Laboratorio 12
Laboratorio 12
Laboratorio 12
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
2. In the upper-right corner, click admin, and then click Configuration > Revisions.
4. Select the configuration with the comment Local-SD-WAN, and then click Revert.
5. Click OK to reboot.
Configuring SD-WAN
In this exercise, you will configure a basic DIA setup using the FortiGate GUI. You will
create a zone for port1 and port2 on Local-FortiGate, and then configure SD-WAN rules to
steer traffic for critical and non-critical internet applications.
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and
password password.
2. Click Policy & Objects > Firewall Policy.
3. Select the Full_Access policy, and then click Delete.
Configure an SD-
WAN
Zone named underlay.
Configure SD-WAN
members with the
following
configuration, and add
them to
the underlay zone:
port1 with Gateway 1
0.200.1.254
port2 with Gateway 1
0.200.2.254
1. Continuing on the Local-FortiGate GUI, click Network > SD-WAN > SD-WAN
Zones.
2. Click Create New > SD-WAN Zone.
3. In the Name field, type underlay.
1. Click OK.
2. Click Create New > SD-WAN Member.
3. Configure the following settings:
Field Value
Interface port1
Field Value
Gateway 10.200.1.254
Status Enabled
1. Click OK.
2. Click Create New > SD-WAN Member.
3. Configure the following settings:
Field Value
Interface port2
Gateway 10.200.2.254
Status Enabled
1. Click OK.
2. On the SD-WAN Zones tab, expand the underlay zone.
1. Continuing on the Local-FortiGate GUI, click Network > SD-WAN, and then click
the Performance SLAs tab.
2. Click Create New to add a performance SLA.
3. Configure the following settings:
Field Value
Name Level3_DNS
Server 4.2.2.1
The page should show that port1 and port2 are up (green up arrow).
FortiGate can reach the detect server through port1 and port2, and displays a green arrow
for Packet Loss, Latency, and Jitter.
1. To check the routing table, click Dashboard > Network, and then click the Static &
Dynamic Routing widget.
Configure Rules
You will configure two SD-WAN rules. One rule will be used to steer the traffic of critical
applications. The other rule will be used to steer the traffic of non-critical applications. Both
rules will use manual mode.
By default,
application
detection for SD-
WAN rules is not
visible on the GUI.
This feature has
been enabled for
you on the Local-
FortiGate GUI.
The commands to
enable the
visibility of
application
detection for SD-
WAN rules are:
config system
global
set gui-app-
detection-sdwan
enable
end
To configure rules
1. Continuing on the Local-FortiGate GUI, click Network > SD-WAN, and then click
the SD-WAN Rules tab.
2. Click Create New to add a rule.
3. Configure the following settings:
Field Value
Name Critical-DIA
Source LOCAL_SUBNET
address
When you
select Internet
service, FortiGate
uses the Internet
Service Database
(ISDB) list of IP
addresses and
protocols for each
application. The
FortiGuard server
regularly updates and
loads this list on
FortiGate.
When you
select Application,
FortiGate detects the
application according
to the first packets
exchanged with the
initial session.
Your page should look similar to the following example. Note that you might not be able to
view the application icons at this stage.
1. Click OK to save the settings.
2. Repeat the previous steps to configure a rule for non-critical traffic using the
following settings:
Field Value
Name Non-Critical-DIA
Field Value
Source LOCAL_SUBNET
address
Field Value
Destination Subnet
0.0.0.0/0.0.0.0
Interface underlay
4. Click OK.
1. Continuing on the Local-FortiGate GUI, click Policy & Objects > Firewall Policy.
2. Click Create New.
3. Configure the following settings:
Field Value
Name DIA
Incoming port3
Interface
Outgoing underlay
Interface
Source LOCAL_SUBNET
Destinatio all
n
Schedule always
Service ALL
Action Accept
NAT Enable
For SSL
Inspection,
select certificate-
inspection.
cd Desktop
sh traffic-generation.sh
The Local-Client
VM is generating
various types of
internet traffic.
The script takes about 2 minutes to complete, and then the terminal window
displays Script was successfully completed . You can move to the next task while the
script is running.
2. Click Network > SD-WAN, and then click the SD-WAN Zones tab.
4. Hover over each graph to display the bandwidth that each member (port1 and
port2) uses.
2. Click Latency to display a graph that shows the latency for the performance
SLA Level3_DNS monitored over the past 10 minutes.
3. Notice the green arrows beside port1 and port2 in the Packet Loss, Latency,
and Jitter columns.
They indicate that the port is up and that the measured performances are within acceptable
values.
The terminal window should display The traffic was successfully generated .
2. On the Local-FortiGate GUI, click Log & Report > Forward Traffic.
3. Hover over the upper-left corner of the log table to display the table column settings
icon.
4. Click the gear icon, select Destination Interface, select SD-WAN Quality, and
then select SD-WAN Rule Name.
5. Click Apply.
7. To simplify the view, beside a DNS log message, right-click DNS, and then select
the Not exact match filter.
2. Right click port1, and then select Set Status > Disable.
5. In the upper-right corner, click the time selection list, and then select 1 hour to
display a summary of events in the past hour.
6. On the Summary page, scroll down, and then click the SD-WAN Events summary
widget to expand it.
You can see that FortiGate directs the traffic only to member 2 after you switched off port1.
9. Double-click the second Service will be redirected in sequence order message
received, and then review the details.
When both interfaces are back up, the member sequence order corresponds to the
configured order—member 1, and then member 2.
10. Close the Local-FortiGate GUI session and the terminal window on the Local-Client
VM.