Тёмный

2. Configuring and Testing Link Health Monitor for Redundant VPN Connections on FortiGate 6.2 

Devin Adams
Подписаться 14 тыс.
Просмотров 14 тыс.
50% 1

Here is the second video configuring and comparing the Dead Peer Detection vs. Link Health Monitor checks for fail-over.
Note: I had to switch the webterm VMs with windows 7 so we could see the dropped packets. Please refer to the first video on how to build the topology.
Here is the documentation regarding the DPD:
kb.fortinet.co...

Опубликовано:

 

15 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 23   
@ob2522
@ob2522 Год назад
I know this is a few years old now (still an amazing resource!) - linux will show dropped packets if you use the -O flag :)
@MonkeyDRedfield
@MonkeyDRedfield 3 года назад
Finally someone who goes directly to the point. Thank you.
@shakhriyoryorov4980
@shakhriyoryorov4980 3 года назад
Hey bro. Thank you so much. I have spent 2 days to resolve this issue with convergence delay (80 seconds). Great work. )))
@dexteralberts597
@dexteralberts597 26 дней назад
I don't know if you monitor this, but is it possible with Fortigate to construct a VPN that load balances with 2 WAN connections, but if one fails will spin up the 3rd WAN connection to take the place of the failed connection? My application is using 2 physical wired ISP paths, with a cellular path on the 3rd WAN. I like using the link monitors and for my application if that's the only way I can do a 3 way setup, I have no issue with that. For my site a few lost packets will not present a problem.
@GoldenBoy40ro
@GoldenBoy40ro 2 года назад
To the tunnel en the VPN Remote2, do you configure "set monitore" ? Nice video congratulation, best regards from México
@MrJklinect
@MrJklinect 3 года назад
Just curious, I have an MPLS and site to site VPN over LTE for failover. Can I use this same setup on that? I have all traffic piped through the VPN back to our plant (subject to change later), so I need to monitor the MPLS interface and if it goes down have it fail over to the VPN
@yusufguner9864
@yusufguner9864 2 года назад
Nearly same setup i have. Primary is MPLS and secondary is IPSec VPN. Did you try this solution on your setup?
@carlosivandonoso
@carlosivandonoso 4 года назад
Hello, good afternoon, as I understand the "set srcintf" is the tunnel interface that is configured, in your case it is ToRemote1, another question is if this should also be configured in the other tunnel interface, which would be ToRemote2. Also I would like to ask you for the option "set server" can it be any phase 2 network on the other side? or does it have to be exclusively the fortigate on the other side? On the other hand, in the source.-ip you indicate the ip 10.10.1.254, that ip is the ip of the lan interface of the fortigate? or is it the ip of the tunnel interface? As you did not show the tunnel configuration, I had several doubts, thank you very much for the video.
@clayton7443
@clayton7443 4 года назад
This is great. Is there any reason this wouldn't work if the other side of the tunnel was not a FortiGate? Also, if both primary & secondary tunnels were using the same WAN uplink, would that change this configuration at all aside from the source interface?
@rafaeuvs
@rafaeuvs 3 года назад
I didn't understand what did it do when you killed the "cable", how was still communicating? It will enable or disable the route after detects down?
@martinhs1644
@martinhs1644 2 года назад
what would be the behaviour changing the static routes like: "same distance, different priority"
@arielgonzalez9990
@arielgonzalez9990 4 года назад
great video, if I want to configure the same topology but 1 side to other Firewall like Cisco ASA o Cisco Router, I need to choice DPD or it is possible used Link Monitor too?
@DevinAdams
@DevinAdams 4 года назад
DPD is standardized for IPSEC, I'm assuming you can use either.
@stephenfitzgerald7294
@stephenfitzgerald7294 2 года назад
Great video, thanks so much.
@v88vas
@v88vas 4 года назад
Devin, thanks for the awesome videos...
@johnpersil84
@johnpersil84 3 года назад
Is use 2 virtual 6.2.7 fortigates and it seem like i can't choose the vpn interface in the link monitor... very strange
@Randywheeler
@Randywheeler 4 года назад
Awesome man! Thanks so much!!!
@DevinAdams
@DevinAdams 4 года назад
You got it brotha! Let me know if there's anything else you need labbed up!
@serlegar
@serlegar 4 года назад
Hi Could you configure the Wan Link Monitor in the Web Gui SD-WAN menu ?
@gratengraten3716
@gratengraten3716 4 года назад
Thank you so much ❤️💕💕
@information359
@information359 4 года назад
Hey,, it's so helpful keep making.. Your stuff is new that is why I like it..
@swi10
@swi10 3 года назад
thx!
@aady69ias
@aady69ias Год назад
nice video ..sometimes u r annoying!
Далее
FortiGate: Simple WAN Fail-Over
13:12
Просмотров 46 тыс.
27. Configuring Redundant LDAP binds on FortiGates 6.2
23:48
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 348 тыс.
FortiGate 60F HA Cluster Build
22:25
Просмотров 52 тыс.
OSI Model Deep Dive
31:52
Просмотров 332 тыс.
CAN Bus Explained - A Simple Intro [v2.0 | 2021] 🌟
14:44