Task 4: BGP & Routing Intent
In task four, the student will configure BGP on the FortiGates and enable Routing Intent from the Azure hub portal.
Configure BGP
Confirm the private address space of the vWAN hub
The private address space of the vWAN hub is needed to create a summary route from the private address range to the secondary interfaces of the FortiGate NVAs to establish BGP peering.
The FortiGates are deployed with BGP peers already configured and ready to go online after the static route is enabled.
View FortiGate BGP peer status
Determine FortiGate NVA port2 Gateway
Static routes are needed on the FortiGates to enable BGP, a component required to setup the static route is the gateway address of the FortiGate’s port2 interface.
Every subnet in Azure uses the first address in the subnet as the gateway. For example, in the subnet 10.1.1.0/24 Azure uses 10.1.1.1 as the subnet gateway.
- Click on Network
- Click on Interfaces
- View the assigned address of port2 and determine the gateway
In the screenshot below, the port2 IP address is 10.1.112.5/255.255.255.128 (/25)
Configure Static Routes on each FortiGate
Two static routes are required on each FortiGate
Create a static route
Repeat the process to add a static route for the Azure internal load balancer health probe
Refer to the overall for the internal load balancer placement. Health probes enable the Azure load balancer to know if a FortiGate is in a state to forward traffic.
The static route destination below is the default Azure load balancer health probe destination.
- Enter Destination:
168.63.129.16/32
- Enter Gateway Address:
10.1.112.1
- Select Interface: port2
- Enter Administrative Distance:
5
- Click “OK”
- Enter Destination:
Repeat the commands on the other FortiGate
When completed the static routes of each FortiGate should look similar to the screenshot below.
Verify BGP communication between FortiGate NVAs
After configuring the static routes on both FortiGates BGP peers are reachable.
Verify BGP communication between FortiGate NVAs in the CLI.
Open FortiGate CLI
Run CLI command
get router info bgp summary
More information about FortiGate static routes and BGP can be found in Fortinet documents.
Enable Routing Intent
Routing Intent and Routing Policies allow you to configure the Virtual WAN hub to forward Internet-bound and Private (Point-to-site VPN, Site-to-site VPN, ExpressRoute, Virtual Network and Network Virtual Appliance) traffic to an Azure Firewall, Next-Generation Firewall Network Virtual Appliance (NGFW-NVA) or security software-as-a-service (SaaS) solution deployed in the virtual hub.
Enable Routing Intent
- Navigate - to your Hub - vwanXX-eastus-vHub1_VHUB
- Click - “Routing Intent and Routing Policies” on the left under “Routing”
- Select - for “Internet traffic” - Network Virtual Appliance
- Select - for “Private traffic” - Network Virtual Appliance
- Select - for both “Next Hop Resources” - your cluster name (the only selection in the dropdown)
- Click - “Save” to update Routing Intent
Continue to Chapter 4 - Task 5: VNET Peering and Verifying Routing