config link-load-balance flow-policy
Use this command to configure link load balancing policy rules.
A link policy matches traffic to rules that select a link group or virtual tunnel.
The policy uses a matching tuple: source, destination, service, and schedule. The policy match is a Boolean AND—All must match for the rule to be applied.
The elements of the tuple support specification by group objects. This is a Boolean OR—If source IP address belongs to member 1 OR member 2, then source matches.
The logical combinations enable you to subscribe multiple address spaces or services to a group of links, and create load balancing rules on that group basis.
The policy table is consulted from top to bottom. The first rule to match is applied.
The FortiADC system evaluates traffic to determine the routing rules to apply. With regard to link load balancing, the system evaluates rules in the following order and applies the first match:
|
Before you begin:
- You must have configured any address, service, and schedule objects that you want to use as match criteria for your policy.
- You must have configured a link group or virtual tunnel group.
- You must have read-write permission for link load balancing settings.
Syntax
config link-load-balance flow-policy
set default-link-group <datasource>
config rule
edit <name>
set group-type {link-group | virtual-tunnel}
set link-group <datasource>
set virtual-tunnel <datasource>
set destination-type {address|addrgrp|isp}
set destination-address <datasource>
set destination-addrgrp <datasource>
set destination-isp <datasource>
set in-interface <datasource>
set schedule <datasource>
set service-type {service|servicegrp}
set service <datasource>
set servicegrp <datasource>
set source-type {address|addrgrp|isp}
set source-address <datasource>
set source-addrgrp <datasource>
set source-isp <datasource>
next
end
default-link-group |
Specify a link group configuration object that is used as the default when traffic does not match policy rules. |
config rule |
|
group-type |
|
link-group |
If you specify the link group type, specify a link group configuration object. |
virtual-tunnel |
If you specify the virtual tunnel group type, specify a virtual tunnel configuration object. |
destination-type |
Specify whether to use address, address group, or ISP address objects for this rule. |
destination-address |
Specify an address object to match destination addresses. If you do not specify a destination address, the rule matches any destination. |
destination-addrgrp |
Specify an address object to match destination addresses. If you do not specify a destination address, the rule matches any destination. |
destination-isp |
Specify an address object to match destination addresses. If you do not specify a destination address, the rule matches any destination. |
in-interface |
Network interface to which the policy applies. |
schedule |
Specify the schedule object that determines the times the system uses the logic of this configuration. The link policy is active when the current time falls in a time period specified by one or more schedules in the schedule group. If you do not specify a schedule, the rule applies at all times. |
service-type |
Specify whether to use service or service group objects for this rule. |
service |
Specify a service object to match destination services. If you do not specify a service, the rule matches any service. |
servicegrp |
Specify a service group object to match destination services. If you do not specify a service, the rule matches any service. |
source-type |
Specify whether to use address, address group, or ISP address objects for this rule. |
source-address |
Specify an address object to match source addresses. If you do not specify a source address, the rule matches any source address. |
source-addrgrp |
Specify an address object to match source addresses. If you do not specify a source address, the rule matches any source address. |
source-isp |
Specify an address object to match source addresses. If you do not specify a source address, the rule matches any source address. |
Example
FortiADC-docs # config link-load-balance flow-policy
FortiADC-docs (flow-policy) # config rule
FortiADC-docs (rule) # edit ISP-1
Add new entry 'ISP-1' for node 634
FortiADC-docs (ISP-1) # get
in-interface :
source-type : address
source-address :
destination-type : address
destination-address :
service-type : service
service :
schedule :
group-type : link-group
link-group :
FortiADC-docs (ISP-1) # set in-interface port2
FortiADC-docs (ISP-1) # set source-type addrgrp
FortiADC-docs (ISP-1) # set source-addrgrp LAN
FortiADC-docs (ISP-1) # set destination-type addrgrp
FortiADC-docs (ISP-1) # set destination-addrgrp WAN
FortiADC-docs (ISP-1) # set service-type servicegrp
FortiADC-docs (ISP-1) # set servicegrp Web
FortiADC-docs (ISP-1) # set link-group ISP1
FortiADC-docs (ISP-1) # end
FortiADC-docs (flow-policy) # end