Fortigate Advpn BGP
Fortigate Advpn BGP
Jose Silva
Network Topology
Table of Contents
1 Introduction .......................................................................................................................................... 2
2 Network Diagram .................................................................................................................................. 2
3 Platform and images ............................................................................................................................. 3
4 IP address space .................................................................................................................................... 3
5 Network Equipment Configuration ....................................................................................................... 3
5.1 “Internet” router ........................................................................................................................... 3
5.2 Datacenter ISP1 router ................................................................................................................. 5
5.3 Datacenter ISP2 router ................................................................................................................. 6
5.4 Datacenter distribution switch ..................................................................................................... 7
5.5 Datacenter firewall ....................................................................................................................... 9
5.6 Copenhagen distribution switch ................................................................................................. 17
5.7 Copenhagen aggregation switch................................................................................................. 18
5.8 Setubal ISP1 router ..................................................................................................................... 20
5.9 Setubal ISP2 router ..................................................................................................................... 21
5.10 Setubal distribution switch ......................................................................................................... 22
5.11 Setubal firewall ........................................................................................................................... 23
5.12 Paris ISP1 router.......................................................................................................................... 31
5.13 Paris ISP2 router.......................................................................................................................... 32
5.14 Paris distribution switch.............................................................................................................. 33
5.15 Paris firewall................................................................................................................................ 34
1 Introduction
This network laboratory tests the connectivity between branch office and a datacenter
using ADVPN on FortiGate firewalls. Also, the connectivity provided to the internet from
services on a DMZ network on the datacenter. All branch sites and the datacenter are provided
with two ISPs for internet access fault tolerance. All accesses to the internet are implemented
through FortiGate’s SD-WAN rules. The branches have configured two ADVPN connection to
each of the ISPs on the datacenter, and the access on these ones are also implemented using
SD-WAN rules.
All routing is done using BGP over the VPN connections between the branches and the
datacenter.
2 Network Diagram
Device Image
Internet Cisco IOU router v15.5.2T
dc-fw01 Fortigate 64b VM v7.0.2 build 0234
stb-fw01 Fortigate 64b VM v7.0.2 build 0234
cph-fw01 Fortigate 64b VM v7.0.2 build 0234
dc-sw90 Cisco IOU switch v15.2d
stb-sw90 Cisco IOU switch v15.2d
cph-sw90 Cisco IOU switch v15.2d
dc-sw00 Cisco IOU switch v15.2d
stb-sw00 Cisco IOU switch v15.2d
cph-sw00 Cisco IOU switch v15.2d
4 IP address space
The following table represents the IP address space used on the branches and on the
datacenter.
Datacenter 10.2.0.0./16
Copenhagen 10.8.0.0/16
Setubal 10.4.0.0/16
Paris 10.6.0.0/16
ADVPN 10.255.250.0/24
! ----------------------------------------
! -- Interfaces
! ----------------------------------------
interface Ethernet0/0
description = dc-isp1
ip address 192.168.2.1 255.255.255.252
no shutdown
exit
!
interface Ethernet0/1
description = dc-isp2
ip address 192.168.2.5 255.255.255.252
no shutdown
exit
!
interface Ethernet0/2
description = stb-isp1
ip address 192.168.4.1 255.255.255.252
no shutdown
exit
!
interface Ethernet0/3
description = stb-isp2
ip address 192.168.4.5 255.255.255.252
no shutdown
exit
!
interface Ethernet1/0
description = par-isp1
ip address 192.168.6.1 255.255.255.252
no shutdown
exit
!
interface Ethernet1/1
description = par-isp2
ip address 192.168.6.5 255.255.255.252
no shutdown
exit
!
interface Ethernet1/2
description = web-clients
ip address 192.168.255.1 255.255.255.0
no shutdown
exit
!
interface Ethernet1/3
description = web-servers
ip address 192.168.250.1 255.255.255.0
no shutdown
exit
!
! ----------------------------------------
! -- Routing
! ----------------------------------------
exit
!
interface Ethernet0/2
shutdown
exit
!
interface Ethernet0/3
description = acme-dc
ip address 192.168.20.1 255.255.255.252
no shutdown
exit
!
! ----------------------------------------
! -- Routing
! ----------------------------------------
ip route 0.0.0.0 0.0.0.0 192.168.2.1
ip route 192.168.100.0 255.255.255.224 192.168.20.2
!
router bgp 65022
bgp log-neighbor-changes
neighbor 192.168.2.1 remote-as 65000
!
address-family ipv4
network 0.0.0.0
network 192.168.20.0 mask 255.255.255.252
network 192.168.100.0 mask 255.255.255.224
neighbor 192.168.2.1 activate
neighbor 192.168.2.1 next-hop-self
exit-address-family
exit
!
exit
!
interface Ethernet0/1
shutdown
exit
!
interface Ethernet0/2
shutdown
exit
!
interface Ethernet0/3
description = acme-dc
ip address 192.168.20.5 255.255.255.252
no shutdown
exit
!
! ----------------------------------------
! -- Routing
! ----------------------------------------
ip route 0.0.0.0 0.0.0.0 192.168.2.5
!
router bgp 65026
bgp log-neighbor-changes
neighbor 192.168.2.5 remote-as 65000
!
address-family ipv4
network 0.0.0.0
network 192.168.20.4 mask 255.255.255.252
neighbor 192.168.2.5 activate
neighbor 192.168.2.5 next-hop-self
exit-address-family
exit
!
vtp version 3
vtp mode server
do vtp primary force
!
vlan 5
name Management
exit
!
vlan 10
name Servers
exit
!
vlan 3172
name Dmz
exit
!
! ----------------------------------------
! -- Interfaces
! ----------------------------------------
interface Vlan5
description = management
ip address 10.2.5.10 255.255.255.0
no shutdown
exit
!
interface Ethernet0/0
description = server
switchport
switchport mode access
switchport access vlan 10
spanning-tree portfast
no shutdown
exit
!
interface Ethernet0/1
description = dmz
switchport
switchport mode access
switchport access vlan 3172
spanning-tree portfast
no shutdown
exit
!
interface Ethernet0/2
description = dc-fw-01-port4
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 5,10,3172
no shutdown
exit
!
interface Ethernet0/3
shutdown
exit
!
! ----------------------------------------
! -- Routing
! ----------------------------------------
ip default-gateway 10.2.5.1
!
next
edit "dc-netmgmt"
set vdom "root"
set ip 10.2.5.1 255.255.255.0
set allowaccess ping http
set vlanforward enable
set device-identification enable
set role lan
set interface "port4"
set vlanid 5
next
edit "dc-servers"
set vdom "root"
set ip 10.2.10.1 255.255.255.0
set allowaccess ping
set vlanforward enable
set device-identification enable
set role lan
set interface "port4"
set vlanid 10
next
edit "dc-dmz"
set vdom "root"
set ip 172.16.2.1 255.255.255.224
set allowaccess ping
set vlanforward enable
set device-identification enable
set role lan
set interface "port4"
set vlanid 3172
next
edit "port7"
set vdom "root"
set type physical
set alias "cph"
set lldp-reception enable
set lldp-transmission enable
next
edit "cph-netmgmt"
set vdom "root"
set ip 10.8.5.1 255.255.255.0
set allowaccess ping
set vlanforward enable
set device-identification enable
set role lan
set interface "port7"
set vlanid 5
next
edit "cph-office"
set vdom "root"
set dhcp-relay-service enable
set ip 10.8.16.1 255.255.255.0
set allowaccess ping
set vlanforward enable
next
edit "net-dkdc-servers"
set subnet 10.2.10.0/24
next
edit "net-dkdc-dmz"
set subnet 172.16.2.0/24
next
edit "net-cph-netmgmt"
set subnet 10.8.5.0 255.255.255.0
next
edit "net-cph-office"
set subnet 10.8.16.0 255.255.255.0
next
edit "net-stb-netmgmt"
set subnet 10.4.5.0 255.255.255.0
next
edit "net-stb-office"
set subnet 10.4.16.0 255.255.255.0
next
edit "net-par-netmgmt"
set subnet 10.6.5.0 255.255.255.0
next
edit "net-par-office"
set subnet 10.6.16.0 255.255.255.0
next
edit "net-10.0.0.0m8"
set subnet 10.0.0.0 255.0.0.0
next
end
!
! ----------------------------------------
! -- SD-WAN
! ----------------------------------------
config system sdwan
set status enable
config zone
edit "sdwan-internet"
next
end
config members
edit 1
set interface "port1"
set zone "sdwan-internet"
set gateway 192.168.20.1
next
edit 2
set interface "port2"
set zone "sdwan-internet"
set gateway 192.168.20.5
next
end
config health-check
edit "sla_internet"
set server "192.168.250.1"
set members 1 2
next
end
config service
edit 1
set name "rule-internet"
set mode priority
set dst "all"
set src "all"
set health-check "sla_internet"
set priority-members 1 2
set priority-zone "sdwan-internet"
next
end
end
!
! ----------------------------------------
! -- Firewall virtual IPs
! ----------------------------------------
config firewall vip
edit "dkdc-dmz-public-nat"
set extip 192.168.100.10-192.168.100.30
set mappedip "172.16.2.10-172.16.2.30"
set extintf "any"
next
end
!
! ----------------------------------------
! -- Firewall zones
! ----------------------------------------
config system zone
edit "dkdc"
set intrazone allow
set interface "dc-netmgmt" "dc-servers" "dc-dmz"
next
edit "cphsite"
set intrazone allow
set interface "cph-netmgmt" "cph-office"
next
end
!
! ----------------------------------------
! -- Firewall policies
! ----------------------------------------
config firewall policy
edit 1
set name "cphsite-internet-access"
set srcintf "cphsite"
set dstintf "internet-sdwan"
set action accept
set srcaddr "net-cphsite"
set dstaddr "all"
set schedule "always"
set service "ALL_ICMP" "HTTP"
next
edit 5
set name "acmevpn-to-dkdc"
set srcintf "acmevpn"
set dstintf "dkdc"
set action accept
set srcaddr "net-10.0.0.0m8"
set dstaddr "net-dkdc"
set schedule "always"
set service "ALL_ICMP"
set logtraffic all
next
edit 6
set name "acmevpn-to-cphsite"
set srcintf "acmevpn"
set dstintf "cphsite"
set action accept
set srcaddr "net-10.0.0.0m8"
set dstaddr "net-cphsite"
set schedule "always"
set service "ALL_ICMP"
set logtraffic all
next
edit 7
set name "acmevpn-to-acmevpn"
set srcintf "acmevpn"
set dstintf "acmevpn"
set action accept
set srcaddr "net-10.0.0.0m8"
set dstaddr "net-10.0.0.0m8"
set schedule "always"
set service "ALL"
set logtraffic all
next
end
!
! ----------------------------------------
! -- Routing - BGP
! ----------------------------------------
config system interface
edit "Loopback0"
set vdom "root"
set type loopback
set ip 10.255.255.2/32
set allowaccess ping
next
end
!
config router bgp
set as 65000
set router-id 10.255.255.2
config neighbor-group
edit "AcmeSites"
set remote-as 65000
exit
!
! ----------------------------------------
! -- Interfaces
! ----------------------------------------
interface Vlan5
description = management
ip address 10.8.5.10 255.255.255.0
no shutdown
exit
!
interface Ethernet0/0
description = Po10
channel-group 10 mode active
no shutdown
exit
!
interface Ethernet0/1
description = Po10
channel-group 10 mode active
no shutdown
exit
!
interface Ethernet0/2
description = dc-fw-01-port7
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 5,16
no shutdown
exit
!
interface Ethernet0/3
shutdown
exit
!
interface Port-channel10
description = cph-sw-00
switchport trunk encapsulation dot1q
switchport mode trunk
exit
!
! ----------------------------------------
! -- Routing
! ----------------------------------------
ip default-gateway 10.8.5.1
!
hostname cph-sw-00
ip domain name acme.local
no ip domain lookup
no logg console
logg buffered 131072 debug
service password-encryption
!
! ----------------------------------------
! -- VTP and VLANs
! ----------------------------------------
vtp domain AcmeCPHNet
vtp password AcmeCPHNetPass
vtp pruning
vtp version 3
vtp mode client
!
! ----------------------------------------
! -- Interfaces
! ----------------------------------------
interface Vlan5
description = management
ip address 10.8.5.11 255.255.255.0
no shutdown
exit
!
interface Ethernet0/0
description = Po10
channel-group 10 mode active
no shutdown
exit
!
interface Ethernet0/1
description = Po10
channel-group 10 mode active
no shutdown
exit
!
interface Ethernet0/2
shutdown
exit
!
interface Ethernet0/3
description = clientpc
switchport mode access
switchport access vlan 16
spanning-tree portfast edge
no shutdown
exit
!
interface Port-channel10
description = dc-cph-00
switchport trunk encapsulation dot1q
switchport mode trunk
no shutdown
exit
!
! ----------------------------------------
! -- Routing
! ----------------------------------------
ip default-gateway 10.8.5.1
!
address-family ipv4
network 0.0.0.0
network 192.168.40.0 mask 255.255.255.252
neighbor 192.168.4.1 activate
neighbor 192.168.4.1 next-hop-self
exit-address-family
exit
!
!
address-family ipv4
network 0.0.0.0
network 192.168.40.4 mask 255.255.255.252
neighbor 192.168.4.5 activate
neighbor 192.168.4.5 next-hop-self
exit-address-family
exit
!
edit 2
set dst 10.4.0.0 255.255.0.0
set blackhole enable
next
edit 3
set gateway 192.168.40.1
set device "port1"
next
edit 4
set gateway 192.168.40.5
set device "port2"
set distance 15
next
end
!
! ----------------------------------------
! -- Objects addresses
! ----------------------------------------
config firewall address
edit "net-dkdc"
set subnet 10.2.0.0/16
next
edit "net-cphsite"
set subnet 10.8.0.0/16
next
edit "net-stbsite"
set subnet 10.4.0.0/16
next
edit "net-parsite"
set subnet 10.6.0.0/16
next
edit "net-dkdc-netmgmt"
set subnet 10.2.5.0/24
next
edit "net-dkdc-servers"
set subnet 10.2.10.0/24
next
edit "net-dkdc-dmz"
set subnet 172.16.2.0/24
next
edit "net-cph-netmgmt"
set subnet 10.8.5.0 255.255.255.0
next
edit "net-cph-office"
set subnet 10.8.16.0 255.255.255.0
next
edit "net-stb-netmgmt"
set subnet 10.4.5.0 255.255.255.0
next
edit "net-stb-office"
set subnet 10.4.16.0 255.255.255.0
next
edit "net-par-netmgmt"
set subnet 10.6.5.0 255.255.255.0
next
edit "net-par-office"
set subnet 10.6.16.0 255.255.255.0
next
edit "net-10.0.0.0m8"
set subnet 10.0.0.0 255.0.0.0
next
end
!
! ----------------------------------------
! -- ADVPN-SPOKE
! ----------------------------------------
config vpn ipsec phase1-interface
edit "AcmeVPN11"
set interface "port1"
set peertype any
set net-device disable
set auto-discovery-receiver enable
set add-route disable
set ike-version 2
set proposal des-sha256
set dpd on-idle
set remote-gw 192.168.20.2
set psksecret AcmeADVPNTunnel
set dpd-retryinterval 5
next
edit "AcmeVPN21"
set interface "port2"
set peertype any
set net-device disable
set auto-discovery-receiver enable
set add-route disable
set ike-version 2
set proposal des-sha256
set dpd on-idle
set remote-gw 192.168.20.2
set psksecret AcmeADVPNTunnel
set dpd-retryinterval 5
set monitor "AcmeVPN11"
next
edit "AcmeVPN12"
set interface "port1"
set peertype any
set net-device enable
set auto-discovery-receiver enable
set add-route disable
set ike-version 2
set proposal des-sha256
set dpd on-idle
set remote-gw 192.168.20.6
set psksecret AcmeADVPNTunnel
set dpd-retryinterval 5
next
edit "AcmeVPN22"
edit 2
set name "stbsite-to-acmevpn"
set srcintf "stbsite"
set dstintf "sdwan-acmevpn"
set action accept
set srcaddr "net-stbsite"
set dstaddr "net-10.0.0.0m8"
set schedule "always"
set service "ALL"
set logtraffic all
next
edit 3
set name "acmevpn-to-stbsite"
set srcintf "sdwan-acmevpn"
set dstintf "stbsite"
set action accept
set srcaddr "net-10.0.0.0m8"
set dstaddr "net-stbsite"
set schedule "always"
set service "ALL"
set logtraffic all
next
end
!
! ----------------------------------------
! -- Routing - BGP
! ----------------------------------------
config system interface
edit "Loopback0"
set vdom "root"
set type loopback
set ip 10.255.255.4/32
set allowaccess ping
next
end
!
config router bgp
set as 65000
set router-id 10.255.255.4
config neighbor
edit "10.255.250.1"
set remote-as 65000
set advertisement-interval 1
set link-down-failover enable
next
edit "10.255.250.2"
set remote-as 65000
set advertisement-interval 1
set link-down-failover enable
next
end
config network
edit 1
set prefix 10.4.0.0/16
next
edit 2
set prefix 10.255.255.4/32
next
end
end
!
address-family ipv4
network 0.0.0.0
network 192.168.60.0 mask 255.255.255.252
neighbor 192.168.6.1 activate
neighbor 192.168.6.1 next-hop-self
exit-address-family
exit
!
!
address-family ipv4
network 0.0.0.0
network 192.168.60.4 mask 255.255.255.252
neighbor 192.168.6.5 activate
neighbor 192.168.6.5 next-hop-self
exit-address-family
exit
!
edit 2
set dst 10.6.0.0 255.255.0.0
set blackhole enable
next
edit 3
set gateway 192.168.60.1
set device "port1"
next
edit 4
set gateway 192.168.60.5
set device "port2"
set distance 15
next
end
!
! ----------------------------------------
! -- Objects addresses
! ----------------------------------------
config firewall address
edit "net-dkdc"
set subnet 10.2.0.0/16
next
edit "net-cphsite"
set subnet 10.8.0.0/16
next
edit "net-stbsite"
set subnet 10.4.0.0/16
next
edit "net-parsite"
set subnet 10.6.0.0/16
next
edit "net-dkdc-netmgmt"
set subnet 10.2.5.0/24
next
edit "net-dkdc-servers"
set subnet 10.2.10.0/24
next
edit "net-dkdc-dmz"
set subnet 172.16.2.0/24
next
edit "net-cph-netmgmt"
set subnet 10.8.5.0 255.255.255.0
next
edit "net-cph-office"
set subnet 10.8.16.0 255.255.255.0
next
edit "net-stb-netmgmt"
set subnet 10.4.5.0 255.255.255.0
next
edit "net-stb-office"
set subnet 10.4.16.0 255.255.255.0
next
edit "net-par-netmgmt"
set subnet 10.6.5.0 255.255.255.0
next
edit "net-par-office"
set subnet 10.6.16.0 255.255.255.0
next
edit "net-10.0.0.0m8"
set subnet 10.0.0.0 255.0.0.0
next
end
!
! ----------------------------------------
! -- ADVPN-SPOKE
! ----------------------------------------
config vpn ipsec phase1-interface
edit "AcmeVPN11"
set interface "port1"
set peertype any
set net-device disable
set auto-discovery-receiver enable
set add-route disable
set ike-version 2
set proposal des-sha256
set dpd on-idle
set remote-gw 192.168.20.2
set psksecret AcmeADVPNTunnel
set dpd-retryinterval 5
next
edit "AcmeVPN21"
set interface "port2"
set peertype any
set net-device disable
set auto-discovery-receiver enable
set add-route disable
set ike-version 2
set proposal des-sha256
set dpd on-idle
set remote-gw 192.168.20.2
set psksecret AcmeADVPNTunnel
set dpd-retryinterval 5
set monitor "AcmeVPN11"
next
edit "AcmeVPN12"
set interface "port1"
set peertype any
set net-device enable
set auto-discovery-receiver enable
set add-route disable
set ike-version 2
set proposal des-sha256
set dpd on-idle
set remote-gw 192.168.20.6
set psksecret AcmeADVPNTunnel
set dpd-retryinterval 5
next
edit "AcmeVPN22"
end
end
!