you want to alias. This field can
be configured in two formats: a hostname (prefix) or a FQDN.
Hostname (prefix)
Text string specified here that does not contain a dot character is regarded as a
hostname (prefix) of the target, and the base domain specified previously will be
appended automatically to this hostname in Multihoming system backend. For
example entering "host1" here if you want to alias host1.example.com to
www.example.com. In this case, this name must be stated in an A/AAAA record
first.
FQDN
Text string specified here that contains dot characters is regarded as a FQDN of
the target (but text string that ends with a dot character is not acceptable), and the
base domain specified previously will not be appended automatically to it in
backend. For example entering "host1.example.com" here if you want to alias
host1.example.com to www.example.com, or entering "host.otherdomain.com"
here if you want to alias an external target host.otherdomain.com to
www.example.com. This can be used to configure a CName record for DKIM
signing.
TTL Set the TTL (Time to Live) for the CName record.
CName record is a better way to manage alias for a real host than creating multiple A/AAAA records for it, but all
the name resolving via CName records will be redirected to the only one A/AAAA record, which is applied to the
one A/AAAA record policy. If a host is aliased through multiple A/AAAA records, different A/AAAA records might
be applied to each of them.
A wildcard character is supported for Multihoming's CName record to represent all the possible subdomain name
in an alias name. For example if the alias name of a CName record is configured as *.example.com, queries for
such as
l www.example.com
l ftp.example.com
l 123.example.com
l www.a.example.com
l www.a.b.example.com
l www.a.b.c.example.com
will match this CName record and be pointed to a A/AAAA record according to the target name in the CName
record. To use the wildcard character in an alias name, it must start with "*.". Combinations such as "*abc", "abc*",
"a*bc" and "abc.*", and standalone "*" and "*." are not be acceptable. You can use *.example.com. (do not miss
the dot in the end) to cover all the possible subdomain names of example.com. The following example describes
how it works:
It matches the alias name www and then refers to the A record with the host name host1 (according to the target
name). If the time and source of the request matches this A record, the request will be answered according to the
corresponding A record policy: policy_host1.
It matches the alias name *.abc and then refers to the A record with the host name wildcard1 (according to
the target name). If the time and source of the request matches this A record, the request will be answered
according to the corresponding A record policy: policy_wildcard1.
It matches the alias name *.abc and then refers to the A record with the host name wildcard1 (according to
the target name). If the time and source of the request matches this A record, the request will be answered
according to the corresponding A record policy: policy_wildcard1.
It matches the alias name *.abc and then refers to the A record with the host name wildcard1 (according to
the target name). If the time and source of the request matches this A record, the request will be answered
according to the corresponding A record policy: policy_wildcard1.
It matches the alias name *.example.com. and then refers to the A record with the host name wildcard2
(according to the target name). If the time and source of the request matches this A record, the request will be
answered according to the corresponding A record policy: policy_wildcard2.
It matches the alias name *.example.com. and then refers to the A record with the host name wildcard2
(according to the target name). If the time and source of the request matches this A record, the request will be
answered according to the corresponding A record policy: policy_wildcard2.
It matches the alias name *.example.com. and then refers to the A record with the host name wildcard2
(according to the target name). If the time and source of the request matches this A record, the request will be
answered according to the corresponding A record policy: policy_wildcard2.
Note that wildcard character is only supported for A/AAAA and CName records.
DName Record
DName (Delegation Name) records are used to alias an entire subtree of a domain to another. An domain can
have multiple alias, but an alias can only be assigned to one domain.
Alias Alias name for a domain. Note that domain name of the domain you are setting
for will be appended to the value you specify here, to become the final alias name.
For example, specifying the Alias field here with "another" in base domain
example.com means you alias a domain (the domain you are required to set in
Target field) to another.example.com.
For in-zone redirection, you should enter "example.com" for the target if you are
setting the DName records in the base domain example.com. For example,
queries for www.another.example.com will be redirected to www.example.com.
For out-zone redirection, you could enter another domain name here such as
"another.com" or others. Queries for www.another.example.com will be
redirected to www.another.com then. Of cause, domain another.com must be
delegated first.
TTL Set the TTL (Time to Live) for the DName record.
SRV Record
Service Specify the symbolic name prepended with an underscore, for example, _http, _ftp or
_imap.
Protocol Specify the protocol name prepended with an underscore, for example, _tcp or _udp.
Priority Specify the relative priority of this service (0 - 65535). Lowest is highest priority.
Weight Specify the weight of this service. Weight is used when more than one service has the
same priority. The highest is most frequently delivered. Leave is blank or zero if no
weight should be applied.
TTL Set the TTL (Time to Live) for the SRV record.
MX Record
MX (Mail Exchanger) record specifies a mail server responsible for accepting recipient email messages for your
domain.
Host Name The domain name that the mail servers are responsible for. This field can be
configured in two formats: a hostname (prefix) or a FQDN.
Hostname (prefix)
Text string (dot characters within is acceptable) specified here that does not end
with a dot character is regarded as a prefix of the domain, and the base domain
specified previously will be appended automatically to this prefix in Multihoming
system backend. For example, if a mail server is responsible for the recipient
emails such as [email protected], enter “mail” here. If the mail server is
responsible for the recipient emails such as [email protected], leave this field
blank.
FQDN
Text string (dot characters within is acceptable) specified here that ends with a dot
character is regarded as a FQDN of the domain, and the base domain specified
previously will not be appended to it in backend. For example, if a mail server is
responsible for the recipient emails such as [email protected], enter
“mail.example.com.” here. If the mail server is responsible for the recipient emails
such as [email protected], enter “example.com.” here.
Priority The priority of the mail servers. This value is used to prioritize mail delivery if multiple
mail servers for a domain are available (Note that each mail server requires a
corresponding MX record).The higher the priority is, the lower the number is.
Mail Server The host name of the mail server responsible for the domain specify in Host Name
field. The host must be manually predefined in an A/AAAA record or a CName
record. This field can be configured in two formats: a hostname (prefix) or a
FQDN.
Hostname (prefix)
Text string specified here that does not contain a dot character is regarded as a
hostname (prefix) of the mail server, and the base domain specified previously will
be appended automatically to this hostname in Multihoming system backend. For
example entering "ms1" here if ms1.example.com is the mail sever responsible
for domain mail.example.com or example.com. In this case, this name must be
stated in an A/AAAA record first.
FQDN
Text string specified here that contains dot characters is regarded as a FQDN of
the mail server (but text string that ends with a dot character is not acceptable),
and the base domain specified previously will not be appended automatically to it
in backend. For example entering "ms1.example.com." here if ms1.example.com
is the mail sever responsible for domain mail.example.com or example.com, or
entering an external mail server "ms.otherdomain.com" here if it is responsible for
domain mail.example.com or example.com.
For example, to route emails for recipient [email protected] to a mail server mail1.example.com, it
requires the following A/AAAA record and MX record:
TXT (Text) record provides text information a host. The text can be used for a variety of purposes depending on
what you're using the TXT record for. For example, Sender Policy Framework (SPF) is one of the most common
uses for TXT records. TXT records can also be used to describe a server, network, data center, and other
accounting information by containing human readable information.
TTL Set the TTL (Time to Live) for the TXT record.
Host Name The prefix of a domain name that the TXT record is used for. This field can be
configured in two formats: a hostname (prefix) or a FQDN.
Hostname (prefix)
Text string specified here that does not contain a dot character is regarded as a
hostname (prefix) of the domain, and the base domain will be appended
automatically to this hostname in Multihoming system backend. For example, if
this TXT record is used for a domain mail.example.com, enter “mail” here. If the
TXT record is used for base domain example.com, leave this field blank.
FQDN
Text string specified here that contains dot characters is regarded as a FQDN of
the domain, and the base domain will not be appended automatically to this it in
backend. For example, if this TXT record is used for a domain mail.example.com,
enter “mail.example.com” here. If the TXT record is used for base domain
example.com, enter “example.com” here.
TXT Free form text data of any type or information in format <attribute name>=<attribute
value> for specific purposes. For example using a TXT record for SPF to fight spam,
you could specify "v=spf1 a:mail ip4:10.16.130.2/24 ~all" here, which means emails
sent from domain IP 10.16.130.2/24 are effective, while emails sent from other IPs are
assumed as spams.
External subdomain records are used to delegate the responsibility for subdomains to other name servers, which
means the responsibility for the administration of a subdomain (such as child) of the base domain (such as
example.com) will be delegated to another management group (such as child.example.com). Multihoming (the
name server of base domain example.com) is responsible for redirecting all the queries which end with
child.example.com to the subdomain name servers.
Subdomain Name The prefix of the delegated subdomain. For example, if the delegated subdomain is
child.example.com, enter child here. Note that this name can not be a duplicate of what
is specified to the A/AAAA, NS, CName, DName or MX record in the base domain.
NS Record Specify the external name servers that the subdomain is delegated to. The NS records
here will point the subdomain to the responsible name servers. Note that Multihoming
only answers the IP addresses of external name servers authoritative for the subdomain to
the queries for anything in the subdomain. So please have the external name servers
(another machines) configured and online first. If the name servers authoritative for the
subdomain is not a FortiWAN running Multihoming, inbound load balancing is not
available for the subdomain.
Name Server Hostname (prefix) or FQDN of the external name server authoritative
for the subdomain. Enter “ns1” or "ns1.child.example.com.", if the
name server’s FQDN is "ns1.child.example.com" for example. See
section NS Record above for details.
Relay Mode
To enable Multihoming in relay mode, go to Service > Multihoming on the Web UI, check the boxes Enable
Multihoming and Enable Relay.
When Relay is enabled, FortiWAN will relay the DNS requests it receives to a specified name servers, and
reprocess the answer with appropriate IP address according to the AAAA/A record policies. The necessary
configurations for Multihoming in Relay Mode are AAAA/A Record Policy and Domain Settings. The name server
the Multihoming Relay Mode forward a DNS request to must be configured in field "Domain Settings". Only if the
AAAA/A record of the request answer that the name serve responds to FortiWAN matches Multihoming's AAAA/A
Record, the request answer will be reprocesses with appropriate IP address according to the AAAA/A record
policies, otherwise, Multihoming will simply forward the DNS answer to client without any changing. Please
make sure the same configuration of AAAA/A record on both FortiWAN Multihoming and the
specified name server working with Multihoming Relay Mode.
Note that it's necessary to update the registrations on your parent domain with FortiWAN's localhost IP
addresses, so that a request for your domain can be delivered to FortiWAN and forwarded to the specified name
server.
For other query type such as MX and TXT, Multihoming's Relay Mode will simply forward the answer from the
specified name server to clients.
Domain Settings
Domain Name
Domain Name The registered domain name that Multihoming relays the queries for, such as
example.com.
Name Server
IPv4 Address Specify the IPv4 addresses of the name servers authoritative for the domain and
Multihoming relays the queries to.
IPv6 Address Specify the IPv6 addresses of the name servers authoritative for the domain and
Multihoming relays the queries to.
A/AAAA Record
Scenarios
Example 1
Here is a typical usage to balance inbound traffic load by Multihoming (non-relay mode). Thinking about the
inbound traffic to access a virtual server on FortiWAN, Multihoming distributes the accesses over Multiple WAN
links by dynamically answering the best WAN link IP to DNS queries for www.domainname.com (domain name
of the virtual server). The followings are the related configurations.
An internal web server (192.168.0.100 on HTTP 80) is installed in LAN and virtual server on FortiWAN is
associated with it by the following settings on Web UI: Service > Virtual Server (See Virtual Server for details):
Server IP Service
This web server is bound to the two WAN ports. Accesses on 211.21.33.186 and 61.64.195.150 for HTTP 80 will
be translated to the real server 192.168.0.100 in LAN. To get details about WAN configurations, see Configuring
your WAN.
To make accesses distributed among the two WAN links according their upstream load, you need to have
Multihoming configured as followings. Go to Service > Multihoming on Web UI, enable Multihoming (disable
Relay) and have the following basic settings configured.
2 61.64.195.150
Domain Settings
You need to register the domain domainname.com, the responsible name server ns1.domainname.com and its
IP address 211.21.33.186 to a registrar.
A/AAAA Record
Example 2
Here is another similar usage for Multihoming and an internal SMTP server. Multiple will answer the mail server
responsible for accepting recipient email for domain domainname.com, for example [email protected].
An internal mail server (192.168.0.200 on SMTP 25) is installed in LAN and virtual server on FortiWAN is
associated with it by the following settings on Web UI: Service > Virtual Server (See Virtual Server for details):
Server IP Service
To make accesses distributed among the two WAN links by weighted round-robin, you need to have Multihoming
configured as followings. Go to Service > Multihoming on Web UI, enable Multihoming (disable Relay) and have
the following basic settings configured.
2 61.64.195.150 1
Domain Settings
You need to register the domain domainname.com, the responsible name server ns1.domainname.com and its
IP address 211.21.33.186 to a registrar.
A/AAAA Record
MX Record
Tunnel Routing
Tunneling is a technique to perform data transmission for a foreign protocol over a incompatible network; such
as running IPv6 over IPv4, and the transmission of data for use within a private, corporate network through a
public network. Tunneling is done by encapsulating and decapsulating data and information of the particular
protocol within the incompatible transmission units symmetrically.
Traditional tunneling is established over single WAN link which is a lack of load balancing and fault tolerance.
FortiWAN's Tunnel Routing (TR) is a technique that builds a special connection between two FortiWAN units to
deliver link aggregation and fault tolerance over multiple WAN links ideally tailored for multinational intranet
systems. Different to Auto Routing distributing sessions over WAN links, Tunnel Routing breaks further a session
down to packets over multiple WAN links and allows data to be prioritized during transfer while boosting the
performance of critical services such as VPN and live video streaming while avoiding delays and data loss.
Basically, FortiWAN's Tunnel Routing implies routing packets of a session over tunnels (WAN links), which
contains the two elements - Tunnels and Routing.
GRE Tunnel
FortiWAN's Tunnel Routing sets up proprietary tunnels between symmetric FortiWAN sites (local and remote)
with GRE (Generic Routing Encapsulation) protocol. GRE (Generic Routing Encapsulation) Protocol packs the
Payload (Original Packet) with Delivery Header and GRE Encapsulation Header. Physically, a point-to-point GRE
tunnel for Tunnel Routing is the transimission of GRE packets via a pair of WAN links predefined on the
symmetric FortiWAN sites (a WAN link on the local FortiWAN, and another one on the remote FortiWAN) (See
"Tunnel Group" and "Group Tunnel" in "Tunnel Routing - Setting").
Routing
With the multiple WAN links on each FortiWAN, Tunnel Routing distributes (routes) GRE packets of a session
over the GRE tunnels (a tunnel group) according the balancing algorithms and tunnel status detection. This is
what the load balancing and fault tolerance Tunnel Routing provides for tunneling. Moreover, with proper policy
setting, Tunnel Routing can route GRE packets over multiple sites (more than two sites) without full-mesh
connections between the sites (See "Default Rule", "Routing Rule" and "Persistent Rules" in "How to set up
routing rules for Tunnel Routing"). Briefly, it performs routing of GRE packets over multiple tunnels and multiple
sites.
Scenarios
After the basic concept how Tunnel Routing transfers packets, several topics related to Tunnel Routing are
explained in detail.
the same source and destination, packets that are indicated the source and destination will be first matched to
the Tunnel Routing rule and transferred by Tunnel Routing, without be processed by FortiWAN's Auto Routing
and NAT.
See Configuring the parameters for tunnel health detection for the setting details.
IPSec Support
Although Tunnel Routing provides itself a simple data protection by encrypting the data payload of original
packets, it is not secure enough as standard IPSec's protection. IPSec defines rigorous procedures on security
parameters negotiation, key exchange and authentication to prevent any compromise. Various encryption and
authentication algorithms, and key strengths are contained in IPSec, so that various security levels are provided.
With IPSec protection, a standard virtual private network (VPN) can be implemented.
Although Tunnel Routing connects two incompatible networks (private networks) by tunneling through Internet, it
is seriously not a standard VPN since it is short on security. FortiWAN IPSec (Transport mode) is capable of
protecting Tunnel Routing tunnels, so that Tunnel Routing becomes qualified to the standard VPN. With IPSec
protection, Tunnel Routing not only functions in a securer way, but also keeps the advantage of bandwidth
aggregation and fault tolerance between tunnels. The only sacrifice is dynamic IP addresses and NAT pass
through are not supported for Tunnel Routing over IPSec. Besides, deployments of Tunnel Routing over IPSec is
limited. For more information about Tunnel Routing over IPSec, please refer to "IPSec - About FortiWAN IPSec
VPN", "Limitation in the IPSec deployment" and "IPSec - Define routing policies for an IPSec VPN".
Throughput of a tunnel
As the previous description, a logical tunnel is established by two FortiWAN units via two physical WAN links
(such as WAN1 of FWN-A and WAN2 of FWN-B in the above diagram). Throughput of the tunnel is bounded by
one of the two WAN links with the worst throughput. For example, if throughput of the two WAN links are 30Mbps
and 50Mbps respectively, packets can not be transferred via the tunnel at speed higher than 30Mbps. We can
roughly say that throughput of the tunnel is 30Mbps.
Ideally, we expect data transmission over tunnels can reach to the summary of the maximum throughput of the
tunnels. For example, you might expect a speed close to 100 Mbps if both the two tunnels are 50Mbps. However,
realistic network latency and transport layer protocols make it impossible to aggregate the bandwidth in such
perfect way. We tried to figure out the factors affecting Tunnel Routing performance, and network latency is
surely the major one. If packets of a session is transferred via a group of tunnels (packets are distributed among
the tunnels, the concept of tunnel group will be introduced in Tunnel Routing - Setting), performance of the
transmission will be mainly influenced by the highest latency of the participating tunnels. For example, if
connection latency of two tunnels (such as Tunnel1 and Tunnel2 in above diagram) are 10ms and 30ms
respectively, a transmission via the two tunnels will suffer from 30ms delays. We can roughly say that the latency
that the tunnel group is experiencing is 30ms.
The throughput and quality of WAN links so that are the important factors in your plan for deploying a Tunnel
Routing network. Basically, WAN links with better quality (lower latency) bring better performance for Tunnel
Routing transmission. Measuring the latency of all the pairs of WAN links between two FortiWAN units in advance
helps you to determine the WAN links for the Tunnel Routing network. For example, two FortiWAN units have
three WAN links individually, and the latency of all the pairs of WAN links between the two units is as followings:
According the above measure, pairs of FWN-A's WAN1 and FWN-B's WAN2, FWN-A's WAN2 and FWN-B's
WAN3, and FWN-A's WAN3 and FWN-B's WAN1 are the better connections among all the pairs. It seems that the
three WAN link pairs are qualified to be used for establishing tunnels in your Tunnel Routing network. You can
pick two or three of them and combine them into a tunnel group. FortiWAN provides a benchmark (See "Tunnel
Routing - Benchmark") to measure the latency (RTT) and evaluate the tunnels , which is helpful to plan a Tunnel
Routing network.
Now let's see how the latency influence Tunnel Routing performance. If the WAN link pairs of FWN-A's WAN1
and FWN-B's WAN2, and FWN-A's WAN3 and FWN-B's WAN1 are used to establish tunnels for a tunnel group,
the throughput of the WAN links and the two tunnels are as following:
Tunnel 1 Tunnel 2
As the previous discussion that throughput of a tunnel is bounded to the worse WAN link, throughput of the two
tunnels is bounded to 50Mbps. Similar according previous definition, transmission through the tunnel group
consisting of the two tunnels suffers from 30ms delay, which is the higher latency of the two tunnels. However,
according to measure, this Tunnel Routing deployment (two 50Mbps tunnels with 30ms latency) results in
69Mbps performance, which is 69% usages of the two tunnels (69Mbps/50Mbps+50Mbps). In the measurement
of tunnel performance and latency, bandwidth of the participating WAN links is wholly available for the Tunnel
Routing transmission; there is no other traffic occupied the bandwidth.
Tunnel Group
Tunnel 1 Tunnel 2
With the same latency of a tunnel group, the higher throughput of each the participating tunnel brings lower
aggregation percentage, which means the higher throughput the tunnels the lower latency is required to remain
the aggregation percentage at the same level. For example, the following measurement shows how the
aggregation percentage of tunnels performance is varied by single tunnel's throughput under the same latency.
With the same conditions, packets of a session are transferred through the tunnel group consisting of two
100Mbps tunnels at a maximum of 70Mbps. Bandwidth usages of the two tunnels is down to 35%. It might
require latency less than 5ms to bring bandwidth usage of the two 100Mbps tunnels close to 60%.
The above measurement gives basic concept that how the performance of a Tunnel Routing transmission is
influenced. Both the throughput (bandwidth) of single WAN link and its connection latency deeply influence the
performance, and these factors greatly concern the plan you deploy the Tunnel Routing network. The above data
is for your reference, some variations in details are possible.
For one-way TR transmission, although either download or upload bandwidth of tunnels is consumed by the
transferred data packets, bandwidth (in the opposite direction) is available to get relative TCP control packets
responded in acceptable latency and correct order. Both the download and upload bandwidth will be consumed if
the tunnels are loaded with bidirectional connections. Respondent TCP control packets of a connection and data
packets of another connection will scramble for limited bandwidth. In the meantime, distributing TCP control
packets of a connection over tunnels must bring higher latency and out-of-order delivery and result in poor
transmission performance. To guarantee expected throughput for bidirectional TR transmission, FortiWAN
Tunnel Routing fixes TCP control packets (packets without data payloads) of all connections running on a TR
group to a single tunnel (rather than distributing them over tunnels), which will significantly reduce latency and
out-of-order delivery. This specific tunnel is not reserved for only TCP control packets, parts of data packets of
connections will also be assigned to this tunnel according to the specified balancing algorithm. Therefore, this
specific tunnel is supposed to be the most stable (largest bandwidth, best quality) one in the tunnel (refer to the
above description for how to evaluate a tunnel). This mechanism requires no extra configurations, but needs posit
the tunnels on the configuration GUI in a appropriate ordering , see Tunnel Routing - Setting.
As the above description, Tunnel Routing could hardly 100% aggregate bandwidth of multiple tunnels for TCP
connections. TCP is intrinsically such sensitive to factors, such as latency, packet out-of-order delivery, TCP
window size, quality of the links and etc., so that there will always be a bottleneck to the transmission
performance, as long as packets of each connection are distributed over multiple tunnels. However, on the other
hand, higher bandwidth usage (almost 100%) of multiple tunnels could be achieved if Tunnel Routing just
persistently transfers packets of each connection via a single tunnel rather than distributing them over multiple
tunnels. Like the cooperation of Persistent Routing and Auto Routing (see Outbound Load Balancing and Failover
(Auto Routing) and Persistent Routing), Tunnel Routing supposes the Persistent Routing as well. Although a
persistently-routed TR connection will be bounded in performance by the maximum throughput of the tunnel that
TR fixes it to (conversely, a packet-distributed TR connection can use aggregated bandwidth of tunnels, even if it
is about a maximum of 70% aggregation), in real practice, Tunnel Routing will not serve only one connection at a
time; there will always be various connections existing concurrently between two sites and tunnels are full of their
traffic. In that case, each connection need compete with others for available bandwidth and it is hard to tell
whether a packet-distributed connection or a persistently-routed connection runs in better throughput, but it
certainly gives higher usage of overall bandwidth if all the connection in tunnels are persistently-routed.
Packet-distributed TR connection
Persistently-routed TR connection
Default rule
If your TR network deployment requires more than 100 TR routing rules, replacing the TR routing rules with TR
default rules will be suggested for better performance (see How to set up routing rules for Tunnel Routing).
For example, a tunnel group consists of three tunnels, and each of them has 50Mbps throughput. When all of the
tunnels are in good quality the entire TR transmission (packets are distributed over the three tunnels) maybe
reach 100Mbps, which is a best case. Once one of the tunnels becomes extreme low-throughput because of
unexpected delay, the entire throughput of the tunnel group could very well be lower than 69Mbps (maybe
60Mbps or worse); which means a three-tunnels group is worse than a two-tunnels group in this case. Removing
this bad tunnel from the group or stopping distributing packets to the tunnel can recover the entire throughput
back to what a two-tunnels group is supposed to be.
As the previous discussion we suggest the tunnels of a tunnel group are equal in quality for having a reasonable
and stable TR performance. It is expected that a tunnel that is always in bad quality will not be used in the tunnel
group. However in physical network unexpected communication problem, such as packet loss and increased
delay, causing temporary poor quality is unavoidable. FortiWAN provides a mechanism to monitor the quality of
each tunnel in a tunnel group. According to a predefined quality policy, FortiWAN dynamically determines
whether a tunnel is having low quality. Once it is identified, FortiWAN will trigger the process to stop distributing
packets to this tunnel until this tunnel backs to normal.
Packet RTT (round-trip time) and jitter (the variation in the latency on a packet flow) between the two endpoints of
a tunnel are used to evaluate the quality of tunnels. By specify the RTT and jitter thresholds and time durations in
a policy, FortiWAN can identify quality of a tunnel, stop distributing packets to the tunnel when it is in poor quality
and join the tunnel in the packet distribution when its quality backs to normal.
Bandwidth Management
Tunnel Routing is designed to be transparent to FortiWAN's Bandwidth Management (See "Bandwidth
Management"). The way to allocate or limit bandwidth to traffic of Tunnel Routing is to drill it down to the original
packets, control the traffic by individual service, source or destination. In other words, traffic of each service
processed by Tunnel Routing can be controlled individually. Guaranteeing proper bandwidth to individual traffic
helps for the performance of Tunnel Routing transmission. Packets encapsulated by Tunnel Routing becomes
invisible to Bandwidth Management; controlling the overall Tunnel Routing traffic by service GRE will go to
failure.
Scale
For large-scale Tunnel Routing network deployment, FortiWAN supports up to 100 tunnel groups for FWN-200B,
400 tunnel groups for FWN-1000B and 1000 tunnel groups for FWN-3000B. All of the three models have a default
maximum total allowed enable amount of 2500 GRE tunnels (total amount of enabled GRE tunnels of all the
tunnel groups).
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Tunnel Routing service, see
"Log", "Statistics: Tunnel Status", "Statistics: Tunnel Traffic", "Report: TR Status" and "Report: TR Reliability".
See also
Tunnel Routing
Scenarios
Basic Setting
The basic settings are located here: enabling or disabling Tunnel Route logging, define names and entering
tunnel routing activation key (if the encryption function is enabled for a tunnel group).
Tunnel Route Log Enable or disable logging. FortiWAN provides mechanisms to record, notify and analysis on
events refer to the Tunnel Routing service, see "Log", "Statistics: Tunnel Status", "Statistics:
Tunnel Traffic", "Report: TR Status" and "Report: TR Reliability".
Local Host ID Assign a unique host name for this unit. Tunnels are established between two FortiWAN
units. Host ID is used for Tunnel Routing to recognize the units running TR transmission.
Symmetrically, this field is required to the opposite unit.
Key Decide a secret key for tunnel encryption and enter it here, if the encryption function is
enabled for a tunnel group. Tunnel Routing encryption employs only one secret key for all
tunnel transmissions, therefore, please set the decided key to all the tunnel routing hosts.
This key is used for the data encryption built in Tunnel Routing, not for encryption of IPSec.
For an IPSec protection on Tunnel Routing, please refer to "IPSec".
Tunnel Group
Consider the symmetric FortiWAN sites with multiple WAN links on each side, a tunnel between the two units are
the connection with one WAN link of local unit and one WAN link of remote unit. A tunnel group contains
multiple tunnels which might be various combinations of WAN links between the two FortiWAN units. A tunnel
group is the basic unit to be used for a Tunnel Routing transmission. Packets of a session transferred via tunnel
routing between units would be distributed (according to the balancing algorithms) to the multiple tunnels defined
in the tunnel group. Therefore, a tunnel group is logically a big tunnel that multiple WAN links are integrated to.
The figure below is an example to illustrate tunnels and tunnel groups. Tunnel Group 1 contains two tunnels
which tunnel 1 is established with FWN-A's WAN 1 and FWN-B's WAN 1, and tunnel 2 is established with FWN-
A's WAN 2 and FWN-B's WAN 2. A transmission via Tunnel Group 1 will be distributed over tunnel 1 and tunnel 2.
Tunnel Group 2 also contains two tunnels which tunnel 3 is established with FWN-A's WAN 3 and FWN-B's WAN
4, and tunnel 4 is established with FWN-A's WAN 4 and FWN-B's WAN 3. Containing only one tunnel in a tunnel
group, which is a degenerate case, is allowed.
Tunnel group is the basic unit to be employed for tunnel routing transmission. Therefore, balancing algorithms,
encryption, the opposite site, tunnels in the group and even quality of the WAN links are the necessary
associations for a tunnel group transmission. To set up a tunnel group, here is the necessary information:
l Which opposite FortiWAN unit the tunnel group is established with: Remote host ID
l What are the tunnels included in the tunnel group: Local IP and Remote IP for a tunnel
l How to distribute packets over the tunnels: Algorithm
l Does the transmission keep in secret:Encryption
Note that every tunnel group must contain at least one tunnel which is configured with one static
public IP address. FortiWAN supports up to 100 tunnel groups for FWN-200B, 400 tunnel groups for FWN-
1000B and 1000 tunnel groups for FWN-3000B. All of the three models have a default maximum total allowed
enable amount of 2500 GRE tunnels.
In this configuration table, tunnels are configured for a tunnel group with IP addresses of WAN links of local and
remote FortiWAN units and the routing algorithm used to rout packets over tunnels.
Add Click the Add button to add a new Tunnel Group setting panel.
Remote Host ID Enter the Host ID of the Remote unit the Tunnel Group connects to.
Algorithm l Round-Robin: Route the connections in every tunnel by weight. Note: Please specify the
weight value of “Group Tunnels” when selecting “Round-Robin” (See Load Balancing
Algorithms).
l By Upstream Traffic: Route the connections to the tunnel with the lightest upstream traffic
flow (See Load Balancing Algorithms).
Group Tunnels
Click the add button on the Group Tunnels panel, then a configuration block pops up for adding a GRE tunnel in
the tunnel group. Move the cursor over an existing tunnel (it will be highlighted) and click it, the configuration
block pops up also for editing it.
Note that the default maximum allowed to enable for a tunnel group is 16 GRE tunnels.
For all the configured tunnel groups, a maximum total of 2500 enabled GRE tunnels is
allowed.
Local IP Configure local IP address for tunnels in the tunnel group. The local IP addresses here are the
localhost IP defined on the WAN links of local FortiWAN. According to the WAN type defined on
WAN links, here are several types of Local IP for options.
l Static-IP WAN link without NAT on local side: If the WAN link of local FortiWAN
you want to employ for the tunnel is configured with a static public IP address and there
will be no NAT translation to this IP address, please select “IPv4 Address” and
configure it with the static public IP address of the WAN link.
l Static-IP WAN link with NAT on local side: If the WAN link of local FortiWAN you
want to employ for the tunnel is configured with a static IP address and there is a NAT
translation to this IP address, please select “(NAT) IP Address” and configure it with the
static IP address of the WAN link.
l Dynamic-IP WAN link without NAT on local side: If the WAN link of local
FortiWAN you want to employ for the tunnel is configured with a dynamic IP address
(Bridge Mode: PPPoE or DHCP for the WAN type) and there will be no NAT translation
to the dynamic IP address, please select “Dynamic WANx” for the configuration.
l Dynamic-IP WAN link with NAT on local side: If the WAN link of local FortiWAN
you want to employ for the tunnel is configured with a dynamic IP address (Bridge
Mode: PPPoE or DHCP for the WAN type) and there is a NAT translation to the
dynamic IP address, please select “(NAT) Dynamic WANx” for the configuration.
According your WAN Setting, “Dynamic WAN x” and “(NAT) Dynamic WAN x” are listed in
pair in the drop-down menu to correspond all the dynamic WAN links (Bridge Mode:
PPPoE and Bridge Mode: DHCP). To avoid a TR transmission failure, please select
corresponding types for the deployments which involve NAT translating within.
If the IP addresses that ISP provides is private IP addresses (no matter they are static or
dynamic), the ISP might perform NAT translations to the private IP addresses. Please
contact with the ISP for further information.
For options "Static-IP WAN link without NAT" and "Static-IP WAN link with NAT", if a
change on the IP address of the WAN link is made (from Network Setting) on the local
FortiWAN unit, a corresponding update to the setting here is necessary (manually).
For deployment of Tunnel Routing over IPSec, make sure Local IP here is equal to the
Local IP configured to correspondent IPSec Phase 1 (See "IPSec - Define routing policies
for an IPSec VPN").
Remote IP Configure remote IP address for tunnels in the tunnel group. The remote IP addresses here are
the localhost IP defined on the WAN links of remote FortiWAN. According to the WAN type
defined on WAN links, here are several types of Remote IP for options.
l Static-IP WAN link without NAT on remote side: If the WAN link of remote
FortiWAN you want to employ for the tunnel is configured with a static IP and there will
be no NAT translation to the IP address, please select “IPv4 Address” and configure it
with the static IP address of the WAN link.
l Dynamic-IP WAN link without NAT on remote side: If the WAN link of remote
FortiWAN you want to employ for the tunnel is configured with a dynamic IP and there
will be no NAT translation to the IP address, please select “Dynamic IP” for the
configuration.
l WAN link with NAT on remote side: No matter the WAN link of remote FortiWAN
you want to employ for the tunnel is configured with a static or dynamic IP address,
please select “(NAT) Dynamic IP” for the configuration if there is a NAT translation to
the IP address.
To avoid a TR transmission failure, please select corresponding types for the deployments
which involve NAT translating within.
For option "Static-IP WAN link without NAT", if a change on the IP address of the WAN link
is made (from Network Setting) on the remote FortiWAN unit, a corresponding update to
the setting here is necessary (manually).
For deployment of Tunnel Routing over IPSec, make sure Remote IP here is equal to the
Remote IP configured to correspondent IPSec Phase 1 (See "IPSec - Define routing
policies for an IPSec VPN").
Weight The weight/priority of the tunnel for the Round-Robin balancing algorithm. This field is
displayed only if Round-Robin is selected for Algorithm.
Encrypt Check to enable/disable encryption for packets transferred via this tunnel. Remember to set
the secret key for encryption. This is a simple encryption built in Tunnel Routing, which
employs AES in ECB mode. If a higher and stricter security is required, please perform Tunnel
Routing under protection of IPSec Transport mode (See "IPSec").
DSCP DSCP(Differentiated Services Code Point) provides simple mechanism for quality of service
(QoS) on IP networks. DSCP uses the differentiated services code in IP header to indicated
different traffic QoS classification. If your ISP provides DSCP service, please contact them for
the values. In the field, specify the value to the tunnel. Leave it blank if you do not apply DSCP
to the tunnel. Note that only the tunnels established with static local and remote IP addresses
support DSCP. This will primarily be used for tunnels over MPLS networks.
Health Detection Select a predefined health detection policy (see Configuring the parameters for tunnel health
Policy detection) from the list. FortiWAN monitors this tunnel according to the policy (see Tunnel
healthy detection).
Add (button) Click to add configuration of the tunnel into Group Tunnels panel. After clicking, this tunnel is
listed on the panel. Note that clicking the Apply button is still required to save the whole
configurations to system back-end for Tunnel Routing.
Save (button) This button appears while you are editing an existing tunnel. Click to save the editing back to
Group Tunnels panel. Note that clicking the Apply button is still required to save the whole
configurations to system back-end for Tunnel Routing.
As previous description, for the performance of bidirectional transmission, Tunnel Routing will automatically fix
any TCP control packet (packet without data payload) to the first available tunnel listed on the Group Tunnel
block in bottom-up order. Not only the control packets but also data packets will be assigned to this specific
tunnel, therefore, the more bandwidth this tunnel is capable of, the more smoothly the control packets can be
delivered. You are suggested to arrange the tunnels (by clicking the Move Down and Move Up buttons) in a order
that the higher throughput the lower position on the list.
Note that one group tunnel configuration cannot be duplicates (group tunnels with the same configuration on
fields Local IP and Remote IP) for multiple tunnel groups. One group tunnel configured with a static local IP
address and a static remote IP address can only be used for one tunnel group between one pair of local host and
remote host. One group tunnel configured with a static IP address and a dynamic WAN link can be duplicates in
the tunnel groups which is used with different remote host, but cannot be duplicates in the tunnel groups which is
used with the same remote host.
Beside the GRE tunnels, configuration of a tunnel group includes setting for Default Rule, which is an option. If
your TR network deployment requires more than 100 TR routing rules, replacing the TR routing rules with TR
default rules will be suggested for better performance. Default Rule is introduced in How to set up routing rules
for Tunnel Routing.
Fields Description
Detection Period The time interval (in milliseconds) between detection packets sending. A
shorter detection interval can detect tunnel failure more real-time, but it
consumes more bandwidth resource.
Note that the tunnel health detection requires the same detection period at
two endpoints of the tunnels. Please make sure you set the same period to
the two FortiWAN appliances.
Number of Retries The times that FortiWAN will retry for confirming that a tunnel is failed. Every
time when FortiWAN does not receive response to a detection packet, it
continues sending detection packets for the specified times. A tunnel will be
declared as failed only if all of the retries are not responded.
The three parameters decides how much time that FortiWAN can detect a state switch on a tunnel. For example,
if the Number of Successful Detections field is set to 5 and the Detection Period field is set to 3000 (milliseconds),
it will take 15 seconds to detect a recovery from failure. On the other hand, if Number of Retries or Number of
Successful Detections is set as a small value, the detection becomes sensitive to subtle changes, which may
cause wild shifts of tunnel state.
To create a quality policy, go to Service > Tunnel Routing and create a Routing Quality Rule Policy
configuration. It contains the following fields:
Fields Description
Threshold RTT Specify a RTT threshold (in milliseconds) used to evaluate tunnels.
Duration Under time Specify a time period (in seconds). If both the RTT and jitter between
the endpoints of a tunnel are consistently lower the specified thresholds
for a period longer than this value, the tunnel will be declared as in
normal quality.
Over time Specify a time period (in seconds). If any of the RTT and jitter between
the endpoints of a tunnel are consistently higher the specified thresholds
for a period longer than this value, the tunnel will be declared as in poor
quality.
The period that FortiWAN uses for updating the real RTT and jitter values of a tunnel
is relative to the detection period of tunnel health detection (see Configuring the
parameters for tunnel health detection). The RTT is updated every two detection
periods, and the jitter is updated every the detection period (but it costs two
detection period to get the first jitter value at the beginning). For example, if the
detection period of tunnel health detection is 500ms, then FortiWAN will update the
RTT of a tunnel every 1000ms, and update the jitter every 500ms (the first jitter will
costs 1000ms).
See Configuring a routing rule to apply quality policies to TR routing rules and Example for using quality policies
for how to use quality policies.
See also
Tunnel Routing
Scenarios
What is the traffic to be transferred by Tunnel Routing? Tunnel Routing filter traffic by Source,
Destination and Service.
Which Tunnel Group is employed to transfer the traffic? Apply a predefined tunnel group to the specified
traffic, then it will be transferred according to the how the tunnel group is defined; the balancing algorithm, the
tunnels, the weight, the encryption and DSCP.
What to do if the Tunnel Group fails? A failed tunnel group means all the tunnels defined in the tunnel group
are disconnected (detected by Tunnel Routing's tunnel healthy detection mechanism). Therefore, it is necessary
to specify another way for the traffic. Note that as long as one tunnel in a tunnel group remains connected,
Tunnel Routing keeps employing the tunnel group for transmission.
Next we introduce the two ways, Routing Rule and Default Rule, to establish the routing rules for Tunnel
Routing.
Source The source of the connection (See "Using the web UI").
IPv4 Address, IPv4 Range and IPv4 Subnet: To filter out the traffic coming from the
specified IPv4 Address, IPv4 Range or IPv4 Subnet.
Destination The destination of the connection (See "Using the web UI").
IPv4 Address, IPv4 Range and IPv4 Subnet: To filter out the traffic going to the
specified IPv4 Address, IPv4 Range or IPv4 Subnet.
Service The TCP/UDP service type to be matched. The default is "Any". Administrators can select from
the publicly known service types (e.g. FTP), or can choose the port number in TCP/UDP
packet. To specify a range of port numbers, type starting port number plus hyphen "-" and then
end port number. e.g. "TCP@123-234" (See "Using the web UI").
Group The tunnel group used to transfer the specified traffic (filtered by Source, Destination and
Service). The balancing algorithm and tunnels for distributing the traffic are defined in the
tunnel group.
Quality Policy Select a predefined quality policy (see Configuring quality policies) from the list.
When a quality policy is selected, FortiWAN monitors the quality of tunnels of the specified
tunnel group for the specified traffic (source, destination and service) according this policy,
and reacts if a poor tunnel is identified (see Monitoring quality of a tunnel).
See Example for using quality policies for how to use quality policies.
Fail-Over This field defines the fail-over policy for situation that all the WAN links (tunnels) of the
specified tunnel group in the routing rule fail. Possible options are:
NO-ACTION: Traffic will not be diverted when the tunnel group get failed, and
transmission will get failed.
Auto Routing: Traffic will be re-evaluated against Auto Routing's rules and transferred
according to the Auto Routing policies. Transmission gets failed if there is no rule
matches.
Tunnel: [Group Name]: All the defined tunnel groups are listed for options. Traffic will
be diverted to the specified tunnel group here, however, the diverted traffic will not be
diverted again if the beck-up tunnel group is also failed. Note: it takes the same action as
"NO-ACTION" if a tunnel group that is the same as what specified in field "Group" is
selected as back-up for fail-over here.
If your TR network deployment requires more than 100 TR routing rules, replacing the TR routing rules with TR
default rules will be suggested for better performance.
Case 1:
FortiWAN detects the RTT and jitter between 1.1.1.1 and 4.4.4.4 remain higher than 250ms and 20ms (lower
than 400ms and 40ms) for over 5 seconds. Traffic of TCP@5060 is only distributed over the 2.2.2.2-5.5.5.5
tunnel and the 3.3.3.3-6.6.6.6 tunnel. Other traffic is still distributed over the three tunnels.
Case 2:
FortiWAN detects the RTT and jitter between 1.1.1.1 and 4.4.4.4 remain higher than 250ms and 20ms (lower
than 400ms and 40ms), and RTT and jitter between 3.3.3.3 and 6.6.6.6 remain higher than 400ms and 40ms for
over 10 seconds. Traffic of TCP@5060 is only assigned to the 2.2.2.2-5.5.5.5 tunnel. Other traffic is only
distributed over the 1.1.1.1-4.4.4.4 tunnel and the 2.2.2.2-5.5.5.5 tunnel.
Case 3:
FortiWAN detects the RTT and jitter between 1.1.1.1 and 4.4.4.4 remain lower than 250ms and 20ms for over 5
seconds, but RTT and jitter between 3.3.3.3 and 6.6.6.6 remain higher than 400ms and 40ms. Traffic of
TCP@5060 is only distributed over the 1.1.1.1-4.4.4.4 tunnel and the 2.2.2.2-5.5.5.5 tunnel. Other traffic is only
distributed over the 1.1.1.1-4.4.4.4 tunnel and the 2.2.2.2-5.5.5.5 tunnel.
A Default Rule is attached to a Tunnel Group. The configurations of a tunnel group contains items for its default
rules, so that traffic filtered out by the default rule would be transferred via this tunnel group, which is the second
element for a tunnel routing rule we introduced above.Every default rule contains fail-over policy for transmission
when the tunnel group fails; this is the third element for a tunnel routing rule.
Source The source of the connection (See "Using the web UI").
IPv4 Address, IPv4 Range and IPv4 Subnet: Specify the IPv4 Address, IPv4 Range or
IPv4 Subnet that the traffic comes from to be filtered by this rule.
LAN: To filter out the traffic that comes from LAN area.
DMZ: To filter out the traffic that comes from DMZ area.
Fail-Over Select a policy from the list. Once the tunnel group get failed (every single tunnel in the
tunnel group fails), traffic will be diverted based on Fail-Over policies.
NO-ACTION: Traffic will not be diverted when the tunnel group get failed, and
transmission will get failed.
Auto Routing: Traffic will be re-evaluated against Auto Routing's rules and transferred
according to the Auto Routing policies. Transmission gets failed if there is no rule
matches.
Tunnel: [Group Name]: All the defined tunnel groups are listed for options. Traffic will
be diverted to the specified tunnel group here, however, the diverted traffic will not be
diverted again if the beck-up tunnel group is also failed. Note that it takes the same action
as "NO-ACTION" if a tunnel group that is the same as what this default rule attached to is
selected as back-up for fail-over here.
Considering the illustration above, a tunnel group (Tunnel Group AB) containing two tunnels (Tunnel 1 and
Tunnel 2) connects two FortiWAN units (FWN-A and FWN-B) that two internal networks connect respectively to.
Configurations of default rules on two sites are as follow:
Source Fail-Over
192.168.1.10 NO-ACTION
Source Fail-Over
192.168.2.11 NO-ACTION
The sources sat on FWN-B's default rules, which are treated as destinations for FWN-A, are sent to FWN-A via
the automatic negotiation. FWN-A then generates logically the following routing rules in system back-end.
The sources sat on FWN-A's default rules, which are treated as destinations for FWN-B, are sent to FWN-B via
the automatic negotiation. FWN-B then generates logically the following routing rules in system back-end.
In the example above, Source of every default rule is specified with single IPv4 address. It is a easier way that set
up default rules by specifying Source with a IPv4 range, IPv4 subnet, LAN or DMZ.
Default Rule gives a great help to establish fully-connected routing rules while constructing an Intranet on many
branch sites via Tunnel Routing. Consider an Intranet deployment over three branch sites, only three default rules
(each one on a branch site) are required to establish the fully connection over the three sites, which requires six
routing rules without using Default Rule.
Default Rule refers the configurations of LAN and DMZ in Network Setting to negotiate the routing rules if the
Source is specified as LAN or DMZ for a default rule. It is necessary to re-apply the configurations of Default Rule
to trigger the negotiation and update the default rules if any change to LAN or DMZ networks setting.
Source The source of the connection (See "Using the web UI").
Destination The destination of the connection (See "Using the web UI").
Service The TCP/UDP service type to be matched. The default is "Any". Administrators can select from
the publicly known service types (e.g. FTP), or can choose the port number in TCP/UDP
packet. To specify a range of port numbers, type starting port number plus hyphen "-" and then
end port number. e.g. "TCP@123-234" (See "Using the web UI").
So far, Routing Rules, Default Rule and Persistent Rules are introduced. Any packet for Tunnel Routing will be
first evaluated against Persistent Rules. Once a persistent rule matches and a tunnel that the previous packet are
transferred through is marked for the session, this packet will be transferred directly via the tunnel without
evaluation against Default Rule and Routing Rules. Packets that no persistent rules match or no tunnel is market
for transferring directly will be evaluated against Default Rule first and Routing Rules then, the rule that matches
first is applied.
See also
Tunnel Routing
Scenarios
Tunnel Routing's Benchmark works as Client/Server mode. Test traffic is sent from the client site to the server
site via every single configured tunnel, and then the benchmark results are reported at client site. Two steps to
start Tunnel Routing's Benchmark between two FortiWAN appliances (make sure the Tunnel Routing network is
established between the two FortiWANs),
1. Specify one of the FortiWANs to be the benchmark server.
2. Start benchmark traffic from the benchmark client, the ForiWAN opposite to the benchmark server.
1. Specify the port number on the Test Port field for sending/receiving the testing traffic. Note that the port number
on both benchmark sites (Client/Server) must be identical. It will fail to receive testing packets if unequal port
numbers are used by the two sites.
2. Click the button Start Test Server of the tunnel group that you want to test from the list (in Test Client Status
block). This button will be switched to Stop Test Server while benchmark server is running; click it to stop the
server.
While the benchmark server is running, a message Test server is running. Please do not change to another page
or close browser will display and occupy the main page of Web UI. For all the administrator accounts, it become
unable to apply new configurations to Tunnel Routing (the Apply button on Web UI becomes ineffective) during
benchmark server is running. Web UI will allow apply configurations to other functions during benchmark server is
running, but we suggest not to do this since changes to some functions such as Network Setting, Firewall or
IPSec might interrupt benchmark server. During benchmark server running, you can switch Web UI main page to
other functions, but a message Test server is running. Please stop it first displays when you turn the main page
back to Tunnel Routing. This message reminds you the benchmark server is still running, and the Apply button of
Tunnel Routing remains ineffective until you stop the server. Note that the benchmark server can work for only
one tunnel group anytime; stop the server on one tunnel group to start it for another.
1. Specify the port number on the Test Port field for sending/receiving the test traffic. Note that the port number on
both benchmark sites (Client/Server) must be identical. It will fail to receive testing packets if unequal port
numbers are used by the two sites.
2. Click the button Test of the same tunnel group that the opposite benchmark server is working for. You will be
direct to a management panel to start benchmark testing. For a disable tunnel group, a error message This group
is not enabled displays.
3. In the testing management panel, you see all the tunnels of the tunnel group listed (IP addresses of the two
endpoints of a tunnel), and two test cases provided:
1. Single tunnel test: Click the Test button of a tunnel, testing traffic will be generated and sent to the
opposite (the server side) of the tunnel. All the packets of the testing session will be sent through only the
specified tunnel. This will bring out a testing result for evaluating performance of the specified tunnel.
2. Tunnel group test: Click the Test button of the last item All Tunnels in Group (at the bottom of the
table), testing traffic will be generated and sent to the opposite (the server side) of the tunnel group. All
the packets of the testing session will be distributed over the tunnels of the tunnel group according to the
configured algorithm of the tunnel group. This will bring out a testing result for evaluating performance of
the tunnel group.
4. On the upper right corner of the table, there is a button Test All used to perform every Single Tunnel Testing and
the Tunnel Group Testing one by one in a top-down order.
5. You can click Close to stop and leave the benchmark management panel.
Measurement
All the benchmark testing cases (single tunnel testing and tunnel group testing) contain two parts, testing
without traffic and testing with traffic. In the first 20 seconds, benchmark client continues to send ping ICMP
echo requests to the benchmark server without sending other testing traffic together. In the next 20 seconds then,
benchmark client continues to creates TCP data streams together with ping ICMP echo requests to measure the
throughput of the tunnel (WAN links). The testing traffic between benchmark client and server is encapsulated
with GRE header, so that it simulates real tunnel transmission for performance measurement. Benchmark server
responses client for the testing traffic via the same tunnel, and the measurement result can be generated by
benchmark client and displays in the table. The measurement result contains
Tunnel WAN links employed by the tunnel between the symmetric sites.
Without Traffic - RTT Round-Trip Time of the ping ICMP packets in average (without other tunnel traffic).
Without Traffic - Packet Packet loss of the ping ICMP packets in percentage (without other tunnel traffic).
Loss
With Traffic - RTT Round-Trip Time of the ping ICMP packets in average (with the traffic of throughput
measurement).
With Traffic - Packet Loss Packet loss of the ping ICMP packets in percentage (with the traffic of throughput
measurement).
To evaluate the quality of a tunnel (two WAN links) exactly, we suggest to stop any general-purpose traffic
passing through the WAN links while a measurement is running on a tunnel.
See also
Tunnel Routing
Scenarios
Scenarios
Example 1
A company’s headquarters and two branch offices are located in different cities. Each office has a LAN, multiple
WAN links and a DMZ with VPN gateway:
Tunnel Group
1.1.1.1 4.4.4.4 1
3.3.3.3 8.8.8.8 1
Routing Rules
Tunnel Group
2.2.2.2 3.3.3.3 1
4.4.4.4 1.1.1.1 1
4.4.4.4 3.3.3.3 1
Routing Rules
Tunnel Group
6.6.6.6 3.3.3.3 1
8.8.8.8 1.1.1.1 1
8.8.8.8 3.3.3.3 1
10.10.10.10 Dynamic IP 1
Routing Rules
According to example 1, any data sent from 1.1.1.11 (or 192.168.1.1-192.168.1.10) to 2.2.2.22 will be wrapped
and sent as a GRE packet. If 1.1.1.1 experiences a WAN link failure, the packet will still be sent from 3.3.3.3 to
continue the transfer.
NOTE: When using tunnel routing in FortiWAN, the settings must correspond to each other or else tunnel routing
will not perform its function. For example, if FortiWAN in Taipei has removed the values 2.2.2.2 to 3.3.3.3 in their
routing rule settings, then the FortiWAN in Taichung will not be operational.
Requirements
As illustrated in the diagram below, a tunnel is established between LAN1 and LAN2. Packets are transferred via
two WAN links evenly.
Headquarters Branch
Tunnel Group
Dynamic IP at Dynamic IP at 1
WAN2 WAN2
Routing Rules
Tunnel Group
Dynamic IP at Dynamic IP at 1
WAN2 WAN2
Routing Rules
Requirements
The LAN links in branch 1 and branch 2 can communicate with each other via the tunnel established with the
headquarter.
WAN 1 No 1.1.1.1 No
WAN 2 No No 2.2.2.2
WAN 3 3.3.3.3 No No
Tunnel Group
Routing Rules
Tunnel Group
Routing Rules
Tunnel Group
Routing Rules
WAN 1 No 1.1.1.1 No
WAN 2 No No 2.2.2.2
WAN 3 3.3.3.3 No No
WAN 4 4.4.4.4 No No
WAN 5 No No 5.5.5.5
Tunnel Group
Routing Rules
Policies
Default Policy By Downstream Traffic Tick the check boxes "1", "2", "3", "4" ...
Filters
Tunnel Group
Routing Rules
Tunnel Group
Routing Rules
Policies
Default Policy By Downstream Traffic Tick the check boxes "1", "2", "3", "4" ...
Filters
See also
Tunnel Routing
Virtual Server is a method for single gateway machine to act as multiple servers while the real servers sit inside
corporate network to process requests passed in from the gateway machine. Inbound traffic does not have to
know where the real servers are, or whether there are just one or many servers. This method prevents direct
access by users and therefore increases security and flexibility.
FortiWAN has built in virtual server and is capable of supporting various virtual server mapping methods. For
example, different public IP addresses can be mapped to various real servers in LAN or DMZ. Or ports can be
mapped to public IP address on different servers.
Virtual server are configured by designating and adjusting virtual server rules. Each rule specifies a mapping
condition. It maps WAN IP address and a service (port or ports) to an internal server IP. The order of virtual server
rules is like any other rule tables in FortiWAN as it also uses the “first match scheme”, viz. the first rule of request
matched is the rule to take effect.
For example, a public IP address 211.21.48.196 and wants a web server on 192.168.123.16 to handle all the web
page requests coming to this public IP address. To do this, a virtual server rule must be created with
211.21.48.196 to be its WAN IP, 192.168.123.16 to be its Server IP, and HTTP(80) to be its Service.
Virtual Server makes intranet (LAN) servers accessible for the internet (WAN). The private IP addresses assigned
to intranet servers will become invisible to the external environment, making services accessible for users outside
the network. Then FortiWAN is available to redirect these external requests to the servers in LAN or DMZ.
Whenever an external request arrives, FortiWAN will consult the Virtual Server table and redirect the packet to the
corresponding server in LAN or DMZ. The rules of Virtual Server tables are prioritized top down. If one rule is
similar to another in the table, only the higher ranked one will be applied, and the rest will be ignored. In addition,
Virtual Server enables to balance load on multiple servers, which is to distribute traffic over a group of servers
(server cluster), making services highly accessible.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Virtual Server service, see
"Log", "Statistics: Virtual Server Status" and "Report: Virtual Server".
Server Pool
Fields Descriptions
Server Pool Settings A server pool can contain multiple backend server settings. Click the add button to create
a new setting and complete the following fields.
Server IP The real IP (IPv4) of the backend server, most likely in LAN or DMZ.
Service Specify the type of TCP/UDP service for service port translation. Virtual server translates
the service port of an incoming request into the specified service before sending the
packet to this backend server.
You can select matching criteria from publicly known service types (e.g. FTP), or choose
port number from TCP/UDP packet. To specify a range of port numbers, enter starting
port number plus hyphen “-“ and ending port number, e.g. “TCP@123-234” (see "Using
the web UI").
Weight Weight for the Round-Robin algorithm to determine which backend server responds to
the incoming requests. The higher the weight, the greater the chance is for the
corresponding server to be used.
Leave this blank if the algorithm applied to the server pool is not Round-Robin.
Fields Descriptions
When Specified the time period to be matched. The time that FortiWAN receives the incoming
request will be evaluated against this time period.
l Busy hour
l Idle hour
l All-Time
See Busyhour Settings.
WAN IP Specified an WAN IP to the virtual server. Destination IP address of an incoming request will
be evaluated against this WAN IP. All the WAN links are listed in the drop-down menu for
options:
l WAN#:IP_address: For a static-IP-based (routing mode and bridge mode) WAN link, the
first IP that is deployed on the WAN port (hosthost of the WAN link) will be an option here,
such as WAN1:10.12.102.4.
l Dynamic IP at WAN#: For a dynamic-IP-based (PPPoE and DHCP) WAN link, its WAN IP is
represented as Dynamic IP at WAN#.
l IPv4 Address: In case that you deployed multiple IPs on a WAN port, and you want to use
one of them except the first one for the virtual server, you can select IPv4 Address to enter
the IP you want. However please make sure that you enter an IP that is deployed on any of
the WAN port.
Service Specified the TCP/UDP service to be matched. Service of an incoming request will be
evaluated against this service.
You can select matching criteria from publicly known service types, or choose port number
from TCP/UDP packets. To specify a range of port numbers, type starting port number plus
hyphen “-“ and ending port number, e.g. “TCP@123-234” (see "Using the web UI").
Algorithm Specify the algorithm to distribute the incoming requests over the server candidates in the
specified server pool. (See Load Balancing Algorithms)
l Round-Robin
l By Connection
l By Response Time
l Hash
Keep Session Check the box to keep session after a connection has been established. If the session is to be
stored, then enter a time period. Default value is 30s
Fields Descriptions
Server Pool Specified a server pool to the virtual server. A incoming request will be assigned to a server of
the server pool if the arriving time, destination IP and service of the request matches the
virtual server rule (When, WAN IP and Service settings).
L Check to enable logging: Whenever the rule is matched, system will record the event to log
file.
After an incoming request matches a virtual server rule (the When, WAN IP and Service fields), the procedure to
process the request is:
1. Deciding a backend sever from the specified server pool (the Server Pool field) according to the specified
algorithm (the Algorithm field).
2. Translating the destination service of the request into the specified service of the backend server (the Service field
of the backend server).
3. Pushing the request to the backend server.
Fields Descriptions
When Options: Busy hour, Idle hour, and All-Time (See "Busyhour Settings").
WAN IP For external internet users, the virtual server is presented as a public IP (IPv6) on WAN port.
This WAN IP is the "visible" IP for the virtual server in external environment. Select a public IP,
and in "Routing Mode", either enter the IP manually or select the IP obtained from WAN link; In
"Bridge Mode One Static IP", insert WAN IP and the public IP assigned by ISP; Or choose
"dynamic IP at WAN#", if WAN type is none of the above.
Service The type of TCP/UDP service to be matched. Select matching criteria from publicly known
service types, or choose port number from TCP/UDP packets. To specify a range of port
numbers, type starting port number plus hyphen “-“ and ending port number, e.g. “TCP@123-
234” (See "Using the web UI").
Server IP The real IP (IPv6) of the server, most likely in LAN or DMZ.
L Check to enable logging: Whenever the rule is matched, system will record the event to log file.
Example 1
The settings for virtual servers look like:
l Assign IP address 211.21.48.194 to WAN1. Refer to [System] -> [Network Settings] -> [WAN Settings] for more
regarding WAN IP configurations.
l Assign IP address 211.21.33.186 to WAN2.
l Forward all HTTP requests (port 80) through WAN1 or WAN2 to the two HTTP servers 192.168.0.100 and
192.168.0.101 in LAN.
l Forward all FTP requests (port 21) through WAN1 or WAN2 to two FTP servers 192.168.0.200 and 192.168.0.201
in LAN.
l Assign 211.21.48.195 and 211.21.33.189 to WAN 1 and WAN2. Forward all requests to 211.21.48.195 or
211.21.33.189 to two SMTP servers 192.168.0.200 and 192.168.0.201 in LAN.
l Forward all requests from 211.21.48.197 to 192.168.0.15 in LAN.
Note:
1. FortiWAN can auto-detect both active and passive FTP servers.
2. All public IPs must be assigned to WAN 1. To configure these IPs, go to "IP(s) on Localhost of the Basic Subnet"
table in [System] -> [Network Settings] -> [WAN Settings] -> [WAN Link 1].
3. 211.21.48.197 does not belong to any physical host, and it must be assigned to WAN port.
Virtual server table for the above settings:
Example 2
l Forward all the TCP port 1999 requests established between external network and public IP 211.21.48.194 to FTP
Server@ TCP port 1999 at 192.168.0.100 in LAN.
l Note: Due to the nature of ftp protocol, in port style ftp-data connection, when ftp-control is used in port 1999, port
1998 will be taken by ftp-data.
l Enable external users to access WAN IP 211.21.33.186, and connect PcAnywhere to .LAN hosts.
l Note: PcAnywhere uses TCP port 5631 and UDP port 5632. Refer to PcAnywhere software manual for more details.
l Enable external users to access WAN IP 211.21.48.194, and forward packets of TCP/UDP range 2000-3000 to host
192.168.0.15.
Note: Port range redirecting is supported as well.
[WAN Link Health Detection] offers you insight into the health status of WAN links. It allows you to set up specific
health detection criteria against each individual WAN link in network of multiple links. FortiWAN detects the
connection status of the WAN link by sending out ICMP and TCP packets to targets, and determines the
connection quality with data that reports back. [WAN Link Detection] lists a few fields to fulfill. Concerning about
detection packets flooding, FortiWAN determines a WAN link alive without sending detection packets if inbound
traffic on the WAN link is detected. The ICMP and TCP detection packets are sent only if no inbound traffic is
detected.
For a single detection via ICMP / TCP packets, FortiWAN sends a ICMP or TCP packet (defineded in "Detection
Protocol") individually to multiple targets (defined in "Ping List / TCP Connect List" and "Number of Hosts Picked
out per Detection") via a WAN link (defined in "WAN Link"). FortiWAN determines the WAN link alive if receiving
response from at least one of those targets in a time period (defined in "Detection timeout in milliseconds"),
otherwise this detection is consider failed (FortiWAN will not judge whether a WAN link is down by just one
detection failure). No matter whether a single detection succeed, FortiWAN continues the detection after seconds
(defined in "Detection Period in Second"). The WAN link is determined as down only if multiple detections fail
continually (defined in "Number of Retries"). WAN link health detection monitors the WAN links status which
FortiWAN's Summary, Auto Routing, Multihoming and Statistics will refer to.
Ignore Inbound Traffic Enable [Ignore Inbound Traffic], FortiWAN will determine WAN link
status only by sending ICMP and TCP packets to targets, regardless of
inbound traffic on the WAN link. Disable [Ignore Inbound Traffic],
FortiWAN monitors WAN links status via the mixture of inbound traffic
and ICMP / TCP packets.
Detection timeout in milliseconds This indicates the timeout period for every single detection in
milliseconds. If no response packets are detected during this period, the
system will consider the detection failed.
WAN Link The WAN link to be configured health detection criteria to. Configure the
WAN links individually by selecting them from the list.
Detection Protocol Two protocols used to perform WAN link detection are available: ICMP
and TCP.
Detection period, in seconds The time interval between ICMP or TCP packets sending for detection.
The unit is second. A shorter interval configuration can detect connection
condition earlier, but it consumes more bandwidth resource.
Number of hosts picked per The number of hosts that is picked out from Ping List or TCP Connection
detection List for detection. When FortiWAN starts checking the link health, it will
send out ICMP and TCP packets to the IP address of the hosts that has
been picked out. Detection will not be performed if setting the value to
zero.
Number of retries The number of times FortiWAN retries if a detection being indicated
failed. Once all the retries in the number of times fail, FortiWAN claims
the WAN connection fails.
Number of successful detection The number of continuously successful detections that is required
for declaring a WAN link indeed available.
Note that always employ real external IP addresses (hosts in Internet) for the Ping List, gateway and
hosts in near WAN are not appropriate destinations for the detection.
IPSec
FortiWAN's IPSec VPN is based on the standard two-phase Internet Key Exchange (IKE) protocol, and two
communication modes: tunnel mode and transport mode. IPSec is one of the popular standards for establishing a
site-to-site VPN network. It contains the tunneling technology and strict security mechanisms. Different from the
tunneling of IPSec VPN, FortiWAN's Tunnel Routing has the advantages of bandwidth aggregation and fault
tolerance. By integrating IPSec and Tunnel Routing, FortiWAN is fit for the requirement that an IPSec VPN with
ability of bandwidth aggregation and fault tolerance.
We start the topic with IPSec VPN Concepts, which includes the descriptions of IPSec VPN overview, IPSec key
exchange and How IPSec VPN works. The next topic describes how to set up FortiWAN IPSec VPN, see IPSec
set up. IPSec VPN installation is divided into the stages as follows:
As we know, a private network (deployment of private IP addresses) is invisible, closed to public network (usually
the Internet). Two private networks in geographically different location can not directly access each other through
Internet. Virtual Private Network (VPN) is a concept that connects local and remote private networks over Internet
to logically become one private network. An user in a local private network is capable to have accesses to
resource in remote private network in a secure way through Internet, such as the access to remote private
network of the headquarters office from (branch) local private network. Users of the two private networks access
to each other without being aware of the VPN transmissions, just like they are physically in the same network.
The VPN concept implies two critical elements, a tunnel connecting two private networks over an intermediate
network and a secure way transferring data through the tunnel (over an untrusted network), which make the
virtual private network matches the properties of a physical private network, accesses among private IP address
and invisibility to public network (data privacy). IPSec is just the technology designed to implement the two
properties of VPN concept. A VPN network established by IPSec can be called IPSec VPN. It not only gives the
tunneling implementation for connectivity of two incompatible networks, but also put emphasis on the strict
security definitions.
VPN Tunnels
Tunneling is a technique to perform data transmission for a foreign protocol over a incompatible network; such as
running IPv6 over IPv4, and the transmission of data for use within a private, corporate network through a public
network. Tunneling is done by encapsulating and decapsulating data and information of the particular protocol
within the incompatible transmission units symmetrically. IPSec protocol sets define the processes, which is the
Tunnel Mode we will introduce later (See Modes of IPSec VPN data transmission), to deliver encryption protected
data between incompatible networks by tunneling through an intermediate network. IPSec offers another option
to deliver protected data end-to-end without tunneling, which is called Transport Mode (See Modes of IPSec VPN
data transmission). It provides the flexibility to integrate other tunneling protocols with IPSec to establish a VPN
network.
The above diagram shows an IPSec VPN connection between two private networks, which two FortiWAN units
(two endpoints of the VPN tunnel) functions as the IPSec VPN gateways for. The IPSec VPN tunnel is established
through public IP addresses (for example 1.1.1.1 and 2.2.2.2) of FortiWAN's WAN interfaces. FortiWAN A
receives packets from site A network (192.168.1.0/24) with source IP 192.168.1.10 and destination IP
192.168.2.10 (site B network), and then performs:
l encrypt packets with shared security parameters (algorithms and secret keys)
l encapsulate packets with a new IP header that source IP is 1.1.1.1 and destination IP is 2.2.2.2.
l forward packets to the site B network (FortiWAN B)
FortiWAN B receives the packets and performs:
longer secure if its secret key is not safe or compromised. Before we take look into IPSec's key exchange, a basic
concept of encryption and authentication is introduced first.
Encryption
Encryption mathematically transforms data to meaningless random numbers. The original data is called plaintext
and the encrypted data is called ciphertext. The opposite process, called decryption, performs the inverse
operation to recover the original plaintext from the ciphertext. The process by which the plaintext is transformed
to ciphertext and back again is called an algorithm. All algorithms use a small piece of information, a key, in the
arithmetic process of converted plaintext to ciphertext, or vice-versa. IPSec uses symmetrical algorithms, which
the same key is used for both encrypt and decrypt the data. The length of the key is one of the factors
determining the security of an encryption algorithm. FortiWAN IPsec VPNs offer the following encryption
algorithms, in descending order of security:
3DES Triple-DES, in which plain text is DES-encrypted three times by three keys.
DES Digital Encryption Standard, a 64-bit block algorithm that uses a 56-bit key.
Authentication
In Information Security (or Cryptography), Authentication is the process of determining whether someone or
something is, in fact, who or what it is declared to be. In authentication, one has to prove its identity to the remote
one, and the identity will be verified by the remote one. A typical providing proof can be a certificate or username
and password. In cryptography, a message authentication code (MAC) is a short piece of information used to
authenticate a message—in other words, to provide integrity and authenticity assurances on the message.
Integrity assurances detect accidental and intentional message changes, while authenticity assurances affirm the
message's origin. A MAC algorithm, sometimes called a keyed (cryptographic) hash function (however,
cryptographic hash function is only one of the possible ways to generate MACs), accepts as input a secret key and
an arbitrary-length message to be authenticated, and outputs a MAC (sometimes known as a tag). The MAC
value protects both a message's data integrity as well as its authenticity, by allowing verifiers (who also possess
the secret key) to detect any changes to the message content. As with any MAC, it may be used to
simultaneously verify both the data integrity and the authentication of a message. FortiWAN IPsec VPNs offer the
following MAC algorithms, in descending order of security:
Security Association
To support secure communications (data encryption and authentication) between two VPN gateways, the
common security attributes must be shared in advance, which are the cryptographic and authentication
algorithms, encryption secret key and other necessary parameters. A common set of the security attributes
maintained by two IPSec VPN gateways for an IPSec VPN tunnel is what called Security Association (SA), which
is used to provide a secure channel and protect the communications between the two site networks. Each of the
two IPSec VPN gateways encrypts/decrypts data according to the established Security Association. The process
to establish a Security Association involves sharing and negotiation of the security attributes.
IKE consists of two phases, Phase 1 and Phase 2. The purpose of IKE Phase 1 is to establish a secure and
authenticated channel, which is actually a Security Association (called ISAKMP SA as well), between two entities
for further IKE Phase 2 negotiations. With the protection of ISAKMP SA, Phase 2 will then be performed to
establish the final Security Association (called IPSec SA as well) used to protect the VPN communications (data
transmission) between two sites. In other words, before users' VPN communication starts (data packet being
transferred to each other), the corresponding IKE Phase 1 and Phase 2 must be done to establish the SAs
between the two VPN gateways. With the established SA between two VPN gateways, privacy and authenticity
are so that guaranteed to the VPN communications (by encryption and authentication). Basically, IKE Phase 1
authenticates a remote peer and sets up a secure channel for going forward Phase 2 negotiations to establish the
IPSec SA.
IKE Phase 1
Before we talk about the details of IKE Phase 1, let us have an overview on Phase 1's Identity Verification
(Authentication). The endpoint who begins the IKE Phase1 negotiation makes a declaration of who it is to the
opposite endpoint, and the opposite endpoint verifies the identity. FortiWAN's IPSec employs a pre-shared key
to achieve the identity verification. The pre-shared key is a common key (similar to a password) pre-shared
between the two entities who join in the Phase 1 negotiations. This pre-shared key is used for verification of the
declared identity in a cryptographic system (MAC calculation of the identity). This mechanism is on the premise
that the pre-shared key is never compromised to the third-party. Although it looks like a password, the pre-shared
key, also known as a shared secret, is never sent by either endpoint during the processes of authentication.
Actually, the pre-shared key is involved in the calculations of encryption keys, which is actually used for the
authentication, at each endpoint.Unmatched pre-shared keys result in unmatched encryption keys, and indirectly
cause the authentication in IKE Phase 1 failed.
Now back to the IKE Phase 1. Phase 1 achieves the following objectives to establish ISAKMP Security
Association:
An IKE proposal is a set of necessary parameters for negotiations to establish a Security Association. The
negotiation initiator offers opposite endpoint the proposals of the suggested encryption and authentication
algorithms, the time-period that keys should remain active, and the strength of the keys used in Diffie-Hellman
key exchange process. The opposite endpoint chooses an appropriate proposal and responds it to the initiator, so
that the algorithms and other parameters used to protect data transmission between two endpoints are
determined.
A secret key is necessary for the established ISAKMP Security Association to work with the determined encryption
and authentication protocols. Therefore, except the negotiations of IKE proposals, a secret key must be
determined and shared between the two entities during IKE Phase 1 negotiations. However, it is insecure to send
a secret key directly to the opposite endpoint over the public network (no SA protection is offered during Phase 1
negotiations). Diffie-Hellman key exchange, which is a method used to securely exchange cryptographic keys
over a public channel, is introduced to IKE to generate the secret key. The two entities running a Diffie-Hellman
key exchange will start by exchanging key materials, which are public to third-party, via the public network. With
the key materials, calculation of Diffie-Hellman key exchange performed on each of the endpoints derives a
common value, which is a seed to generate the secret key we need. With the private and common seed, the two
endpoints further calculate the common secret key, and so that the secret key is securely shared. Actually, the
pre-shared key used for identity authentication is involved in the final calculations generating the secret key.
Authentication
Identity protection
The two endpoints running the Phase 1 processes declare its identity to each other. A pre-shared key between the
two entities is used to verify the declared identity and thus prevent malicious attacks from counterfeit identity.
With cryptographic method and the pre-shared key, one can prove its identity to the opposite end. Although it
looks like a password, the pre-shared key, also known as a shared secret, is never sent by either gateway.
Actually, it is involved in the generation of encryption secret key.
Message integrity
A message authentication code (MAC) not only verifies identity but also provides integrity and authenticity
assurances on the exchanged messages. The MAC value protects both a message's data integrity as well as its
authenticity against man-in-the-middle attacks or tampering.
In Main mode, the processes of IKE Phase 1 consists of six message exchanges. An IKE Phase 1 session begins
with IKE proposals negotiations between initiator and responder (as the previous description). In the next two
message exchanges, the necessary keying materials are exchanged to calculate the common secret key at both
ends. For the last two exchanges, encrypted authentication information is exchanged to verify the identity and
message integrity on each end.
In Aggressive mode, the processes of IKE Phase 1 is squeezed into three message exchanges. All data required
for IKE proposal negotiation and Diffie-Hellman key exchange passed by the initiator and responder in the first
two message exchanges. Unencrypted authentication information for sessions passed in the second and third
message exchanges. Comparing with main mode, aggressive mode might not be such secure (weak identity
protection and risk of pre-shared key crack), the advantage to aggressive mode is that it is faster than Main mode
however. FortiWAN's IPSec, however, does not support IKE Phase 1 in Aggressive mode, only Main mode is
available.
The successful outcome of Phase 1 negotiations (either aggressive mode or main mode) establishes the ISAKMP
Security Association, and the Phase 2 negotiation begins immediately. Phase 2 negotiations will be protected
(encryption) within the ISAKMP Security Association.
IKE Phase 2
Under the protection of ISAKMP Security Association, IKE Phase 2 performs parameters negotiations to establish
the IPsec Security Association which protects the subsequent IPSec VPN communications. IKE Phase 2 is
processed in one mode called Quick Mode (New Group Mode is not supported by FortiWAN). Similar to Phase 1,
in IKE Phase 2, another proposal of encryption and authentication algorithms is negotiated, shared secret keys
are derived, and the negotiation sessions are authenticated. The negotiated encryption and authentication
algorithms, derived secret keys and other necessary parameters, which are the successful outcome of IKE Phase
2, constitute the IPSec Security Association. So that the security association between two IPSec VPN gateways is
established, and the VPN communications are so that protected.
Perfect Forward Secrecy is a property of communication security that past session keys can not be compromised
by the compromise of long-term keys if a session key is associated to the long-term key in some way. Actually,
the shared secret key we introduced in IKE Phase 2 is derived by calculation with the secret key derived in IKE
Phase 1 and some insecure (is public to any third-party) parameters (a Diffie-Hellman exchange is not involved in
the calculation), if PFS is not enabled for IKE Phase 2. Once the secret key of IKE Phase 1 is compromised to an
attacker, all the secret session keys derived in IKE Phase 2 might become compromised. With enabling PFS, the
calculation of secret keys involves a new Diffie-Hellman exchange. The private key material of Diffie-Hellman
exchange protects the session secret keys of IKE Phase 2 from the compromise of IKE Phase 1's keys. However,
system performance might be concerned if Diffie-Hellman exchange is performed twice (Phase 1 and Phase 2
individually) for a establishment of IPsec Security Association.
Tunnel mode
IPSec Tunnel mode is commonly used for site-to-site communications by tunneling through incompatible
networks. For example, it delivers protected communications between two private networks through Internet,
which is a typical IPSec VPN. In IPSec tunnel mode, the original IP packet is entirely encrypted (not only the
payload data but also the routing information are encrypted), and is encapsulated with a new IP header. With the
new IP header encapsulation and decapsulation, two incompatible networks deliver encrypted packets to each
other by tunneling through Internet.
Transport mode
IPSec Transport mode is used for communications between two end-stations (host-to-host). An end-station can
be a IPSec gateway or just a host running IPSec server/client. Both are actually the destination to each other
while communicating. The basic concept of IPsec Transport mode is that the original IP header is intact; the
routing is neither modified nor encrypted. Transport mode only provides protection of the payload of the original
IP packet by encryption. The two endpoints are supposed to be accessible to each other originally. Usually,
Transport mode is applied to other tunneling protocols to provide protection of GRE/L2TP encapsulated IP data
packets ( GRE/L2TP transmission over IPSec protection). FortiWAN IPSec Transport mode is only available for
Tunnel Routing.
IPSec set up
After basic concept of IPSec introduced previously, this section focus on the introduction of FortiWAN's IPSec and
the configurations to set up FortiWAN's IPSec. FortiWAN provides a complete VPN solution through the
cooperation of Tunnel Routing and IPSec. FortiWAN's Tunnel Routing is used to build a site-to-site VPN with
bandwidth aggregation and fault tolerance over multiple WAN links. Moreover, with FortiWAN's IPSec protection,
Tunnel Routing delivers packets over secure channels.
(A specific procedure is required to switch the version, see IKE Phase 1 Web
UI fields - Internet Key Exchange)
Transmission mode Tunnel mode and limited Transport mode. Transport mode is only available for
Tunnel Routing.
DPD Support
PFS Support
IP deployment Support static IPv4 only, the supported WAN link types (See Configuring
your WAN):
l Routing mode
l Bridge Mode: One Static IP
l Bridge Mode: Multiple Static IP
Fail over Not Support (Both IPSec Tunnel mode and Transport mode themselves have no
ability to do fail over, only Tunnel Routing over IPSec Transport mode supports
fail over)
Although FortiWAN's Tunnel Routing (See "Tunnel Routing") is the technology to distribute packets of one
tunneling connection over multiple tunnels (bandwidth aggregation and fault tolerance are so that supported), it
does not provide strict protection to the tunneling communications (the encryption function built-in Tunnel
Routing is very simple and low security). For this reason, the major purpose of FortiWAN's IPSec Transport mode
is to provide Tunnel Routing transmissions an IPSec protection. Actually, the FortiWAN's IPSec Transport mode
is designed for Tunnel Routing only; an Transport mode IPSec SA can not be applied to the traffic except Tunnel
Routing. By establishing an IPSec SA on every TR tunnel, Tunnel Routing's GRE packets will be encrypted (ESP
encapsulated) and be transferred through the specified interface (according to the specified TR algorithm) in
IPSec Transport mode (the original routing of the GRE packet remains intact as the previous description). The
ESP packets are decrypted on the opposite FortiWAN unit to recover the original GRE packets, and the
subsequence is the normal Tunnel Routing processes, packet decapsulation, reassembly and forwarding (to the
hosts behind the FortiWAN). The way for IPSec Transport mode to protect Tunnel Routing transmission is very
flexible. For every TR tunnel of a tunnel group, it is your options to establish a IPSec SA protecting the TR tunnel
or not. Tunnel Routing works normally under full and partial IPSec protection (full protection: each TR tunnel of a
tunnel group is protected by a IPSec SA; partial protection: parts of the TR tunnels of a tunnel group are protected
by IPSec SAs).
In conclusion, FortiWAN provides three methods to build a VPN network, which are Tunnel Routing, IPSec
Tunnel mode and Tunnel Routing over IPSec Transport mode. Note that Tunnel Routing can not support
dynamic IP and NAT pass-through (one of the features of Tunnel Routing, see "Dynamic IP addresses and NAT
pass through" in "Tunnel Routing > How the Tunnel Routing Works"), if it is protected by IPSec.
In the example above, the WAN link IP address mapping of ISAKMP SA 1 between FortWAN 1 and FortiWAN 2 is
typical and correct. Both the WAN link IP addresses, 2.2.2.2 and 4.4.4.4, participate in only one ISAKMP SA, the
ISAKMP SA 1. As for WAN link 3 on FortiWAN 2, its IP address 3.3.3.3 participates in ISAKMP SA 2 and ISAKMP
SA 3 (more than one ISAKMP SA), which causes failure to establish ISAKMP SA 2 and ISAKMP SA 3. IPSec
connections thus can not be established.
The above example indicates a valid IPSec deployment. The mapping of WAN link IP address for all the ISAKMP
SAs between the two devices are in one-to-one relationship:
The above diagram is anther example of valid IPSec deployment. There are three IPs deployed on FortiWAN 2's
WAN link 2 (See "Configuring your WAN"), and each IP address participates in only one ISAKMP SA.
Considering the IPSec deployment among more than two FortiWAN devices as the above example.
ISAKMP SA 1 established For the two FortiWAN devices (FortiWAN1 and FortiWAN 2), the two WAN link IP
addresses, 3.3.3.3 and 5.5.5.5, participate in only ISAKMP SA 1. Although
3.3.3.3 also participates in ISAKMP SA 2, it takes no influence on ISAKMP SA 1
since it is the thing about another device, FortiWAN 3. The deployment limitation
is about any two devices, others can be ignored.
ISAKMP SA 2 established For the two FortiWAN devices (FortiWAN 2 and FortiWAN 3), the two WAN link
IP addresses, 3.3.3.3 and 8.8.8.8, participate in only ISAKMP SA 2.
ISAKMP SA 3 failed For the two FortiWAN devices (FortiWAN 1 and FortiWAN 2), the WAN link IP
addresses 6.6.6.6 participates in not only ISAKMP SA 3 but also ISAKMP SA 4.
ISAKMP SA 4 failed For the two FortiWAN devices (FortiWAN 1 and FortiWAN 2), the WAN link IP
addresses 6.6.6.6 participates in not only ISAKMP SA 3 but also ISAKMP SA 4.
ISAKMP SA 5 established For the two FortiWAN devices (FortiWAN 2 and FortiWAN 3), thetwo WAN link IP
addresses, 2.2.2.2 and 9.9.9.9, participate in only ISAKMP SA 5. Although
2.2.2.2 also participates in ISAKMP SA 4, it takes no influence on ISAKMP SA 5
since it is the thing about another device, FortiWAN 1. The deployment limitation
is about any two devices, others can be ignored.
Between any two FortiWANs, we cannot terminate traffic through multiple IPSec connections on the same local
or remote IP address. This limitation exists in both of the IPSec types: IPSec Tunnel mode and IPSec Transport
mode, so that Tunnel Routing over IPSec Transport mode is involved indirectly. You have to give careful
consideration to the issue when planing how to deploy the IPSec VPN (and Tunnel Routing) between multiple
FortiWANs.
The locations of the sites that the site-to-site traffic originates from and needs to be delivered to
l Choose the network sites that they need to communicate to each other through the VPN and define what kind of
communication it is (what kind of services provided in a network site and what kind of services that users in a
network site need to access).
The networks, individual hosts or server frames participating in the VPN communications
l A network site consists of hosts, servers, and/or networks (private IP addresses deployment). You need to
determine the participating private IP addresses (the source and destination of traffic) and make policies to permit
traffic to pass through the VPN.
The VPN devices used to build the VPN
l A site-to-site VPN (tunnels) between two FortiWAN units, or a FortiWAN unit and a FortiGate unit.
The network interfaces that two VPN devices communicate through
l For any VPN tunnel between two VPN devices, you need to determine the participating network interface for each
end-point. This implies the public IP addresses (local IP and remote IP) used to establish a VPN tunnel through
Internet. Note that only static IP addresses are supported.
l One WAN interface cannot serve for more than one IPSec connectivity between any two FortiWAN devices. You
need to take this for consideration when you determine the topology. See "Limitation in the IPSec deployment" for
the details.
The VPN device interfaces that a private network accesses the VPN through
l The private IP addresses associated with the VPN device interfaces to the private networks. Hosts in the private
network behind the VPN device access VPN through these interface. Traffic is forwarded between the VPN tunnels
and the private networks on each site.
The types used to build the VPN
l IPSec protected VPN without bandwidth aggregation and fault tolerance: IPSec Tunnel mode.
l IPSec protected VPN with bandwidth aggregation and fault tolerance: Tunnel Routing over IPSec Transport mode.
l VPN with bandwidth aggregation and fault tolerance: Tunnel Routing (See "Tunnel Routing").
To set up the IPSec VPN between two FortiWAN units, the following steps are necessary for each of the
endpoints.
1. Define IKE Phase 1 parameters for establishment of ISAKMP Security Association with authenticated a remote
peer.
2. Define IKE Phase 2 parameters for establishment of IPSec Security Association with authenticated a remote
peer.
3. Create correspondent policies of NAT, Auto Routing (AR) and Tunnel Routing (TR) to correctly route the
packets of IKE negotiations and IPSec VPN communications (will be discussed in next section, see "Define
routing policies for an IPSec VPN").
Here are the items and information that you need to determine for IKE Phase 1 settings:
Defining the remote and local ends of the IPSec VPN tunnel
Basically, this is to specify the public IP addresses for the two ends (a local FortiWAN unit and a remote FortiWAN
unit) of the IPSec VPN tunnel. The IPSec VPN tunnel is established through connection of the two public IP
addresses. You need to determine the WAN link of a FortiWAN unit to connect with each other for an IPSec VPN
tunnel; and the IP addresses deployed on the two WAN ports are actually the two ends (local IP and remote IP) of
the IPSec VPN tunnel. FortiWAN's IPSec VPN does not support dynamic IP addresses; it is only available for the
WAN links that are deployed as Routing Mode, Bridge Mode: One Static IP or Bridge Mode: Multiple
Static IP (see "Configuring your WAN" for details). For the settings of a IPSec VPN tunnel configured on the two
endpoints, the Local IP of a FortiWAN unit becomes the Remote IP of the opposite FortiWAN unit and vice versa.
An IPSec VPN tunnel consists of the IKE negotiations (for the security associations, SAs) and the data
transmission tunnel; both are established through the two public IP addresses. You also have to give
consideration to the limitation that we cannot deploy multiple IPSec connections between any two FortiWANs on
the same local or remote IP address. See "Limitation in the IPSec deployment" for details.
A pre-shared key used to authenticate the FortiWAN unit to the remote unit
During the IKE Phase 1 negotiations, a FortiWAN unit need to authenticate itself to the remote unit by a pre-
shared key. The two endpoints of an IPSec VPN tunnel share a common key in advance, so that they can
authenticate itself to each other with the common key, like a password. You need to distribute the pre-shared key
in a secure way. The pre-shared key configured on the two endpoints of a IPSec VPN tunnel must be equal, or the
establishment of IPSec Security Association goes to failure (failed authentication results in failure of IKE Phase 1
and Phase 2.
The modes for parameters exchanging, Main mode and Aggressive mode, used for IKE Phase
1 negotiations
A FortiWAN unit exchange Phase 1 parameters with the remote unit in only Main mode. In Main mode, the Phase
1 parameters are exchanged in six messages with encrypted authentication information. As the previous
introductions, Main mode gives securer authentication by a encryption with the negotiated secret key. By
comparison, Aggressive mode is weak in authentication since the lack of encryption. However, with the simplified
exchanging process, Aggressive mode is faster than Main mode indeed. Security and efficiency are the
considerations you need to evaluate for IKE Phase 1 negotiations. Once it is determined, both the two endpoints
must be configured with the same mode.
The connectivity between two endpoints communicating through IPSec may goes down unexpectedly due to
routing problems, hardware broken, host rebooting, etc. In the situation, however, the IPSec entities are not
aware of the loss of peer connectivity (availability of peer), and the security associations (SAs) of each peer
remains. Packets of communication will continue being sent to oblivion, and reestablishment goes to failure.
Dead Peer Detection (DPD) is such a method, by sending periodic HELLO/ACK messages, to confirm the
availability of an IPSec endpoint, recognize a disconnection, reclaim the lost resources (SAs) and reestablish IKE
negotiations automatically. When a disconnection is detected, the active ISAKMP SA and the correspondent
IPSec SAs are removed and renegotiated immediately whether the secret keys expire or not.FortiWAN's IPSec
DPD is performed in the Always Send mode, which the detection messages are sent at configured intervals
regardless of traffic activity between the peers (some products probe for a idle tunnel before sending DPD
detection messages, but FortiWAN does not). Related SAs would be removed once a disconnection is recognized
by FortiWAN's IPSec DPD, but FortiWAN would not automatically perform the reestablishment (new
establishment of the SAs is triggered only if an outgoing packets of the IPSec communication arrive at the
FortiWAN unit).
The main object of IKE Phase 1 is to negotiate the encryption and authentication algorithms, and the
correspondent keys between two FortiWAN units so that they can authenticate the identity to each other during
the Phase 1 process, and protect the subsequent IKE Phase 2 negotiations.
l Which encryption algorithms may be applied for converting messages into a form that only the intended recipient
can read
l Which authentication hash may be used for creating a keyed hash from a pre-shared or private key
l Which Diffie-Hellman group (DH Group) will be used to generate a secret session key
The initiator of IKE Phase 1 proposes a list of potential cryptographic parameters that are supported (this is what
the Proposal fields supposed to be configured on Web UI, algorithms and DH Group) to remote FortiWAN. The
remote FortiWAN compares the received proposals with its own list of Phase 1 Proposal and responds with the
choice of matching parameters to use for authenticating and encrypting packets. According the determined
proposal, the two peers handle the subsequent exchanges to generate encryption keys between them, and
authenticate the exchanges through a pre-shared key. The negotiated encryption algorithm, authentication
algorithm and secret session key, which are the outcome of successful IKE Phase 1, will be used to protect the
subsequent IKE Phase 2 negotiations.
To guarantee a successful IKE proposal negotiation, the configurations of proposals on both endpoints must be
partially matched. However, FortiWAN's IKE Phase 1 does not support multiple proposals, which means the IKE
Phase 1 proposal must contain only one encryption algorithm, one authentication algorithm and one DH group.
Therefore, you need to make sure that the IKE Phase 1 proposals on the two FortiWAN units are exactly the
same, or Phase 1 negotiation goes to failure.
Go to Service > IPsec, select the Tunnel Mode or Transport Mode and click the add button to add a new
configuration panel of Phase 1. The Phase 1 configuration defines the endpoints of the IPSec VPN tunnel, and
the necessary parameters used to negotiate with the opposite unit to establish ISAKMP Security Association.
Name A "unique" description name for the Phase 1 definition. The name is
not a parameter exchanged with the opposite unit during Phase 1
negotiations. This name can contain a piece of information used for
simple management, such as it can reflect where the correspondent
remote unit is or what the purpose it is. It is also the index used in
IPSec Statistics (See "Statistics > IPSec").
Hide Details / Show Details Click to expand or collapse the configuration details.
l Please make sure the entered IP address is equal to the IP address of the WAN port that you would like to
employ to establish the IPSec VPN, system will not run error checking on this. Incorrect IP address
causes the negotiations to go to failure.
l A duplicate of Remote IP (or pair of Local IP and Remote IP) of a Phase 1 configuration is not
acceptable to other Phase 1 configurations. Please make sure each Phase 1 configuration is
incompatible with others on the Remote IP. See "Limitation in the IPSec deployment" for details.
l In Transport mode, the Local IP and Remote IP of a Phase 1 configuration must be equal to the Local IP
and Remote IP of a TR tunnel that IPSec provides protection to, so that TR packets match the ISAKMP
SA and are protected by ESP encapsulation. See "Tunnel Routing".
l Additional routing policies are necessary for system to route the packets of IKE negotiations and IPSec
VPN communications to the IP address (WAN port) you defined here (See "Define routing policies for an
IPSec VPN").
Authentication Method Only Pre-Shared Key is supported. Enter the pre-shared key in the
field "Input key" next to the drop-down menu. The pre-shared key is
used to authenticate the identity to each other, the local and remote
FortiWAN units, during IKE Phase 1 negotiations. Make sure both
the local and remote units are defined an equal key. For stronger
protection against currently known attacks, a key consisting of a
minimum of 16 randomly chosen alphanumeric characters is
suggested.
Dead Peer Detection Check to enable the monitoring of current existence and
availability of the remote unit. PDP sends a detection message
periodically to remote unit every specified time interval. The
IPSec tunnel will be considered down if local unit sends the
detection message without a response from the remote unit for
five consecutive times. When a disconnection is recognized,
the active ISAKMP SA (and the correspondent IPSec SAs) are
removed immediately whether the secret keys expire or not (a
renegotiation would not be performed automatically).
Delay: Set the time interval that PDP sends periodically the
detection message.
Keylife Enter the time interval (in seconds) that the negotiated secret key
(used for ISAKMP SA) is valid during. For the expiration of a key,
IKE Phase 1 is performed automatically to negotiate a new key
without interrupting normal IPSec VPN communications.
Phase 2 settings are associated with a Phase 1 configuration for an establishment of IPSec VPN (IPSec SA). This
section we describe the configurations of IKE Phase 2.
Here are the items and information that you need to determine for IKE Phase 2 settings:
Similar to Phase 1 negotiations, the purpose of IKE Phase 2 is to negotiate another set of encryption and
authentication algorithms, and the correspondent secret keys, so that the established IPSec SA provides
protection to subsequent IPSec VPN communications.
l Which encryption algorithms may be applied to provide data confidentiality for IP Encapsulating Security Payload
(ESP)
l Which authentication hash may be used for data integrity, authentication and anti-replay creating in IP
Encapsulating Security Payload (ESP)
l Whether PFS is applied to generate a secret session key or not
l Which Diffie-Hellman group (DH Group) will be used to generate a secret session key if PFS is applied
FortiWAN IKE Phase 2 supports multiple proposals of encryption and authentication algorithms. However, a
successful IKE Phase 2 proposal negotiation requires partially matched proposals on the both units. Incompatible
IKE proposals fails the IKE Phase 2 negotiations. Please make sure on this while configuring.
Similar to the processes in Phase 1, two FortiWAN units handle the negotiations of encryption and authentication
algorithms according to their IKE proposals. The only thing that is different from Phase 1 is Perfect Forward
Secrecy (PFS).
By default, the standard IKE Phase 2 derives the secret session key (for IPSec Security Association) based on the
secret session key of ISAKMP Security Association (outcome of Phase 1 negotiations) without additional private
materials. The secret session keys of IPSec SA might become vulnerable (to be recovered) if the keys of ISAKMP
SA are broken or compromised. Perfect Forward Secrecy (PFS) is the option for IKE Phase 2 to force a new Diffie-
Hellman exchange (it implies a new private key material) involved in the calculations of secret session keys, so
that they are unrelated to only the Phase 1 keys (can not be recovered with only the compromised ISAKMP SA
secret key). Therefore, a DH Group has to be specified for a IKE Phase 2 proposal if the PFS is applied to it.
Certainly, PFS gives securer IPSec SA secret key, but more time is spent on the calculations.
Quick mode selector is a rule to determine which packet is transferred throuth IPSec VPN, according to the source
IP address, source port, destination IP address, destination port and protocol of a packet. For Tunnel Mode, it
usually implies the hosts (or a network) behind the two FortiWAN units trying to communicate to each other
through the IPSec VPN tunnel established between the two FortiWAN. Make sure the Quick mode selector of one
endpoint is correspondent to the opposite endpoint. A source IP address defined in the selector in one peer must
be defined as the destination IP address of the selector of the opposite peer, and vice versa. FortiWAN supports
only Tunnel Routing (TR) traffic to be transferred through IPSec VPN in Transport Mode, therefore, the quick
mode selector is not required for Phase 2 configurations of Transport Mode.
IKE Phase 1 and Phase 2 are both the necessaries to establish an IPSec VPN, thus configurations of an IPSec
VPN must contains configurations of the two Phases. Choosing a set of Phase 1 parameters that you would like
to define the correspondent Phase 2 parameters for. The Phase 2 configuration panel is below the Phase 1 panel
on the Web UI. Click the add button on the header of Phase 2 or the add button of an existing Phase 2
configuration to add a new Phase 2 configuration panel.
For IPSec Tunnel mode, you can define multiple sets of Phase 2 parameters within one Phase 1 configuration for
different Phase 2 Quick Mode selectors. A Phase 2 configuration contains only one quick mode selector used to
filter packets matching the only one pair of packet source, destination and protocol. To allow different traffic (for
example, traffic of different protocol) to be transferred through the same IPSec VPN tunnel (through the same
Local and Remote IPs), it requires multiple Phase 2 configurations (different quick mode selectors) to associate
with the same Phase 1. Moreover, you can deliver different IKE Phase 2 proposals (different encryption,
authentication algorithms and DH groups) to the multiple quick mode selectors, if multiple security levels are
necessary.
For IPSec Transport mode, the Phase 2 configuration does not require a Quick Mode selector. FortiWAN's IPSec
Transport mode is designed to protect only communications of Tunnel Routing. Tunnel Routing takes the part to
evaluate packets for TR transmission (TR rules) and distributes packets over TR tunnels (TR algorithms), then
IPSec Transport mode established on a TR tunnel (Local IP and Remote IP) protects all the passing TR packets.
Therefore, multiple Phase 2 sets within a Phase 1 is not required for Transport mode. Remember that FortiWAN
supports only two kinds of site-to-site IPSec VPN, "IPSec Tunnel mode" and "Tunnel Routing over IPSec
Transport mode".
Hide Details / Show Details Click to expand or collapse the configuration details.
l NULL: NULL means perform an integrity check only; packets are not
encrypted. It is invalid to set both Encryption and Authentication to
null.
l DES: Digital Encryption Standard, a 64-bit block algorithm that uses
a 56-bit key.
l 3DES: Triple-DES; plain text is encrypted three times by three keys.
l AES128: A 128-bit block algorithm that uses a 128-bit key.
l AES192: A 128-bit block algorithm that uses a 192-bit key.
l AES256: A 128-bit block algorithm that uses a 256-bit key.
The remote peer or client must be configured to use at least
one of the encryption proposals that you define.
Keylife Enter the time interval (in seconds) that the negotiated secret keys
(used for IPSec SA) are valid during. For the expiration of keys, IKE
Phase 2 is performed automatically to negotiate new keys without
interrupting normal IPSec VPN communications. Keylife of IPSec
SA's secret keys is suggested to be shorter than the keylife of
ISAKMP SA's secret keys.
Quick Mode Configurations of Quick Mode is required only for IPSec Tunnel
Mode. A Quick Mode selector determines the acceptance or
rejection of transmission through the IPSec VPN tunnel for
packets. It usually implies the IPSec VPN communications
between private networks (hosts) behind the two FortiWANs
unit (IPsec VPN gateways). Packets coming form the networks
behind the local FortiWAN and going to another network
behind the remote FortiWAN are evaluated by Quick Mode
selectors at the local FortiWAN unit. Only packets matching
the selector are allowed to be transferred via the IPSec VPN
tunnel. A Quick Mode selector consists of the following five
filters:
So far, we have introduced the concept of IPSec VPN and how to configure the settings of FortiWAN's IPSec.
However, the success of the IPSec VPN establishment and communications actually requires the cooperation
between FortiWAN' IPSec and other functions, Auto Routing, NAT and Tunnel Routing. In other words, besides
the configurations of IPSec, correspondent policies of Auto Routing, NAT or Tunnel Routing are required to set up
an IPSec VPN. See "Define routing policies for IPSec VPN".
The IPSec packets we are talking about consist of the packets of 2 phases IKE negotiations (called "IKE packets"
here) and the packets of IPSec VPN communications (called "ESP packets" here). An IKE packet comes from the
local FortiWAN unit and its source IP address is just the configured Local IP (a WAN port); an ESP packet comes
from a private network behind the local FortiWAN and its source IP address is a private IP address. The followings
describe the procedures defining related policies for "IPSec Tunnel mode" and "Tunnel Routing over IPSec
Transport mode".
Define Auto Routing and NAT policies for an IPSec Tunnel-mode VPN
For IPSec Tunnel Mode, you need to make sure connections of both IKE and ESP packets are fixedly routed by
Auto Routing to the WAN port that is configured as the Local IP of the IPSec VPN tunnel.
For this example topology, we need to have configurations of Network Setting, Auto Routing, NAT and
IPSec as follows:
Network Setting
WAN settings
WAN Link 1 1
For the details of WAN link setting, see "Configurations for a WAN link in Routing Mode", "Configurations for a
WAN link in Bridge Mode: One Static IP" and "Configurations for a WAN link in Bridge Mode: Multiple Static IP".
For the details of LAN private subnet setting, see "LAN Private Subnet".
Define Auto Routing policies for IKE negotiation and IPSec communication packets
Packets of IKE negotiation are generated by FortiWAN itself (source and destination IP address of the packets is
respectively the Local IP and Remote IP of Phase 1 configuration), therefor the Source and Destination of the
Auto Routing filter for IKE negotiation must be configured with the Local IP and Remote IP (the IP address of
WAN port of two FortiWAN units). Remember that the IPSec SAs are established on the WAN port of both the
two FortiWANs.
Label IPSec_WAN1 (Any name you desire) IPSec_WAN1 (Any name you desire)
Note that packets of IKE negotiations are generated from FortiWAN's localhost, the Source field of
an AR filter must be configured to "Localhost" to match the negotiation traffic and direct it to correct
WAN link.
Routing of packets that are going to be transferred through IPsec VPN between the private networks (LANs)
behind the two sites (local and remote) is also controlled by FortiWAN's Auto Routing. It is necessary to route
packets to the WAN link that the IPSec SA is established on, so that the packets can be processed (evaluated by
Quick Mode selector and ESP encapsulated) by IPSec on the WAN port.
With the existing policy "For IPsec", you only need to add the filters like:
Input Port Any Port (or the LAN port, PortX) Any Port (or the LAN port, PortX)
IPSec Phase 2 Quick Mode selector controls the IPSec availability to specified users (the source, destination and
service of packets); before that, it requires the Auto Routing filter to direct the packets to the correct WAN link
(Routing Policy). Make sure the Auto Routing filter and Phase 2 Quick Mode selector are equal on Source,
Destination and Service. For the details of Auto Routing, see "Auto Routing". Although Auto Routing provides fail-
over policy to redirect packets to another WAN link when a failure occurs, it is unable to achieve the fail-over for
IPSec Tunnel mode since the same Quick Mode selector cannot be applied to different IPSec SAs.
Define NAT policies for IKE negotiation and IPSec communication packets
NAT default rules translate the source addresses of packets come from the private subnet (LAN) behind
FortiWAN after Auto Routing determines a WAN link for them. In IPSec VPN Tunnel mode, Packets of
communications usually come from LAN subnet of FortiWAN and are evaluated with NAT rule before Phase 2
Quick Mode selector. If the source address of a IPSec packet is translated to another by NAT, the packet fails in
matching the Quick Mode selector and the IPSec communication goes to failure.
IKE negotiation packets are generated on FortiWAN's localhost. The source of a IKE packet is the Local IP (IP
address on the WAN port) of the Phase 1, which will not be translated by NAT. Therefore, a NAT policy is not
required for IKE negotiations.
By default, all the packets will be processed by NAT once Auto Routing determines a WAN link to the packets.
However, IPSec VPN communication will go to failure if source IP address of the packets are translated
(mismatching the Quick Mode selectors). To disable NAT for the packets:
Make sure the NAT rule and Phase 2 Quick Mode selector are equal on Source, Destination and Service. For the
details of NAT, see "NAT".
Add Phase 1 configurations for the IPSec tunnel mode VPN between site A's WAN 1 (10.10.10.10) and site B's
WAN 1 (20.20.20.20). The other parameters are not listed here.
Add Phase 2 configurations for the IPSec tunnel mode VPN between site A 's WAN 1 (10.10.10.10) and site B's
WAN 1 (20.20.20.20). The other parameters are not listed here.
Quick Mode
For the details of IPSec configuration, see "IPSec VPN in the Web UI".
Define Auto Routing and Tunnel Routing policies for an Tunnel Routing over IPSec Transport
mode VPN
As previous descriptions, IPSec Transport mode provides secure data transmission without IP tunneling (IP
encapsulation). However, IPSec Transport mode can give protections to FortiWAN's Tunnel Routing, which
brings a securer (compare to the original TR) and more efficient (compare to the "IPsec Tunnel mode VPN" on
load balancing and fault tolerance) VPN application. Tunnel Routing distributes the encapsulated (GRE) packets
over multiple tunnels (pairs of local WAN port and remote WAN port). With the IPSec SAs established on these
TR tunnels, GRE packets will be protected (encrypted/decrypted) by correspondent SA when they pass through a
TR tunnel (the local and remote WAN ports). Transport-mode IPSec SAs are required for each of Tunnel
Routing's GRE tunnels to associate Tunnel Routing with IPSec.
IPSec Transport mode protects the communications between private networks behind two FortiWAN units
through two TR tunnels. For this example topology, we need to have configurations of Network Setting, Auto
Routing, IPSec and Tunnel Routing as follows:
Network Setting
WAN settings
WAN Setting Local endpoint Local endpoint Remote endpoint Remote endpoint
(Site A) (Site A) (Site B) (Site B)
WAN Link 1 2 1 2
WAN Type Routing Mode Routing Mode Routing Mode Routing Mode
For the details of WAN link setting, see "Configurations for a WAN link in Routing Mode", "Configurations for a
WAN link in Bridge Mode: One Static IP" and "Configurations for a WAN link in Bridge Mode: Multiple Static IP".
For the details of LAN private subnet setting, see "LAN Private Subnet".
Our goal is two establish IPSec protected VPN based on Tunnel Routing (See "Tunnel Routing") through two TR
tunnels, which implies two IPSec SAs being established on the two TR tunnels. Therefore, it requires routing
policies to route the IKE negotiation packets for establishing the two IPSec SAs.
Packets of IKE negotiation are generated by FortiWAN itself (source and destination IP address of the packets is
respectively the Local IP and Remote IP of Phase 1 configuration), therefor the Source and Destination of the
Auto Routing filter for IKE negotiation must be configured with the Local IP and Remote IP (the IP address of
WAN port of two FortiWAN units). Remember that the IPSec SAs are established on the WAN port of both the
two FortiWANs.
Auto Routing Local endpoint Local endpoint Remote endpoint Remote endpoint
Policy (Site A) (Site A) (Site B) (Site B)
Auto Routing Local endpoint Local endpoint Remote endpoint Remote endpoint
Filter (Site A) (Site A) (Site B) (Site B)
Input Port Any Port Any Port Any Port Any Port
Tunnel Routing itself takes the responsibility to route packets over multiple tunnels, therefore Auto Routing
policies are not required for packets of IPSec communication. For the details of Auto Routing, see "Auto Routing".
Note that packets of IKE negotiations are generated from FortiWAN's localhost, the Source field of
an AR filter must be configured to "Localhost" to match the negotiation traffic and direct it to correct
WAN link.
Next is the Phase 1 configurations for two IPSec SAs in Transport mode. To associate an IPSec SA with a TR
tunnel, make sure the Phase 1 configuration and the TR tunnel are equal on the Local IP and Remote IP.
Add Phase 1 configurations for IPSec Transport mode SAs between site A's WAN 1 (10.10.10.10) and site B's
WAN 1 (20.20.20.20), and site A's WAN 1 (11.11.11.11) and site B's WAN 1 (21.21.21.21). The other parameters
are not listed here.
Next you need to configure the settings to Phase 2 for the four Phase 1 configurations above. Phase 2 of
Transport mode does not require specifying a Quick Mode selector, only a name and IKE proposal are required.
For the details of IPSec configuration, see "IPSec VPN in the Web UI".
As for the communication packets between networks behind the two FortiWAN units, Tunnel Routing controls the
routing of them. You need the configurations to set up the two TR tunnels, and the policies to route GRE packets
over the TR tunnels.
To establish the TR tunnels, go to Service > Tunnel Routing > add a new Tunnel Group with two Group
Tunnels and appropriate balancing algorithm:
Group Tunnel 1
E Checked Checked
Group Tunnel 2
E Checked Checked
A packet matching the rule will be delivered to appropriate tunnel according the Tunnel Routing algorithm (or you
can say a packet matching the rule will be GRE encapsulated and delivered to appropriate WAN port). The IPSec
SAs established on the tunnels guarantee the privacy to transmission on the tunnels by encrypting the packets
before they are transferred outward.
The pair of Local IP and Remote IP is the link to associated a GRE tunnel with an IPSec Transport mode SA,
please make sure the configurations are equal on this. Note that please do not configure an Tunnel mode Phase
1 with the Local IP and Remote IP of a TR tunnel and configure the Phase 2 Quick Mode selector being equal to a
TR routing rule, or Tunnel Routing goes to failure.
To set up a Tunnel Routing over IPSec Transport mode, we suggest the steps to follow as below:
1. Configure Network Settings on both units.
2. Define correspondent Auto Routing policies on both units.
3. Configure the settings of IPSec Transport mode Phase 1 and Phase 2 on both units.
4. Define Tunnel Routing policies and routing rules on both units.
In this example, the common parameters for establishing IPSec SAs between the two units are as follows:
Configurations on FortiWAN
To set up the IPSec VPN, configurations of Network Setting, Auto Routing, NAT and IPSec are required on
FortiWAN (See "Define routing policies for an IPSec VPN").
Network Setting
WAN settings
Go to System > Network Setting > WAN Setting, and create a WAN link configuration:
WAN Link 1
For the details of WAN link setting, see "Configurations for a WAN link in Routing Mode", "Configurations for a
WAN link in Bridge Mode: One Static IP" and "Configurations for a WAN link in Bridge Mode: Multiple Static IP".
Go to System > Network Setting > LAN Private Subnet, and create a LAN subnet configuration:
Netmask 255.255.255.0
For the details of LAN private subnet setting, see "LAN Private Subnet".
Auto Routing
Go to Service > Auto Routing, and create a policy and two IPv4 filters for IKE negotiations and IPSec
communication.
Policy
Algorithm Fixed
IPv4 Filter
Two IPv4 filters: one for IKE negotiations, and another for general IPSec communication.
Input Port Any Port Any Port (or the LAN port, PortX)
NAT
When All-Time
Source 2.2.2.0/255.255.255.0
Destination 1.1.1.0/255.255.255.0
Service Any
Translated No NAT
IPSec
Phase 1
Name IPSec_FGT_P1
Local IP 10.12.102.42
Remote IP 10.12.136.180
Proposal
Encryption DES
Authentication MD5
DH Group 5
Phase 2
Name IPSec_FGT_P2
Proposal
Encryption DES
Authentication MD5
PFS Group 5
Quick Mode
Source 2.2.2.0/255.255.255.0
Port Any
Destination 1.1.1.0/255.255.255.0
Port Any
Protocol Any
So far, it is complete to set up the IPSec VPN on the FortiWAN side, configurations on the FortiGate side are
introduced next. For the details of IPSec parameters, see "IPSec VPN in the Web UI".
Configurations on FortiGate
To set up the IPSec VPN, configurations of Network, Router and VPN are required on FortiGate. For further
information of FortiGate configurations, see FortiOS Handbook on Fortinet document site.
Network
Go to System > Network > Interface. Configure the setting for WAN 1 with IP address 10.12.136.180 on a
physical interface.
VPN
Name IPSec_to_FWN_P1
Select "Custom VPN Tunnel (No Template)" and click Next to configure the settings as follows:
Network
IP Version IPv4
IP Address 10.12.102.42
Interface WAN1
Authentication
IKE
Version V1
Phase 1 Proposal
Encryption DES
Authentication MD5
Diffie-Hellman Group 5
XAUTH
Type Disable
Phase 2 Selectors
Name IPSec_to_FWN_P2
Phase 2 Proposal
Encryption DES
Authentication MD5
Diffie-Hellman Group 5
Auto-negotiate disable
Seconds 120
Router
Go to Router > Static > Static Routes, and click Create New to create two rules for WAN1 and the IPSec
tunnel - IPSec_to_FWN_P1:
Optional Services
As an edge device, FortiWAN provides other functions except the major traffic load balancing and fault tolerance.
These optional functions are helpful to manage the network in all the ways.
Firewall
This section introduces how to set up the firewall. Unlimited number of rules can be added to the firewall rule list.
The rules are prioritized from top to bottom that is rules at the top of the table will be given higher precedence
over lower ranked ones. [IPv4 Rules] and [IPv6 Rules] are for configurations of IPv4 and IPv6 respectively.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Firewall service, see "Log"
and "Reports: Firewall".
When Three options available: Busy hour, Idle hour and All-Time (See "Busyhour Settings").
Source Packets sent from specified source will be matched (See "Using the web UI").
Destination Packets sent to a specific destination will be matched. This field is the same as the “Source”
field, except that packets are matched with specified destination (See "Using the web UI").
Service The TCP/UDP service type to be matched. Select the matching criteria from publicly known
service types (e.g. FTP), or enter the port number in TCP/UDP packets and specify the range.
Type the starting port number plus hyphen “-“ and then the ending port number. e.g.
“TCP@123-234” (See "Using the web UI").
Action Choose the actions when the rule is matched: Accept: The firewall will let the matched packets
pass. Deny: The firewall will drop the matched packets.
L Check to enable logging. Whenever the rule is matched, the system will record the event to the
log file.
Default rules
By default, FortiWAN's firewall enables the following IPv4/IPv6 rules to deny some accesses coming from the
Internet, which might cause general security issues:
1. When=All-Time & Source=WAN & Destination=Localhost & Service=HTTP(80) &
Action=Deny
2. When=All-Time & Source=WAN & Destination=Localhost & Service=HTTPS(443) &
Action=Deny
3. When=All-Time & Source=WAN & Destination=Localhost & Service=SSH(22) &
Action=Deny
4. When=All-Time & Source=WAN & Destination=Localhost & Service=SNMP(61) &
Action=Deny
Example 1
l The users from the internet (WAN) can only access FTP Server 211.21.48.195 through port 21.
l The users from LAN can access all servers and hosts on the internet (WAN) through port 25 (SMTP), port 80
(HTTP), port 21 (FTP), and port 110 (POP3).
l All other packets are blocked.
The rules table for the example will look like this:
Example 2
l The users from the internet (WAN) can access server 211.21.48.195 inside DMZ through TCP port 7000.
l The hosts 192.168.0.100 – 192.168.0.150 in the LAN can access the Internet (WAN) but the others cannot.
l Users from the Internet (WAN) cannot connect to the port 443 on FortiWAN (i.e. Web Administration on FortiWAN).
Note: “Localhost” represents the address of FortiWAN host machine.
l Users from LAN can access FTP server 192.192.10.1 through port 21.
l Users from the internet cannot ping FortiWAN . Note: To intercept ping messages, users can deny “ICMP” protocol
in service type because ping is a type of “ICMP”.
l Users from the LAN cannot access DMZ.
l Users from the internet (WAN) cannot access LAN and DMZ.
The rules table for the example will look like this:
See also
l Busyhour Settings
l Using the web UI
l Reports: Firewall
NAT
FortiWAN is an edge server that is usually placed on the boundary between WAN and LAN. When a connection is
established from a private IP address (in LAN or DMZ) to the internet (WAN), it is necessary to translate the
private IP address into one of the public IP addresses assigned to the FortiWAN's WAN link. This process is called
NAT (Network Address Translation). FortiWAN provides the typical NAT (called S-NAT also) for sessions
established from internal area. Once the private source IP address of outgoing packet of a session is translated to
a public IP address, the mapping is kept in translation table and therefore the inbound traffic (from public area) of
the session can be accepted and forwarded to the internal host who established the session.
With the typical NAT, two-way data transmission between an internal host and an external host is achieved, only
if the internal host starts the sessions. An external host is unable to starts a session with an internal host via the
typical NAT. FortiWAN's 1-to-1 NAT gives the availability of two-way transmission between an internal host and
an external host not only for sessions starting from the internal host but also for sessions starting from the
external host.
Default Rules
FortiWAN's NAT Default Rules are the NAT rules (and IPv6 NAT rules) generated automatically by system
according to the Network Setting of WAN links. Once a WAN link is sat up (See "Configuring your WAN"), the
default rules are generated at the same time so that FortiWAN performs NAT automatically to packets coming
from anywhere (except subnets in WAN or/and DMZ and static routing subnets of the WAN link) and going to be
transferred via the WAN link. NAT default rules are varies according to how the WAN link is deployed. For
example,
WAN link 1: Routing mode with a basic subnet (125.227.251.0/255.255.255.0) in WAN and DMZ, and the IP(s)
on localhost are 128.227.251.80 and 128.227.251.81. System adds the default rules to WAN link 1 as following:
When = All-Time, Source = 125.227.251.0/255.255.255.0, Destination = Any
Address, Service = Any, Translated = No NAT
WAN link 2: Bridge mode: One Static IP, the IP on localhost is 125.227.250.10. System adds the default rules
to WAN link 2 as following:
When = All-Time, Source = 125.227.250.10, Destination = Any Address, Service =
Any, Translated = No NAT
WAN link 3: Bridge mode: Multiple Static IP, 125.227.252.100-125.227.252.101 are deployed on localhost,
125.227.252.102-125.227.252.103 are deployed in WAN, 125.227.252.104-125.227.252.105 are deployed in
DMZ. System adds the default rules to WAN link 3 as following:
When = All-Time, Source = 125.227.252.100-125.227.252.101, Destination = Any
Address, Service = Any, Translated = No NAT
WAN link 4: Bridge mode: PPPoE, system adds the default rule to WAN link 4 as following:
When = All-Time, Source = Any Address, Destination = Any Address, Service =
Any, Translated = DynamicIP(DHCP/PPPoE)
The last rule translates source IP address of all packets into an IP address (localhost) of the WAN link. The
second (or third) rule from the bottom ignores NAT to packets coming from subnets of the WAN link. Those
default rules are added as the bottom rules to the top-down rule table. They are unable to be deleted and edited,
unless the correspondent deployment of the WAN link changes. The default rules will translate source IP address
of a matched packet into the first of the IP addresses that are assigned to localhost of the WAN link, which
normally is a public IPv4 address or global IPv6 address. Therefore, packets with private source address (IPv4) or
Link-Local source address (IPv6) are acceptable to Internet after the NAT process. However, even a packet
comes with public source address (IPv4) or Global source address (IPv6), NAT is also performed if it matches the
last rule. NAT default rules are based on deployment of a WAN link, deployment of LAN is regardless. Set NAT
rules manually for advanced applications.
Similarly, system generates default rules for IPv6/IPv4 dual stack WAN links. Take the WAN link 1 above as
example, if a IPv6 basic subnet 2001::/64 is deployed on WAN link 1 and the localhost is 2001::1, system adds
the IPv6 default rules to WAN link 1 as following:
When = All-Time, Source = 2001::/64, Destination = Any Address, Service = Any,
Translated = No NAT
Note that for FortiWAN V4.0.x, system does note generate IPv6 default rules for IPv6/IPv4 dual stack
WAN link. It is necessary to add IPv6 default rules manually, or the IPv6 transmission might fail if its
source IP address is a Link-Local address. Please refer to the examples above for this.
Non-NAT
Non-NAT is used for Private Network and MPLS Network where the host in WAN can directly access the host in
DMZ, and where FortiWAN is used to balance VPN load and backup lines.
FortiWAN's inbound and outbound load balancing (Auto Routing and Multihoming) distribute session over
multiple WAN links. It's necessary to make sure the correct NAT rules are applied to every enabled WAN link.
Enable NAT : Enable the function, and NAT will translate any private IP to a fixed public IP assigned to a
given WAN link. Disable the function; FortiWAN will act as a general router for the host in
WAN to directly access the host in DMZ.
WAN : Enabled WAN links are listed in the menu. Select the WAN link to set and apply NAT rules
to.
NAT Rules
As the previous description, FortiWAN provides typical NAT for out-going session (established from internal host
to external host). Here we describe the NAT rules which specified how to translate source IP address of a out-
going packet into specified IP address of the WAN link. Incoming packets from a external host can be accepted
and forwarded to the correct internal host only if a out-going packet has already be translated and transferred to
the same external host. NAT rules are separated into IPv4 NAT rules and IPv6 NAT rules, which are used to
translate a IPv4 address to another IPv4 address and translate a IPv6 address to another IPv6 address
respectively. You will see the default rules at the bottom of the two rule tables, if IPv4 and/or IPv6 addresses are
deployed on localhost of the WAN link.
Customized rules for IPv4-to-IPv4 NAT on a specified WAN link (select from the drop-down menu WAN above).
When The predefined time periods during which the rules will apply. Options are Busy, Idle, All-Times
(See "Busyhour Settings").
Source The packets sent from the source will be matched. Note: The source IPv4 to be translated
must be the IPv4 address assigned to the LAN or DMZ (See "Using the web UI").
Destination The packets sent to the destination will be matched (See "Using the web UI").
Service The packets with the service port number to which users would like NAT to apply. It can be the
TCP/UDP port, or Predefined service groups from [System]->[Service Grouping] (See "Using
the web UI").
Translated Specify manually the IPv4 address or a range of IPv4 addresses that is assigned to the
localhost of the specified WAN link. Source IP address of the packets that match the rule
would be translated to the IP address specified here.
The first IPv4 address assigned to the localhost of the WAN link automatically displays in
the drop-down menu for options. If multiple IPv4 addresses are assigned to the WAN
link's localhost, you can set any of them manually by selecting the options "IPv4 Address"
and "IPv4 Range".
The option [Dynamic IP] will be available while a Dynamic WAN link (Bridge Mode: PPPoE
and Bridge Mode: DHCP) is applied.
L Check to enable logging. Whenever the rule is matched, the system will record the event to the
log file.
Customized rules for IPv6-to-IPv6 NAT on a specified WAN link (select from the drop-down menu WAN above).
When The predefined time periods during which the rules will apply. Options are Busy, Idle, All-Times
(See "Busyhour Settings").
Source The packets sent from the source will be matched (See "Using the web UI"). Note: The source
IPv6 to be translated must be the IPv6 address assigned to the LAN or DMZ.
Destination The packets sent to the destination will be matched (See "Using the web UI").
Service The packets with the service port number to which users would like NAT to apply. It can be the
TCP/UDP port, or Predefined service groups from [System]->[Service Grouping] (See "Using
the web UI").
Translated Specify manually the IPv6 address or a range of IPv6 addresses that is assigned to the
localhost of the specified WAN link. Source IP address of the packets that match the rule
would be translated to the IP address specified here.
The first IPv6 address assigned to the localhost of the WAN link automatically displays in
the drop-down menu for options. If multiple IPv6 addresses are assigned to the WAN
link's localhost, you can set any of them manually by selecting the options "IPv6 Address"
and "IPv6 Range".
The option [Dynamic IP] will be available while a Dynamic WAN link (Bridge Mode:
PPPoE) is applied. Bridge Mode: DHCP does not support IPv6/IPv4 dual stack.
Note that this field must be an IPv6 address obtained upon public DMZ subnet and with
64-bit or lower prefix length.
L Check to enable logging. Whenever the rule is matched, the system will record the event to the
log file.
When Select the time when to apply the 1-to-1 NAT rule, including three options: Busy, Idle and
All-Time (See "Busyhour Settings").
Internal Address Select the internal IPv4 address, IPv4 range or IPv4 subnet that the 1-to-1 NAT rule should
be applied to (See "Using the web UI"). For a 1-to-1 NAT rule, the amount of internal IP
address here must be the same as amount of external IP address below. (Note: Internal IP
Address must be an IP address of the internal network or DMZ port.)
Service Select a service port where the 1-to-1 NAT rule should be applied to, such as TCP, UDP,
ICMP or any of the predefined network service groups (See "Using the web UI").
External Address Select the external IPv4 address, IPv4 range or IPv4 subnet that the 1-to-1 NAT rule should
be applied to (See "Using the web UI"). For a 1-to-1 NAT rule, the amount of external IP
address here must be the same as amount of internal IP address above. (Note: External IP
Address must be an IP address obtained upon WAN link connection.)
L Check to enable logging. Whenever the rule is matched, the system will record the event to
the log file.
For any out-going packet (no matter a internal or a external host launch the session), if the packet matches a 1-to-
1 NAT rule on When, Internal Address (Source) and Service, source IP address of the packet will be translate to
correspondent external address specified in the rule. For any in-coming packet (no matter a internal or a external
host launch the session), if the packet matches a 1-to-1 NAT rule on When, External Address (Destination) and
Service, destination IP address of the packet will be translate to correspondent internal address specified in the
rule.
Enable NAT
Example: To translate packets from local machine 192.168.123.100 to public IP address 172.31.5.51, check
“Enable NAT”, and select WAN #1, then check “Enable”. The NAT rule settings look like:
Disable NAT
Disable NAT sets FortiWAN to Non-NAT mode whereby all the WAN hosts can acccess DMZ hosts directly with
proper routing setup. In this mode, FortiWAN acts as a router connecting multiple subnets.
Non-NAT is commonly used on Private Network and MPLS network, which makes possible for the hosts of the
branch office to directly access the headquarters. In case that ISP 1 is down, FortiWAN will automatically route
the link to ISP 2, and, accordingly, serve as VPN load balancer based on the status of each link.
Persistent Routing
Persistent routing is used to secure subsequent connections of source and destination pairs that are first
determined by Auto-Routing in FortiWAN. It is useful for applications require secure connection between the
server and client whereby client connection will be dropped if server detects different source IP addresses for the
same client during an authenticated and certified session. PR ensures that the source IP address remains
unchanged in the same session.
Timeout: For every session (pair of source and destination), if there is no packets occured during the timeout
period, records of persistent route of the session will be cleared. That means the next coming connection of the
session will be routed by the auto-routing rules first.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Persistent Routing service,
see "Log" and "Statistics: Persistent Routing".
When : Options: Busy hour, Idle hour, and All-Time (See "Busyhour Settings").
Source : Established connections from the specified source will be matched (See "Using the web UI").
No PR: the matched connections will NOT be routed persistently. (The Default)
L : Check to enable logging: Whenever the rule is matched, system will record the event to log
file.
When : Options: Busy hour, Idle hour, and All-Time (See "Busyhour Settings").
Source : Established connections from the specified source will be matched (See "Using the web UI").
Destination : The connections to the specified destination will be matched. This field is the same as the
“Source” field, except it matches packets with the specified destination (See "Using the web
UI").
Action : Do PR: the matched connections will be routed persistently. (The Default)
L : Check to enable logging: Whenever the rule is matched, system will record the event to log
file.
Persistent routing is often used when destination servers check source IP. The function is performed on most
secure connections (e.g. HTTPS and SSH). To prevent the connections from being dispatched over a diverse
range of WAN links, persistent routing serves the best solution for maintaining connections over a fixed WAN link.
Once a connection is established, auto-routing rules are applied to determine the WAN link to be used.
Subsequent connections with the same destination and source pair obey the rules formulated in the persistent
routing table. Note that the device will consult the rule table whenever established connections are to be sent to
new destinations.
Auto-routing will be reactivated once in persistent routing the interval between two successive connections are
longer than timeout period. A second connection will be considered as a "new" one. Then auto-routing will secure
the connection to go through a different WAN link.
Example 1
The persistent routing policies to be established accordingly:
l In LAN, established connections from IP address 192.168.0.100 to 192.168.10.100 are NOT to be routed
persistently.
l Established connections from DMZ to LAN are NOT to be routed persistently.
l Established connections from LAN to the host IP ranging from 10.10.1.1 ~ 10.10.1.10 are NOT to be routed
persistently.
l Since the default action by IP Pair rules is Do PR, if no rule is added, all connections will use persistent routing.
Then persistent routing table will look like:
192.168.0.100 192.192.10.100 No PR
DMZ WAN No PR
LAN 10.10.1.1-10.10.1.10 No PR
Example 2
The persistent routing policies to be established accordingly:
HTTP and HTTPs connections from the subnet 192.168.0.0/24 in LAN use persistent routing.
As there is no default action set by Web Service Rules, if no rule is added, all connections will be based on IP Pair
Rules to determine whether to use persistent routing.
Source Action
192.168.0.0/255.255.255.0 Do PR
WAN Do PR
Example 3
The persistent routing policies to be established accordingly:
HTTP and HTTPs connections from LAN hosts with IP range 192.168.0.10~192.168.0.20 use persistent routing,
but this does not apply to other services except IP address 192.168.0.15.
HTTP and HTTPs connections from subnet 192.168.10.0/24 to 192.192.10.100 use persistent routing. But this
does not apply to other connections.
Connections from IP address 211.21.48.196 in DMZ to the WAN subnet 10.10.1.0/24 in WAN do NOT use
persistent routing.
Since the default action by IP Pair Ruels is Do PR, if no rule is added, all connections will use persistent routing.
Source Action
192.168.0.10-192.168.0.20 Do PR
192.168.10.0/255.255.255.0 Do PR
192.168.0.15 WAN Do PR
192.168.0.10-192.168.0.20 WAN No PR
192.168.10.0/255.255.255.0 ANY No PR
211.21.48.196 10.10.1.0/255.255.255.0 No PR
Note: Rules are matched top down. Once one rule is matched, the rest will be ignored. In this case, the
connections from 192.168.0.15 may meet the criteria of the first and second IP Pair rules, only the first rule will be
applied. Hence the rules will not perform NoPR on 192.168.0.15 even though it matches the second rule.It shall
be noted that Web Service Rules are prioritized over IP Pair Rules. As 192.168.10.0/255.255.255.0 is configured
to be NoPR in IP Pair Rules, but DoPR in Web Service Rules, HTTP connections will still apply persistent routing.
Bandwidth Management
Bandwidth Management (BM) allocates bandwidth to applications. To secure the bandwidth of critical
applications, FortiWAN Bandwidth Management (BM) defines inbound and outbound bandwidth based on traffic
direction, i.e. take FortiWAN as the center, traffic flows from WAN to LAN is inbound traffic, otherwise, it is
outbound traffic. No matter which direction a connection is established in, a connection must contain inbound
traffic and outbound traffic. The section will mainly explain how to guarantee bandwidth based on priority
settings, and how to manage inbound and outbound traffic by configuring busy/idle hours, data
source/destination, and service type, etc.
Bandwidth Management consists of Classes and Filters (IPv4/IPv6). Click "Expand Link Settings" or "Collapse
Link Settings" to show or hide configuration details of links and bandwidth limit.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Bandwidth Management
service, see "Log", "Statistics: Bandwidth" and "Report: Bandwidth Usage".
Guaranteed Kbps The guaranteed bandwidth for this class. This secures
bandwidth allocated as defined for WAN link in peak hours.
This is significant to guarantee the service quality especially
for critical applications like VoIP.
Guaranteed Kbps The guaranteed bandwidth for this class. This secures
bandwidth allocated as defined for WAN link in peak hours.
This is significant to guarantee the service quality especially
for critical applications like VoIP.
Input Port Select a interface that packets are received on for this filter term to evaluate the
outbound traffic, or leave it as Any Port. See Using the web UI for details. This
field is only available for Outbound IPv4/IPv6 filters.
Source The source used to evaluate traffic (original packets) by where it comes from (See
"Using the web UI").
Destination The destination used to evaluate traffic (original packets) by where it goes to (See
"Using the web UI").
Service The service used to evaluate traffic (original packets) by what the source port
and destination port they are. Service matches as long as source port or
destination port matches (See "Using the web UI").
The options GRE and ESP in the Service drop-down menu is for the GRE
and ESP packets coming from other VPN devices. GRE and ESP packets
generated by FortiWAN are invisible to Bandwidth Management filters.
Classes The BM class that traffic matching the filter (Source, Destination and Service) is
associated with.
L Check to enable logging: Whenever the rule is matched, system will record the
event to log file.
While system is applying the bandwidth management settings, traffic passing through
FortiWAN will be blocked for a while.
To control Tunnel Routing or IPSec transmission by Bandwidth Management, please make sure a Bandwidth
Management filter is defined correctly (on the source, destination and service) to match its original packets. If you
would like to control the overall Tunnel Routing or IPSec transmission no matter what the original services it is, try
to classify the traffic by its Source and Destination; the Source and Destination of the Routing Rules of Tunnel
Routing, or the Source and Destination of the Quick Mode selectors of IPSec Tunnel mode (See "How to set up
routing rules for Tunnel Routing" and "IPSec VPN in the Web UI").
Traffic shaping by Bandwidth Manage takes place before Tunnel Routing and IPSec encapsulations. Traffic of an
application is counted together in BM logs no matter whether it is transferred through Tunnel Routing and IPSec,
thus you cannot identify whether the traffic is processed by FortiWAN's Tunnel Routing (includes Tunnel Routing
over IPSec Transport mode) and FortiWAN's IPSec (Tunnel mode) according to the PROTO field of BM logs (see
"Log > View") and the Service report of FortiWAN Reports. All the traffic processed by TR and IPSec is marked as
its original application name in BM logs and Reports. The only case that you see the traffic identified as GRE or
ESP in BM logs and Reports is because other devices generate the GRE or ESP traffic (encapsulated by other
devices, not FortiWAN) and pass it through the FortiWAN. See "Traffic Statistics for Tunnel Routing and IPSec"
for the details.
To recognize the traffic processed by Tunnel Routing and IPSec from the Reports, you
can manage this kind of traffic with exclusive BM classes by matching its input port,
source or destination IP addresses, so that you can get the statistics and bandwidth
usage of Tunnel Routing and IPSec from the In Class and Out Class reports.
Scenarios
Example 1 Inbound BM
The maximum bandwidth limited for internet users to transfer emails to mail server 211.21.48.197 in DMZ during
both busy and idle periods is 128K on WAN1, 64K on WAN2, and 128K on WAN3. The guaranteed bandwidth on
WAN1, WAN2 and WAN3 is zero.
The maximum bandwidth limited for hosts in LAN zone to download data from internet web servers during both
busy and idle periods is 128K on WAN1, 64K on WAN2, and 64K on WAN3. The guaranteed bandwidth on WAN1,
WAN2 and WAN3 is zero.
During the busy period, the maximum bandwidth limited for 192.168.0.100 to download data from internet FTP
servers is 50K on WAN1, 30K on WAN2 and WAN3. The guaranteed bandwidth on WAN1 is 20K, and zero on
WAN2 and WAN3. During the idle period, the maximum bandwidth limited for 192.168.0.100 to download data
from internet FTP servers is 50K on WAN1, 200K on WAN2 and WAN3. The guaranteed bandwidth is 20K on
WAN1, 100K on WAN2 and WAN3. The bandwidth is prioritized as "High" during both busy and idle periods.
During the busy period, the maximum bandwidth limited for internet users to upload data to FTP server
211.21.48.198 in DMZ is 500K on WAN1, 256K on WAN2 and WAN3. The guaranteed bandwidth on WAN1 is
200K, and zero on WAN2 and WAN3. During the idle period, the maximum bandwidth limited for internet users to
upload data to FTP server 211.21.48.198 in DMZ is 500K on WAN1, 300K on WAN2 and WAN3. The guaranteed
bandwidth is 200K on WAN1, WAN2 and WAN3. The bandwidth is prioritized as "Low" during both busy and idle
periods.
Filter Settings
There are two possible scenarios for inbound data. One is local host downloading data from a remote FTP server
in WAN, the other is a remote user in WAN uploading data to FTP in LAN. In both two scenarios data are sent
from WAN to LAN. Thus it is necessary to configure BM rules for the scenarios on the Inbound BM page.
Example 2 Inbound BM
During the busy period, the maximum bandwidth limited for hosts in LAN zone to download data from FTP server
192.192.10.10 is 128K on WAN1, 128K on WAN2, and 64K on WAN3. During the idle period, the maximum
bandwidth limited for hosts in LAN zone to download data from FTP server 192.192.10.10 is 512K on WAN1,
WAN2 and WAN3. The guaranteed bandwidth on WAN1, WAN2 and WAN3 is zero during both busy and idle
periods.
During the busy period, the maximum bandwidth limited for hosts 192.168.0.10 ~ 192.168.0.50 in LAN zone to
download data from internet web servers is 128K on WAN1, 256K on WAN2 and WAN3. The gauranteed
bandwidth is zero on WAN1, 128K on WAN2 and 64K on WAN3. During the idle period, the maximum bandwidth
limited for hosts 192.168.0.10 ~ 192.168.0.50 in LAN zone to download data from internet web servers is 128K
on WAN1, 512K on WAN2 and WAN3. The guaranteed bandwidth is zero on WAN1, WAN2 and WAN3. The
bandwidth is prioritized as "Low" on WAN2 and WAN3 during both busy and idle periods.
During the busy period, the maximum bandwidth limited for hosts in a subnet 192.168.100.0/24 in LAN to
download data from internet FTP servers is 50K on WAN1, 64K on WAN2 and WAN3. The guaranteed bandwidth
on WAN1 is 20K, and zero on WAN2 and WAN3. During the idle period, the maximum bandwidth limited for hosts
in a subnet 192.168.100.0/24 in LAN to download data from internet FTP servers is 20K on WAN1, 128K on
WAN2 and WAN3. The guaranteed bandwidth is 20K on WAN1, 32K on WAN2 and WAN3. The bandwidth is
prioritized as "High" during both busy and idle periods.
Filter Settings
Example 3 Outbound BM
During the busy period, the maximum bandwidth limited for internet users to download data from FTP server
211.21.48.198 in DMZ is 128K on WAN1 and WAN2, and 64K on WAN3. During the idle period, the maximum
bandwidth limited for internet users to download data from FTP server 211.21.48.198 in DMZ is 512K on WAN1,
WAN2 and WAN3. The guaranteed bandwidth on WAN1, WAN2 and WAN3 is zero during both busy and idle
period.
During the busy period, the maximum bandwidth limited for internet users to receive emails from mail server
211.21.48.197 in DMZ is 128K on WAN1 and WAN2, and 256K on WAN3. During the idle period, the maximum
bandwidth limited for internet users to receive emails from mail server 211.21.48.197 in DMZ is 128K on WAN1
and WAN2, and 512K on WAN3. The guaranteed bandwidth on WAN1, WAN2 and WAN3 is zero. The bandwidth
is prioritized as "Low" during both busy and idle periods.
During the busy period, the maximum bandwidth limited for internet users to download data from a virture FTP
server 192.168.0.100 in LAN is 200K on WAN1, 100K on WAN2 and WAN3. The guaranteed bandwidth on WAN1
is 100K, and 50K on WAN2 and WAN3. During the idle period, the maximum bandwidth limited for internet users
to download data from a virture FTP server 192.168.0.100 in LAN is 512K on WAN1, WAN2 and WAN3. The
guaranteed bandwidth is on WAN1, WAN2 and WAN3 is zero. Note: When configuring filters on virtual servers,
specify the private IP assigned to the virtual server and not the translated public IP.
During the busy period, the maximum bandwidth limited for hosts in a remote subnet 10.10.10.0/24 to download
data from FTP server 211.21.48.198 in DMZ is 128K on WAN1 and WAN2 and 256K on WAN3. During the idle
period, the maximum bandwidth limited for hosts in a remote subnet 10.10.10.0/24 to download data from FTP
server 211.21.48.198 in DMZ is 256K on WAN1 and WAN2, and 512K on WAN3. The guaranteed bandwidth is
zero on WAN1, WAN2 and WAN3, and the bandwidth is prioritized as "Low" during both busy and idle periods.
Filter Settings
Two possible scenarios for upstream data: e.g. FTP (scenario 1), is that local host uploads data from a remote
FTP server in the WAN. The other scenario is a remote user in WAN downloads data from a FTP server in the
LAN. Both of these scenarios are sending data from LAN to WAN. Thus configuring BM rules for these two
scenarios on the inbound BM page is necessary.
See also:
l Busyhour Settings
l Using the web UI
l Log
l Statistics: Bandwidth
l Report: Bandwidth Usage
Connection Limit
Connection Limit is a feature that restricts the number of connections to remain below a certain specified limit.
When the number of connections exceeds that limit, the system will automatically log the event (if logging is
enabled). Connection limit can detect exceptionally high volumes of traffic caused by malicious attacks.
FortiWAN protects the network by rejecting connections above the threshold.
Configurations of Connection Limit are divided into two sections: Count Limit and Rate Limit.
Count Limit is aimed to limit the number of concurrent connections issued by a source. That is to say at anytime
FortiWAN will deny a new connection request coming from the source if the count of current established
connections requested by the source reaches the threshold, no matter what the destinations and services of the
connections are.
Rate Limit is aimed to restrict the rate that the specified connections are establishing at. FortiWAN recognizes
the connections according to the source, destination, service and issue time that you specified, and monitors the
number of the connection establishments every second. FortiWAN will deny a new connection that matches the
specified rule if the number of matched connections established in recent second has reached to the value of the
specified rate.
FortiWAN provides mechanisms to record, notify and analysis on events refer to the Connection Limit service,
see "Log", "Statistics: Connection Limit" and "Report: Connection Limit".
Log Interval
Log Interval : The log interval determines how often the system records when the number of the connections
exceeds the limit defined in the rules table.
Source : Match connections from a specified source (See "Using the web UI").
L : Check to enable logging. If the box is checked, logging will be enabled. Whenever the rule is
matched, the system will record the event to the log file.
FortiWAN maintains a counter for every IP address that matches the specified source respectively, and monitors
whether the connection count of each the IP address reaches the threshold (Count) defined to a Count Limit rule.
E : Enable: This rule can be matched. Disable: This rule does not need to be matched.
When : All of these three options are applicable 24 hours a day (See "Busyhour Settings").
Source : Match connections from a specified source (See "Using the web UI").
Destination : Match connections to specified Destination: This field is the same as the “Source” field, except that
connections are matched with specified destination (See "Using the web UI").
Service : The TCP/UDP service type to be matched. Select the matching criteria from publicly known service
types (e.g. FTP), or enter the port number in TCP/UDP packets and specify the range. Type the
starting port number plus hyphen “-“ and then the ending port number. e.g. “TCP@123-234” (See
"Using the web UI").
Conn/Sec : Specify the number of connection allowed per second, under the conditions of [When], [Source],
[Destination], and [Service] defined.
L : Check to enable logging. If the box is checked, logging will be enabled. Whenever the rule is
matched, the system will record the event to the log file.
FortiWAN maintains one counter for every Rate Limit rule, which means that FortiWAN monitors whether the
total number of the connections that match the rule and are established in recent second reaches the value of
Conn/Sec specified to the rule.
Cache Redirect
FortiWAN is capable of working with external cache servers. When a user requests a page from a web server on
the internet, FortiWAN will redirect the request to the cache server. If the requested web page is already on the
cache server, it will return the page to the user, thus saving time on data retrieval. Cache servers are configured
here. However, cache servers have to support caching in transparent mode. Note: Cache Server can be in DMZ.
FortiWAN provides log mechanisms on events refer to the Connection Limit service, see "Log".
Cache Group
The first table configures cache server groups. Multiple groups can have different sets of rules which are then
created on the second table. In addition, the number of cache servers is not limited to one. Therefore it is
possible to have multiple cache servers with different weights in the cache server group.
Weight The weight for redirecting the requests to this cache server. A higher value means a greater
the chance.
Associated WAN Select WAN link associated with the cache server. Cache redirect works only when both the
selected WAN link and the cache server are available. Selecting "NO" means cache redirect
is not associated with WAN links. No matter a WAN link is available or not, cache redirect
can work if the cache server is available.
Redirect Rule
Source The source where the request originates and it will be redirected to the cache server.
Specify the IP(s) when selecting “IPv4 Address”, “IPv4 Range” and/or IPv4 subnet (See
"Using the web UI").
Destination The destination where the request will be sent and it will be redirect to the cache server.
Specify the IP(s) when selecting “IPv4 Address”, “IPv4 Range” and/or IPv4 subnet (See
"Using the web UI").
Port The service port number and it will be redirected to the cache server.
Group Select “NO REDIRECT” for requests not to be directed. Or assign pre-existing group to
redirect the requests.
L Enable logging or not: If the box is checked, the logging will be enabled. Whenever the rule
is matched, the system will write the event to the log file.
Redirect rules can be established to match requests that will be redirected to the specific cache server group.
When FortiWAN receives a request from a client, the request will be redirected to the cache server. The cache
server will determine if the data requested already exists or not. If not, then the request will be performed on
behalf of the client with the data returned from the web server to the client.
When FortiWAN receives a request from a client, the request will be redirected to the cache server. In this case,
the data requested already exists on the cache server. Therefore it will return the data requested to the client
without passing the actual request to the internet.
Internal DNS
Internal DNS is the DNS server built in FortiWAN used to manage your domain for internal users. Internal DNS
resolve domain name for DNS requests coming from LAN or DMZ subnets. FortiWAN's Internal DNS is recursive
DNS, which allows users to resolve other people's domains. The DNS servers set in System > Network Setting
> DNS Server will be asked by Internal DNS while it recursively resolve an unknown domain (See "Set DNS
server to FortiWAN"). In case that all the set DNS servers are not available or the DNS server is not configured,
Internal DNS will ask the root domain name server for resolving the domain. Allocate the Internal DNS to users in
LAN and DMZ subnets by manually set the DNS server on their computers to the gateways, which are LAN ports
or DMZ ports. It is unable to automatically allocate FortiWAN's internal DNS to users by FortiWAN's DHCP. An
user in LAN or DMZ subnet need to manually configure the DNS server on its computer to the gateway it connects
to for using FortiWAN's Internal DNS. Activate DNS function by configuring fields below:
IPv4 PTR Record l TTL: Specifies the amount of time other DNS servers and applications are allowed to
cache the record.
l IPv4 Address: Enter the reverse lookup IPv4 address.
l Host Name: Enter the corresponding FQDN for the reverse IP.
IPv6 PTR Record l TTL: Specifies the amount of time other DNS servers and applications are allowed to
cache the record.
l IPv6 Address: Enter the reverse lookup IPv6 address.
l Host Name: Enter the corresponding FQDN for the reverse IP.
Domain Settings
Domain Name Enter domain names for the internal DNS. Press “+” to add more domains.
IPv4 Address Query IPv4 address. It can be: IPv4 single address, range, subnet, or predefined IPv4
group.
IPv6 Address Query IPv6 address. It can be: IPv6 single address, range, subnet, or predefined IPv6
group.
NS Record
Name Server Enter server name's prefix. For example: if a server’s FQDN is "nsl.abc.com", enter “nsl”.
IPv4 Address Enter the IPv4 address corresponding to the name server.
IPv6 Address Enter the IPv6 address corresponding to the name server.
A/AAAA Record
Host Name Enter the prefix name of the primary workstation. For example: if the name is
"www.abc.com", enter “www”.
CName Record
Alias Enter the alias of the domain name. For example, if "www1.abc.com" is the alias of
"www.abc.com", (domain name), enter “www1” in this field.
Target Enter the real domain name. For example, if "www1.abc.com" is the alias of
"www.abc.com", enter “www”.
SRV Record
Service Specify the symbolic name prepended with an underscore. (e.g. _http, _ftp or _imap)
Protocol Specify the protocol name prepended with an underscore. (e.g. _tcp or _udp)
Priority Specify the relative priority of this service (0 - 65535). Lowest is highest priority.
Weight Specify the weight of this service. Weight is used when more than one service has the
same priority. The highest is most frequently delivered. Leave is blank or zero if no
weight should be applied.
TTL TTL (Time To Live) specifies the amount of time that SRV Record is allowed to be
cached.
MX Record
Host Name Enter the prefix of the mail server’s domain name. For example, if domain name is
"mail.abc.com", enter “mail”.
Priority Enter the priority of the mail servers. The higher the priority is, the lower the number is.
Subdomain Name Enter the name of an external subdomain. To add an additional subdomain, press +.
NS Record l Name server - Enter the prefix of domain name (e.g. if the FQDN of the host is
"ns1.abc.com", enter "ns1")
l IPv4 address - Enter the corresponding IPv4 address of the domain name.
l IPv6 address - Enter the corresponding IPv6 address of the domain name.
DNS Proxy
Conceptually, FortiWAN's DNS Proxy is a function to dynamically redirect outgoing DNS requests (UDP 53) to an
appropriate DNS server according to FortiWAN's WAN link loading. It is implemented by dynamically replacing
the original destination IP address of outgoing DNS requests with another DNS server IP address. No matter what
the DNS server that an internal host is configured with, for any outgoing DNS request passing through FortiWAN,
DNS Proxy replaces the original destination IP address of the DNS requests with the DNS server IP address
determined by a load balancing algorithm. Basically, FortiWAN's DNS Proxy selects a WAN link with lighter traffic
loading and replace original destination of the DNS query packet with another DNS server that is associated with
the WAN link.
Algorithm Select an algorithm (See Load Balancing Algorithms) for selecting one of the
participating WAN links:
WAN Select the participating WAN links by specifying the DNS servers and weight. From
the drop-down menu, select a WAN link and configure the following fields Weight and
Server 1 - 3. Then the WAN link becomes one of the participating WAN links for DNS
Proxy selects according to the specified algorithm.
After DNS Proxy selects a WAN link for a DNS request according to the specified
algorithm, the destination of the DSN packet will be replaced with the DNS server
associated to the WAN link. You can associate maximum of three DNS server IP
addresses to a WAN link. DNS Proxy detects availability of the specified DNS servers
and chooses the first available server for every replacement. A replacement will not
take place if no specified server is available.
No matter which algorithm is specified, if only one WAN link is configured here, DNS
packets will be always processed with the DNS server associated with the WAN link.
In other words, DNS Proxy redirects DNS requests to a fixed DNS server regardless of
traffic loading on WAN links.
Weight Give a weight to the WAN link. This field is visible when By Weight is
selected in Algorithm.
Server 1 Specify IP address of the first DNS server to the WAN link. This IP
address will be used to replace the destination of a DNS packet if
the associated WAN link is selected.
Server 2 Specify IP address of the second DNS server to the WAN link. This IP
address will be used for the replacement if Server 1 is not available. This
is optional.
Server 3 Specify IP address of the third DNS server on the WAN link. This IP
address will be used for the replacement if Server 1 and Server 2
are not available. This is optional.
Source DNS request packets coming from the specified source will be matched. Enter a single
IPv4 address, IPv4 range (in format xxx.xxx.xxx.xxx-xxx.xxx.xxx.xxx) or a IPv4 subnet (in
format xxx.xxx.xxx.xxx/netmask).Keep it blank for matching any source.
Domain Name DNS requests for the specified domain name will be matched. A wildcard character is
accepted for the left-most label of a domain name, e.g. *.fortinet.com or
*fortinet.com.
Note that other formats such as www.*.com, www.fortinet.* or *.fortinet.* are not
supported. Keep it blank for any domain name.
What DNS Proxy performs to DNS packets is only replace the destination of DNS packets; it does not involve
routing for the packets. DNS Proxy select a WAN link only for the destination replacement, not for routing the
packets. Auto Routing determines the route for the outgoing DNS packets (actually, Auto Routing is the only
function routing for all outbound traffic, see Auto Routing). For example, although DNS Proxy selects WAN 1 for
replacing destination of a DNS packet with IP of the DNS server associated with WAN 1, FortiWAN routing
function might transfer it through other WAN links (WAN 2 or WAN 3) or a LAN port.
Scenario
Here is an example using algorithm By Weight to select the DNS server for the destination replacement in the
weight WAN1:WAN2 = 2:1.
Algorithm
By Weight
DNS Server
WAN 1 2
Weight 2 1
Server 2 - -
Server 3 - -
According to the configuration, all the DNS requests received on FortiWAN's LAN ports and DNS ports will be
reworked as followings:
Packet Source Request A record Original des- Hit WAN Replaced destination
for tination link
Even if FortiWAN connects to multiple ISP networks, the problem is that users behind FortiWAN are usually
configured with a fixed DNS server (that is probably located in one of the connected ISP networks), which means
they always ask the same DNS server for a server name and are responded with the same IP address of the
server. A user will not know other IP addresses of the same server name in other ISP networks unless they
change DNS configuration to others.
For example a FortiWAN transfers outbound traffic by Auto Routing with Optimum Route (see Auto Routing and
Optimum Route). In the above diagram, the DNS 1 (10.10.10.100) in ISP-1 network answers 10.10.10.10 to
query for server name www.abc.com, while the DNS 2 (20.20.20.100) in ISP-2 network answers 20.20.20.20 to
the query for the same server name. In other words, traffic to www.abc.com will be routed to WAN 1 by Optimum
Route if a client asks DNS 1 for www.abc.com, or traffic will be routed to WAN 2 by Optimum Route if the client
asks DNS 2 for www.abc.com. However, the clients in LAN are configured with a static DNS address no matter
manually or by DHCP. If all the clients in LAN are configured with DNS Server = 10.10.10.100, all the
traffic to www.abc.com will fixedly be destined to 10.10.10.10 through WAN 1. This is what we mentioned traffic
congestion on single WAN link resulted by usage of Optimum Route for resolving ISP peering issue.
For this reason, FortiWAN's DNS Proxy is a mechanism used to detect a WAN link with lighter traffic loading and
redirect a DNS query to the DNS server located in the ISP network connected by the WAN link. For example, if
DNS Proxy detects WAN 2 has lighter traffic loading than WAN 1, DNS queries for www.abc.com will be
redirected to DNS 2 (20.20.20.100) and the response for www.abc.com will be 20.20.20.20. With appropriate
configuration on Optimum Route, traffic to www.abc.com can be routed to WAN 2. No matter what the original
DNS server (destination IP) of the query is, DNS Proxy replace it with another DNS according to current WAN link
loading. Therefore, accessing to the same service can to distributed into multiple WAN links with Auto Routing by
Optimum Route for this case.
To use DNS Proxy with Optimum Route to improve the bad transmission efficiency resulted by bad peering
between ISPs, here is the basic premise for using DNS Proxy:
l FortiWAN connects to the bad-peering ISP networks through different WAN links.
l Optimum Route Detection is appropriately configured, and corresponding Auto Routing policy and filters are
created for routing traffic by the algorithm: By Optimum Route. Without these configurations, the basic peering
issue does not get resolved, and DNS Proxy becomes meaningless for this.
l Make sure that a service provider deploys different servers in the bad-peering ISP networks, and maintains DNS
servers to answer corresponding IP address of the server that is located in the same ISP network with the DNS
server. DNS Proxy will become helpless for this case if the service is only deployed in a ISP network.
l List these particular DNS servers located in each of the ISP networks. A DNS server must be associated with a WAN
link connected to the ISP network that the DNS server is located in.
Scenario
Base on the above example, make sure Optimum Route Detection and Auto Routing are configured before going
on DNS Proxy. We assume that the Optimum Route Policy (see Optimum Route Detection) is configured as
Static IP Table as followings:
Setting Upload the IP file of ISP 1. The IP subnet Upload the IP file of ISP 2. The IP subnet
10.10.10.0/24 is maintained in the file. 20.20.20.0/24 is maintained in the file.
You can also set the Optimum Route Policy as Dynamic Detect, Static & Dynamic or Dynamic & Static, see
Optimum Route Detection for the details.
The Auto Routing policy and filter rule are correspondingly configured as followings (see Auto Routing for details):
The above settings provides the basic solution of bad peering between ISP 1 and ISP 2. In this example, servers
of www.abc.com are deployed in both ISP 1 and ISP 2 networks, and the DNS server in each ISP network
answers corresponding IP to requests for www.abc.com. To introduce DNS Proxy to the case to dynamically
distribute sessions to www.abc.com through the two WAN links, it requires the following settings of DNS Proxy
configured:
We use algorithm By Total Traffic to select the DNS server associated with the lightest-loaded WAN link for the
destination replacement (you can try other algorithms).
Algorithm
By Total Traffic
DNS Server
WAN 1 2
Server 2 - -
Server 3 - -
Proxy Domains
www.abc.com
The configurations guarantees that destinations of DNS packets querying for www.abc.com will be replaced with
DNS servers 10.10.10.100 or 20.20.20.100 in circular order according to weight 2:1. DNS packets processed by
DNS Proxy will be transferred outward according the Auto Routing policies. In this case (bad peering exists
between the two ISPs), it is better to let DNS packets destined to 10.10.10.100 be routed to WAN 1 and DNS
packets destined to 20.20.20.100 be routed to WAN 2. Packets might be stuck by the bad peering if packets
destined to 10.10.10.100 be routed to WAN 2. Here, with Optimum Route being used in the Auto Routing policy,
DNS packets processed by DNS Proxy will be routed to appropriate WAN link to avoid the bad peering.
Case 1
If DNS Proxy is configured to forward DNS queries to a DNS server located in FortiWAN's LAN or DMZ subnets,
and this DNS server resolves queries by interacting with other DNS servers in the Internet through FortiWAN, a
query loop will happen. DNS Proxy forwards the queries that the DNS server in LAN or DMZ sends to the DNS
servers outside FortiWAN back to the DNS server in LAN or DMZ.
Case 2
FortiWAN's Internal DNS (see Internal DNS) provides service on IP address 223.255.255.2 that FortiWAN uses it
for internal operations. However, if the DNS server in Network Setting (System > Network Setting > DNS
Server, see Set DNS server to FortiWAN) is configured, Internal DNS will forward queries to the configured DNS
servers rather that resolving them itself. Now, if you configure System > Network Setting > DNS Server with
DNS servers located in FortiWAN's LAN or DMZ subnets, enable the Internal DNS, and configure Proxy DNS to
forward queries to 223.255.255.2, a query loop will happen.
All the DNS queries are forwarded by DNS Proxy to 223.255.255.2 which is the Internal DNS, then these queries
are forwarded again by Internal DNS to the DNS servers in LAN or DMZ which are configured in System >
Network Setting > DNS Server. The DNS servers might resolve queries by interacting with other DNS servers in
the Internet through FortiWAN. DNS Proxy forwards the queries that the DNS server in LAN or DMZ sends to the
DNS servers outside FortiWAN back to Internal DNS on 223.255.255.2, and the queries are eventually forwarded
back to the DNS servers in LAN or DMZ.
SNMP
SNMP (Simple Network Management Protocol) is often used in managing TCP/IP networks by providing system
information and sending event notifications to a SNMP manager. A SNMP manager is typically a host running the
SNMP manager application. The SNMP manager communicates with the SNMP agent running on a FortiWAN
unit; sends out SNMP requests and receives incoming event notification (SNMP trap) from the SNMP agent. The
agent responds FortiWAN's system information for SNMP requests and sends SNMP traps to the SNMP
manager.
SNMP v1/2
SNMP v3
Privacy Key Enter the privacy key code. Eg: 12345678, ABCDEFGHUI.etc.
AuthProtocol Select the authentication protocol used for transferring the authenticated
password, either MD5 or SHA.
PrivProtocol Select the authentication protocol used for transferring the authenticated privacy
key.
Authentication Select the authentication method for user and privacy key, either authentication
with or without privacy.
FortiWAN MIB
The FortiWAN MIB defines the structure of the management data maintained on FortiWAN. It contains the fields,
information and traps that are specific to a FortiWAN units. The FortiWAN MIB file is available on the Fortinet
Customer Service & Support website, https://support.fortinet.com/.
IP MAC Mapping
Users can specify the IP-MAC table by classifying periods like peak hours and idle hours. Once the IP-MAC table
is set up, a packet from a certain IP address can pass through FortiWAN only when its MAC address matches the
table list and time period.
FortiWAN provides log mechanism to the IP MAC Mapping service, see "Log".
E : Enable/Disable
When : Select the time period: busy hour, idle hour and all time. All time is defined in 24-hour
system. For details, refer to [System] -> [Busyhour Settings] (See "Busyhour
Settings").
MAC Address : Enter the MAC address of the network interface card.
L : Check it to activate the rule and record results in log file. Otherwise, the rule is
inactive and data will not be stored.
Statistics
This topic deals with FortiWAN network surveillance system. Comprehensive statistics are collected to monitor
networking status, bandwidth usage of traffic class, and dynamic IP WAN link. These data offer deep insight into
the network, and help detect unexpected network failures, boosting network reliability and efficiency.
Traffic
It sorts and displays real-time traffic of traffic class over WAN link. Select traffic direction (inbound/outbound) in
Traffic Type to view statistics.
Traffic Class : The name of the traffic class defined on Inbound/Outbound Bandwidth Management
page. Among these, unclassified classes are labeled as “Default Class”.
Min. ~ Max.(Priority) : The maximum/minimum traffic volume allowed for a specific traffic class of different
priority levels.
3-Second Statistics : Displays packet numbers or traffic flow volume in Kilobyte/sec for the last 3 seconds.
1-Minute Statistics : Displays packet numbers or traffic flow volume in Kilobyte/sec for the past 60
seconds.
Top 10 : Displays the data flow for the last five seconds with corresponding IP address.
Statistics can be ranked by By Source and By Destination.
Unlike traffic statistics in previous section that focuses on real-time monitor of network status, statistics in BM
(Bandwidth Management) is intended for long-term analysis. For particular traffic class in a given traffic direction,
administrators can view bandwidth usage in bar graph during the past 60 minutes, 30 hours, 50 days, and 20
months.
Go to Statistics > BM, the followings are the options for you to query a statistics chart:
Fields Description
Traffic Type Specify traffic flow direction for displaying the BM statistics: Inbound and Outbound.
Traffic Class Specify the name of the traffic class defined on the Service > Bandwidth Management
page for displaying the BM statistics. The listed options are:
l Sum of All Classes: Traffic distributions of all the BM classes are displayed in the
statistics chart. It displays the sum of traffic of all the classes at every time point.
l User-defined Classes: Traffic distributions of the user-defined classes.
l Default Class: Traffic distributions of the default class.
WAN Link Specify the WAN link for displaying the BM statistics. The listed options are:
l Sum of All Links: Traffic distributions of all the WAN links are displayed in the statistics
chart. It displays the sum of traffic of all the WAN links at every time point.
l WAN Link #: Traffic distributions of a single WAN link.
The three conditions for querying the BM statistics are combined with AND operator. For example, if you have the
conditions as following:
Traffic Type=Outbound, Traffic Class=Default Class, WAN Link=WAN link #1
It displays the statistics of the outbound default class on WAN link 1.
Fields Description
Time (Y axis) Time scale in minutes (past 60 minutes), hours (past 30 hours), days (past 50 days) and
months (past 20 months).
Current Current bandwidth usage. The bandwidth usage at the last-right time point in the chart.
Limit Line A limit line is displayed to indicate the maximum allowed bandwidth that the default BM
class defines to the WAN link when the real traffic is very close to the limitation.
The limit line function is available only when Traffic Class is selected as Sum of All
Classes or Default Class. When WAN link is selected as Sum of All Links, only one limit
line will be displayed for the WAN link with the highest limitation value.
Information Moving the mouse over the BM statistics chart displays the corresponding exact bandwidth
usage.
Persistent Routing
It shows details with respect to persistent routing status. With persistent routing, administrators can view
connections and manually reset these connections as well.
IPv4/IPv6 IP Pair
Count : Number of connections that the current persistent routing rule applies to.
Timeout : Length of time to lapse before the current connection times out.
WAN : The WAN link through which the current persistent routing connection travels.
Web Service Entry : Shows connection entries that match Web Service Rules.
Count : Number of connections that the current persistent routing rule applies to.
Timeout : Length of time to lapse before the current connection times out.
WAN : The WAN link through which the current persistent routing connection travels.
Note that IP Pair and Web Service show at most 50 entries respectively.
It shows WAN link health detection results regarding the reliability of a specific WAN connection. The data are
derived based on ping results from destination IP list configurations in System > WAN Link Health Detection
(See "WAN Link Health Detection"). It enables to observe the number of sent requests, number of received
responses, and the success ratio for a given destination. These statistics assist administrators in further analyzing
network status and user behavior.
Number of Requests : The number of requests sent to the Destination IP so far. A request indicates a ping
packet if Detection Protocol is ICMP, or a TCP connection request if Detection
Protocol is TCP.
Number of Replies : The number of responses received so far from the Destination IP. A reply indicates a
ICMP echo reply or a time_exceed if Detection Protocol is ICMP, or a system
acknowledge indicating TCP connection is established if Detection Protocol is TCP.
Both indicate the success of a single WAN link detection.
Success Ratio (%) : The percentage of responses divided by requests. The higher the percentage, the
greater the reliability.
It shows dynamic IP WAN link details like its IP address obtained via PPPoE or DHCP. It also enables to create
new IP addresses by re-establishing connections to the WAN.
It shows data DHCP lease assigns, i.e. lease IP and MAC address, client-hostname, and expiration time. Once
option of DHCP server is selected, a list regarding all existing DHCP servers in the network will display. Option
Automatic Refresh sets the time interval to regularly update DHCP servers.
Automatic Refresh : The time interval after which the table of DHCP leases information is updated.
Expiration Time : Shows the time period when the IP address is valid.
DHCPv6 Server : Displays DHCPv6 server and range of IPv6 addresses which can be assigned.
Expire Time : Shows the time period during which the IPv6 address is valid.
It shows RIP status based on RIP and OSPF settings in [System] -> [Network Settings] -> [LAN Private Subnet].
Data on this page are used to inspect private subnet’s Network IP, Netmask, and gateway list.
Connection Limit
It enables administrators to inspect the number of established connections in real-time and to justify the
maximum number of connections allowed on [Service] -> [Connection Limit] page, to avoid network congestion.
Connections : Shows the number of connections that are established by the source IP address and
still active in system. An connection in system might be a connection with traffic flow
existing or a idle connection. This number varies from connections closing to newly
opened connections.
Clear : System maintains necessary tables and information for connections. Clicking the
button to abort the connections established by the source IP address, and release the
occupied memory then. When system is under attacks with high volumes of malicious
connections, FortiWAN's Connection Limit (See "Connection Limit") stops
subsequent connections established by the malicious IP addresses, but it takes time
to recover system from the bandwidth and memory occupied by those malicious
connections that are already in system. The Clear button terminates them
immediately.
It displays status and statistics regarding virtual server defined in Service/Virtual Server.
WAN IP : Displays WAN IPs defined in the rules on Service/Virtual Server page.
Service : Displays services defined in the rules on Service/Virtual Server page. These services
are those available for virtual servers.
Server IP : Displays server IPs defined in the rules on Service/Virtual Server page. The server IPs
denote those in real network usage.
FQDN
The IPv4 and IPv6 addresses of the FQDNs that connected via FortiWAN are shown in this page.
IPv4 FQDN
IPv4 Address : IPv4 addresses of the FQDN connected via FortiWAN. It maintains 20 addresses at
most.
IPv6 FQDN
IPv6 Address : IPv6 addresses of the FQDN connected via FortiWAN. It maintains 20 addresses at
most.
Tunnel Status
Tunnel Status displays the connectivity of every single GRE tunnel of each tunnel group defined in Service >
Tunnel Routing (see Tunnel Routing) and statistics of the corresponding data transmission
Tunnel Group The drop-down menu lists all the tunnel groups defined in Service > Tunnel
Routing. Select the tunnel group for monitoring it. The statistics of the specified
tunnel group will be displayed in the Tunnel Health Status table below.
Automatic Refresh Enable automatic refresh by selecting the time interval (Every 3, 6, 9, 15, ...
Seconds) for refreshing the statistics, or disable it by selecting Disabled. The
statistics here will be automatically refreshed periodically if it is enabled.
Tunnel The GRE tunnel defined in the specified tunnel group, represented by the pair of
its local and remote IP addresses.
3-Second Statistics Statistics of data transmission through this tunnel in the past 3 seconds,
represented by RX Packets, RX Kbps, TX Packets and TX Kbps.
1-Minute Statistics Statistics of data transmission through this tunnel in the past 1 minute,
represented by RX Packets, RX Kbps, TX Packets and TX Kbps.
Moreover, the round trip time (RTT) and Jitter between the two endpoints of
the tunnel is provided here for reference. The two fields will become blank if
the tunnel is failed. You can also get the RTT of the tunnel by running Tunnel
Routing's benchmark (see Tunnel Routing - Benchmark).
Local Subnets The local subnets (subnets in the local site) of the default routing rules of the
specified tunnel group. It will be blank if there is no default rule enabled.
Opposite Subnets The opposite subnets (subnets in the remote site) of the default routing rules of
the specified tunnel group. It will be blank if there is no default rule enabled.
The default rule subnets listed here and corresponding page on remote Web UI are supposed to be equal for a
tunnel group, just the position is switched. Local subnets here are the opposite subnets for the remote site, and
the opposite subnets here are the local subnets for the remote site.
Tunnel Traffic
It collects inbound/outbound traffic statistics regarding tunnel routing in the past 60 minutes, 24 hours, and 30
days. Statistics are displayed on chart.
Tunnel Routing Group : Select a group from the list. Depending on N tunnels the group gets, N statistical
charts will show.
IPSec
IPSec Statistics reports the usages and states of your configured IPSec Security Associations (See "IPSec"). Go
to Statistics > IPSec, a select bar and two statistics tables are displayed.
Selector
Select the combination of Mode and Phase 1 here, and then the statistics of related IPSec SAs are reported.
Mode Select the mode, Tunnel mode or Transport mode, of the security
associations that you ask for.
Phase 1 Name All the configured Phase 1 names of the mode you selected above are
list in the drop-down menu. Select a Phase 1 name (ISAKMP SA) to
display the statistics of the associated IPSec SAs (Phase 2).
Statistics of the IPSec SAs associated to the ISAKMP SA you selected is displayed in two tables, Security
Association Database and Security Policy Database.
Used time (s) The past time since the IPSec SA is established.
Life time (s) The time interval (in seconds) that the secret key of the IPSec SA is
valid during. For the expiration of a key, IKE Phase 2 is performed
automatically to establish a new IPSec SA (a new key is negotiated).
The value here is equal to value of Keylife of the correspondent Phase
2 configuration.
Change time (s) The time point that system starts to establish a new IPSec SA for
replacing the current IPSec SA which is going to expire. New
IPSec SA will be prepared in advance so that it takes over the
expired IPSec SA in time. This value is related to Life time and
determined by system.
Name The unique name of the IPSec SA (the name configured to the Phase 2)
Source[port] For IPSec in Tunnel mode, this is the Source and Source Port of
the Quick Mode selector of the IPSec SA (the Source and Port
configured to the Phase 2).
Destination[port] For IPSec in Tunnel mode, this is the Destination and Destination
Port of the Quick Mode selector of the IPSec SA (the Destination
and Port configured to the Phase 2).
Protocol For IPSec in Tunnel mode, this is the Protocol of the Quick Mode
selector of the IPSec SA (the Protocol configured to the Phase 2).
Last used time The time that the IPSec SA is applied last to a data packet.
For the details of parameters of IPSec, see "IPSec VPN in the Web UI".
Compare with general IP transmission, traffic transferred through FortiWAN's Tunnel Routing or IPSec is charged
extra on GRE/ESP encapsulation and decapsulation (See "Tunnel Routing" and "IPSec VPN"). In order to
individually allocate bandwidth to applications encapsulated in GRE and ESP packets, Tunnel Routing and
IPSEC are designed to be transparent to Bandwidth Management (See "Bandwidth Management"). Bandwidth
Management shapes the traffic before packet encapsulation or after packet decapsulation. FortiWAN's traffic
statistics is associated with the operation of Bandwidth Management, which implies traffic of Tunnel Routing and
IPSec is partially transparent to the statistics function. FortiWAN gives the traffic statistics in three ways: BM log,
statistics on Web UI and FortiWAN Reports. Traffic statistics for Tunnel Routing and IPSec in the three ways are
discussed as follows.
BM logs
A BM log is actually a traffic statistics (inbound-pkts, inbound-bytes, outbound-pkts, outbound-bytes, total-pkts
and total-bytes) in a time period for a traffic (source IP, destination IP, source port and destination port) that
matches the Bandwidth Management filter (See Log format in "Log View"). Bandwidth Management treats the
traffic equally no matter whether it is later transferred through Tunnel Routing and IPSec. The BM log tells
nothing directly (through the source port and destination port fields) that a transmission is actually done by Tunnel
Routing, IPSec or normal IP routing. You might be aware of a Tunnel Routing and IPSec transmission through
the source IP and destination IP in the logs, if you those IP addresses are already predefined just for the Tunnel
Routing and IPSec transmission. The only situation that you see the GRE or ESP indicated by source port and
destination fields in a BM log is when the traffic comes from other VPN devices.
Statistics on Web UI
Pages Statistics > Traffic and Statistics > BM(See "Statistics > Traffic" and "Statistics > BM") the traffic
statistics by WAN links and defined Bandwidth Management classes, which tells nothing directly about Tunnel
Routing and IPSec traffic. The way to identify the traffic that is transferred through Tunnel Routing or IPSec is to
create a BM class and BM filter to classify the traffic by the source IP and destination IP that are defined in Tunnel
Routing's routing rules or IPSec's Quick Mode selectors.
Page Statistics > Tunnel Traffic (See "Statistics > Tunnel Traffic") is the only page reports the traffic statistics
about Tunnel Routing. Although traffic statistics is reported by the defined Tunnel Routing groups, statistics of
the individual application in the tunnel traffic is unavailable here.
Page Statistics > IPSec (See "Statistics > IPSec") tells nothing about traffic statistics of IPSec, only IPSec
connectivity states are reported here.
FortiWAN Reports
Similar to BM logs, application traffic processed by Tunnel Routing or IPSev is marked as its original application
name in Reports (See "Reports > Bandwidth Usage > Services"). Individual service type of the original packets
encapsulated by Tunnel Routing or IPSec is visible in Reports. Only the GRE or ESP traffic generated by other
devices and passed through FortiWAN will be counted as GRE or ESP in the Reports > Services page. Although
you can not easily identify whether the traffic is processed by FortiWAN's Tunnel Routing or IPSec from the
Service report, but the In Class and Out Class reports can tell you the information and statistics if an exclusive BM
class is used for this kind of traffic.
BM Control O X
BM log O X
Reports O X
BM Control O X X
BM log O X X
Reports O X X
We have a simple example to explain the difference between the statistics ways. Consider that user A generates
60MB FTP traffic and 80MB HTTP traffic and transfer them through Auto Routing, user B generates 40MB FTP
traffic and 20MB HTTP traffic and transfer them through Tunnel Routing (through one tunnel group). We create
two BM classes, class-AR and class-TR, to control traffic of user A and user B respectively (identifying by their
input port, source or destination IP addresses).
l user A (source IP) generates FTP traffic (source or destination port) in 60MB
l user B (source IP) generates FTP traffic (source or destination port) in 40MB
l user A (source IP) generates HTTP traffic (source or destination port) in 80MB
l user B (source IP) generates HTTP traffic (source or destination port) in 20MB
From the BM logs, we have no idea which one is transferred through Tunnel Routing. The thing we know from the
logs is 100MB FTP traffic and 100MB HTTP traffic passed through FortiWAN, and they are 200MB in total.
Go to Statistics > Tunnel Traffic, we see 60MB tunnel traffic (parts of the 200MB) belongs to the tunnel group.
However, it tells nothing about the statistics for the individual services (FTP and HTTP) in the tunnel traffic.
l FTP = 100MB
l HTTP = 100MB
l Total = 200MB
Similarly, you can not identify how much the bandwidth is used by Tunnel Routing by a glance. You still can have
the information as long as you give each of the services a drill-down query by Internal IP, but this is not a
complete report for the entire Tunnel Routing usage.
l class-AR = 140MB
l class-TR = 60MB
l Total = 200MB
You can have the complete report from the class-TR and all the drill-down queries.
Logs
This topic deals with how to configure logging and how to forward logs. Log records keep FortiWAN data and are
capable of storing a wide variety of data concerning System, Firewall, Routing, and bandwidth management, etc
(see Log View). Log files are stored in FortiWAN's hard disk and can be forwarded to other servers for archiving or
for notifying events via emails (see Log Control and Log Notification).
Additionally, FortiWAN offers a powerful reporting and analysis tool: Reports. The web-based analysis software
that is embedded in FortiWAN or running on an independent machine enables administrators to gain insights into
network traffic without manually filtering through large volumes of log data (See Enable Reports).
Log View
In Log > View there is a sub-menu of 13 log types (see the table below). Choose the desired log type, and its
corresponding events will show in display window. Click the Refresh button to get the latest log records. Please
be aware that this page is only for online viewing of current events. For log data pushing and archiving, see Log
Control.
Fields Descriptions
Log Type Choose log type to view its events in display window. The log types are:
l System Log
l Firewall Log
l NAT Log
l Auto & Persistent Routing Log
l Virtual Server Log
l BM Log
l Connection Limit Log
l Cache Redirect Log
l Multihoming Log
l Backup Line Log
l Dynamic IP Log
l IP-MAC Mapping Log
l Tunnel Routing Log
l IPSec Log
Recent Event Log events of the selected log type are listed here.
Log format
A log listed here consists of three parts:
{TIMESTAMP} {LOG_TYPE} {LOG_CONTENT}
The {TIMESTAMP} is in the format 'yyyy-mm-dd HH:MM:SS' and is always an UTC time. The details of {LOG_
TYPE} and {LOG_CONTENT} are described as follows.
Notation Conventions
{ADDRPORT} follows TCPDUMP format, for example:
l IPv4: 8.8.8.8.80
l IPv6: 2001::8:8:8:8.80
{IP-5-TUPLE}
Firewall
The first packet of session {IP‐5‐TUPLE} matching a Firewall rule triggers the log. System generates only one log
for this session. This log indicates all the packets of the session {IP‐5‐TUPLE} are accepted or denied by Firewall,
and the first packet size is <pktlen>. In reality, the event ACCEPT will not be logged by system.
NAT
The first packet of session {IP‐5‐TUPLE} matching a NAT rule triggers the log. System generates only one log for
this session. This log indicates source addresses of the packets of {IP‐5‐TUPLE} are translated to the new address
{ADDR} by NAT.
The first packet of session {IP‐5‐TUPLE} matching a Auto Routing rule triggers the log. System generates only
one log for this session. This log indicates packets of the session {IP‐5‐TUPLE} are transferred outward through
WAN link <widx>, or all the WAN links defined in the routing and fail-over policies fail to transfer the packets
(AR=NONE). The first packet size of the session is <pktlen>. See "Auto Routing" for further information.
The first packet of session {IP‐5‐TUPLE} matching a Persistent Routing rule triggers the log. System
generates only one log for this session. This log indicates packets of the session {IP‐5‐TUPLE} are
transferred outward through WAN link <widx> (the persistence entry of the session is not expired), or Auto
Routing determines the WAN link for the session (PR=WAIT_AR, the persistence entry of the session is expired
or absent), or the action to this session is No PR (PR=NONE). The first packet size of the session is
<pktlen>. See "Persistent Routing" for further information.
If a PR log that PR=WAIT_AR, the PR log and a correspondent AR log are generated in pairs.
Virtual Server
The first packet of session {IP‐5‐TUPLE} matching a Virtual Server rule triggers the log. System generates only
one log for this session. This log indicates destination addresses of the packets of {IP‐5‐TUPLE} are translated to
the new address {ADDR} by Virtual Server. The first packet size of the session is <pktlen>.
BM
Session {IP‐5‐TUPLE} matching a Bandwidth Management filter triggers the log when it is closed. System
generates only one log for this session. This log indicates the traffic statistics (INPKTS, INBYTES, OUTPKTS,
OUTBYTES, TOTALPKTS, TOTALBYTES and DURATION) of the session {IP‐5‐TUPLE}.
Connection Limit
Count Limit
CL SRC=<ip> DROP=<pkt_number>
This log is triggered every time-period if the number of connections generated by a source SRC=<ip> exceeds the
limitation defined in Connection Limit > Count Limit. This log indicates connections generated by SRC=<ip> and
passing through FortiWAN are more that the limitation, and there are <pkt_number> packets are dropped for the
reason.
Rate Limit
RL RULE=<ridx> DROP=<pkt_number>
This log is triggered every time-period if a rule <ridx> of Connection Limit > Rate Limit is matched. This log
indicates connections defined in the Rate Limit rule <ridx> are generated in a rate higher than the limitation, and
there are <pkt_number> packets are dropped for the reason.
Cache Redirect
CR {IP‐5‐TUPLE} NEW_DST={ADDR‐PORT}
The first packet of session {IP‐5‐TUPLE} matching a Cache Redirect rule triggers the log. System generates only
one log for this session. This log indicates destination addresses and ports of the packets of {IP‐5‐TUPLE} are
translated to {ADDR} by Virtual Server. The first packet size of the session is <pktlen>.
Multihoming
An DNS response (queried for A or AAAA records) by Multihoming triggers the log. System generates the log only for
DNS queries for A and AAAA records. This log indicates a DNS query whose type is TYPE=<A|AAAA> and comes
from FROM=<ip> is responded by Multihoming with REPLY=<ip>, which is the IP address of WAN link <widx>.
System generates two logs for A and AAAA records if the DNS query type is ANY.
Dynamic IP
DHCP
System triggers the log when a DHCP WAN link <widx> is acted for ACTION. ACTION=bind and IP=<ip> must
be generated in pairs for a log.
PPPoE
System triggers the log when a PPPoE WAN link <widx> is acted for ACTION. ACTION=bind and IP=<ip>
must be generated in pairs for a log. Three more logs are introduced when a PPPoE WAN link goes to failure:
l PPPOE config‐requests timeout
l PPPOE connection no response
l PPPOE authentication failed
IP-MAC Mapping
The first packet of session {IP‐5‐TUPLE} blocked by IP-MAC Mapping triggers the log. System generates only one
log for this session. This log indicates source MAC addresses <MAC> of the packets of {IP‐5‐TUPLE} and the MAC
address defined in IP-MAC table are mismatched, and so that the packets are blocked.
The first packet of session {IP‐5‐TUPLE} blocked by IP-MAC Mapping triggers the log. System generates only one
log for this session. This log indicates destination MAC addresses <MAC> of the packets of {IP‐5‐TUPLE} and the
MAC address defined in IP-MAC table are mismatched, and so that the packets are blocked.
Tunnel Routing
The first packet of session {IP‐5‐TUPLE} being transferred by Tunnel Routing triggers the log. System generates
only one log for this session. This log indicates packets of {IP‐5‐TUPLE} are transferred through the Tunnel Group
<group name>, and the first packet size of the session is <pktlen>.
This log is triggered when a single GRE tunnel FROM=<ip> TO=<ip> is acted for actions ACTION.
IPSec
After an ISAKMP SA or IPSec SA is expired, new IKE phase 1 or 2 negotiation between <LOCAL_IP_PORT> and
<REMOTE_IP_PORT> is initiated or responded.
Packets of IKE negotiation are retransmitted due to the failure in authentication (pre-shared keys of the two entities
might not be correspondent with each other).
<IP> INFO: request for establishing IPsec-SA was queued due to no phase1 found.
Request for establishing IPSec SA from <IP> was queued due to the failure in phase 1 negotiation (Phase 1
proposals of the two entities might not be correspondent with each other).
A queued or retransmitted phase 1 negotiation is declared to failure because the time is up.
<IP> does not receive any proposal in the phase 2 negotiation messages (Phase 2 proposals of the two entities
might not be correspondent with each other).
System
Admin session
Account change
Access deny
UI command
l There is no slave
l Configuration synchronization finished successfully
l Configuration synchronization failed
l Peer information is not available
l ARP caches are updated
l Neighbor Discovery caches are updated
l System time synchronized
l No NTP servers in system settings
l License key <key> is applied successfully, system rebooting...
l License key <key> is applied successfully
l Test email is sent to <receiver>
l Failed to send test email to <receiver>
UI setting
Update
Config
Shutdown
Instant push
Service error
Connection overflow
Rate overflow
Undefined code
VRRP
HA
l Won precedence over the incompatible peer. Enter the Master state.
l Preceded by the incompatible peer. Enter the Panic state.
l Peer heartbeat stopped. Enter the Master state to take over services.
l Preceded by another Master. Reboot to enter the Slave state.
l Too Much port down. Reboot to enter the Slave state.
l Preceded by the incompatible peer. Enter the Panic state.
l Peer heartbeat stopped. Enter the Master state to take over services.
l Two Slaves linked at the same time. Restart HA after random delay.
l Master is gone. Enter the Master state to take over services.
l Peer heartbeat stopped
l Time synchronization failed.
l Configuration synchronization failed.
Log Control
Control sets to forward data from FortiWAN to servers via FTP, E-mail and Syslog (protocol) for archiving and
analysis. Configure log push method one log type by another, or use “Copy Settings to All Other Log Types”. It
copies and applies settings of one log type to others avoiding unnecessary duplicating of settings.
l System Log
l Firewall Log
l NAT Log
l Auto & Persistent Routing Log
l Virtual Server Log
l BM Log (Bandwidth Management)
l Connection Limit Log
l Cache Redirect Log
l Multihoming Log
l Backup Line Log
l Dynamic IP Log
l IP-MAC Mapping Log
l Tunnel Routing Log
l IPSec
Copy Settings to All Other Log Types : Copy and apply settings of a log type to other ones.
Push Now : Click this button and logs are pushed immediately.
Push Log When Out of Space : Check Enable to avoid losing data in case of space shortage.
Methods
FortiWAN transfer logs with FTP, Email and Syslog. It either forwards logs to external FTP server, administrator’s
mail account via SMTP or a remote syslog servers.
FTP
Syslog
Facility : Assign a facility to the logging message to specify the program type.
Note: If the Server is applied with a FQDN, then the DNS Server must be set in the Web UI [System]->[Network
Settings]->[DNS Server] (See "Set DNS server for FortiWAN").
Notification
Two methods are provided to send out the notifications for important system events: E-mail and SNMP trap.
Please configure the settings for the methods and select the event type to notify.
E-Mail Settings
The table below summarizes the event notification mail setup:
SMTP Port Specify the port (465 by default) that the SSL encrypted SMTP is using if the SSL
check box is checked. FortiWAN uses fixed port:25 for non-encrypted SMTP. This field
becomes ineffective if the SSL is unchecked.
Send Test E-mail Now Click the button to run test for the email settings above.
Note: If the SMTP Server is applied with a FQDN, then the DNS Server must be set in the Web UI System >
Network Settings > DNS Server (See "Set DNS server for FortiWAN").
Event Types to Notify Check to select the events. Enter the threshold to number of connections, rate of
connections and total WAN traffic to trigger the notification.
WAN link failure and recovery Send notification when a WAN link fails or recovers
from failure. A integer used to indicate the failed or
recovered WAN link.
HA slave failure and recovery Send notification when the slave unit in HA
deployment fails or recovers from failure. Integer 1
indicates the slave unit recovered and integer 2
indicates it failed.
Number of connections reaches Set the threshold and the number of connections
___ being processed in system will be sent as an event
notification when it exceeds the threshold.
Rate of connections reaches___ Set the threshold and the number of connections
/ sec established in system every second will be sent as
an event notification when it exceeds the
threshold.
Total WAN traffic reaches ___ Set the threshold and the number of current total
Kbps WAN traffic (sum of inbound and outbound traffic
of every WAN link) will be sent as an event
notification when it exceeds the threshold.
Enable Reports
FortiWAN's Reports provides long-term and advanced data analysis by processing system logs to database. The
original logs FortiWAN generates contains raw data which is yet to be processed, and Reports can organize and
analyze these data into readable statistics.
Every FortiWAN unit embeds the Reports system (See "Reports"), or the Reports could be also a stand-alone
system running on a computer. Here is the settings to specify the ways of log push for Reports servers.
Embedded Reports
Enable Reports DB : Enable the embedded Reports (See "Reports"). Logs will be processed directly to
the database stored in the built-in hard disk. Analysis and statistics are displayed
via Web UI.
The Reports displays no data without enabling this.
Stand-alone Reports
Enable Reports UDP : Enable it to push logs to specified stand-alone Reports server.
Recipient IP Address : Specify location of the stand-alone Reports server that logs are pushed to. This
field is available only if Enable Reports UDP is checked.
The stand-alone Reports displays no data without enabling this.
A stand-alone Reports and the embedded Reports can run at the same time, but both servers use the same logs.
Events
l Firewall
l Virtual Server
l Bandwidth Usage
l Connection Limit
l Multihoming
l Tunnel Routing
Selected logs here will be pushed to embedded Reports and stand-alone Reports, if any or both of them are
enabled.
Reports
Reports is the built-in monitoring and traffic pattern analysis tool for instant status of WAN connections and traffic
statistics analysis. MIS personnel can perform offline and more detailed analysis of the data to gain insight into
user traffic patterns for better network design and management policy definition. However, FortiWAN generates
large volumes of raw activity logs during the process of monitoring its functions. For long-term or trend analysis,
Reports is an online companion tool that greatly simplifies the analysis of the data.
Reports Features
l Provides historical detail and reporting over longer periods of time (See "Create a Report").
l Provides more fine-grained subcategories of analysis and reports (See "Advanced Functions of Reports: Drill in").
l Provides customized filters on reports (See "Advanced Functions of Reports: Custom Filter").
l Provides instant email of reports in PDF formats (See "Advanced Functions of Reports: Report Email").
l Reports can be saved in PDF format (See "Advanced Functions of Reports: Export").
l Supports user-select report date range (See "Create a Report").
l Supports user-specified backup of original log and database data (See "Reports Database Tool").
Reports provides analysis and reporting capabilities on device status, top bandwidth utilization and function
status. MIS personnel can gain complete understanding of the detailed network statistics via the various reports.
Such statistics include, for example, the exact time of failure of every WAN link, the peak rate and amount of
bandwidth of every WAN link, the minimum and maximum traffic volume for a given specified day range, the
traffic volume and service conditions of a certain server during a specified day range. Bandwidth Usage presents
the analysis of how the bandwidth of every WAN link is used: what connections are constructed between which
internal IP and external IP hosts, what services operate on the connections, and what and how much traffic is
transferred through which WAN link? For example, you can obtain, from Reports analysis, the external traffic
destinations from any or all devices inside the LAN or look at what internet servers attracted the most traffic from
your enterprise.
It is important to have a solid grasp of the functionality and operational theory of Reports in order to effectively
analyze network traffic patterns and various statistics of FortiWAN for optimal management policy definition.
Reports reporting function is calendar-based (in the upper right portion of the UI screen). Reporting can be done
for a specific day, by highlighting that date in the calendar. Reporting can be done over a range of dates by
specifying the start date and the end date on the Calendar.
Reports reporting function is divided into three categories and eighteen subcategories:
l Device Status: Dashboard, Bandwidth, CPU, Session, WAN Traffic, WAN Reliability, WAN Status, TR Reliability
and TR Status (See "Device Status").
l Bandwidth Usage: In Class, Out Class, WAN, Service, Internal IP and Traffic Rate (See "Bandwidth Usage").
l Function Status: Connection Limit, Firewall, Virtual Server and Multihoming (See "Function Status").
To make those data and analysis available, please enable Reports via Log > Reports (See "Enable
Reports") or Reports > Settings > Reports (See "Settings > Reports").
Create a Report
Report’s reporting function is calendar-based (in the upper right portion of the UI screen). Reporting can be done
for a specific day, by highlighting that date in the calendar. Reporting can be done over a range of dates by
specifying the start date and the end date on the Calendar.
Enable Reports
Please complete the necessary setting to enable FortiWAN Reports via Log > Reports (See "Enable Reports")
or Reports > Settings > Reports (See "Settings > Reports"), or data is unavailable for Reports.
Single Date
Start date:
l Click on the field under “Start date” to call up a calendar for further selection.
l Select a date from the calendar, and reports will be generated on the selected date from 00:00 to 23:59. The
selected date is highlighted in white, while the other dates are displayed in gray, and today’s date is circled in
yellow.
l Click the right or left arrow to go to the next or previous month.
l Click Apply to complete date selection, and reports will then be generated accordingly.
l Choose a different report type from the Category Area to generate reports on the same date selected if needed.
Date Range
To select a date range:
l Click the checkbox between Start date and the End date, and then Start time, End date and End time will become
available for selection (as shown below):
l Put a Start date and End date by clicking the input field and selecting from the calendar.
l Input the Start time and End time in the format of HH:MM. Note that the duration cannot exceed 90 days.
l Click Apply to complete date range selection and start generating reports.
l Choose a different report type from the Category Area to generate reports on the same date range selected if
needed.
All reports generated by FortiWAN can be exported in PDF format to your local computer; just simply click the
Export button on the upper side of any report page, and select PDF.
All reports generated by FortiWAN can be sent to users via email. Reports saved in PDF format can be sent out
as email attachments. Click the Email button on the right upper corner of any report page to edit settings of the
report email. In the settings dialog, you may send current report through email immediately or arrange a
scheduled email for it. No matter which report page you’re at, you can always click the Email button on that page
to send the current report through email, or the Schedule button to get the report email scheduled (see Report
Email).
Device Status
The Device Status report shows the top-level view of the analysis of the traffic flowing through FortiWAN. Device
Status includes 9 categories showing the average data rate through FortiWAN, the number of sessions
(connections) in use, the status of WAN links and TR connections and FortiWAN hardware statistics.
Bandwidth
The Bandwidth report shows the traffic distribution by the date range defined. Your FortiWAN model is rated by
its data throughput (and number of simultaneous connections). This report will help you determine if you are
using the correct FortiWAN model and bandwidth capability for the data volumes at our location.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Bandwidth Distribution:
l X axis: Time between 00:00 to 23:59 (of a selected date). Days from start to end if Date Range specified (max 90
days) .
l Y axis: Bandwidth in Kbps or Mbps.
l Green indicates inbound data rate.
l Blue indicates outbound data rate.
l Clicking on Both, In or Out buttons at the right upper corner of the graph allows you to see bandwidth distribution in
different directions:
l Both: Displays both inbound and outbound bandwidth distribution.
Statistics Table:
l Lists the average inbound and outbound traffic rate distributed by the date range defined. This is the numerical
presentation of the same information in the Bandwidth Distribution Charts.
l Time: Time periods or dates if a date range is defined.
l Inbound bps: Traffic originating from outside of FortiWAN, going into the internal port.
l Outbound bps: Traffic originating from inside of FortiWAN, going to the external port.
CPU
The CPU report shows the distribution of CPU usage of FortiWAN by the date range defined. CPU usage is a
measure of how much traffic is being managed or how much services the FortiWAN is required to do on that
traffic. Sustained usage near 80% is a good indicator that a larger FortiWAN model is required to handle the
required traffic and services load. Use this chart to compare your target maximum usage with the actual usage
over time.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Lists the CPU usage distributed in percentage (%) by the date range defined. This is the numerical presentation of
the same information in the CPU Usage Distribution Charts.
l Time: Time periods or dates if a date range is defined.
l % Usage: CPU usage in %.
Session
The Session report shows the distribution of sessions (connections) by the date range defined. Your FortiWAN
model is rated by the number of simultaneous connections it can process (among other things as noted above).
This report will help you determine if you are using the correct FortiWAN model for the number of connections in
use by your users.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table:
l Lists the number of sessions distributed by the date range defined. This is the numerical presentation of the same
information in the Session Distribution Charts.
l Time: Time periods or dates if a date range is defined.
l Count: Number of Sessions.
WAN Traffic
The WAN Traffic report shows the traffic distribution of every FortiWAN’s WAN link by the date range defined.
This report will help you to determine if WAN links are capable for the data volumes.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
WAN Reliability
The WAN Reliability report shows the statistics on the failures happened on FortiWAN WAN links.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Lists the times of failure happened on WAN links by the date range defined.
l WAN: WAN links that are enabled on FortiWAN. (Disabled WAN links will not be shown in the table).
l Fails: Times of failure happened on this WAN link.
l Drill in: Click to check the status (OK and Fail) over time on this WAN link (See "Drill In").
WAN Status
FortiWAN supports various numbers of WAN links, for example, FortiWAN 700 supports 25 WAN links, FortiWAN
5000 and FortiWAN 6000 support 50 WAN links. The WAN Status report shows the statuses on every FortiWAN’s
WAN link. The various statuses are defined as below.
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Lists the statuses of every WAN link by the date range defined.
l Time: Time periods or dates if a date range is defined.
l WAN: The WAN link.
l Status: The status happened on the WAN link at the time.
TR Reliability
Tunnel Routing (TR) is FortiWAN’s important function used to construct intranets between multiple LANs
anywhere in the world. Tunnel Routing also boosts performance by supporting link aggregation and fault
tolerance over multiple links for services such as VPN and live video streaming. A Tunnel Group represents the
configuration of Tunnel Routing on FortiWAN between two specific sites; it includes related internal IP addresses
of both sites and routing policies between sites (See "Tunnel Routing").
The TR Reliability report shows the statistics on the failures happened on FortiWAN’s TR links. Please reference
FortiWAN User Manual for more information about Tunnel Routing.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Group: Tunnel Group configured on FortiWAN; the failed TR link belongs to. Select “Group” as primary sorting via
clicking on the column title “Group”.
l Local IP: Local IP address of the failed TR link in the Tunnel Group. Select “Local IP” as primary sorting via clicking
on the column title “Local IP”.
l Remote IP: Remote IP address of the failed TR link in the Tunnel Group. Select “Remote IP” as primary sorting via
clicking on the column title “Remote IP”.
l Fails: the count of failures occurring on the IP pair in this Tunnel Group for the reporting period.
l Drill in: Click to check the status (OK and Fail) of the TR link (See "Drill In").
l Note: A “▲” or “▼” is shown aside the column header while the column is selected as primary sorting, e.g. Group
▲. The sorting order will be switched by clicking on the same column header.
TR Status
The TR Status report shows the statuses of every FortiWAN’s TR link (See "Tunnel Routing") by date the range
defined.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Bandwidth Usage
This report category is the core function of the Reports and also serves as the basis for traffic analysis to gain
insights for better policy management. This category can further be divided into In Class, Out Class, WAN,
Service, Internal IP and Traffic Rate.
The Bandwidth Usage Report includes: Charts (upper) and Statistics Table (lower).
l Pie Charts display respective percentage of all the traffic patterns that sorted (default) by the total data volume (IN
+ OUT) shown on the page. The Pie Charts display will change depending upon which column in the Statistics
Table is selected for primary sorting. This Pie Chart shows the percentage of the traffic pattern of the top 10 items
only, which might not match the percentage value listed in the Statistics Table. Use it only as a visual reference to
see who the major users are.
l Bar Charts illustrate the total volume of each traffic pattern shown on the page, and the percentage of each traffic
pattern out of total traffic. The Bar Chart display will change depending upon which column in the Statistics Table is
selected for primary sorting.
l The Statistics Table is the numerical presentation of the same information illustrated in the Pie chart and Bar
Charts. The traffic statistics includes information of total traffic, inbound traffic, outbound traffic and percentage of
total traffic.
l Inbound Bytes: The volume of traffic originating from outside of FortiWAN, going into the internal network.
l Outbound Bytes: The volume of traffic originating from inside of FortiWAN, going to the external network.
l Total Bytes: (Default primary sorting) The volume of total traffic = Inbound Bytes + Outbound Bytes.
The statistics table lists 10, 20, 50 or 100 entries sorted by default in declining order by total data volume. By
default the first screen shows the top 10 entries, but navigation buttons and a direct-entry page box at the lower
right corner of the screen allow you to examine all items found. The default number of rows to be listed on the
report page can be defined in account settings.
The Statistics Table may be re-sorted by Inbound Bytes, Outbound Bytes or Total Bytes, by selecting the
appropriate column header. The Pie and Bar charts will reformat to reflect the selected traffic measurement.
Note that the percentage of total traffic shown in the Statistics Table may not be the same as that shown on the
Pie Chart. The Statistics Table shows the percentage of total traffic in all traffic patterns, while the Pie Chart only
shows the total of the top 10 traffic users.
See also:
l Report: Inclass
l Report: Outclass
l Report: Service
l Report: WAN
l Report: Internal IP
l Report: Traffic Rate
Inclass
This report shows the statistics of each inbound class as defined in FortiWAN’s Bandwidth Management function
(See "Bandwidth Management"). Each class is a classification (by service, by IP address and etc.) of incoming
traffic passed through FortiWAN. This statistic will help you realize if the Bandwidth Management policies of
FortiWAN are running well, or if any adjustment is necessary for the specified bandwidth class.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
l Pie Chart: Pie chart of traffic statistics is generated based on Inbound Classes of FortiWAN’s Bandwidth
Management.
l Bar Chart: Bar chart statistics show the actual data volume used by the top 10 Inbound Classes.
l Statistics Table:
l List the Inbound Class the most traffic being classified into.
l In Class: The Inbound Classes defined in FortiWAN.
l Inbound Bytes: The volume of inbound traffic of the Inbound classes.
l Outbound Bytes: The volume of outbound traffic of the Inbound Classes.
l Total Bytes: The volume of total traffic of the Inbound Classes (Inbound Bytes + Outbound Bytes).
l Note: Select “Inbound Bytes”, “Outbound Bytes” or “Total Bytes” as primary sorting by clicking on the
column title. A “▲” is shown aside the column header while the column is selected as primary sorting, e.g.
Inbound Bytes ▲.
l % Total Bytes: The volume of total traffic of the Inbound Classes in %.
l % Inbound Bytes: The volume of inbound traffic of the Inbound Classes in %.
l % Outbound Bytes: The volume of outbound traffic of the Inbound Classes in %.
l Only one of the three statistics data (% Inbound Bytes, % Outbound Bytes, or % Total Bytes) will be
displayed in the statistics table depending on the primary sort column.
l This page and this table describe total traffic volume, not traffic rate. Data transferred are measured in
KBytes, MBytes or GBytes over the period of time selected.
l Drill in (See "Drill In"):
l Clicking the magnifier icon located under the “Drill in” column in the statistics table allows you to perform an
additional ‘drill-down’ analysis on traffic for the selected In Class, shown by Out Class, WAN, Service,
Internal IP, External IP, Internal Group, External Group and Traffic Rate (Trend) via the selected policy In
Class:
l Out Class – Out Classes that are associated with this In Class.
l WAN – WAN links that are associated with this In Class.
l Service – Services (L3-L7) that are associated with this In Class.
l Internal IP – Any monitored internal IP addresses that are associated with this In Class.
l External IP – Any monitored external IP addresses that are associated with this In Class.
l Internal Group – Any monitored internal IP group (set up under the Settings menu) that the internal IP
addresses are associated with this In Class.
l External Group – Any monitored external IP group (set up under the Settings menu) that the external IP
addresses are associated with this In Class.
l Traffic Rate: bandwidth distribution generated by this In Class by the date range defined.
Outclass
This report shows the statistics of each outbound class as defined in FortiWAN’s Bandwidth Management
function (See "Bandwidth Management"). Each class is a classification (by service, by IP address and etc.) of
outgoing traffic passed through FortiWAN.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
l Pie Chart: Pie chart of traffic statistics is generated based on Outbound Classes of FortiWAN’s Bandwidth
Management.
l Bar Chart: Bar chart statistics show the actual data volume used by the top 10 Outbound Classes.
l Statistics Table:
l List the Outbound Class the most traffic being classified into.
l Out Class: The Outbound Classes defined in FortiWAN.
l Inbound Bytes: The volume of inbound traffic of the Outbound Classes.
l Outbound Bytes: The volume of outbound traffic of the Outbound Classes.
l Total Bytes: The volume of total traffic of the Outbound Classes (Inbound Bytes + Outbound Bytes).
l Note: Select “Inbound Bytes”, “Outbound Bytes” or “Total Bytes” as primary sorting by clicking on the
column title. A “▲” is shown aside the column header while the column is selected as primary sorting, e.g.
Inbound Bytes ▲.
l % Total Bytes: The volume of total traffic of the Outbound Classes in %.
l % Inbound Bytes: The volume of inbound traffic of the Outbound Classes in %.
l % Outbound Bytes: The volume of outbound traffic of the Outbound Classes in %.
l Only one of the three statistics data (% Inbound Bytes, % Outbound Bytes, or % Total Bytes) will be
displayed in the statistics table depending on the primary sort column.
l This page and this table describe total traffic volume, not traffic rate. Data transferred are measured in
KBytes, MBytes or GBytes over the period of time selected.
l Drill in (See "Drill In"):
l Clicking the magnifier icon located under the “Drill in” column in the statistics table allows you to perform an
additional ‘drill-down’ analysis on traffic for the selected policy Out Class, shown by In Class, WAN, Service,
Internal IP, External IP, Internal Group, External Group and Traffic Rate (Trend) via the selected policy Out
Class:
l In Class – In Classes that are associated with this Out Class.
l WAN – WAN links that are associated with this Out Class.
l Service – Services (L3-L7) that are associated with this Out Class.
l Internal IP – Any monitored internal IP addresses that are associated with this Out Class.
l External IP – Any monitored external IP addresses that are associated with this Out Class.
l Internal Group – Any monitored internal IP group (set up under the Settings menu) that the internal IP
addresses are associated with this Out Class.
l External Group – Any monitored external IP group (set up under the Settings menu) that the external IP
addresses are associated with this Out Class.
l Traffic Rate: bandwidth distribution generated by this Out Class by the date range defined.
WAN
This report shows the statistics of traffic passed through FortiWAN via the WAN Links.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
l Pie Chart: Pie chart of traffic statistics is generated based on WAN links defined on FortiWAN.
l Bar Chart: Bar chart statistics show the actual data volume used by the top 10 WAN links.
l Statistics Table :
l List the WAN links on the FortiWAN that traffic passed through.
l WAN: The WAN links defined on the FortiWAN.
l Inbound Bytes: The volume of inbound traffic of the WAN links.
l Outbound Bytes: The volume of outbound traffic of the WAN links.
l Total Bytes: The volume of total traffic of the WAN links (Inbound Bytes + Outbound Bytes).
l Note: Select “Inbound Bytes”, “Outbound Bytes” or “Total Bytes” as primary sorting by clicking on the
column title. A “▲” is shown aside the column header while the column is selected as primary sorting, e.g.
Inbound Bytes ▲.
l % Total Bytes: The volume of total traffic of the WAN links in %.
l % Inbound Bytes: The volume of inbound traffic of the WAN links in %.
Services
This report shows the statistics of traffic passed through FortiWAN by various services.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
l Pie Chart: Pie chart of traffic statistics is generated based on the traffic incurred by Services.
l Bar Chart: Bar chart statistics show the actual data volume used by the top 10 Services.
l Statistics Table:
l List the Services generating (as a source or termination) the most traffic.
l Service: The Service that traffic passed through FortiWAN.
l Inbound Bytes: The volume of inbound traffic of the Service.
l Outbound Bytes: The volume of outbound traffic of the Service.
l Total Bytes: The volume of total traffic of the Service (Inbound Bytes + Outbound Bytes).
l Note: Select “Inbound Bytes”, “Outbound Bytes” or “Total Bytes” as primary sorting by clicking on the
column title. A “▲” is shown aside the column header while the column is selected as primary sorting, e.g.
Inbound Bytes ▲.
l % Total Bytes: The volume of total traffic of the Service in %.
l % Inbound Bytes: The volume of inbound traffic of the Service in %.
l % Outbound Bytes: The volume of outbound traffic of the Service in %.
l Only one of the three statistics data (% Inbound Bytes, % Outbound Bytes, or % Total Bytes) will be
displayed in the statistics table depending on the primary sort column.
l This page and this table describe total traffic volume, not traffic rate. Data transferred are measured in
KBytes, MBytes or GBytes over the period of time selected.
Internal IP
This report shows the statistics of traffic passed through FortiWAN by Internal IP addresses.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
l Pie Chart: Pie chart of traffic statistics is generated based on traffic incurred (as a source or termination) by Internal
IP addresses.
l Bar Chart: Bar chart statistics show the actual data volume used by the top 10 Internal IP addresses.
l Statistics Table:
l List the Internal IP addresses generating (as a source or termination) the most traffic.
l IP: The Internal IP addresses.
l Inbound Bytes: The volume of inbound traffic of the Internal IP addresses.
l Outbound Bytes: The volume of outbound traffic of the Internal IP addresses.
l Total Bytes: The volume of total traffic of the Internal IP addresses (Inbound Bytes + Outbound Bytes).
l Note: Select “Inbound Bytes”, “Outbound Bytes” or “Total Bytes” as primary sorting by clicking on the
column title. A “▲” is shown aside the column header while the column is selected as primary sorting, e.g.
Inbound Bytes ▲.
l % Total Bytes: The volume of total traffic of the Internal IP addresses in %.
l % Inbound Bytes: The volume of inbound traffic of the Internal IP addresses in %.
l % Outbound Bytes: The volume of outbound traffic of the Internal IP addresses in %.
l Only one of the three statistics data (% Inbound Bytes, % Outbound Bytes, or % Total Bytes) will be
displayed in the statistics table depending on the primary sort column.
l This page and this table describe total traffic volume, not traffic rate. Data transferred are measured in
KBytes, MBytes or GBytes over the period of time selected.
l Drill in (See "Drill In"):
l Clicking the magnifier icon located under the “Drill in” column in the statistics table allows you to perform an
additional ‘drill-down’ analysis on traffic for the selected Internal IP address, shown by In Class, Out Class,
WAN, Service, External IP, Internal Group, External Group and Traffic Rate (Trend) via the selected
Internal IP address:
l In Class – In Classes that are associated with this Internal IP address.
l Out Class – Out Classes that are associated with this Internal IP address.
l WAN – WAN links that are associated with this Internal IP address.
l Service – Services (L3-L7) that are associated with this Internal IP address.
l External IP – Any monitored external IP addresses that are associated with this Internal IP address.
l Internal Group – Any monitored internal IP group (set up under the Settings menu) where this Internal IP
address belongs to.
l External Group – Any monitored external IP group (set up under the Settings menu) that the external IP
addresses are associated with this Internal IP address.
l Traffic Rate: bandwidth distribution generated by this Internal IP address by the date range defined.
Traffic Rate
This report shows the statistics of traffic passed through FortiWAN by Traffic Rate.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Bandwidth Distribution:
l X axis: Time between 00:00 to 23:59 (of a selected date). Days from start to end if Date Range specified (max 90
days).
l Y axis: Bandwidth in Kbps or Mbps.
l Green indicates inbound data rate.
l Blue indicates outbound data rate.
l Clicking on Both, In or Out buttons at the right upper corner of the graph allows you to see bandwidth distribution in
different directions:
l Both: Displays both inbound and outbound bandwidth distribution.
l In: Displays only inbound bandwidth distribution.
l Out: Displays only outbound bandwidth distribution.
l Moving the mouse over the graph will display time, date and corresponding traffic distribution.
Statistics Table:
l List the average inbound and outbound traffic rate distributed by the date range defined. This is the numerical
presentation of the same information in the Bandwidth Distribution Charts.
l Time: The time periods or date ranges defined.
l Inbound bps: The inbound traffic rate in the time periods or date ranges.
l Outbound bps: The outbound traffic rate in the time periods or date ranges.
Drill in:
l Clicking the magnifier icon located under the “Drill in” column in the statistics table allows you to perform an
additional ‘drill-down’ analysis on traffic for the selected Time period , shown by In Class, Out Class, WAN, Service,
Internal IP, External IP, Internal Group and External Group via the selected Time period:
l In Class – In Classes that are associated within this time period.
l Out Class – Out Classes that are associated within this time period.
l WAN – WAN links that traffic passed through within this time period.
l Service – Services (L3-L7) that are associated within this time period.
l Internal IP – Any monitored internal IP addresses that are associated within this time period.
l External IP – Any monitored external IP addresses that are associated within this time period.
l Internal Group – Any monitored internal IP group (set up under the Settings menu) that the internal IP addresses
are associated within this time period.
l External Group – Any monitored external IP group (set up under the Settings menu) that the external IP addresses
are associated within this time period.
Function Status
This report category is the function to monitor the status of FortiWAN’s major functions for a long period. Long
term statistics of function status is helpful to administrators. This category can further be divided into Connection
Limit, Firewall, Virtual Server and Multihoming.
Connection Limit
To prevent network congestion, FortiWAN’s Connection Limit function limits the number of connections from
each source IP. A Connection Limit event means the number of connections from a given source IP has exceeded
the limit (See "Connection Limit"). Reports produces a summary report for Connection Limit events.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l List the Source IP generating the most accesses while connections exceeding the limit, sorted by the volume of
Drops in declining order.
l Source IP: The IP address generating connections exceeding the limit.
l Drops: The counts of denied access (try to construct new connection) while the connections exceeding the limit.
Firewall
Firewall is the most popular tool to control network access and deny illegal access. FortiWAN’s Firewall function
limits network access by service, source IP and/or destination IP. A Firewall event means that network access has
been denied according to the Firewall rules (See "Firewall"). Reports produces a summary report for Firewall
events.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Lists the Service, Source IP and Destination IP of denied network access, sorted by the volume of Drops in declining
order.
l Service: The Service of denied access.
l Source IP: The Source IP address of denied access.
Virtual Server
FortiWAN’s Virtual Server function the linking of multiple servers in an internal (or private) network to external
network (public) IP addresses. It is usually used to share multiple servers with single public IP addresses – a
simple server load balancing application (See "Virtual Server & Server Load Balancing"). Reports produces a
summary and detailed report for Virtual Server.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Lists the Virtual Server IP (Service) and count of access, sorted by the Server IP (default).
l WAN IP: the public IP address for external users to access the virtual server.
l WAN Service: the service for external users to access the virtual server.
l Server IP: the IP address of the Virtual Server.
l Server Service: the service ran on the virtual server.
l Requests: the count of accessing this Server Service ran on the Virtual Server IP from the WAN IP address.
l Note: Select “WAN IP”, “WAN Service”, “Server IP” and “Server Service” as primary sorting via clicking on the column
title. A “▲” or “▼” is shown aside the column header while the column is selected as primary sorting, e.g. Server IP
▲. The sorting order will be switched by clicking on the same column header.
Multihoming
FortiWAN’s Multihoming function performs load balancing and fault tolerance between WAN links for inbound
traffic. Users from the public network are told dynamically by FortiWAN the best available WAN link to access in
order to reach specific resources on the internal network (See "Inbound Load Balancing and Failover
(Multihoming)"). Reports produces a summary and detailed report for Multihoming.
Create a report for a specific day or over a range of dates (See "Create a Report").
Export reports and send reports through email (See "Export and Email").
Statistics Table
l Lists the Domain Name and the count of the number of times this domain was accessed, sorted by the FQDN
(default).
l FQDN: the domain name configured on FortiWAN. Select “FQDN” as primary sorting via clicking on the column title
“FQDN”.
l WAN: which WAN links this FQDN was accessed through. Select “WAN” as primary sorting via clicking on the
column title “WAN”.
l WAN IP: the WAN IP address in this FQDN accessed through the WAN link. Select “WAN IP” as primary sorting via
clicking on the column title “WAN IP”.
l Access: the counts of accessing this domain by external users via the WAN IP address.
l Note: Select “FQDN”, “WAN” and “WAN IP” as primary sorting via clicking on the column title. A “▲” or “▼” is shown
aside the column header while the column is selected as primary sorting, e.g. FQDN ▲. The sorting order will be
switched by clicking on the same column header.
Reports provides advanced functions beyond the basic reports to give an accurate analysis. Drill In and Custom
Filter are the functions about querying the reports with complex conditions. It delivers only the data that a user
needs from large data sets. Export and Report Email are the functions about documentations and delivering of
the on-line reports. The details of the advanced functions are described as follows.
Drill In
There are 7 different query conditions for Bandwidth Usage, including In Class, Out Class, WAN, Service, Internal
IP, External IP and Traffic Rate. In every Bandwidth Usage report, analysis can be further drilled-in to include
more traffic data statistics; in other words, Reports allows traffic to be queried based on combination of multiple
conditions. For example, select Service as the query subject from the menu in the category area, and the Service
report will be displayed accordingly, as shown below:
Service=All
Go to Reports > Service, you can have an overall service report which gives the traffic statistics of all the service
usages (query result is as shown below).
The HTTPS(TCP@443) service can be further drilled in to query which WAN link of FortiWAN are utilizing this
service by clicking the Drill In magnifier icon in the row of HTTPS(TCP@443) listed in the table and select WAN
(query result is as shown below):
As indicated in the blue box (shown in the figure above), this page presents the data of HTTPS(TCP@443) traffic
in the WAN report, In the statistics table, the WAN link 1 can be further drilled in to query what internal IP
addresses are included by clicking the Drill In magnifier icon in the row of WAN 1 listed in the table and select
Internal IP (query result is as shown below):
As indicated in the blue box (shown in the figure above), this page presents the data of Internal IP report that
includes the traffic of WAN 1 (WAN) using HTTPS(TCP@443) (Service), The IP address: 10.12.106.17 can be
further drilled in to query what External IP addresses it is connected to by clicking the Drill In magnifier icon in the
row of 10.12.106.17 IP listed in the table and select External IP (query result is as shown below):
As indicated in the blue box (shown in the figure above), this page presents the data of External IP report that
includes the traffic of WAN 1 (WAN) at internal IP=10.12.106.17 (Internal IP) using HTTPS(TCP@443) (Service).
From the example illustrated above, administrators can easily query the traffic flow based on combination of
various conditions needed, while analysis can be drilled in to more details for better review. In the upper section
of the report page, you’ll see a summary of the query conditions used in the existing report (highlighted in blue as
shown in the image above), making it clear for administrators to keep track of the query details.
The report presented by Traffic Rate using the same filter: Service=HTTP(TCP@443), WAN=1 and Internal
IP=10.12.106.17 is illustrated as follows.
As illustrated in the example above, Reports offers two kinds of advanced query: you can either keep drilling in
with different conditions to get a report with more specific details, or change query condition at any Drill In level;
in other words, network flow data can be queried either vertically or horizontally.
Custom Filter
Reports offers 6 fixed reports of bandwidth usage by default; In Class, Out Class, WAN, Service, Internal IP, and
External IP. Usually, administrators will need to check drilled-in information for particular target regularly. As
discussed previously, Drill-in function can be used to obtain more report specifics, while Filter helps to directly
obtain more traffic data of a specific target. In order to quickly perform a query based on a specific filter without
going through those tedious steps over again, Custom Filter allows users to apply their own filters based on
particular requirements for query on bandwidth usage reports.
Click Filter above every Bandwidth Usage report to see an extended block for further settings.
l A Filter can be composed of multiple conditions. Click Add new condition and select an option from the drop-down
menu to start setting your filter: In Class, Out Class, WAN, Service, Internal IP, External IP, Internal Group and
External Group.
Conditions:
l There are two actions for options while setting the condition:
l Including: Extract only those records that fulfill the specified criterion.
l Excluding: Extract those records that not fulfill the specified criterion.
l Configurations for report categories:
l In Class: Enter the Inbound Class name you want to query (include or exclude) in the input field.
l Out Class: Enter the Outbound Class name you want to query (include or exclude) in the input field.
l WAN: Enter the WAN number you want to query (include or exclude) in the input field.
l Service: Enter the Service you want to query (include or exclude) in the input field. Click on the arrow next to
the input field to see more Service options. Predefined L4 and L3 protocols are available. Entering a single
or a range of port number is also allowed.
l Internal IP: Enter the Internal IP address you want to query (include or exclude) in the input field.
l External IP: Enter the External IP address you want to query (include or exclude) in the input field.
l Delete: Delete the extended block of condition settings in the filter.
Cancel:
Apply:
Click Apply to start the query based on the filter conditions defined. The result is presented in the report area.
Note both the result and filter conditions will not be saved in user profile. When the page moves to other report
categories, the filter conditions will be invalid.
Example
Check out the Internal IP report first, and create and apply a customer filter, for example, with the conditions
WAN = 1 and Service = HTTPS(TCP@443). The query result of traffic statistics that are associated with the
Service HTTPS(TCP@443) and passed through FortiWAN via WAN1 will then be displayed by Services
accordingly. As illustrated below, the block marked in blue indicates the query subject of current report:
Continuing the example described above, apply the custom filter: Service=HTTPS(TCP@443), WAN=1 and
Internal IP=10.12.106.17 in the Traffic Rate report, and the query result will show the corresponding traffic
statistics by traffic rate as follows (the block marked in blue indicates the query subject of current report):
Note: Saved custom filters are kept in user account profile. Users can edit and delete custom filters from their
account profile. Please refer to section of Customer Filters in Account Settings for more information.
Export
All reports generated by Reports can be exported as PDF or CSV format. By clicking Export button on the upper
side of any report page, PDF and CSV are displayed for options.
Report Email
All reports generated by Reports can be sent to users via email. Reports saved in PDF or CSV format can be sent
out as email attachments.
Note: Prior to creating emails, you must first configure an email server used to transfer report emails to Reports.
You can set the email server through Reports > Settings > Email Server, or the email function on every report
page.
Click the Email button on the right upper corner of any report page to configure email settings to current report
page. For example, in the settings dialog below, you are currently in Traffic Rate report (see the header "Email :
Traffic Rate" on the setting dialog), then you can:
Send now
Click the Send now tab on the setting dialog. This feature requires a email server configured first.
Format Select the format of reports included in this email: PDF or CSV.
Cancel Click to cancel current configuration and close the dialog window.
Email Server
Click the Email Server tab on the setting dialog. You can also set the email server through Reports > Settings
> Email Server. Both ways directs to one Reports to one email server.
Schedule
Click the Schedule tab on the setting dialog to set the report email scheduled. This feature requires a email
server configured first.
Format Select the format of reports included in this email: PDF or CSV.
l Daily: the report bounded in previous day 00:00 ~ 24:00 will be automatically sent at
05:00 everyday.
l Weekly: the report bounded in the last week (Monday 00:00 ~ Sunday 24:00) will be
automatically sent at 05:00 every Monday.
l Monthly: the report bounded in the last month (the first day 00:00 ~ the last day 24:00)
will be automatically sent on the first day of every month at 05:00.
Add to existing
Click the Add to existing tab on the setting dialog to list the schedule. By clicking the button "Add to this" on the
right upper corner of every schedule item, you can add current report category to one of the scheduled report
emails. You can edit the schedule through Reports > Settings > Scheduled Emails.
A Web-based Reports database management tool providing limited functions similar to the Reports database
tool is available, see Database Data Utility.
Installation Procedures
Step 1: Click the installation file (such as FWN-dbtool-4.0.0-B20150303.exe) to run the installer. Select the
language of your choice.
Step 4: Read the License Agreement carefully. Click the ‘I Agree’ button to accept the agreement and begin the
installation process. Otherwise, please click ‘Cancel’.
Step 6: Choose a Start Menu folder (or check ‘Do not create shortcuts’ to ignore it). Click ‘Install’ and then the
installation process will begin.
Start DB Tool
To perform the database tool, please go to: Start > Programs > FWN-dbtool, and DB Tool utility is available
for selection.
Setting
The first time when you use the DB tool, please go to Setting to specify the database to be managed.
DB IP Specify the location of the Reports database. it would be the IP address of FortiWAN Web UI.
DB Port Specify the port number that Reports database is listening. Please use the default port 5432.
The DB tool can be used to backup, restore and delete data from FortiWAN's Reports database.
Backup
From date Specify the start date to back up the data by selecting a date from the drop-down
calendar.
To date Specify the end date to back up the data by selecting a date from the drop-down
calendar.
Save to the directory Click Browse to select a location where the backup data should be saved.
Delete the data after Check it to delete the data in Reports database after it is backed up.
exported
Restore
Delete
From date Select a date from the drop-down calendar to specify the start date to delete the data.
To date Select a date from the drop-down calendar to specify the end date to delete the data.
Note that although operations that Backup and Restore data of the current date (today) are allowed, it might
cause damages the report data since FortiWAN Reports is receiving and processing the data for today. Backup
and Restore are strongly recommend to be used for data before today.
Reports Settings
The Settings here is used to simply manage the Reports on database, disk space and the SMTP server used to
email reports. Click the listed settings and you can further configure them:
IP Annotation : Create, modify and delete the notes of IP addresses (See "IP Annotation").
Dashboard Page Refresh : Auto refresh dashboard page according the time interval you specify (See "Dashboard
Time Page Refresh Time").
Email Server : Manage email server settings for sending emails (See "Email Sever").
Scheduled Emails : Manage the existing email scheduling (See "Scheduled Emails")
Disk Space Control : Monitor disk free space, and send alerts or purge data when it is low (See "Disk Space
Control").
DB Data Utility : Manage the Reports database via backup, restore and delete operations (See
"Database Data Utility")
Please note that this function is only available for the users log-in as administrator permission.
Reports
FortiWAN Reports works by parsing and analyzing the various system logs. Before using the FortiWAN Reports,
you have to enable it by specifying the way and the events to push system logs to Reports. You will be redirected
to Log > Reports to complete the necessary settings to enable the FortiWAN Reports (See "Log > Reports").
IP Annotation
IP annotation helps users to recognize IP addresses shown in Reports by predefined notes. An annotation icon
will appear next to the IP address listed in a report page. Users can read the content of the annotation through
clicking the icon. Click Settings > IP Annotation to enter the IP Annotation settings page.
Search IP Annotations
The search function for IP annotations is on the right upper corner of the page.
Search : Type in the IP address or annotation content that you want to search in the search
field and click the magnifier icon to start searching. The searching result based on
existing IP annotation information will be listed in the table under the field.
Show rows : Allow you to select the number of IP annotation to be displayed in the search result
per page: 10, 20 or 50 rows.
Action : Click Edit to edit the content of an IP annotation. The edit interface is the same as
what for adding a new annotation (See below). Click Delete to delete an IP
annotation.
Email Server
Individual reports (See "Report Email") and system alerts (See "Disk Space Control") can be sent to users via
email. It is necessary to configure the email server first to deliver the report and alert emails to users. Note that
configuration here is the same as the configuration made in the tab "Email" of every report page (See "Report
Email").You can maintain the unique configuration of mail server for Reports via Settings > Email Server or the
"Email" function of every report page. The mail servers used for Reports, log push (See "Log Control") and
notifications (See "Notification") could be different. Click Settings > Email Server to enter the Email Server
settings page.
Scheduled Emails
You may have get some report emails scheduled (see Report Email). Go to Reports > Settings > Scheduled
Emails, then you can edit or delete the schedules.
Email The scheduled report email. You can see the information of the email:
Format Select the format that the reports are attached in: PDF or CSV.
Schedule Select the period for automatic email sending: Daily, Weekly or
Monthly.
Reports Delete report categories from the report email. The only way to add
report categories to a scheduled report email is the "Add to existing"
function on every report page (see Report Email).
Days : Enter the number of days for the duration. When database data exceeds the day
duration, Reports keeps the latest data of the day duration in database and purges
the earlier data. Leave the field empty if you want disable the condition.
Percentage (%) : Enter the percentage. When disk free space is less than the percentage of total disk
space, Reports purges the earlier data from database to keep disk free space more
than the amount. Leave the field empty if you want disable the condition.
Send notification after : Click to enable notification via email after data purging. Settings > Email Server must
purge data be configured to ensure the notification (See "Reports Email Server").
Send Alerts
The alert function is triggered by two conditions, day duration and percentage of free disk space. It will alert
administrator via email when any of the two conditions is satisfied. Settings > Email Server must be configured to
ensure the notification (See "Reports Email Server").
Days : Enter the number of days for the duration. Reports sends an alert to users when
database data exceeds the day duration. Leave the field empty if you want disable
the condition.
Percentage (%) : Enter the percentage. Reports sends an alert to users when disk free space is less
than the percentage of total disk space. Leave the field empty if you want disable the
condition.
Note that system schedules condition check for database purge and sending alerts at 04:00 A.M. everyday. You
are suggested to set a looser condition for sending alerts than database purge so that you get the alert earlier
before the data being purged, if you need to backup the data (via Reports database tool) in advance.
Mail To
e-mail address : Enter the email address for system delivers alerts and notifications to. Settings >
Email Server must be configured to ensure the notification (See "Reports Email
Server").
Free Space : Display the amount of free disk space in MB and percentage.
Database Used : Display the disk amount used by Reports database in MB and percentage.
Other Used : Display the amount of disk overhead or pre-allocated space in MB and percentage.
Reports database:
Go to Reports > Settings > DB Data Utility, an operation panel with tabs Backup, Restore and Delete is
shown.
Backup
This feature allows you a database backup for a single day. For having backups of a couple of days, you will need
to either perform the backups individually (day by day) or install a Reports Database tool on your local computer
to perform a single database backup for a couple of days.
To backup report data of a single date, click the Backup tab on the panel and simply follow the steps:
1. Click the Date field to open the calender and specify a date for backup.
2. Click the Backup button to start data backup procedure. The backup file will be named in form Default_
yyyymmdd.data by default, such as Default_20161007.data. This backup file will be required when you are
restoring it back to FortiWAN.
Restore
To restore a data backup to Reports, click the Restore tab on the panel and simply follow the steps:
1. Click the filed Select the data file to restore to select a backup file (.data file) for restoring.
2. Click the Restore button to start data restore procedure.
Note that it is not allowed to backup or restore report data of the current date (today) since FortiWAN Reports is
receiving and processing the data for today. The operations are available for data before today.
Note that both the Web-based database data utility and the Reports database tool use the common backup file
format (.data), which implies that a backup file (.data), whether is generated by the Web-based database data
utility or the Reports database tool, can be restored back to Reports database in both the ways.
Delete
To delete report data from the database, click the Delete tab on the panel and simply follow the steps:
1. Click the From date field to open the calender and specify the start date for deleting.
2. Click the To date field to open the calender and specify the end date for deleting.
3. Click the Delete button to delete the report data of the specified period.
In console, enter the command ‘resetconfig’, or on the Web UI select “Factory Default” to do a hard reset and
restore all settings to factory default.
When restored to factory default, accounts and passwords for access of CLI, Web UI and SSH login will also be
reset to:
FortiWAN Log-ins
The Web UI login port will be restored to the default port 443.
FortiWAN also supports SSH logins. The interface for SSH login is the same as the console with identical
username and password.
Port 1: WAN
l WAN Link: 1
l IP: 192.168.1.1
l Netmask : 255.255.255.0
l IP in DMZ 192.168.1.2~192.168.1.253
l Default Gateway 192.168.1.254
l DMZ at Port 5
Port 2: WAN
l WAN Link: 2
l IP: 192.168.2.1
l Netmask: 255.255.255.0
l IP in DMZ 192.168.2.2~192.168.2.253
l Default Gateway 192.168.2.254
l DMZ at Port 5
Port 3: WAN
l WAN Link: 3
l IP: 192.168.3.1
l Netmask: 255.255.255.0
l IP in DMZ 192.168.3.2~192.168.3.253
l Default Gateway: 192.168.3.254
l DMZ at Port 5
Port 4: LAN
l IP: 192.168.0.1
l Netmask: 255.255.255.0
l DHCP Server Disabled
Port 5: DMZ
Fields such as Domain Name Server, VLAN and Port Mapping, WAN/DMZ Subnet Settings are all cleared
FortiWAN's Web UI does not set maximum limitations to numbers of most services rules and policies, but as the
configured rules and policies increase interminably, performance of both FortiWAN and its Web UI decrease,
especially for FortiWAN's critical services, such as Bandwidth Management, Multihoming and Tunnel Routing.
Not only FortiWAN appliances use more and more hardware resources to run and handle traffic with a large
number of configurations, but also your local computer spends more time to run the Web UI pages. The following
table shows the suggested maximum configuration values to FortiWAN's services. Remember that FortiWAN
Web UI allows you to create configurations more than the value, but the performance may not be guaranteed.
IP grouping
Service grouping
Busyhour setting
Date/Time
Time servers 4 4 4
Administration
Firewall
NAT
Persistent routing
Auto routing
Virtual Server
Bandwidth management
Inbound classes 99 99 99
Outbound classes 99 99 99
Connection limit
Cache redirect
Multihoming
Global setting
A record policy
Domain setting
Multihoming – Backup
Internal DNS
Global setting
Domain setting
DNS proxy
IP-MAC mapping
Tunnel Routing
Reports
Scheduled emails 20 20 20