• Contact
  • About Me
  • Privacy Policy
  • Disclaimer
DefenceDev
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos
No Result
View All Result
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos
No Result
View All Result
DefenceDev
No Result
View All Result
ADVERTISEMENT
Home Network Tutorials FortiGate

Fortinet FortiGate: Routing Design Best Practices

neo by neo
May 27, 2025
in FortiGate
0
Fortinet FortiGate: Routing Design Best Practices
0
SHARES
84
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

Routing Design Best Practices

FortiGate routing best practices ensure optimal network performance, scalability, and security by leveraging advanced routing features and proper configuration strategies. Effective routing design can greatly enhance network performance, security, and scalability. As networks grow in size and complexity, having a solid routing strategy becomes essential to ensure efficient traffic flow and easy troubleshooting.

Introduction

Routing is a fundamental aspect of network infrastructure, directing data packets from their origin to their destination across various network paths. For organizations using FortiGate firewalls, effective routing not only ensures seamless communication across the network but also strengthens security by maintaining control over data flows. This post will describe FortiGate best practise related to the routing. FortiGate’s routing capabilities, supporting both static and dynamic protocols, make it a powerful tool for managing diverse network environments.

FortiGate Routing Design Best Practices

  • If you have a multiple path existing for the same network destination, use the distance attribute to ensure only one route is active at a time.
  • In case that are you using asymmetric routing, it will disable FortiGate´s stateful inspection.
  • Try to summarize host routes to super nets to reduce routing table tables
  • Avoid to configure policy routes
  • If Equal Cost Multipath Routing (ECMP) routing is not possible to achieve redundancy, use health link monitor
  • Under Log & Report > Forward Traffic use Destination interface to determine the egress interface for all traffic

Link Health Monitor

Link Health Monitoring is a crucial feature in FortiGate that actively checks the health of links to ensure that data flows through optimal paths. It continuously probes link status by sending health check packets to specified destinations, monitoring connectivity, latency, packet loss, and jitter. If a monitored link fails or falls below acceptable performance standards, the system can automatically switch traffic to an alternative link, ensuring continuity in network operations.

ADVERTISEMENT

More information you can find at the link.

If FortiGate doesn’t receive replies within the failover threshold, all static routes using the gateway are removed from the routing table.

ADVERTISEMENT

Link Health Monitor – Configuration

config system link-monitor
edit <name>
set srcintf <interface>
set server <server ip>
set gateway-ip <gateway ip>
set protocol [ping | tcp-echo | udp-echo | twamp | http]
set update-static-route [enable | disable]
next
end
  • set update-static-route → Remove all routes associated with the srcintf in the event of an outage.
  • set server → Use a server IP located beyond the ISP gateway.

Implement Route Failover

  • When implementing route failover on FortiGate, it’s crucial to ensure continuous network availability by configuring redundant paths for traffic. Route failover can be achieved using methods like link health monitoring or dynamic routing protocols.
  • In dual-ISP scenario is possible to implement ECMP routing. How to implement it you can check at the link.
    FortiGate Forward Traffic
    Forward Traffic

    More articles with similar topic:

    • FortiGate: Check the Routing Table in the CLI
    • FortiGate: Equal Cost Multipath Routing (ECMP) Configuration
    • FortiGate: Routing Monitor and Route Attributes
    • FortiGate: Static Route Configuration via GUI and CLI

    About The Author

    neo

    See author's posts

    ADVERTISEMENT
    Tags: fortigate
    ADVERTISEMENT
    Previous Post

    Fortinet FortiGate: Restrict Access to the Open Ports for Specific Country

    Next Post

    VMware ESXi: Detect and Restart Unresponsive Virtual Machines on ESXi with Bash Script

    neo

    neo

    Related Posts

    Home Lab with Fortinet FortiGate 60D Firewall
    FortiGate

    Home Lab with Fortinet FortiGate 60D Firewall

    My Ultimate FortiGate Command Cheat Sheet
    FortiGate

    My Ultimate FortiGate Command Cheat Sheet

    Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks
    FortiGate

    Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks

    Protect a Self-Hosted Application from Brute Force Attacks with FortiGate
    FortiGate

    How to Protect a Self-Hosted Application from Brute Force Attacks with FortiGate

    FortiGate DDoS Protection: Configure DoS Policies to Secure Self-Hosted Applications
    FortiGate

    FortiGate DDoS Protection: Configure DoS Policies to Secure Self-Hosted Applications

    Fortinet FortiGate Site-to-Site IPsec VPN Troubleshooting
    FortiGate

    Fortinet FortiGate Site-to-Site IPsec VPN Troubleshooting

    Next Post
    VMware ESXi: Detect and Restart Unresponsive Virtual Machines on ESXi with Bash Script

    VMware ESXi: Detect and Restart Unresponsive Virtual Machines on ESXi with Bash Script

    Recommended

    Lesson 2: Linux Bash Variables

    Lesson 2: Linux Bash Variables

    A screenshot of WinBox showing the process of creating 'New DHCP Server'.

    MikroTik: Configure DHCP Server and Settings on Interface

    MikroTik OpenVPN: Sound Alert When VPN Tunnel Fails

    MikroTik OpenVPN: Sound Alert When VPN Tunnel Fails

    MikroTik: OpenVPN Client Failover Script

    MikroTik: OpenVPN Client Failover Script

    GitHub: How to Add a Script or a Folder to Your Repository

    GitHub: How to Add a Script or a Folder to Your Repository

    Categories

    • Blog
    • Cloud
      • Private
    • Linux Tutorials
      • Bash Scripting Tutorials
      • Commands
      • Networking
    • Network Tutorials
      • FortiGate
      • MikroTik
    • Projects
      • AdGuard
      • Immich
      • Nextcloud
      • WordPress
    • Solutions
      • Docker
    • Video Tutorials
      • MikroTik Videos
    ADVERTISEMENT

    DefenceDev Tutorials

    defencedev Logo

    Whether you’re just starting or looking to expand your skills, I hope you find useful information and engaging discussions here. Let me take you through my journey and the goals behind this space!

    Follow Us

    Recent News

    MikroTik OpenVPN: Sound Alert When VPN Tunnel Fails

    MikroTik OpenVPN: Sound Alert When VPN Tunnel Fails

    MikroTik: OpenVPN Client Failover Script

    MikroTik: OpenVPN Client Failover Script

    • Site Map
    • Privacy Policy
    • Facebook Page
    • Disclaimer
    • Contact
    • About Me

    © 2025 defencedev.com - All rights reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Linux Tutorials
      • Bash Scripting Lessons
      • Commands
      • Networking
      • Bash Scripts
    • Solutions
      • Docker
    • Network Tutorials
      • FortiGate
      • MikroTik
    • Projects
      • AdGuard
      • Immich
      • Nextcloud
      • WordPress
    • Cloud
    • Video Tutorials
      • YouTube Channel
      • MikroTik Videos

    © 2025 defencedev.com - All rights reserved.