FortiManager Device Configuration Guide
FortiManager Device Configuration Guide
Branch-TEMP ........................................................................................................................................44
DC Template..........................................................................................................................................48
Assign SD-WAN Template .........................................................................................................................49
Update SD-WAN Zone in Policy. ...............................................................................................................49
Update device SD-WAN and Policy package. ............................................................................................50
Add default route to SD-WAN interface. ..................................................................................................51
Expected Output: ..........................................................................................................................................52
Inter DC Communication..............................................................................................................................53
Create Overlay between DC......................................................................................................................53
Update DC SD-WAN Template ..................................................................................................................54
Create Normalized interface .................................................................................................................54
Lab Introduction
This document describes Secure SD-WAN hands-on lab.
The lab has to be completed during the day of training is organized as this instance are running
on the cloud will automatically shut down within 24 hrs. Although we will be doing our best to
guide you through the caveats, this lab guide should NOT be seen as a “step-by-step guide”. It is
assumed that you have a prior knowledge about FortiManager, FortiGate and Fortinet Secure
SD-WAN Solution.
The main objective of the lab to help understand several advance configuration and its
requirement which can be leveraged during a field deployment.
Dual Hub and Dual Branches (with ADVPN, DIA and RIA).
IP and access detail:
OOB MPLS INET LAN user password
P4: P1:
P10: P5:
DC1_FGT [Link]/24 [Link]/24 admin fortinet
[Link] [Link]/24
GW: [Link] GW: [Link]
P4: P1:
P10:
DC2_FGT [Link]/24 [Link]/24 [Link]/24 admin fortinet
[Link]
GW: [Link] GW: [Link]
P4:
P10: P1: [Link]/30 vl_lan:
Branch1_FGT [Link]/30 admin fortinet
[Link] GW: [Link] [Link]/24
GW: [Link]
P4:
P1:
P10: [Link]/30 vl_lan:
Branch2_FGT [Link]/30 admin fortinet
[Link] GW: [Link]/24
GW: [Link]
[Link]
P1:
FMG admin fortinet
[Link]
Create ADOM
Create ADOM (LAB64) for FOS 6.4 Type and enable Central Management for VPN, FortiAP, SD-WAN and
FortiSwitch.
Add Device
All FortiGate are connected to the FortiManager through out of band (OOB) interfaces. Management
Interface (Port10) IP is preassigned on all FortiGate devices. Using IP and access Detail table, add all
FortiGate devices to FortiManager (Newly created ADOM) for Centralized Management and Analytics.
Note : Do not import Firewall Policy as we will create one required for the LAB.
NB: Note you might get some error for DC1 and DC2, however refresh the page and it will be added.
FortiGate > Security Fabric > Fabric Connectors > Other Fortinet Products > FortiManager.
Expected Output:
Create two (2) separate device Group and assign FortiGate to respective device Group.
Device Manager > Device Group > Device Group > Create New Group
Think why we are doing this!!
Expected Output:
Create and Assign Provisioning Template
Provisioning template are used to configure common parameters which will be used across all the
devices in the infrastructure. Configuration like DNS, NTP, Admin Setting, SNMP, log Settings and more
can be configured and pushed across multiple device. We would use only DNS, Admin Settings and Log
setting for this LAB purpose.
Select LAB_System-TEMP and edit. Click Toggle Widgets and check DNS, Admin Settings and Log
settings as highlighted in snapshot. Do not forget to click “Apply”.
Assign Previsioning Template
System Template > LAB_Syatem-TEMP (select) > Assign Devices > Select all devices > OK
Install System template to all device through “Install Device Settings (only)”
Click on “Install Preview” and Observe what configuration is pushed to each device. Download for
feature reference if required. And click “Install”
Observe how you can push configuration to ten’s and thousands of devices on a single go.
Normalized interface
A normalized interface defines mapping rules. In mapping rules, interfaces are mapped per-device and/or
per platform. You can have both per-device and per-platform mappings in a normalized interface. This
then can be used in VPN, Policy, and SD-WAN templates. When the normalized interface is used in a
policy, the per-device mappings have higher priority than per-platform mappings.
Policy & Object > Object Configuration > Normalized interface > Create New
Note : “Device Interface Name” has to be exactly same as it is in the device like “port1” or “port4”. It
cannot be “Port1” or “PORT1”
Explore if you encounter any problem while shaving the configuration. Understand why this occurred and
how it can be rectified. Please note this important that you do it correct, this will be referred in many
configuration going ahead.
Expected Output:
Create Overlay
Overlay is created to neutralize all the available path so that it can be used for any traffic. Please note
here we will be using the “VPN Manager” feature available is FortiManager. This enable to automate
IPSec provisioning across multiple devices within minutes. We can use the VPN Management > IPsec
VPN pane to create and monitor full-meshed, star, and dial-up IPsec VPN communities. IPsec VPN
communities are also sometimes called VPN topologies.
While we can create all stated VPN topologies, for the sake of this LAB we will focus on most used
topology which is “Dialup”. Please note going ahead we will all enable ADVPN which allow dynamic spoke
to spoke communication.
Define VPN Communities
Let’s configure “VPN Community” for a set of interconnected gateways. Our FGTs will be interconnected
over two separate underlay networks, so we will create four separate communities: one over the Internet
(OL_INET), another one over MPLS (OL_MPLS) and replicate if for both DC, which will work as Active –
Active like many live deployments.
The next few tables list some of the parameters that we will configure. Any parameters that do not
appear in the tables can be left with their default values. And if there is a parameter listed in the table
that you cannot find on FMG, make sure you check under “Advanced Options”!
VPN Manager >IPsec VPN >VPN Community > Create New > (Don’t forget to disable VPN Zone).
Note : dpd-retrycount and dpd-retryinterval are for faster IPsec convergence and should be considered
on in lab environment. Available under advance options.
Now we will add managed Gateway (devices managed by FMG) to the created VPN community. There are
two types of Gateway role, Hub and Spoke. Please proceed and add Managed gateway based on
following table for the respective VPN Community.
Note : Understand the highlighted parameter and try to understand how it is constructed.
Select respective VPN Community > Create New > Managed Gateway > Change highlighted below.
Note: Going ahead any device added with branch will automatically get this overlay Configuration if
Normalized Interface is mapped properly. Automation.
VPN configuration will get pushed to device only with “Install Policy Package & Device Settings”. So lets
create policy for DC and Branch.
Policy & Object > Policy Package > Select Default and Clone as DC-PP and Branch-PP.
Branch-PP is as following.
Policy & Object > Policy Package > Branch-PP > Create New >
Policy & Object > Policy Package > Branch-PP > Installation Target > Edit > add “Branch”
DC Policy Package
DC-PP is as following
Policy & Object > Policy Package > DC-PP > Create New >
Policy & Object > Policy Package > DC-PP > Installation Target > Edit > add “DC”
Note :
1. Overlay is yet not created in device’s; thus we are using “any” as interface. We would update these
policies once it is created after pushing this policy Package.
2. We are referring Device Group to implement Policy. Any device added to this Group will inherit this
Policy package by default.
Now we would push VPN and security Policies to the DC and Branch devices.
Policy & Object > Policy Package > Install > Install Wizard >
Note : Enable “Create ADOM Revision” and give it a name which will work as a revision point to revert
configuration to this state.
Note : Click “Install Preview” to understand what configuration is being sent to which device. Download it
for future reference.
Observe how Normalized interface are replaced with real interface of the device.
From Branch:
From DC:
Device Manager > Managed Devices > Select Appropriate Device > System : Interface > Select Appropriate
Interface > Edit.
Comments: Bandwidth+Ping+ADVPN
Script details :
edit "OL1_INET_0"
set idle-timeoutinterval 5
next
edit "OL1_MPLS_0"
set idle-timeoutinterval 5
next
edit "OL2_INET_0"
set idle-timeoutinterval 5
next
edit "OL2_MPLS_0"
set idle-timeoutinterval 5
next
end
next
edit "OL1_MPLS_0"
next
edit "OL1_INET_0"
next
edit "OL2_MPLS_0"
next
edit "OL2_INET_0"
next
end
Run Created Script
Device Manager > Script > Selcet “Branch” > Run Script > Select “Branch” > Run Now
Device Manager > Device Group > Install Wizard > Install Device settings only
Let’s validate and push all this configuration to all the device on a single go.
Create Normalized Interface for Overlay.
Now we will create Normalized Interface for the newly created Overlay. This we would refer while
creating SD-WAN template. Do not forget to add “_0” as Mapped Interface Name
Policy & Object > Object creation > Normalized Interface > Create New.
Expected Output:
Branch Device
DC Devices
Device Manager > Device & Group > Managed Devices > Select DC1 > Display Option > Check CLI
Configuration > OK
Device Manager > Device & Group > Managed Devices > Select DC1 > CLI Configuration > vpn > ipsec >
phase1-interface > Edit OL1_MPLS_0 > auto-discovery-sender > ON > OK
Now repeat this for OL1_INET in DC1 and for both OL2_MPLS and OL2_INET for DC2.
Note : Install include configuration for both Policy and Device Setting.
Routing through Provisioning Template
Here we will “CLI Template” to configure Dynamic Routing (iBGP) for communication of Branch_LAN to
DC_LAN and vice versa. In this template we would also use “Meta Field”. So let’s create two Meta first.
Device Manager > Device & Group > Managed Devices > Select respective device > Click Edit >
Enter
Your Your Your Your
Location
wish wish wish wish
(over MAP)
dc-id 1 2
branch-id 1 2
Example below for your reference only.
Note : VPN Manager > Map view > Topology View > Feel free to click different community and observe.
You have already understood concept of Bi-Direction SD-WAN or Self-Healing WAN during presentation.
Let’s implement it now through a “CLI Template”.
Device Manager > Previsioning Template > CLI Template > Create New
edit "SLA_FAIL_MPLS"
config rule
edit 1
next
end
next
edit "SLA_FAIL_INET"
config rule
edit 1
next
end
next
edit "SLA_OK_MPLS"
config rule
edit 1
next
end
next
edit "SLA_OK_INET"
config rule
edit 1
next
end
next
end
edit "OL_MPLS_IN"
config rule
edit 3
set set-tag 2
next
edit 100
set set-tag 1
next
end
next
edit "OL_INET_IN"
config rule
edit 3
set set-tag 2
next
edit 100
set set-tag 1
next
end
next
edit "OL_MPLS_OUT"
config rule
edit 1
next
edit 2
next
edit 100
next
end
next
edit "OL_INET_OUT"
config rule
edit 1
set action deny
next
edit 2
next
edit 100
next
end
next
end
set as 65000
set keepalive-timer 5
set holdtime-timer 15
set scan-time 20
config neighbor-group
edit OL_MPLS
set advertisement-interval 1
next
edit OL_INET
next
end
config neighbor-range
edit 1
next
edit 2
next
end
config network
edit 1
next
end
end
# Overlay stickiness
edit 1
next
edit 2
next
end
Note: How referring “Meta Field” this template would work for both DC.
Device Manager > Previsioning Template > CLI Template > Create New
edit "SLA_FAIL_MPLS"
config rule
edit 1
next
end
next
edit "SLA_OK_INET"
config rule
edit 1
next
end
next
edit "SLA_OK_MPLS"
config rule
edit 1
next
end
next
edit "SLA_FAIL_INET"
config rule
edit 1
end
next
end
# BGP to Hub
set as 65000
set keepalive-timer 5
set holdtime-timer 15
set scan-time 20
config neighbor
edit "[Link]"
next
edit "[Link]"
next
edit "[Link]"
next
edit "[Link]"
next
end
config network
edit 1
next
end
end
Now assign this template to respective devices. Please note “Branch Routing” template can be assigned
to multiple spoke location which would always be a repetitive task during live rollout.
Device Manager > Provisioning Template > CLI Template > Select Branch Routing > Assign to device >
select all Branches > ok
Device Manager > Provisioning Template > CLI Template > Select DC Routing > Assign to device > select
both DC device > ok
Check if DC and Branches is learning iBGP route’s. Let the instructor know from where you are able to
view routes and if there exist any other options.
Expected Output:
DC
Branch
BGP Neighbour
Create Following BGP Neighbours. Note we are specifying BGP peer IP address which is common across
all branches.
Device Manager > SD-WAN > BGP Neighbour > Create New
Health-Check Server
Create the Health-Check servers to be used for Link monitoring. Each Health-Check server can be
configured with two servers. Create Health-check servers for respective DC’s. Lets not create any server
for Internet health check for now. We will use some default feature available while creating Performance
SLA.
Interface Members
Created following interface member that will be referred in SD-WAN rules. Note, while it is ok not to give
gateway addresses in overlay but it is recommended to define underlay gateway address. So for
underlay, per-device mapping should be created.
Device manager > SD-WAN > Interface Member > Create New
Normalized
OL1_INET OL1_MPLS OL2_INET OL2_MPLS
Interface
Cost 1 2 1 2
Per-Device Mapping NO NO NO No
Create underlay Interface based on below screenshot.
Device manager > SD-WAN > Interface Member > Create New
Note : Branch1 simulate a Broadband link which will have a dynamic (Private) IP from the modem, thus
no gateway need to be defined and will update itself from route table.
SD-WAN Template
Finally let’s create SD-WAN templates now. We will create 3 different templates
1. Branch-TEMP
2. DC1-TEMP
3. DC2-TEMP
Branch-TEMP
Let’s begin with Branch-TEMP. Create Zone and Include members as stated in the screenshot.
Device Manager > SD-WAN > SD-WAN Template > Create New > Name “Branch-TEMP” > Interface
Member > Create New > SD-WAN Zone and SD-WAN Member.
Device Manager > SD-WAN > SD-WAN Template > Create New > Name “Branch-TEMP” > Performance
SLA > Create New > DC1 and DC2
Device Manager > SD-WAN > SD-WAN Template > Create New > Name “Branch-TEMP” > Performance
SLA > Edit Default_DNS and Specify highlighted interface only > OK
Create Neighbour based on below screenshot. All required component is available in drop down menu.
Device Manager > SD-WAN > SD-WAN Template > Create New > Name “Branch-TEMP” > Neighbour >
Create New
Create following SD-WAN Rule based on the below table and show let the instructor know that you have
completed.
Application Group(DNS,
Underlay and
BCritical all Salesforce, GoToMeeting, Lowest Cost (SLA) Default_DNS
MPLS Overlay
[Link])
Non- Application
all Manual Underlay NA
BCritical Group(Facebook, Twitter)
Note : Can you change the default mode in Maximize Bandwidth to “bibandwidth” and intimate
instructor.
DC Template
DC template are relatively simpler. As explained using route-tag, SD-WAN rule would select an outgoing
interface to communicate from DC to Branch. So create rules based on following information for both the
DC, name them DC1-TEMP and DC2-TEMP.
DC1 Interface
DC1 SD-WAN Rules (Keep all to default if not mentioned in below table.)
Example output
DC2 Interface
DC2 SD-WAN Rules (Keep all to default if not mentioned in below table.)
Note recently created Zone in SD-WAN Template is automatically created as a Zone object and is ready to
be updated in Firewall Policy. Let’s update the Branch and DC policy package and push both SD-WAN and
Security Policy on a single go.
Note : Most of the time, the newly created zone show up, if in case it doesn’t Go to “Object
Configuration” and search for “zone”. Edit all 4 output and just save it once again.
Branch-PP
DC-PP
Add default route to SD-WAN interface on both the branche devices through GUI and push the config.
Compulsory Test:
1. Login to any branch device and test failover of “BCritical” application. Report to instructor with
your observation.
2. Quickly test ADVPN (ping branch machine to machine) with DC based failover.
Tools: Use “wan_simulator” available on FPOC to induce latency/packet loss/Jitter and generate Internet
traffic.
Expected Output:
BCritical and Non-BCritical failover output from “Secure SD-WAN Monitor”
AD-VPN communication (ping response time decreases and Dynamic interface automatically created
(OLX_INET_0_0)
Inter DC Communication
This is something commonly asked in field. To make this work we would use an additional DC1-DC2
Overlay, eBGP and obviously will have to update the policy.
VPN Manger > IPsec VPN > VPN Community > Create New
Parameter DC
Name DC
VPN Topology Full Meshed
IKE Version 2
IKE SA Proposals AES256/SHA256,
IPSEC SA
Proposals AES256/SHA256,
Network Overlay ON
Network ID 100
VPN Zone OFF
dpd-retrycount 2
dpd-retryinterval 3
VPN Manger > IPsec VPN > All VPN Community > Click DC > Create New > Managed Gateway
Note : Not getting “port2” as an option in VPN interface ? Then I Have a hint for you..
Note: VPN config automatically get pushed with Policy Package not with Device Settings (only).
Expected Output:
Note: No need to update any Policy as both Member Interface is now attached to Zone which is already
referred in Policy.
Expected Output:
Login to DC1 with Read-Write access and on the CLI prompt enter the following commands.
config neighbor
edit [Link]
set advertisement-interval 1
next
end
end
Login to DC2 with Read-Write access and on the CLI prompt enter the following commands.
edit [Link]
set advertisement-interval 1
next
end
end
Observe:
Quality of service
Configure
While Fortinet solution different type of Traffic Shaping but what becomes very relevant in case of SD-
WAN deployments is Interface-based traffic shaping profile which allow Percentage based Bandwidth
allocation/reservation.
Let’s try and do a quick configuration for Central Management ie. FortiManager. This is a 3 step process.
Policy & Object > Object Configuration > Firewall Object > Shaping Profile > Create New
Select All(2) and click “Set to Default” to make this the default for all other traffic.
Note: Class ID can be directly created from the Add (+) sign.
Policy & Object > Policy package > Branch-PP >Traffic Shaping Policy > Create new
For example
Remember to Run Script on Branch Group and install all update configuration through Install Policy
Package & Device Settings. Do not forget to review and download the config any time, make this a habit.
Device Manager > Device & Group > Managed Device > Branch > System : Dashboard > Network >
Add Widget > Traffic Shaping (Interface-based)
Create Event handler
Let’s create an email trigger when a link is down. Please note to trigger an email alert you
would need you email server detail to be configured in FortiAnalyzer (FAZ).
Either way “Animesh Saha” would definetly love to hear you have reach here..
The END.