Fortinet black logo
7.0.0

Viewing the FortiGate routing table

Viewing the FortiGate routing table

After some time, routes are propagated between the branch device and the headquarter device, and then installed to the FortiGate routing table.

To view the FortiGate routing table:
get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
    O - OSPF, IA - OSPF inter area
    N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
    E1 - OSPF external type 1, E2 - OSPF external type 2
    i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
    * - candidate default
 
Routing table for VRF=0
B     10.0.0.0/24 [200/0] via 10.10.10.1 (recursive via WAN1-VPN tunnel 203.0.113.1), 00:00:08
[200/0] via 10.10.11.1 (recursive via WAN2-VPN tunnel 198.51.100.1), 00:00:08
C     10.0.1.0/24 is directly connected, port4
B     10.1.0.0/24 [200/0] via 10.10.10.1 (recursive via WAN1-VPN tunnel 203.0.113.1), 00:00:08
[200/0] via 10.10.11.1 (recursive via WAN2-VPN tunnel 198.51.100.1), 00:00:08
C     10.10.10.0/24 is directly connected, WAN1-VPN
S     10.10.10.1/32 [15/0] via WAN1-VPN tunnel 203.0.113.1, [1/0]
C     10.10.10.2/32 is directly connected, WAN1-VPN
C     10.10.11.0/24 is directly connected, WAN2-VPN
S     10.10.11.1/32 [15/0] via WAN2-VPN tunnel 198.51.100.1, [1/0]
C     10.10.11.2/32 is directly connected, WAN2-VPN
C     198.51.100.0/24 is directly connected, port3
C     203.0.113.0/24 is directly connected, port2

Viewing the FortiGate routing table

After some time, routes are propagated between the branch device and the headquarter device, and then installed to the FortiGate routing table.

To view the FortiGate routing table:
get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
    O - OSPF, IA - OSPF inter area
    N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
    E1 - OSPF external type 1, E2 - OSPF external type 2
    i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
    * - candidate default
 
Routing table for VRF=0
B     10.0.0.0/24 [200/0] via 10.10.10.1 (recursive via WAN1-VPN tunnel 203.0.113.1), 00:00:08
[200/0] via 10.10.11.1 (recursive via WAN2-VPN tunnel 198.51.100.1), 00:00:08
C     10.0.1.0/24 is directly connected, port4
B     10.1.0.0/24 [200/0] via 10.10.10.1 (recursive via WAN1-VPN tunnel 203.0.113.1), 00:00:08
[200/0] via 10.10.11.1 (recursive via WAN2-VPN tunnel 198.51.100.1), 00:00:08
C     10.10.10.0/24 is directly connected, WAN1-VPN
S     10.10.10.1/32 [15/0] via WAN1-VPN tunnel 203.0.113.1, [1/0]
C     10.10.10.2/32 is directly connected, WAN1-VPN
C     10.10.11.0/24 is directly connected, WAN2-VPN
S     10.10.11.1/32 [15/0] via WAN2-VPN tunnel 198.51.100.1, [1/0]
C     10.10.11.2/32 is directly connected, WAN2-VPN
C     198.51.100.0/24 is directly connected, port3
C     203.0.113.0/24 is directly connected, port2