Configuring the SD-WAN to steer traffic between the overlays
Configure the HQ FortiGate to use two overlay tunnels for SD-WAN, steering HTTPS and HTTP traffic through the FGT_AWS_Tun tunnel, and SSH and FTP throguh the AWS_VPG tunnel.
- Add SD-WAN member interfaces
- Configure a route to the remote network
- Configure firewall policies
- Configure a health check
- Configure SD-WAN rules
To add SD-WAN member interfaces:
-
Go to Network > SD-WAN, select the SD-WAN Zones tab, and click Create New > SD-WAN Member.
-
Set Interface to AWS_VPG then click OK.
-
Click Create New > SD-WAN Member again.
-
Set Interface to FGT_AWS_Tun.
-
Set Gateway to 172.16.200.1.
-
Click OK.
To configure a route to the remote network 10.0.2.0/24:
-
Go to Network > Static Routes and click Create New.
-
Set Destination to Subnet and enter the IP address and netmask: 10.0.2.0/255.255.255.0.
-
Set Interface to virtual-wan-link.
-
Click OK.
Individual routes to each tunnel are automatically added to the routing table with the same distance:
To configure firewall policies to allow traffic from the internal subnet to SD-WAN:
-
Go to Policy & Objects > Firewall Policy and click Create New.
-
Configure the following:
Name
ISFW-to-IaaS
Incoming Interface
port3
Outgoing Interface
virtual-wan-link
Source
all
Destination
all
Schedule
always
Service
ALL
Action
ACCEPT
NAT
Enabled
-
Configure the remaining settings as required.
-
Click OK.
Once the firewall policies are configured, the VPN tunnels should come up when there is traffic.
To configure a health check to monitor the status of the tunnels:
As you are accessing the servers on the 10.0.2.0/24 subnet, it is preferable to use the FortiGate port2 interface as the ping server for detection. This ensures that, if the gateway is not reachable in either tunnel, its routes are brought down and traffic continues on the other tunnel.
-
Go to Network > SD-WAN, select the Performance SLAs tab, and click Create New.
-
Configure the following:
Name
ping_AWS_Gateway
Protocol
Ping
Server
10.0.2.10
Participants
Specify
Add AWS_VPG and FGT_AWS_Tun as participants.
-
Click OK.
Health check probes originate from the VPN interface's IP address. This is why the phase2 selectors are configured with Local Address set to all.
To configure SD-WAN rules to steer traffic:
HTTPS and HTTP traffic is steered to the FGT_AWS_Tun tunnel, and SSH and FTP traffic is steered to the AWS_VPG tunnel. The Manual algorithm is used in this example.
-
Go to Network > SD-WAN, select the SD-WAN Rules tab, and click Create New.
-
Configure the following:
Name
http-to-FGT_AWS_Tun
Source Address
all
Address
remote_subnet_10_0_2_0
Protocol
TCP
Port range
80 - 80
Outgoing Interfaces
Manual
Interface preference
FGT_AWS_Tun
-
Click OK.
-
Create other SD-WAN rules as required: