Configure

This section tells the firewall to ping an IP (in this case, our gateway) repeatedly to see if it's alive or not. For most cable and DSL type connections this will work fine, however if you are interfacing with another ISP's router that may continue responding to pings even if the circuit is down, then consider using an internet IP such as 4.2.2.2 or 8.8.8.8. You can do this on both wan interfaces if you want it to fail both directions. Config router gwdetectedit 1set interface 'wan1'set server '1.1.1.1'nextendOn newer firmware, this is replaced with link monitoring:config system link-monitoredit 'wan1 check'set srcintf 'wan1'set server '1.1.1.1'set gateway-ip 1.1.1.1set timeout 5set recoverytime 1nextend2. Configure your interfaces. Most of this can be done in the web interface, the only critical piece here are the two fail-detect options on wan1.

How To Configure Wan Load Balancing On Fortigate 80c 2

You can also turn on failure detection for wan2 (make sure you add a gwdetect for it as well), however i don't find it necessary here since if both wan1 and wan2 are down then i'm screwed anyways. Note that the fail-detect options are not necessary on newer firmware. Heroes of hellas 3 free. Config system interfaceedit 'wan1'set ip 1.1.1.2 255.255.255.248set fail-detect enableset fail-detect-option detectservernextedit 'wan2'set ip 2.2.2.2 255.255.255.248nextend3. Configure your static routes. This doesn't need to be done in the CLI, you just need to have an internal to wan1 allow/NAT rule, as well as an internal to wan2 allow/NAT rule. It will choose the proper rule based on which port the traffic is being routed through (the active internet connection).

In case you want to see it in CLI, here it is: config firewall policyedit 1set srcintf 'internal'set dstintf 'wan1'set srcaddr 'all'set dstaddr 'all'set action acceptset schedule 'always'set service 'ALL'set nat enablenextedit 2set srcintf 'internal'set dstintf 'wan2'set srcaddr 'all'set dstaddr 'all'set action acceptset schedule 'always'set service 'ALL'set nat enablenextend5. Test and confirm.