Active-passive WAN optimization configuration example
Please ensure that the Prerequisites are met before proceeding with the configuration example. |
See Active-passive configurations for conceptual information.
This example configuration includes a client-side FortiGate unit called Client-Fgt with a WAN IP address of 172.30.120.1. This unit is in front of a network with IP address 172.20.120.0. The server-side FortiGate unit is called Server-Fgt and has a WAN IP address of 192.168.20.1. This unit is in front of a web server network with IP address 192.168.10.0.
General configuration steps
This section breaks down the configuration for this example into smaller procedures:
-
Configure the client-side FortiGate unit:
-
Add peers.
-
Add a WAN optimization profile to optimize CIFS, FTP, and HTTP traffic.
-
Add an active WAN optimization firewall policy.
-
-
Configure the server-side FortiGate unit:
-
Add peers.
-
Add a passive WAN optimization firewall policy.
-
Add a WAN optimization proxy policy.
-
Configuring active-passive WAN optimization from the GUI
Use the following steps to configure the example configuration from the GUI.
To configure the client-side FortiGate unit:
-
Go to WAN Opt. & Cache > Peers and change the Host ID of the client-side FortiGate unit:
-
Click Change. The Host ID pane opens.
-
Enter a new Host ID:
Host ID Client-Fgt -
Click OK.
-
-
Create the server-side FortiGate unit peer:
-
Select Create New. The New WAN Optimization Peer opens.
-
Configure the following settings:
Peer Host ID Server-Fgt IP address 192.168.20.1 -
Click OK.
-
-
Go to WAN Opt & Cache > Profiles to add a WAN optimization profile to optimize CIFS, HTTP, and FTP traffic:
-
Select Create New.
-
Enter the profile name:
Name Custom-wan-opt-pro -
In the Protocol Options section:
-
Edit CIFS.
-
Set Status to Enable.
-
Click Apply.
-
Repeat these steps to edit and enable FTP and HTTP.
-
-
Click OK.
-
-
Go to Policy & Objects > Firewall Policy to add an active WAN optimization firewall policy:
-
Click Create New.
-
Enter a Name and configure the following settings:
Incoming Interface port2 Outgoing Interface port3 Source all Destination all Schedule always Service HTTP
FTP
SMB
Action ACCEPT -
Set Inspection Mode to Proxy-based.
-
Enable WAN optimization and configure the following settings:
WAN Optimization Active Profile Custom-wan-opt-pro -
Click OK.
-
To configure the server-side FortiGate unit:
-
Go to WAN Opt. & Cache > Peers and change the Host ID of the server-side FortiGate unit:
-
Click Change. The Host ID pane opens.
-
Enter a new Host ID:
Host ID Server-Fgt -
Click OK.
-
-
Create the client-side FortiGate unit peer:
-
Select Create New. The New WAN Optimization Peer opens.
-
Configure the following settings:
Peer Host ID Client-Fgt IP address 172.30.120.1 -
Click OK.
-
-
Go to Policy & Objects > Firewall Policy to add a passive WAN optimization firewall policy:
-
Click Create New.
-
Enter a Name and configure the following settings:
Incoming Interface port4 Outgoing Interface port5 Source all Destination all Schedule always Service ALL
Action ACCEPT -
Set Inspection Mode to Proxy-based.
-
Enable WAN Optimization and configure the following settings:
WAN Optimization Passive Passive Option Default -
Click OK.
-
-
Add a WAN optimization proxy policy from the CLI:
config firewall proxy-policy edit 0 set proxy wanopt set dstintf port5 set srcaddr all set dstaddr all set action accept set schedule always set service ALL next end
Configuring basic active-passive WAN optimization from the CLI
Use the following steps to configure the example configuration from the CLI.
To configure the client-side FortiGate unit:
-
Change the Host ID of the client-side FortiGate:
config wanopt settings set host-id Client-Fgt end
-
Add the Host ID of the server-side FortiGate:
config wanopt peer edit Server-Fgt set ip 192.168.20.1 next end
-
Add a WAN optimization profile to optimize CIFS, HTTP, and FTP traffic:
config wanopt profile edit Custom-wan-opt-pro config cifs set status enable end config http set status enable end config ftp set status enable end next end
-
Add an active WAN optimization firewall policy:
config firewall policy edit 0 set srcintf port2 set dstintf port3 set srcaddr all set dstaddr all set action accept set service HTTP FTP SMB set schedule always set inspection-mode proxy set wanopt enable set wanopt-detection active set wanopt-profile Custom-wan-opt-pro next end
To configure the server-side FortiGate unit:
-
Change the Host ID of the server-side FortiGate:
config wanopt settings set host-id Server-Fgt end
-
Add the Host ID of the client-side FortiGate:
config wanopt peer edit Client-Fgt set ip 172.30.120.1 next end
-
Add a passive WAN optimization firewall policy:
config firewall policy edit 0 set srcintf port4 set dstintf port5 set srcaddr all set dstaddr all set action accept set service ALL set schedule always set inspection-mode proxy set wanopt enable set wanopt-detection passive set wanopt-passive-opt default next end
-
Add a WAN optimization proxy policy:
config firewall proxy-policy edit 0 set proxy wanopt set dstintf port5 set srcaddr all set dstaddr all set action accept set schedule always set service ALL next end