Trusted Network Engineering & Security tutorials, when you need them most.

Beginner’s Guide to Network Engineering

10+

Network & Network Security Experience

1000+

Network & Network Security Tutorials

FortiGate SD-WAN Configuration Guide: Boost Your Network Performance
FortiGate SD-WAN Configuration Guide Boost Your Network Performance

As organizations grow increasingly reliant on cloud-based services and distributed networks, traditional WAN architectures can no longer keep up with the demand for speed, flexibility, and resilience. That’s where FortiGate SD-WAN comes in—a software-defined solution that transforms your WAN infrastructure into a dynamic, intelligent network capable of delivering application-aware routing, better performance, and significant cost savings.

In this guide, we’ll walk through everything you need to know to successfully configure SD-WAN on your FortiGate firewall, from core concepts to advanced settings that can fine-tune performance across multiple WAN links.

What is FortiGate SD-WAN?

FortiGate SD-WAN is an integrated feature in Fortinet’s next-generation firewalls that replaces traditional WAN routing with a more agile, policy-based system. It allows you to:

  • Combine multiple internet or MPLS links into a single virtual interface
  • Route traffic dynamically based on application, performance metrics, or business intent
  • Monitor real-time link health (latency, jitter, packet loss)
  • Optimize bandwidth usage and failover with minimal downtime

Why Use FortiGate SD-WAN?

Here are some of the top reasons organizations switch to FortiGate SD-WAN:

  • Improved performance for cloud and SaaS applications (like Microsoft 365, Zoom, and Salesforce)
  • Lower WAN costs by replacing expensive MPLS with broadband or LTE
  • Centralized management with FortiManager and FortiAnalyzer
  • Built-in security with unified threat protection

Before You Begin: Requirements

To follow this configuration guide, ensure you have:

  • A FortiGate appliance with FortiOS 6.2 or higher (FortiOS 7.x recommended)
  • At least two WAN interfaces (e.g., ISP1 and ISP2)
  • Administrative access to the FortiGate GUI or CLI
  • A clear understanding of your ISP gateways, bandwidth speeds, and routing needs

Step-by-Step FortiGate SD-WAN Configuration

Let’s get into the practical setup.

Step 1: Enable SD-WAN Feature

  1. Go to Network > SD-WAN
  2. Click Enable if it’s not already active
  3. Add your WAN interfaces (e.g., wan1, wan2) to the SD-WAN interface group

Once added, FortiGate creates a virtual interface called sd-wan that abstracts the physical interfaces.

Step 2: Configure Interface Members

For each WAN interface:

  • Set Interface to wan1, wan2, etc.
  • Define the gateway IP for each link
  • Enter the bandwidth (up/down) to reflect actual ISP speeds
  • Optionally set cost or priority to influence routing behavior

Step 3: Set Up Performance SLA

Performance SLAs (Service-Level Agreements) let FortiGate test link quality in real time.

  1. Navigate to Network > SD-WAN > Performance SLA
  2. Click Create New
  3. Name it (e.g., Google-DNS)
  4. Target IP: Use something like 8.8.8.8 or 1.1.1.1
  5. Protocol: Choose Ping or HTTP
  6. Add all SD-WAN members to the SLA test

This helps FortiGate detect link degradation and reroute traffic accordingly.

Step 4: Define SD-WAN Rules (Policy-Based Routing)

SD-WAN rules determine how traffic is routed across WAN links.

  1. Go to Network > SD-WAN Rules
  2. Create a new rule (e.g., Microsoft365_Routing)
  3. Source: Define internal network or user group
  4. Destination: Select Application, Internet Services, or specific IP/URL
  5. Preferred Member: Choose wan1 or wan2
  6. Use Performance SLA to enable dynamic path selection

You can create rules based on:

  • Application category (e.g., VoIP, Video)
  • User group (for custom routing policies)
  • Measured metrics (jitter, latency, loss)

Step 5: Configure SD-WAN Zones (Optional)

Zones allow you to group multiple SD-WAN members for better control.

  1. Navigate to Network > Interfaces > SD-WAN Zones
  2. Create a new zone (e.g., “Internet-Zone”)
  3. Assign both wan1 and wan2 to this zone
  4. Apply the zone in SD-WAN rules and firewall policies

This is particularly useful for multi-region or segmented SD-WAN deployments.

Step 6: Adjust Health Checks and Failover Logic

Each SLA target can trigger automatic failover if thresholds are breached.

  1. Go to the SLA config you created
  2. Set thresholds:
    • Max Latency: e.g., 100ms
    • Max Jitter: e.g., 20ms
    • Max Packet Loss: e.g., 3%
  3. When a link exceeds any threshold, FortiGate shifts traffic to the backup link based on your SD-WAN rule settings

You can enable logging for these events under Log & Report > Events.

Step 7: Update Firewall Policies

Ensure your firewall rules use the sd-wan interface instead of the physical wan1 or wan2.

  1. Go to Policy & Objects > Firewall Policy
  2. Edit your outgoing internet policies
  3. Change Outgoing Interface to sd-wan

This is required for SD-WAN rules to apply properly.

Step 8: Monitor and Optimize

Once configured, monitor your SD-WAN in real-time:

  • Network > SD-WAN Monitor shows current link usage, health, and active routes
  • FortiView > Traffic > Application helps identify top applications
  • Use CLI commands like diagnose sys virtual-wan-link health-check to troubleshoot

Advanced Tips and Best Practices

1. Use Application Control with SD-WAN

Enable application control profiles to classify and route traffic more intelligently, especially for critical business apps.

2. Integrate with FortiManager

For multi-site SD-WAN deployments, FortiManager enables centralized SD-WAN orchestration and template-based configuration.

3. Enable BGP with Overlay Networks

If you’re integrating SD-WAN with MPLS or VPNs, use BGP to advertise dynamic routes between branches and data centers.

4. Use the CLI for Precision Tuning

Commands like:

bashCopyEditconfig system virtual-wan-link
  config members
    edit 1
      set gateway x.x.x.x
      set priority 1
    next
  end
end

…allow you to fine-tune failover behavior, interface weights, and more.

Troubleshooting SD-WAN Issues

Common Issues:

  • Traffic not routing as expected: Ensure correct SD-WAN rules are in place and firewall policies reference the sd-wan interface
  • Failover not triggering: Check SLA target, thresholds, and logs
  • Latency spikes on one link: Adjust link cost or remove it from critical application rules

Use CLI commands like:

bashCopyEditdiagnose sys virtual-wan-link service
diagnose sys virtual-wan-link member

…to inspect current states and decision logic.

Final Thoughts

FortiGate SD-WAN is more than just a WAN optimizer—it’s a next-gen solution that fuses performance, resilience, and security into one unified system. Whether you’re trying to lower costs, improve cloud app performance, or ensure seamless failover between links, SD-WAN gives you the control and flexibility you need.

When configured properly, it becomes an intelligent traffic director that reacts to real-time conditions, all while being deeply integrated into FortiGate’s broader security ecosystem.

Disclosure: My content is reader-supported. This means if you click on some of my links, then i may earn a commission. See how my blog is funded, why it matters, and how you can support me. Here’s my editorial process.

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Licenses & Certifications

[wdcl_image_carousel nav_pagi=”none” slide_count=”4″ slide_count_tablet=”3″ slide_count_phone=”1″ slide_count_last_edited=”on|phone” _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}”][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/ISC2-Certified-in-Cybersecurity-Certificate-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” border_radii_item=”on|8px|8px|8px|8px” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/Google-Cybersecurity-Certification-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” border_radii_item=”on|8px|8px|8px|8px” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/Google-Data-Analytics-Certification-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” border_radii_item=”on|8px|8px|8px|8px” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/Google-IT-support-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” border_radii_item=”on|8px|8px|8px|8px” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/CCNA-1-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/CCNA-2-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/Cisco-Cybersecurity-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” border_radii_item=”on|8px|8px|8px|8px” global_colors_info=”{}”][/wdcl_image_carousel_child][wdcl_image_carousel_child photo=”https://kevindarian.com/wp-content/uploads/2025/02/Network-Security-pdf.jpg” _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}”][/wdcl_image_carousel_child][/wdcl_image_carousel]
Kevin darian
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.