Skip to main content

POLICY ROUTES FORTIGATE

 Policy routes also referred to as policy based routing is a very popular technique that routes the incoming packets based on the set of policy defined. The policy usually defines that the packet from particular source are routed to particular gateway. 

Simply not trying to make it theoretically lengthy lets try this feature out in Fortigate.



In our particular scenario there are 2 fortigate boxes residing in HA (Active/Passive) mode. There are two upstream ISP connected with the fortigate box one named after port 1 SUBISU and the other being port 2  WEBSURFER. We have two internal gateways which contains subnet of 172.16.0.0/28 and the other one being 172.16.0.16/28. We will be leveraging the privilege of policy route and send the packet incoming from 172.16.0.0/28 subnet towards Websurfer upstream and the packet coming from 172.16.0.16/28 subnet towards SUBISU upstream which will help us on utilizing both the links making it more efficient usage of bandwidth.

We will need to create two default routes towards our upstream ISP's .For the redundant Internet connections, both the default static routes have to be active in the routing table.So, in order to achieve it, set the distance of both the routes the same and also be aware that priority must be equal.

Example : 

wan1 has a distance of 10 and a priority of 0.

wan2 has a distance of 10 and a priority of 0.

This is very important in our scenario as we are going to utilize both the links which will provide us maximum utilization of both the ISP's bandwidth rather than setting up making the other link idle waiting for the primary link to fail.

In case of active failover scenario, if wan1 is to be the primary link [active link], then set the lowest priority to that link.And highest priority to the other wan interface. When there are multiple routes to the same destination with the same distance then the priority will be checked. And the route with the least priority will be given the preference.

Example:

wan1 has a distance of 10 and a priority of 0.

wan2 has a distance of 10 and a priority of 10.

Here wan1 will be a selected route, as it has the least priority compared to wan2.

So, all the traffic will be handled by wan1. If wan1 goes down then the traffic will be shifted to wan2.

Let's now begin our configuration for policy route.

1. Creating a static route ( Active/ Active) 

The image above displays a default route towards 103.232.152.81 being the gateway of the upstream ISP SUBISU with an administrative distance value of 10 and priority being 0.

The image above displays a default route towards 118.91.170.241 being the gateway of the upstream ISP WEBSURFER with an administrative distance value of 10 and priority being 0.

We will now need to verify whether both the routes exists in the routing table or not. We can simply check using get router info routing-table all command in the cli of the firewall.

We can see that both the route does exists on the routing table of the firewall.

2. Creating a policy route 

We will need to create a policy route for the subnet 172.16.0.0/28 IP being 172.16.0.2. The end host from 172.16.0.2 will simply go towards the websurfer ISP by checking the policy routes made on the firewall. Under Network tab click on Policy Routes.


We can match the incoming traffic based on protocol, incoming interface, source address, destination address etc. Finally, we will need to create a policy for the those two subnet.

3. Creating a Policy

Policy for SSF subnet (172.16.0.0/28) needs  to be created where my outgoing interface should be port2 WEBSURFER. Services and NAT has been allowed accordingly.


The other policy would be for SSF subnet and its outgoing interface being port 1 SUBISU upstream.


4. Verification
We can simply verify this going under Fortiview > Policies. As you can see in the below image that SOSYS is routing packets from WAN-SUBISU (port1) and SSF Subnet is routing packets from WAN-WEBSURFER (port2)


Relentless growth of cloud computing, mobility, and Web-based applications requires that the network know each application traffic type traversing the network. Policy route can also handles each application type separately to effectively prioritize, segregate, and route traffic without compromising performance or availability.













Comments

Popular posts from this blog

SAN Switch Zoning with Brocade

Zoning in Brocade SAN Switch Let's begin with resetting the switch completely. In my environment I have two brocade SAN Switch connecting to 2 Dell R940 server configured with VMware. The SAN switch will be having connectivity between Dell Unity 500 storage and Dell R940 servers. Multipathing will be done between the server and storage with the help of SAN Switch. Multipathing, also called SAN multipathing or I/O multipathing, is the establishment of multiple physical routes between a server and the storage device that supports. It results in better fault tolerance and performance enhancement. DESIGN The idea behind zoning is that intended WWPN talk with each other . This is more like ACL in the world of Ethernet. To see the devices which are logged into the switch the following commands can be executed. SAN-A:admin> switchshow switchName: SAN-A switchType: 118.1 switchState: Online switchMode: Native switchRole: Principal switchDomain: 1 switchId: ...

SSL Decryption FortiGate

  We have pretty much heard about SSL decryption and of malware hiding inside an encrypted traffic. A large amount of traffic in the internet is pretty much encrypted which basically means that bad things like malware, virus, ransomware can hide inside this encrypted traffic. If majority of these traffic are encrypted our Firewalls are not able to analyze these traffic which can easily infect our organization and the investment which we have done in these firewalls are wasted. There does come around a solution for this and as my topic suggest SSL Decryption also know as Deep Packet Inspection as by some IT folks. The image that I have attached down below clearly suggest about what I am trying to explain. Using deep packet inspection, the firewall simply decrypts the encrypted traffic happening  between client and server, inspects the content to find the threats and block them , then forwards it to the destination re-encrypting it . We will need to first setup the SSL/SSH in...

Upgrade Catalyst C9500

Upgrading Catalyst 9500 series switch is relatively easy. The one that I'm going to upgrade today is on Install mode containing packages.conf file. Install mode consumes far less resources in compared to the traditional bundle mode and has some advantage like auto upgrade when configured in stacked mode. We can talk about the difference between bundle and install mode later on. Let's focus on upgrading the Catalyst 9500 switch. Switch I am trying to upgrade is in 17.03.03 which has some bugs and security vulnerabilities. I am upgrading it from 17.03.03 to 17.6.5(MD) golden image present in the cisco download site for C9500 series switch and also reading down the linked document from cisco that is what they recommend. You can have a look at it . https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/221498-recommended-releases-for-catalyst-9200-9.html We will first need to create FTP username and password in the switch. The username and password must b...