SDWAN: Chapter-2: Fortinet Secure SD-WAN

Fortinet Secure SD-WAN

FortiGate delivers fast, scalable, and flexible Secure SD-WAN on-premises and in the cloud. Fortinet Secure SD-WAN supports cloud-first, security-sensitive, and global enterprises, as well as the hybrid workforce. Our Secure Networking approach uses one operating system and consolidates SD-WAN, next-generation firewall (NGFW), advanced routing, and ZTNA application gateway functions

Fortinet’s Secure SD-WAN solution relies on well-known FortiOS features which are

·        IPSEC (Overlays)

·        Auto-Discovery VPNs (ADVPNs)

·        Advanced Routing (BGP)

·        Link Monitoring (Estimated Bandwidth)

·        ISDB Database

·        Traffic Shaping (QOS)

·        Load Balancing

·        UTM Profiles (Web Filter, IPS, AV, etc)

The administrator can then combine these features and set rules that define how FortiGate steers traffic across the WAN based on multiple factors, such as the protocol, service, or application identified for the traffic, and the quality of the links. Note that SD-WAN controls egress traffic, not ingress traffic. This means that the return traffic may use a different link from the one SD-WAN chose for egress. Below are the benefits of Fortinet’s Secure SDWAN

·        Effective WAN usage

·        Use of Hybrid WAN (ILL and MPLS)

·        Improved application performance through best links using performance SLA

·        Use of AD-VPN (Fortinet Proprietary) for direct communication between 2 branches using IPSEC Tunnels.

·        Less Load on Hub using ADVPN and reduced latency for spoke communication

·        Potential Use of FortiManager (FMG) for Zero Touch Deployment (ZTP) and rest of the security Fabric to create a secure SD-Branch Solution

·        Traffic Inspection using FGT IPS engine and application signature provided by FortiGuard for application identification.

Below diagram shows the Architecture components of SD-WAN.


Fortinet Secure SD-WAN Common Use Cases

·        Direct Internet Access (DIA) or Most Commonly Known as Local Internet Breakout. This is achieved where site as multiple internet links and traffic can is load balanced across Multiple Links. In below example wan2 and LTE will be used simultaneously to access zoom and Office 365

 

 

·        Branch to Data Center Connectivity using IPSEC/Overlay tunnels. This leverage multiple types of WAN connections available at branch and Hub locations so branch access the applications behind the datacenter.

·        Branch to Branch Communication using AD-VPN (Auto Discovery) VPNs. This is use case where enterprise branches would like to communicate with each for other for variety of the applications.


·        Remote Internet Breakout (RIA): This is the use case for the enterprise where branch does not have any local internet breakout and relies on Data center’s  leased lines for Internet access.

·        Dual Hub (Active-Active): This is the Use case Branch connects over IPSEC Tunnels with 2 Active Hubs with different applications.


·        Multi-Region Hub:  Each region has its own SD-WAN topology, which can be single or dual hub. ADVPN shortcuts can be established between devices in each region, but inter-region traffic must always flow through regional hubs.



Fortinet Secure SD-WAN Fundamental

Let’s start with SD-WAN deep dive by understanding SD-WAN fundamentals that is an essential part of any Fortinet SD-WAN enterprise solution. By demonstrating competence in Fortinet SD-WAN fundamentals, you should be able to understand the basics of SD- WAN which eventually will build basics of enterprise SD-WAN.

Below are the Fundamentals or building blocks of the Fortinet’s secure SD-WAN

·        SDWAN Members

·        SDWAN Zones

·        Performance SLA

·        SD-WAN rules

·        SD-WAN routing (Static/Dynamic)

·        Firewall policies.

SD-WAN Members: Members or also known as underlay links are existing physical or logical FortiOS interfaces that you select to be part of SD-WAN. The interfaces are then used to steer traffic based on the SD-WAN rules configured. The Members can be of below types in any general SD-WAN enterprise solution

                            i.          MPLS

                           ii.          ILL

                          iii.          Broadband/PPOE

                          iv.          LTE

                           v.          VLAN

SD-WAN Zones: Zones are logical groupings of interfaces. When SD-WAN member is configured, a zone must be assigned to it. The goal with SD-WAN zones is to reference them in the configuration instead of individual members to optimize the configuration by avoiding duplicate settings, and to achieve network segmentation. When set, the Gateway setting is used as the next hop to forward traffic through the member. There is one default zone available on FGT firewall and test of the zones will be created as per the requirement

·        virtual-wan-link


Performance SLA: Once SD-WAN zones and members are created Performance SLAs are used to monitor the health of SD-WAN members. FortiGate performance SLAs monitor the state of each member whether it is alive or dead and measures the member

·        packet loss

·        latency

·        jitter.

SD-WAN then uses the member health information to make traffic steering decisions based on the configured SD-WAN rules. For example, you can instruct FortiGate to steer internet traffic to a member, provided the member is alive and its latency doesn’t exceed a given threshold. Performance SLAs will also detect situations where the interface is physically up, but FortiGate is unable to reach the desired destination and flags the corresponding link as dead.



SD-WAN Rules: Once zones and Performance SLAs are configured, the traffic is steered using SDWAN Rules. SDWAN rules are also used to prefer the Zone/member in the policy. SD-WAN rules are evaluated in the same way as firewall policies i.e from top to bottom, using the first match. However, unlike firewall policies, they are used to steer traffic, not to allow traffic. When SD-WAN rules are used, corresponding firewall policies are configured to allow the SD-WAN traffic.

There is an implicit SD-WAN rule created by default. If none of the user-defined SD-WAN rules are matched, then the implicit rule is used. By default, the implicit rule load balances the traffic across all available SD-WAN members.


While creating an SD-WAN rules there are 4 Interface selection strategies available out of which any one can be chosen

·        Manual: Members are assigned manually.

·        Best Quality: Member with Best performance (based on SLA targets) is selected.

·        Lowest Cost: In case of Tie, member with lowest cost SLA is selected.

·        Maximize Bandwidth SLA: Traffic is load balanced.

 


SDWAN Routing: SD-WAN rules define the traffic steering policies in SD-WAN. However, traffic won’t be forwarded to an SD- WAN member unless there is a valid route that matches the destination address of the traffic through the SD- WAN member.

Static or Dynamic routing can be used in the SD-WAN. In large Enterprise, SD-WAN is offered with BGP routing where Hub works as route reflector and receives all routes from connected spoke location.

Static: Static SDWAN routing is mostly used for local breakout using the SD-WAN zone.

BGP: iBGP is mostly use in full fledged SD-WAN solution where bgp over each overlay approach is use.






Firewall Policies: A valid firewall policy is also required to allow the traffic steered by SD-WAN rules. SD-WAN policies are configured in the same manner any other policies are configured except zones are used in incoming or outgoing interfaces.



In Next Blog, we will look at the overlay concept in more details to understand how overlays are created on and how personas (Hub/Spoke) are decided for the FortiGate. Till Then, Kindly go through the blog and comment in case of any query.

Comments

Popular posts from this blog

SDWAN:Chapter-3: SDWAN Overlays & ADVPNs

Introduction to Fortinet Firewall