. Set Type to Shared. This example shows how route-maps and service rules are selected based on performance SLAs and the member that is currently active. Example Fortigate Port 2 Interface The distance metric is configurable for static routes and OSPF routes, but not for ISP routes. So, the solution was in the prefix list. Take a look to the provider BGP Networks. In this topology, a branch FortiGate has two SD-WAN gateways serving as the primary and secondary gateways. By default, the redistributed default route is with the metric of 10. Default LLB Link Policy routeDefault routes have lower priority than configured routes. Additionally, there are also two static routes: Azure uses the 168.63.129.16 address for various services. ISP-2: <shorted> *> 100.200.100./24 192.168.1.2 0 65100 65301 i <shorted>. Therefore, take caution when you are configuring an interface in DHCP mode, where Retrieve default gateway from server is enabled. This catches all traffic except for the virtual network traffic and sends it to the FortiGate-VM for inspection. Create a Second Virtual NIC for the VM Select Add another route and set Destination to 0.0.0.0/0 and Target to the network interface ID of the private interface. Now we will just insert the needed info. Potential points to check for OP: 1, Make sure the interface has "Retrieve default gateway from server" enabled 2, If there's a different default gateway route already configured for some other interface, keep in mind the distance settings. Policy routing multiple default gateways on Fortigate I have two locations each with their own internet connection and joined by an MPLS. Enable Router > Policy Route, and click OK. Solution 1) Interface configuration. Set Apply Shaper to Per Policy. Select the new route, then select the Routes tab, then select Edit. If the static route list already contains a default route, you can edit it, or delete the route and add a new one. Display policy routes. ISP-2 learn the public IP Range from the FortiGate over ISP-1. This will take precedence over any default static route with a distance of 10. Set VPC to the private subnet and select Yes, Create . When SLAs for ISP1 are not met, it will fail over to the MPLS line. Set Destination to Subnet and leave the destination IP address set to 0.0.0.0/0.0.0.0. Change the display options for HUB1 to make policy routes visible in the GUI. Select Add. Press OK - and Bam! 3. In the web GUI, go to Policy & Objects. Edit the existing High Priority Traffic Shaper. Rule 1 denies the specific subnet, but unless the rest of the IPv4 range is defined afterwards (with implicit allow) then it blocks everything. Go to Network > Policy Routes. First lets create this in the GUI. In the menu on the left, select Networking. The lower priority primary connection will be used when the FortiGate is not sure which default gateway to use for an outbound connection. Having this route in place allows the FortiGate-VM to respond. The Display Options dialog box is displayed. The gateways reside in different datacenters, but have a full mesh network between them. The FortiGate has multiple SD-WAN links and has formed BGP neighbors with both ISPs. I want to setup the sites to failover to the other sites internet connection via the MPLS. <gateway_ip> is the default gateway IP address for this network. Thanks again for the info, tanr. Check Guaranteed Bandwidth and set to 1000 Kb/s. Technical Tip: Policy routes with multiple ISP - Fortinet Community FortiGate FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic. The virtual network is created as well and forces traffic for additional protected networks to pass through the FortiGate-VM. We can check that the route has been created and is the routing table by going to monitor - routing monitor. set default-information-metric 1 <----- It is possible to use metric if needed. Solution The solution is to configure the two default routes with the same distance, but with different priorities, as shown below. You can have two (or more) default static routes, but they must both have the *same* distance, but with different priorities. Mark the HTTPS checkbox under Administrative access > IPv4 and click OK. You can have as many default routes as you want and they have the same distance but varying priorities. Set Traffic Priority to High. In the table, select the policy route. set default-information-originate enable. Do you know if link health monitors will remove policy routes from the routing table, similar to how static routes Go to Network > Interfaces, select port 2, and click Edit. Multiple default routes are present as per the above configuration, where the wan interfaces are not part of the sdwan, the FIB lookup takes place and it is not guaranteed that the traffic is forwarded via the sdwan member configured in the rule. Use the default value of 0 for the priority of the connection you wish to be the primary and a higher priority for the secondary connection. There is also a route out port2 (also the trusted/internal interface) with the VNET prefix as the destination. <port> is the port used for this route. I am leaving the AD at 10 - which is default. route created. Create a new inbound port rule for TCP 8443. The default route 0.0.0.0/0 points to the FortiGate-VM internal IP address. As you can see the FortiGate learn the default Gateway from both ISPs but the Gateway 100.100.100.254 (ISP-1) is the best. In the second-from-left pane, click Display Options. config router static edit 1 set device "wan1" set gateway 10.160..160 next edit 2 set device "wan2" Loading. This article describes how to configure this feature. To create a new default route, go to Network > Static Routes. set default-information-metric-type . I am running a Fortigate 1240b on FortiOS 5.2.3, and when I create a virtual wan link to do ECMP load balancing between multiple ISPs I set a default route for the virtual wan link, but then cannot set another default route for an ISP link that I do not want in the load balance group. Typically, you have only one default route. Select Traffic Shapers. Creating a default route Go to VPC Dashboard > Route Tables and select Create Route Table. That way they both stay in the routing table and the policy route can force you to one or the other interface. The Forums are a place to find answers on a range of Fortinet products from peers and product experts. This provides a route to any additional subnets that may be created. Now I can apply similar rules to the IPSEC neighbours. Set the default gateway: config system route edit <seq_num> set device <port> set gateway <gateway_ip> end where: <seq_num> is an unused routing sequence number starting from 1 to create a new route. Set High-Priority Traffic Guarantee. Please follow the steps to allow HTTPS in FortiGate: Login to FortiGate using your username and password. Select Add inbound port rule. Drag the selected policy route to the desired position. By default, distance for static routes is 10, for ISP is 20, for OSPF is 110, for EBGP is 20, and for IBGP is 200. You could probably use communities at the PE/CPE connected to the branches and manipulate BGP metrics based on the community. ISP1 is used primarily for outbound traffic, and has an SD-WAN service rule using the lowest cost algorithm applied to it. If the SP uses different RD for the VRF towards the hubs it would be possible to have several default routes as the VPNv4 prefixes would be unique when the RD is prepended onto the 0.0.0.0/0 prefix. The network interface is listed, and the inbound port rules are shown. Priority of a route in FortiOS is the equivalent of "cost" on other devices. # config system interface edit "wan" set vdom "root" set mode dhcp Configured as dhcp so default route would be pushed set allowaccess ping fgfm set type physical set role wan set snmp-index 1 next edit "wwan" set vdom "root" The route with the lowest value in the priority field is considered the best route, and it is also the primary route. Go to the Azure portal, and open the settings for the FortiGate VM. To display policy routes: In the tree menu under Managed FortiGates, select HUB1. Navigate to network - static routes - and create a new one. Sample Command: In order to change the metric for the default route, you can use the following options (CLI): # config router ospf. Rule 2 uses set le 32 to match the whole IPv4 range (that isn't previously blocked by rule 1). FortiGate will add this default route to the routing table with a distance of 5, by default. Create dead gateway detection entries. To move a policy route in the CLI: config router policy move 3 after 1 end Fortinet Community Knowledge Base FortiGate Both the internet and MPLS terminates to an HA pair of Fortigates. The traffic is matching the FIB and uses and outbound interface accordingly. Check Max Bandwidth and set to 1048576 Kb/s.