ℹ️ Document Conversion Notice: This page was converted from the original file for easier reading. Diagrams/images may appear only in the original PDF below.
Document preview
File info: application/pdf · 27 pages · 2.46MB

FortiGate SD-WAN Configuration Guide using IPoE Interface

This guide details the configuration of FortiGate for SD-WAN utilizing IPoE (IP over Ethernet) services provided by Japan Network Enabler (JPNE) Co., Ltd. and NTT Communications Corporation. It covers two primary methods: Internet Breakout and Hybrid WAN.

Chapter 1: Introduction

This configuration guide introduces two basic methods for achieving SD-WAN using FortiGate with the "IPoE-based Fixed IP Internet Connection Service" offered by Japan Network Enabler (JPNE) Co., Ltd. and NTT Communications Corporation.

  1. Internet Breakout (Chapter 2): Routes specific high-load traffic, such as Office 365, over the IPv6 line.
  2. Hybrid WAN (Chapter 3): Differentiates between PPPoE/IPoE lines based on usage.

Applying these configurations according to customer requirements enables flexible network operations.

For information on each company's IPoE services, please refer to their official information:

For FortiGate IPoE configuration, please refer to the following links:

1.1. Equipment and OS Version

  • Equipment: FortiGate-60F
  • Version: FortiOS 6.4.4

Adjust interface names and other device-dependent settings according to your FortiGate. Some GUI displays may be split for clarity.

1.2. Reference Materials

The configurations in this guide are based on official Fortinet deployment guides. For more detailed information, please refer to:

Chapter 2: Internet Breakout

2.1. Assumed Topology

The diagram illustrates a remote FortiGate-60F connected via an IPoE line to the internet. Office 365 traffic is routed directly to the internet via the VNE (IPoE) network, while other communications are routed through the central site via an IPsec VPN tunnel.

2.2. Prerequisites

  • The remote site uses one IPoE line for internet connectivity.
  • The remote site and central site are connected via IPsec VPN (refer to APPENDIX #1 for remote site IPsec configuration examples).
  • Basic FortiGate configuration, IPoE connection setup, and proper cabling are completed.
  • Default routes are configured on both the IPoE and IPsec interfaces, with the IPoE interface having a lower priority setting to ensure the IPsec interface is preferred.

2.3. Creating Breakout Policy

Navigate to Policy & Object > Firewall Policy and click + Create New.

Policy Configuration:

  • Name: breakout (or a suitable name)
  • Incoming Interface: vne.root (IPoE)
  • Outgoing Interface: internal
  • Destination: Click +, select Internet Services from the right pane, and choose the applications to break out (e.g., Microsoft-Microsoft Update, Microsoft-Office365, Microsoft-Office365-Published.Allow, Microsoft-Office365-Published.Optimize).
  • Logging Options: Enable logging and select All Sessions.

Click OK to create the policy.

To prioritize the 'breakout' policy, drag and drop it to the top of the policy list.

This configuration ensures that Office 365 and Microsoft update traffic is handled by the 'breakout' policy.

2.4. Configuring Breakout Routing

Navigate to Network > Static Routes and create static routes for each application to be broken out.

  • Internet Service: Microsoft-Microsoft.Update
  • Interface: vne.root

Repeat this process for Microsoft-Office365, Microsoft-Office365-Allow, and Microsoft-Office365-Optimize.

Note: This guide sets default routes for vne.root and the IPsec interface. Adjust according to your actual environment.

2.5. Changing Static Route Priority

To ensure the IPsec interface is prioritized, modify the priority of the IPoE interface's default route.

Navigate to Network > Static Routes. Select the default route for the vne-root interface (0.0.0.0/0 vne.root) and click Edit.

Click Advanced Settings and change the Priority value to 1. (Lower priority values indicate higher priority; the default is 0).

Click OK to save the changes.

2.6. Verification Method

Verify the breakout operation by navigating to Log & Report > Forward Traffic. Ensure that Office 365 related traffic shows the policy ID 'breakout' and the destination interface as 'vne.root'.

Chapter 3: SD-WAN Hybrid WAN

3.1. Assumed Topology

The diagram shows a FortiGate-60F configured with both IPoE and PPPoE lines for load balancing and differentiated traffic routing.

3.2. Prerequisites

  • The configuration uses a FortiGate-60F connected to the internet via both IPoE and PPPoE lines.
  • Basic FortiGate configuration, IPoE, and PPPoE connection setup, and proper cabling are completed.
  • Microsoft Update and Office 365 traffic primarily use the IPoE line, while other traffic utilizes both IPoE and PPPoE lines through load balancing.
  • The PPPoE interface is named 'pppoe'.

3.3. Reference Materials

3.4. Creating SD-WAN Interface

Navigate to Network > SD-WAN Zone and click on virtual-wan-link.

Click + Create New to add SD-WAN members.

Edit the SD-WAN member, select vne-root for the interface, and click OK.

Similarly, create a new member and add the PPPoE interface (pppoe). The virtual-wan-link (SD-WAN) interface will then display vne.root and pppoe as its members.

3.5. Creating Priority Interface for Specific Applications

Create an interface that prioritizes application traffic identified by ISDB. In this guide, the vne-root interface is used for Office 365 and Microsoft Update traffic.

Navigate to Network > SD-WAN Rules and click + Create New.

SD-WAN Rule Configuration:

  • Name: o365 (or any desired name)
  • Source Address: all (applies to all users in this guide)
  • Internet Services: Microsoft-Microsoft_Update, Microsoft-Office365, Microsoft-Office365-Allow, Microsoft-Office365-Optimize
  • Outgoing Interface: Manual
  • Preferred Interface: vne-root

Click OK to create the SD-WAN rule.

Traffic not matching the created rule will be handled by an implicit rule.

3.6. Creating Default Route

Create a static route that sets the SD-WAN interface as the default route (Destination 0.0.0.0/0.0.0.0).

Navigate to Network > Static Routes and click + Create New.

Select SD-WAN for the Interface and click OK.

3.7. Creating Policy

Navigate to Policy & Object > Firewall Policy and click + Create New.

New Policy Configuration:

  • Name: Internal to sd-wan (or any desired name)
  • Incoming Interface: internal
  • Outgoing Interface: virtual-wan-link
  • Source: all
  • Destination: all
  • Service: ALL
  • Logging Options: Enable logging and select All Sessions.

Click OK to complete the policy creation.

Note: This guide configures all traffic to use the SD-WAN interface. Adjust source, destination, and security profiles as needed.

The created policy will appear in the firewall policy list.

3.8. Changing MSS Value

Due to the addition of IPv6 headers, the TCP MSS (Maximum Segment Size) value for sessions passing through vne.root needs to be adjusted.

TCP MSS values can be configured in the firewall policy. Open the CLI console by clicking the >_ icon in the upper right of the GUI.

Execute the following commands in the CLI console:

config firewall policy
    edit 1
        set tcp-mss-sender 1420
        set tcp-mss-receiver 1420
    end

3.9. Verification Method

Generate traffic (e.g., Office 365 or other traffic) from a terminal device. Navigate to Network > SD-WAN Zone and confirm that traffic volumes are being counted for each SD-WAN member interface (download and upload).

Navigate to Log & Report > Forward Traffic and verify the following:

  • Office 365 traffic is primarily sent via vne-root.
  • Other traffic is sent via both vne-root and pppoe interfaces.

Appendix #1: IPsec VPN Configuration for Remote/Central Sites

This appendix explains the IPsec VPN configuration for remote and central sites when performing the "Internet Breakout" setup described in Chapter 2.

1. Assumed Topology

The diagram illustrates the IPsec VPN configuration between a remote FortiGate-60F and a central FortiGate.

2. Reference Materials

3. Prerequisites

  • No network addresses are configured for the IPsec tunnel.
  • Key exchange is configured in Aggressive mode.
  • Authentication method is set to Pre-shared Key.
  • Configuration uses the VPN wizard's Custom option.
  • Default settings are applied for unspecified configurations.

4. IPsec VPN Configuration

Navigate to VPN > IPsec Wizard and run the VPN creation wizard.

  • Name: ipsec (or any desired name)
  • Template Type: Custom. Click Next. Selecting Custom exits the wizard and transitions to the detailed configuration screen. Configuration is required for both the central and remote sides.

Network Settings:

  • Remote Gateway IP Address: Enter the WAN IP address of the central site (e.g., 10.130.186.56).
  • Local Gateway IP Address: Enter the IP address of the vne.root interface on the remote site.
  • Interface:
    • Remote Site: Select vne.root.
    • Central Site: Select WAN1.

Authentication:

  • Method: Pre-shared Key
  • Pre-shared Key: Enter any desired string.

IKE:

  • Mode: Aggressive
  • Accept Type: Any Peer ID

Phase 2 Selector:

  • Local Address: Enter 192.168.1.0/255.255.255.0.

4.3. IPsec Routing Configuration

Navigate to Network > Static Routes. Configure the IPsec tunnel as the default route (Destination 0.0.0.0/0.0.0.0) and click OK.

Similarly, configure a static route on the central site's FortiGate so that traffic destined for the central FortiGate (Destination 10.130.186.56/255.255.255.255) goes via vne.root. (On the central FortiGate, set the IP address of vne.root as the destination and WAN1 as the interface).

After configuration, the routing settings will appear as shown.

5. IPsec Policy Configuration

Create IPsec Policy: Navigate to Policy & Object > Firewall Policy and click + Create New.

IPsec Policy Editing:

  • Name: internal-to-ipsec (or any desired name)
  • Incoming Interface: internal
  • Outgoing Interface: ipsec
  • NAT: Disable

Click OK to complete the policy creation.

6. Verification Method

After completing the settings on both the remote and central sides, generate traffic from a device within the remote LAN to the central site. Verify that the IPsec status becomes active.

You can check the IPsec status on the FortiGate dashboard. Navigate to Dashboard > +. In the Add Widget screen, click IPsec and then Add Widget.

Clicking the newly added IPsec Monitor on the dashboard allows you to view the status of IPsec interfaces.

Revision History

Version Release Date Revision History
1.00 2021.2 Initial Release

Full PDF Document

Loading PDF...
Download PDF

If the inline viewer fails, it will open the original document in compatibility mode automatically. You can also open the file directly.