Configuring LLB persistence rules
Persistence rules identify traffic that should be ignored by load balancing rules and instead be forwarded to the same gateway each time the traffic traverses the FortiADC appliance.
You should use persistence rules with applications that use a secure connection. Such applications drop connections when the server detects a change in a client’s source IP address.
Persistence rules used in link load balancing describes the types of persistence rules you can configure.
Persistence | Description |
---|---|
Source-Destination Pair |
Packets with the same source IP address and destination IP address take same outgoing gateway. |
Source-Destination Address |
Packets with a source IP address and destination IP address that belong to the same subnet take the same outgoing gateway. |
Source Address |
Packets with a source IP address that belongs to the same subnet take the same outgoing gateway. Source address based persistence consumes a significant amount of memory, as calculated using the following formula per VS: (max persistence entry size) x (size per entry of the table) x (content routing or pool count) For example: If the max persistence entry size is 262144 (default), the per entry of the table is 44 bytes, and there is no content routing. 262144 x 44 = 11534336 bytes (which is ≈11MB) |
Destination Address |
Packets with a destination IP address that belongs to the same subnet take same outgoing gateway. |
Before you begin:
- You must have an awareness of the types of outbound traffic from your network. Persistence rules are useful for traffic that requires an established session, such as secure connections (HTTPS and SSH, for example).
- You must have knowledge of the source and/or destination subnets to which the persistence rules should apply.
- You must have Read-Write permission for Link Load Balance settings.
You can use persistence rules in link groups but not virtual tunnels. |
To configure a persistence rule:
- Go to Link Load Balance > Link Group.
- Click the Persistence tab.
- Click Create New to display the configuration editor.
- Complete the configuration as described in Persistence rule configuration.
- Save the configuration.
Type | Guidelines |
---|---|
Name |
Configuration name. Valid characters are Note: After you initially save the configuration, you cannot edit the name. |
Type |
Select one of the persistence types, as described below. |
Source-Destination Pair |
|
Timeout |
The default is 300 seconds. |
Source-Destination Address |
|
Timeout |
The default is 300 seconds. |
Source IPv4 Netmask Bits |
Number of bits in a subnet mask to specify a network segment that should following the persistence rule. |
Destination IPv4 Netmask Bits |
Number of bits in a subnet mask to specify a network segment that should following the persistence rule. For example, if you set this to 24, and the system chooses a particular gateway router for destination IP 192.168.1.100, the system will select that same gateway for traffic to all destination IPs in subnet 192.168.1.0/24. |
Source Address |
|
Timeout |
The default is 300 seconds. |
Source IPv4 Netmask Bits |
Number of bits in a subnet mask to specify a network segment that should following the persistence rule. The default is 32, but you can set it to any value between 1 and 32. For example, if you set this to 24, and the system chooses a particular gateway router for client IP 192.168.1.100, the system will select that same gateway for subsequent client requests when the subsequent client belongs to subnet 192.168.1.0/24. |
Destination Address |
|
Timeout |
The default is 300 seconds. |
Destination IPv4 Netmask Bits |
Number of bits in a subnet mask to specify a network segment that should following the persistence rule. |