Peers and authentication groups
The client-side and server-side FortiGate units are called WAN optimization peers. The client and server roles relate to how a session is started. Any FortiGate unit configured for WAN optimization can be a client-side and a server-side FortiGate unit at the same time, depending on the direction of the traffic. Client-side FortiGate units initiate WAN optimization sessions and server-side FortiGate units respond to the session requests.
During this process, the WAN optimization peers identify and optionally authenticate each other. The authentication group is optional unless the tunnel is a secure tunnel. You need to add authentication groups to support secure tunneling between WAN optimization peers.
Peer requirements
WAN optimization requires the following configuration on each peer:
-
The peer must have a unique host ID.
-
Unless authentication groups are used, peers authenticate each other using host ID values. Do not leave the local host ID at its default value.
-
The peer must know the host IDs and IP addresses of all of the other peers that it can start WAN optimization tunnels with. This does not apply if you use authentication groups that accept all peers.
-
If a FortiGate unit or VDOM is operating in transparent mode, WAN optimization uses the management IP address as the peer IP address of the FortiGate unit instead of the address of an interface.
-
All peers must have the same local certificate installed on their FortiGate units if the units authenticate by local certificate. Furthermore, system time must be enabled to ensure that SSL/TLS certificate expiry can be validated. Similarly, if the units authenticate by pre-shared key (password), administrators must know the password. The type of authentication is selected in the authentication group. This applies only if you use authentication groups.
Tunnel requests for peer authentication
When a client-side FortiGate unit attempts to start a WAN optimization tunnel with a peer server-side FortiGate unit, the tunnel request includes the following information:
-
The client-side host ID.
-
The name of an authentication group, if included in the rule that initiates the tunnel.
-
The authentication method it specifies (pre-shared key or certificate), if an authentication group is used.
-
The type of tunnel (secure or not).
If the tunnel request does not include an authentication group, authentication will be based on the client-side host ID in the tunnel request.
If the tunnel request includes an authentication group, the authentication will be based on the settings of this group as follows:
-
The server-side FortiGate unit searches its own configuration for the name of the authentication group in the tunnel request. If no match is found, the authentication fails.
-
If a match is found, the server-side FortiGate unit compares the authentication method in the client and server authentication groups. If the methods do not match, the authentication fails.
-
If the authentication methods match, the server-side FortiGate unit tests the peer acceptance settings in its copy of the authentication group.
-
If the Accept peer(s) setting is Any , the authentication is successful.
-
If the Accept peer(s) setting is One, the server-side FortiGate unit compares the client-side host ID in the tunnel request with the peer name in the server-side authentication group. If the names match, authentication is successful. If a match is not found, authentication fails.
-
If the Accept peer(s) setting is Defined Peers Only, the server-side FortiGate unit compares the client-side host ID in the tunnel request with the server-side peer list. If a match is found, authentication is successful. If a match is not found, authentication fails.
-
After a tunnel is established, multiple WAN optimization sessions can start and stop between peers without restarting the tunnel.