Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
kubimike
New Contributor III

Love the product . Found a huge headache

If you don't create your SDWAN interfaces upfront you have to un-associate the interfaces with every policy to do so. This is a major PITA and wasn't an problem on Sonicwall. Time to step up the FG game here and make a wizard or utility or amend the OS to allow this to happen. This is very frustrating. Does anyone have any clever ideas? I was going to download the config edit it and re-upload it. However that sounds like I might open a can of worms. I called support, no known work-arounds. 

1 Solution
Dave_Hall
Honored Contributor

Any "free/unused" interface can be added to the the SD-WAN (virtual-wan-link) interface - It's mostly to act as a placeholder for revising the firewall policy section. 

 

Any static route setting should still be retained after placing a WAN interface into the SD_WAN, though I would try some testing on your part. 

 

Shame you are not on site, if all possible I would set up a backup connection to a free port on the fgt in the event that you do lose connection to it, at least someone on site could swap cables/ports.  (Just make sure the authorized admin port settings are also set up on the backup wan interface. And perhaps you may want to test that connection first.)

 

 

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

View solution in original post

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
9 REPLIES 9
Dave_Hall
Honored Contributor

Personally, in a quick pinch (though not advisable), I likely do the same if there is like a lot of firewall policies.  Though I would add one of your WAN interfaces to the SD-WAN first then edit a copy of that config:

 

- In the firewall policy section, replace  "<wan interface name>" with  "virtual-wan-link".

- Then add the other (WAN) interface(s) to the config system virtual-wan-link section. - Save the revised config (new copy) and load that into the fgt.  Use the CLI to check for any errors : diagnose debug config-error-log read

 

And example of the SD-WAN section may look like in the CLI:

 

config system virtual-wan-link     set status enable     set load-balance-mode measured-volume-based     config members         edit 1             set interface "wan1"             set volume-ratio 60         next         edit 2             set interface "wan2"             set volume-ratio 40         next         next     end

And an example (edited) firewall policy:

 

config firewall policy     edit 11         set name "Access-appoved-DNS"         set srcintf "internal_net"

        set dstintf "virtual-wan-link"

        set srcaddr "All_Internal"

        set dstaddr "approved-dns"         set service "DNS"         set action accept     next end

Again, the above is not recommended nor advised.

 

kubimike wrote:

[...]I was going to download the config edit it and re-upload it. However that sounds like I might open a can of worms. I called support, no known work-arounds. 

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
kubimike
New Contributor III

Thanks, both of my WAN interfaces are in use. I need to do this at about 9 sites remotely. If I remove policies IE (static routes) I won't be able to get to these devices anymore . This is a tricky one . 

lobstercreed

Making major config changes via code edit/upload/reboot is nerve-wracking, but we have done it multiple times.  You could use a diff tool like WinMerge to compare the result and give yourself some extra confidence that you didn't change anything wrong.  Obviously find and replace is your friend when it comes to finding all the right things to change.  All that said..doing it without the ability to at least go on-site quickly if needed....eesh...

emnoc
Esteemed Contributor III

Quick tip

 

Always deploy a single SDWAN setup even if from day one you have no need for multilink NAT members. A few sml steps now, saves you from a hughe headache later.

 

Ken Felix

 

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
kubimike
New Contributor III

ha yeah Im a new customer just learned that after doing a complete rollout!

Dave_Hall
Honored Contributor

Any "free/unused" interface can be added to the the SD-WAN (virtual-wan-link) interface - It's mostly to act as a placeholder for revising the firewall policy section. 

 

Any static route setting should still be retained after placing a WAN interface into the SD_WAN, though I would try some testing on your part. 

 

Shame you are not on site, if all possible I would set up a backup connection to a free port on the fgt in the event that you do lose connection to it, at least someone on site could swap cables/ports.  (Just make sure the authorized admin port settings are also set up on the backup wan interface. And perhaps you may want to test that connection first.)

 

 

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
kubimike
New Contributor III

Hi Dave, I plan on running more wires to my internet switches temporarily moving everything to different ports. I can then remove WAN1 and WAN2 from all the policies etc and do what I need to do. Yeah I will need someone to put cables for me. I was hoping someone at Fortinet would see this and add the feature to the OS. Seems like a big oversight. One lesson learned as @Emnoc pointed out is start with SDWan first. 

Dave_Hall
Honored Contributor

Yeah, I myself has been tasked to passively migrate about 35 fgt devices from using zone (load balancing) scheme to using the SD-WAN. 

 

A word of caution though, at least on the 5.4 firmwares is SSL VPNs are not supported on SD-WAN.

 

kubimike wrote:

One lesson learned as @Emnoc pointed out is start with SDWan first. 

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
kubimike
New Contributor III

Thanks Im on 6.0.4

Labels
Top Kudoed Authors