Fortigate Wanopt Cache Proxy
Fortigate Wanopt Cache Proxy
Visit http://support.fortinet.com to register your FortiGate WAN Optimization, Web Cache and Web Proxy product. By registering you can receive product updates, technical support, and FortiGuard services.
FortiGate WAN Optimization, Web Cache and Web Proxy User Guide Version 4.0 MR1 16 November 2009 01-410-96996-20091116 Copyright 2009 Fortinet, Inc. All rights reserved. No part of this publication including text, examples, diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of Fortinet, Inc. Trademarks Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient, FortiGate, FortiGate Unified Threat Management System, FortiGuard, FortiGuard-Antispam, FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager, Fortinet, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Contents
Contents
Introduction .............................................................................................. 7
Before you begin............................................................................................................. 7 FortiGate models that support WAN optimization....................................................... 8 How this guide is organized........................................................................................ 8 Document conventions .................................................................................................. 9 IP addresses............................................................................................................... 9 Cautions, Notes and Tips ........................................................................................... 9 Typographical conventions ......................................................................................... 9 CLI command syntax ................................................................................................ 11 Registering your Fortinet product............................................................................... 12 Fortinet products End User License Agreement ....................................................... 12 Customer service and technical support.................................................................... 12 Training .......................................................................................................................... 12 Fortinet documentation ............................................................................................... 13 Tools and Documentation CD................................................................................... 13 Fortinet Knowledge Base ......................................................................................... 13 Comments on Fortinet technical documentation ..................................................... 13
Web proxy topology...................................................................................................... 20 WAN optimization client/server architecture.............................................................. 21 WAN optimization peers ........................................................................................... 21 WAN optimization and the FortiClient application..................................................... 22 Operating modes and VDOMs.................................................................................. 22 WAN optimization tunnels............................................................................................ 22 Tunnel sharing .......................................................................................................... 23 Protocol optimization ................................................................................................... 24 Byte caching.................................................................................................................. 25 WAN optimization and HA............................................................................................ 25 Monitoring WAN optimization performance ............................................................... 25
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Contents
Example: Adding secure tunneling to an active-passive WAN optimization configuration ................................................................................................................. 57 Network topology and assumptions.......................................................................... General configuration steps...................................................................................... Configuring WAN optimization with secure tunneling - web-based manager ........... Configuring WAN optimization with secure tunneling - CLI ...................................... 57 58 58 60
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Contents
Example: Web Cache Only WAN optimization ........................................................... 64 Network topology and assumptions.......................................................................... General configuration steps...................................................................................... Configuring Web Cache Only WAN optimization - web-based manager.................. Configuring Web Cache Only WAN optimization - CLI............................................. 64 65 65 66
Configuring active-passive web caching.................................................................... 68 Example: Active-passive Web Caching ...................................................................... 68 Network topology and assumptions.......................................................................... General configuration steps...................................................................................... Configuring active-passive web caching - web-based manager............................... Configuring active-passive web caching - CLI.......................................................... 68 69 69 71
Configuring peer-to-peer web caching ....................................................................... 72 Example: Peer-to-peer web caching ........................................................................... 73 Network topology and assumptions.......................................................................... General configuration steps...................................................................................... Configuring peer-to-peer web caching - web-based manager.................................. Configuring peer-to-peer web caching - CLI............................................................. 73 74 74 76
SSL offloading for WAN optimization and web caching .................. 103
Example: SSL offloading for a WAN optimization tunnel ....................................... 103 Network topology and assumptions........................................................................ General configuration steps.................................................................................... Client-side configuration steps................................................................................ Server-side configuration steps .............................................................................. 103 104 104 106
Example: SSL offloading and reverse proxy web caching for an Internet web server ..................................................................................................... 106 Network topology and assumptions........................................................................ 107
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Contents
Example: Explicit proxy configuration...................................................................... 114 General configuration steps.................................................................................... 114 Configuring the explicit web proxy - web-based manager ...................................... 115 Configuring the explicit web proxy - CLI ................................................................. 115 CLI configuration ........................................................................................................ 116 config web-proxy explicit......................................................................................... 116 config web-proxy global .......................................................................................... 116
Index...................................................................................................... 123
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Introduction
Introduction
Welcome and thank you for selecting Fortinet products for your network protection. You can use FortiGate WAN optimization and web caching to improve performance and security of traffic passing between locations on your wide area network (WAN) or from the Internet to your web servers. You can also use the FortiGate unit as an explicit web proxy server. If your FortiGate unit supports web caching, you can also add web caching to the web proxy server. This document describes how FortiGate WAN optimization, web caching, and web proxy work and also describes how to configure these features. This chapter contains the following topics: Before you begin Document conventions Registering your Fortinet product Fortinet products End User License Agreement Customer service and technical support Training Fortinet documentation
At this stage, the following installation and configuration conditions are assumed:
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Introduction
You have already successfully installed two or more FortiGate units at various locations across your WAN by following the instructions in the appropriate FortiGate unit QuickStart or Installation Guide. You can download FortiGate installation guides from the FortiGate documentation page: http://docs.fortinet.com/fgt.html. You have administrative access to the web-based manager and/or CLI. The FortiGate units are integrated into your WAN. The operation mode has been configured. The system time, DNS settings, administrator password, and network interfaces have been configured. Firmware, FortiGuard Antivirus and FortiGuard Antispam updates are completed. You have added firewall policies to allow your FortiGate units to process traffic.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Introduction
Document conventions
Advanced configuration example: Provides a configuration example that combines WAN optimization, web caching, out-of-path WAN optimization, and the use of multiple VDOMs to apply protection profiles to sessions being optimized. SSL offloading for WAN optimization and web caching: Describes how to offload SSL processing from web sites to FortiGate units to improve WAN performance for SSL-protected web sites on a WAN. FortiClient WAN optimization: Describes how FortiGate and FortiClient WAN optimization work together and includes an example configuration. Using the FortiGate explicit web proxy: Describes the FortiGate web proxy and how to add web caching to a proxy configuration. This chapter includes guidance to pass to end-users when they need to configure their web browsers to use the proxy. WAN optimization storage: Describes how to configure WAN optimization storage settings to control how data is stored for web caching and byte caching.
Document conventions
Fortinet technical documentation uses the conventions described below.
IP addresses
To avoid publication of public IP addresses that belong to Fortinet or any other organization, the IP addresses used in Fortinet technical documentation are fictional and follow the documentation guidelines specific to Fortinet. The addresses used are from the private IP address ranges defined in RFC 1918: Address Allocation for Private Internets, available at http://ietf.org/rfc/rfc1918.txt?number-1918.
Note: Presents useful information, usually focused on an alternative, optional method, such as a shortcut, to perform a step.
Tip: Highlights useful additional information, often tailored to your workplace activity.
Typographical conventions
Fortinet documentation uses the following typographical conventions:
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Document conventions
Introduction
Button, menu, text box, From Minimum log level, select Notification. field, or check box label CLI input* config system dns set primary <address_ipv4> end FGT-602803030703 # get system settings comments : (null) opmode : nat HTTP connections are not secure and can be intercepted by a third party. <HTML><HEAD><TITLE>Firewall Authentication</TITLE></HEAD> <BODY><H4>You must authenticate to use this service.</H4> Visit the Fortinet Technical Support web site, https://support.fortinet.com. Type a name for the remote VPN peer or client, such as Central_Office_1. Go to VPN > IPSEC > Auto Key (IKE). For details, see the FortiGate Administration Guide. Note: Links typically go to the most recent version. To access earlier releases, go to http://docs.fortinet.com/. This link appears at the bottom of each page of this document. * For conventions used to represent command syntax, see CLI command syntax on page 11.
CLI output
10
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Introduction
Document conventions
Curly braces { }
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
11
Introduction
Table 2: Command syntax Options delimited by vertical bars | Mutually exclusive options. For example: {enable | disable} indicates that you must enter either enable or disable, but must not enter both. Non-mutually exclusive options. For example: {http https ping snmp ssh telnet} indicates that you may enter all or a subset of those options, in any order, in a space-delimited list, such as: ping https ssh Note: To change the options, you must re-type the entire list. For example, to add snmp to the previous example, you would type: ping https snmp ssh If the option adds to or subtracts from the existing list of options, instead of replacing it, or if the list is comma-delimited, the exception will be noted.
Training
Fortinet Training Services provides a variety of training programs to serve the needs of our customers and partners world-wide. Visit the Fortinet Training Services web site at http://campus.training.fortinet.com, or email [email protected].
12
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Introduction
Fortinet documentation
Fortinet documentation
The Fortinet Technical Documentation web site, http://docs.fortinet.com, provides the most up-to-date versions of Fortinet publications, as well as additional technical documentation such as technical notes. In addition to the Fortinet Technical Documentation web site, you can find Fortinet technical documentation on the Fortinet Tools and Documentation CD, and on the Fortinet Knowledge Base.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
13
Fortinet documentation
Introduction
14
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
15
Private network
As shown in Figure 1, the FortiGate units can be deployed as security devices that protect private networks connected to the WAN and also perform WAN optimization. In this configuration, the FortiGate units are configured as typical security devices for the private networks and are also configured for WAN optimization. The WAN optimization configuration intercepts traffic to be optimized as it passes through the FortiGate unit and uses a WAN optimization tunnel with another FortiGate unit to optimize the traffic that crosses the WAN. As shown in Figure 2, you can also deploy WAN optimization on single-purpose FortiGate units that only perform WAN optimization. In Figure 2, the WAN optimization FortiGate units are located on the WAN outside of the private networks. You can also install the WAN optimization FortiGate units behind the security devices on the private networks.
Figure 2: Single-purpose WAN optimization topology
Private network
Private network
WAN optimization
Security
The WAN optimization configuration is the same for FortiGate units deployed as security devices and for single-purpose WAN optimization FortiGate units. The only differences would result from the different network topologies.
Out-of-path topology
In an out-of-path topology, one or both of the FortiGate units configured for WAN optimization are not directly in the main data path. Instead, the out-of-path FortiGate unit is connected to a device on the data path, and the device is configured to redirect sessions to be optimized to the out-of-path FortiGate unit.
16
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Figure 3 shows out-of-path FortiGate units configured for WAN optimization and connected directly to FortiGate units in the data path. The FortiGate units in the data path use a method such as policy routing to redirect traffic to be optimized to the out-of-path FortiGate units. The out-of-path FortiGate units establish a WAN optimization tunnel between each other and optimize the redirected traffic.
Figure 3: Out-of-path WAN optimization
Private network Private network
Security
WAN
Security
One of the benefits of out-of-path WAN optimization is that out-of-path FortiGate units only perform WAN optimization and do not have to process other traffic. An in-path FortiGate unit configured for WAN optimization also has to process other non-optimized traffic on the data path. The out-of-path FortiGate units can operate in NAT/Route or Transparent mode. Other out-of-path topologies are also possible. For example, you can install the out-ofpath FortiGate units on the private networks instead of on the WAN. Also, the out-of-path FortiGate units can have one connection to the network instead of two. In a one-arm configuration such as this, firewall policies and routing have to be configured to send the WAN optimization tunnel out the same interface as the one that received the traffic.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
17
Private network
Private network
WAN optimization
Security
Private network
Security
You can also configure WAN optimization between FortiGate units with different roles on the WAN. FortiGate units configured as security devices and for WAN optimization can perform WAN optimization as if they are single-purpose FortiGate units just configured for WAN optimization.
18
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Private network
You can also configure a reverse proxy web-cache-only WAN optimization (Figure 6). In this configuration, users on the Internet browse to a web server installed behind a FortiGate unit. The FortiGate unit intercepts the web traffic and caches pages from the web server. Reverse proxy web caching on the FortiGate unit reduces the number of requests that the web server must handle, leaving it free to process new requests that it has not serviced before.
Figure 6: Reverse proxy web caching
Web server network Reverse proxy WAN optimization web cache WAN, LAN, or Internet Internet users
Private network
The topology in Figure 7 is the same as that of Figure 1 on page 16 with the addition of web caching to the FortiGate unit in front of the private network that includes the web servers. In a similar way, you can add web caching to all of the topologies shown in WAN optimization topologies on page 15.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
19
Private network
WAN optimization
If your FortiGate unit supports web caching, you can also add web caching to the explicit web proxy. The FortiGate unit will then caches Internet web pages to improve web browsing performance.
20
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
When a client-side FortiGate unit matches a session with a WAN optimization rule, it uses the information in the rule to attempt to start a WAN optimization tunnel with a server-side FortiGate unit installed in front of the server network. This FortiGate unit must include a WAN optimization rule to accept WAN optimization tunnel requests from the client-side FortiGate unit. Firewall policies are not required on the server-side FortiGate unit. Sessions from the client-side to the server-side FortiGate unit are WAN optimization tunnel requests. As long as the server-side FortiGate unit contains WAN optimization rules, it will accept WAN optimization tunnel requests. These tunnel requests, however, will only result in an operating tunnel if the FortiGate unit peers can authenticate with each other.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
21
Server network
To identify all of the WAN optimization peers that a FortiGate unit can perform WAN optimization with, you add host IDs and IP addresses of all of the peers to the FortiGate unit configuration. The peer IP address is actually the IP address of the peer unit interface that communicates with the FortiGate unit.
22
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Client network
3 2
3 2
Server network
Packets
WAN
Packets
Before a tunnel can be started, the peers must be configured to authenticate with each other and to agree on the tunnel configuration. Then, the client-side peer attempts to start a WAN optimization tunnel with the server-side peer. Once the peers authenticate with each other, they bring up the tunnel and WAN optimization communication over the tunnel starts. After a tunnel has been established, multiple WAN optimization sessions can start and stop between peers without restarting the tunnel.
Tunnel sharing
You can use the tunnel-sharing WAN optimization rule CLI keyword to configure tunnel sharing for WAN optimization rules with auto-detect set to off. Tunnel sharing means multiple WAN optimization sessions share the same WAN optimization tunnel. Tunnel sharing can improve WAN performance by reducing the number of WAN optimization tunnels between FortiGate units. Having fewer tunnels means less data to manage. Also, tunnel setup requires more than one exchange of information between the ends of the tunnel. Once the tunnel is set up, each new session that shares the tunnel avoids tunnel setup delays. Tunnel sharing also uses bandwidth more efficiently by reducing the chances that small packets will be sent down the tunnel. Processing small packets reduces network throughput, so reducing the number of small packets improves performance. A shared tunnel can combine all the data from the sessions being processed by the tunnel and send the data together. For example, suppose a FortiGate unit is processing five WAN optimization sessions and each session has 100 bytes to send. If these sessions use a shared tunnel, WAN optimization combines the packets from all five sessions into one 500-byte packet. If each session uses its own private tunnel, five 100-byte packets will be sent instead. Each packet also requires a TCP ACK reply. The combined packet in the shared tunnel requires one TCP ACK packet. The separate packets in the private tunnels require five. Tunnel sharing is not always recommended. Aggressive and non-aggressive protocols should not share the same tunnel. An aggressive protocol can be defined as a protocol that is able to get more bandwidth than a non-aggressive protocol. (The aggressive protocols can starve the non-aggressive protocols.) HTTP and FTP are considered aggressive protocols. If aggressive and non-aggressive protocols share the same tunnel, the aggressive protocols may take all of the available bandwidth. As a result, the performance of less aggressive protocols could be reduced. To avoid this problem, rules for HTTP and FTP traffic should have their own tunnel. To do this, set tunnel-sharing to private for WAN optimization rules that accept HTTP or FTP traffic.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
23
Protocol optimization
It is also useful to set tunnel-sharing to express-sharing for applications, such as Telnet, that are very interactive but not aggressive. Express sharing optimizes tunnel sharing for Telnet and other interactive applications where latency or delays would seriously affect the users experience with the protocol. Set tunnel-sharing to sharing for applications that are not aggressive and are not sensitive to latency or delays. WAN optimization rules set to sharing and expresssharing can share the same tunnel.
Protocol optimization
Protocol optimization techniques optimize bandwidth use across the WAN. These techniques can improve the efficiency of communication across the WAN optimization tunnel by reducing the amount of traffic required by communication protocols. You can apply protocol optimization to Common Internet File System (CIFS), FTP, HTTP, MAPI, and general TCP sessions. For example, CIFS provides file access, record locking, read/write privileges, change notification, server name resolution, request batching, and server authentication. CIFS is a fairly chatty protocol, requiring many background transactions to successfully transfer a single file. This is usually not a problem across a LAN. However, across a WAN, latency and bandwidth reduction can slow down CIFS performance. When you set Protocol to CIFS in a WAN optimization rule, the FortiGate units at both ends of the WAN optimization tunnel use a number of techniques to reduce the number of background transactions that occur over the WAN for CIFS traffic. You can select only one protocol in a WAN optimization rule. For best performance, you should separate the traffic by protocol by creating different WAN optimization rules for each protocol. For example, to optimize HTTP traffic, you should set Port to 80 so that only HTTP traffic is accepted by this WAN optimization rule. For an example configuration that uses multiple rules for different protocols, see Example: Basic active-passive WAN optimization on page 47.
Figure 14: Example WAN optimization rule to optimize HTTP traffic
If the WAN optimization accepts a range of different types of traffic, you can set Protocol to TCP to apply general optimization techniques to TCP traffic. However, applying this TCP optimization to a range of different types of traffic is not as effective as applying more protocol-specific optimization to specific types of traffic. TCP protocol optimization uses techniques such as TCP SACK support, TCP window scaling and window size adjustment, and TCP connection pooling to remove TCP bottlenecks.
24
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Byte caching
Byte caching
Byte caching breaks large units of application data (for example, a file being downloaded from a web page) into small chunks of data, labelling each chunk of data with a hash of the chunk and storing those chunks and their hashes in a database. The database is stored on a WAN optimization storage device. Then, instead of sending the actual data over the WAN tunnel, the FortiGate unit sends the hashes. The FortiGate unit at the other end of the tunnel receives the hashes and compares them with the hashes in its local byte caching database. If any hashes match, that data does not have to be transmitted over the WAN optimization tunnel. The data for any hashes that does not match is transferred over the tunnel and added to that byte caching database. Then the unit of application data (the file being downloaded) is reassembled and sent to its destination. Byte caching is not application specific. Bytes cached from a file in an email can be used to optimize downloading that same file or a similar file from a web page. The result is less data transmitted over the WAN. Initially, byte caching may reduce performance until a large enough byte caching database is built up. To enable byte caching, you select Enable Byte Cache in a WAN optimization rule. The Protocol setting does not affect byte caching. Data is byte cached when it is processed by a WAN optimization rule that includes byte caching. Byte caching cannot determine whether or not a file is compressed (for example a zip file), and caches compressed and non-compressed versions of the same file separately.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
25
Protocol
Reduction Rate Displays each applications optimization rate. For example, a rate of 80% means the amount of data processed by that application has been reduced by 20%. LAN WAN The amount of data in MB received from the LAN for each application. The amount of data in MB sent across the WAN for each application. The greater the difference between the LAN and WAN data, the greater the amount of data reduced by WAN optimization byte caching, web caching, and protocol optimization. This section shows network bandwidth optimization per time period. A line or column chart compares an applications pre-optimized (LAN data) size with its optimized size (WAN data).
Bandwidth Optimization
26
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Select to refresh the Bandwidth Optimization display. Select a time frame to show bandwidth optimization. You can select: Last 10 Minutes Last 1 Hour Last 1 Day Last 1 Week Last 1 Month Select All to display bandwidth optimization for all applications. Select an individual protocol to display bandwidth optimization for that individual protocol. Select to display bandwidth optimization with a line chart or a column chart.
Protocol
Chart Type
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
27
28
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
29
Accepting any peer is useful if you have many peers or if peer IP addresses change. For example, you could have many travelling FortiClient peers with IP addresses that are always changing as the users travel to different customer sites. This configuration is also useful if you have FortiGate units with dynamic external IP addresses (using DHCP or PPPoE). For most other situations, this method is not recommended as it is less secure than accepting defined peers or a single peer. For more information, see Configuring authentication groups on page 32.
For information about configuring the local host ID, peers and authentication groups, see Configuring peers on page 31 and Configuring authentication groups on page 32. The authentication group is optional unless the tunnel is a secure tunnel. For more information, see Secure tunneling on page 34. If the tunnel request includes an authentication group, the authentication will be based on the settings of this group as follows: The server-side FortiGate unit searches its own configuration for the name of the authentication group in the tunnel request. If no match is found, the authentication fails. If a match is found, the server-side FortiGate unit compares the authentication method in the client and server authentication groups. If the methods do not match, the authentication fails. If the authentication methods match, the server-side FortiGate unit tests the peer acceptance settings in its copy of the authentication group. If the setting is Accept Any Peer, the authentication is successful. If the setting is Specify Peer, the server-side FortiGate unit compares the client-side local host ID in the tunnel request with the peer name in the server-side authentication group. If the names match, authentication is successful. If a match is not found, authentication fails. If the setting is Accept Defined Peers, the server-side FortiGate unit compares the client-side local host ID in the tunnel request with the server-side peer list. If a match is found, authentication is successful. If a match is not found, authentication fails.
If the tunnel request does not include an authentication group, authentication will be based on the client-side local host ID in the tunnel request. The server-side FortiGate unit searches its peer list to match the client-side local host ID in the tunnel request. If a match is found, authentication is successful. If a match is not found, authentication fails. If the server-side FortiGate unit successfully authenticates the tunnel request, the serverside FortiGate unit sends back a tunnel setup response message. This message includes the server-side local host ID and the authentication group that matches the one in the tunnel request.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
30
Configuring peers
The client-side FortiGate unit then performs the same authentication procedure as the server-side FortiGate unit did. If both sides succeed, tunnel setup continues.
Configuring peers
When you configure peers, you first need to add the local host ID that identifies the FortiGate unit for WAN optimization and then add the peer host ID and IP address of each FortiGate unit with which a FortiGate unit can create WAN optimization tunnels.
Figure 16: WAN optimization peer list
Delete Edit
To configure WAN optimization peers - web-based manager 1 Go to Wan Opt. & Cache > Peer. 2 For Local Host ID, enter the local host ID of this FortiGate unit and select Apply. If you add this FortiGate unit as a peer to another FortiGate unit, use this ID as its peer host ID. 3 Select Create New to add a new peer. 4 For Peer Host ID, enter the peer host ID of the peer FortiGate unit. This is the local host ID added to the peer FortiGate unit. 5 For IP Address, add the IP address of the FortiGate unit. Usually this is the IP address of the FortiGate interface connected to the WAN. 6 Select OK. To configure WAN optimization peers - CLI In this example, the local host ID is named HQ_Peer and has an IP address of 172.20.120.100. Three peers are added, but you can add any number of peers that are on the WAN. 1 Enter the following command to set the local host ID to HQ_Peer. config wanopt settings set host-id HQ_peer end 2 Enter the following commands to add three peers. config wanopt peer edit Wan_opt_peer_1 set ip 172.20.120.100 next edit Wan_opt_peer_2
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
31
Delete Edit
To add an authentication group - web-based manager Use the following steps to add any kind of authentication group. It is assumed that if you are using a local certificate to authenticate, it is already added to the FortiGate unit. For more information, see the FortiGate Certificate Management Guide. 1 Go to Wan Opt. & Cache > Peer > Authentication Group. 2 Select Create New.
32
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
3 Add a Name for the authentication group. You will select this name when you add the authentication group to a WAN optimization rule. 4 Select the Authentication Method. Select Certificate if you want to use a certificate to authenticate and encrypt WAN optimization tunnels. You must also select a local certificate that has been added to this FortiGate unit. (To add a local certificate, go to System > Certificates > Local Certificates.) Other FortiGate units that participate in WAN optimization tunnels with this FortiGate unit must have an authentication group with the same name and certificate. Select Pre-shared key if you want to use a pre-shared key or password to authenticate and encrypt WAN optimization tunnels. You must also add a Password (or pre-shared key) used by the authentication group. Other FortiGate units that participate in WAN optimization tunnels with this FortiGate unit must have an authentication group with the same name and password. The password must contain at least 6 printable characters and should be known only by network administrators. For optimum protection against currently known attacks, the key should consist of a minimum of 16 randomly chosen alphanumeric characters. 5 Configure Peer Acceptance for the authentication group. Select Accept Any Peer if you do not know the peer host IDs or IP addresses of the peers that will use this authentication group. This setting is most often used for WAN optimization with the FortiClient application or with FortiGate units that do not have static IP addresses, for example units that use DHCP. Select Accept Defined Peers if you want to authenticate with peers added to the peer list only. Select Specify Peer and select one of the peers added to the peer list to authenticate with the selected peer only. For more information, see Configuring peers on page 31. 6 Select OK. 7 Add the authentication group to a WAN optimization rule to apply the authentication settings in the authentication group to the rule. For more information, see Configuring WAN optimization rules on page 42. To add an authentication group that uses a certificate- CLI Enter the following command to add an authentication group that uses a certificate and can authenticate all peers added to the FortiGate unit configuration. In this example, the authentication group is named auth_grp_1 and uses a certificate named Example_Cert. config wanopt auth-group edit auth_grp_1 set auth-method cert set cert Example_Cert set peer-accept defined end To add an authentication group that uses a pre-shared key - CLI Enter the following command to add an authentication group that uses a pre-shared key and can authenticate only the peer added to the authentication group.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
33
Secure tunneling
In this example, the authentication group is named auth_peer, the peer that the group can authenticate is named Server_net, and the authentication group uses 123456 as the pre-shared key. In practice you should use a more secure pre-shared key. config wanopt auth-group edit auth_peer set auth-method psk set psk 123456 set peer-accept one set peer Server_net end To add an authentication group that accepts WAN optimization connections from any peer - web-based manager Add an authentication group that accepts any peer for situations where you do not have the Peer Host IDs or IP Addresses of the peers that you want to perform WAN optimization with. This setting is most often used for WAN optimization with the FortiClient application or with FortiGate units that do not have static IP addresses, for example units that use DHCP. An authentication group that accepts any peer is less secure than an authentication group that accepts defined peers or a single peer. The example below sets the authentication method to Pre-shared key. You must add the same password to all FortiGate units using this authentication group. 1 Go to Wan Opt. & Cache > Peer > Authentication Group. 2 Select Create New to add a new authentication group. 3 Configure the authentication group:
Name Authentication Method Password Peer Acceptance Specify any name. Pre-shared key Enter a pre-shared key. Accept Any Peer
To add an authentication group that accepts WAN optimization connections from any peer - CLI In this example, the authentication group is named auth_grp_1. It uses a certificate named WAN_Cert and accepts any peer. config wanopt auth-group edit auth_grp_1 set auth-method cert set cert WAN_Cert set peer-accept any end
Secure tunneling
You can configure WAN optimization rules to use AES-128bit-CBC SSL to encrypt the traffic in the WAN optimization tunnel. WAN optimization uses FortiASIC acceleration to accelerate SSL decryption and encryption of the secure tunnel. The secure tunnel uses the same TCP port as a non-secure tunnel (TCP port 7810).
34
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Secure tunneling
To use secure tunneling, you must select Enable Secure Tunnel in a WAN optimization rule and add an authentication group. The authentication group specifies the certificate or pre-shared key used to set up the secure tunnel. You can add a new authentication group to support secure tunneling or you can use an authentication group that was already added for tunnel authentication. The Peer Acceptance setting of the authentication group does not affect secure tunneling. The FortiGate units at each end of the secure tunnel must have the same authentication group with the same name and the same configuration, including the same pre-shared key or certificate. To use certificates you must install the same certificate on both FortiGate units. For active-passive WAN optimization you select Enable Secure Tunnel only in the active rule. In peer-to-peer WAN optimization you select Enable Secure Tunnel in the WAN optimization rule on both FortiGate units. For information about active-passive and peerto-peer WAN optimization, see Configuring WAN optimization rules on page 37. For a secure tunneling configuration example, see Example: Adding secure tunneling to an active-passive WAN optimization configuration on page 57. Secure tunneling is also used in the configuration example: Example: SSL offloading for a WAN optimization tunnel on page 103.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
35
Secure tunneling
36
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
37
WAN optimization does not apply source and destination NAT settings included in firewall policies. This means that selecting NAT or adding virtual IPs in a firewall policy does not affect WAN optimized traffic. WAN optimization is also not compatible with firewall load balancing. However, traffic accepted by these policies that is not WAN optimized is processed as expected. WAN optimization is compatible with identity-based firewall policies. If a session is allowed after authentication and if the identity-based policy that allows the session does not include a protection profile, the session can be processed by matching WAN optimization rules. Firewall traffic shaping is compatible with client/server (active-passive) transparent mode WAN optimization rules. Traffic shaping is ignored for peer-to-peer WAN optimization and for client/server WAN optimization not operating in transparent mode.
If transparent mode is not selected, the source address of the packets received by servers is changed to the address of the server-side FortiGate unit interface that sends the packets to the servers. So servers appear to receive packets from the server FortiGate unit. Routing on the server network is simpler in this case because client addresses are not involved. All traffic appears to come from the server FortiGate unit and not from individual clients.
Note: Do not confuse WAN optimization transparent mode with FortiGate Transparent mode. WAN optimization transparent mode is configured in individual WAN optimization rules. FortiGate Transparent mode is a system setting that controls how the FortiGate unit (or a VDOM) processes traffic.
38
Then you add WAN optimization rules that: match WAN traffic to be optimized that is accepted by a firewall policy according to source and destination addresses and destination port of the traffic add the WAN optimization techniques to be applied to the traffic.
To view the WAN optimization rule list, go to WAN Opt. & Cache > Rule.
Figure 18: WAN optimization rule list
Edit Delete
Protocol Peer Mode SSL Secure Tunnel Delete icon Edit icon
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
39
Insert WAN Add a new rule above the corresponding rule (the New rule screen appears). Optimization Rule Before icon Move To icon Move the corresponding rule before or after another rule in the list. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
Exception
General
FTP sessions (using port 21) would immediately match the secure tunnel rule. Other kinds of services would not match the FTP rule, so rule evaluation would continue until the search reaches the matching general rule. This rule order has the intended effect. But if you reversed the order of the two rules, positioning the general rule before the FTP rule, all session, including FTP, would immediately match the general rule, and the rule to secure FTP would never be applied. This rule order would not have the intended effect.
40
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Figure 20: Example: secure tunneling for FTP incorrect rule order
General
Exception
Similarly, if specific traffic requires exceptional WAN optimization rule settings, you would position those rules above other potential matches in the rule list. Otherwise, the other matching rules would take precedence, and the required exceptional settings might never be used.
To move a rule in the WAN optimization rule list - web-based manager 1 Go to WAN Opt & Cache > Rule. 2 In the rule list, note the ID of a rule that is before or after your intended destination. 3 In the row corresponding to the rule that you want to move, select the Move To icon. 4 Select Before or After, and enter the ID of the rule that is before or after your intended destination. This specifies the rules new position in the WAN optimization rule list. 5 Select OK. To move a rule in the WAN optimization rule list - CLI 1 Use the following command to move a WAN optimization rule with ID 34 above the rule in the rule list with ID 10. config wanopt rule move 34 before 10 end 2 Use the following command to move a WAN optimization rule with ID 5 after the rule in the rule list with ID 1. config wanopt rule move 5 after 1 end
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
41
The netmask corresponds to the subnet class of the address being added, and can be represented in either dotted decimal or CIDR format. The FortiGate unit automatically converts CIDR-formatted netmasks to dotted decimal format. Example formats: netmask for a single computer: 255.255.255.255, or /32 netmask for a class A subnet: 255.0.0.0, or /8 netmask for a class B subnet: 255.255.0.0, or /16 netmask for a class C subnet: 255.255.255.0, or /24 netmask including all IP addresses: 0.0.0.0 x.x.x.x/x.x.x.x, such as 192.168.1.0/255.255.255.0 x.x.x.x/x, such as 192.168.1.0/24
Note: An IP address 0.0.0.0 with netmask 255.255.255.255 is not a valid source or destination address.
When representing hosts by an IP range, the range indicates hosts with continuous IP addresses in a subnet, such as 192.168.1.[2-10], or 192.168.1.* to indicate the complete range of hosts on that subnet. Valid IP range formats include: x.x.x.x-x.x.x.x, such as 192.168.110.100-192.168.110.120 x.x.x.[x-x], such as 192.168.110.[100-120] x.x.x.*, such as 192.168.110.*
42
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To add a WAN optimization rule - web-based manager 1 Go to WAN Opt. & Cache > Rule and select Create New. 2 Configure the WAN optimization rule, using the guidance in the following table, and select OK.
Mode Select Full Optimization to add a rule that can apply all WAN optimization features. Select Web Cache Only to add a rule that just applies web caching. If you select Web Cache Only, you can configure the source and destination address and port for the rule. You can also select Transparent Mode and Enable SSL. Enter an IP address, followed by a forward slash (/), then subnet mask, or enter an IP address range separated by a hyphen. For more information, see WAN optimization address formats on page 42. Only packets whose source address header contains an IP address matching this IP address or address range will be accepted by and subject to this rule. For a passive rule, the server (passive) source address range should be compatible with the source addresses of the matching client (active) rule. To match one passive rule with many active rules, the passive rule source address range should include the source addresses of all of the active rules. Enter an IP address, followed by a forward slash (/), then subnet mask, or enter an IP address range separated by a hyphen. For more information, see WAN optimization address formats on page 42. Only a packet whose destination address header contains an IP address matching this IP address or address range will be accepted by and subject to this rule. Tip: For a Web Cache Only rule, if you set Destination to 0.0.0.0, the rule caches web pages on the Internet or any network. For a passive rule, the server (passive) destination address range should be compatible with the destination addresses of the matching client (active) rule. To match one passive rule with many active rules, the passive rule destination address range should include the destination addresses of all of the active rules. Port Enter a single port number or port number range. Only packets whose destination port number matches this port number or port number range will be accepted by and subject to this rule. For a passive rule, the server (passive) port range should be compatible with the port range of the matching client (active) rule. To match one passive rule with many active rules, the passive rule port range should include the port ranges of all of the active rules.
Source
Destination
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
43
Auto-Detect
Available only if Mode is set to Full Optimization. Specify whether the rule is Active (client), Passive (server) or if Auto-Detect is Off. If Auto-Detect is Off, the rule is a peer-to-peer rule. For an Active (client) rule, you must select all of the WAN optimization features to be applied by the rule. You can select the protocol to optimize, transparent mode, byte caching, SSL offloading, secure tunneling, and an authentication group. A Passive (server) rule uses the settings in the active rule on the client FortiGate unit to apply WAN optimization settings. You can also select web caching for a passive rule. If Auto-Detect is Off, the rule must include all required WAN optimization features and you must select a Peer for the rule. Select this option to configure peer-topeer WAN optimization where this rule can start a WAN optimization tunnel with this peer only. Available only if Mode is set to Full Optimization, and Auto-Detect is set to Off or Active. Select CIFS, FTP, HTTP, or MAPI to apply protocol optimization for one of these protocols. For information about protocol optimization, see Protocol optimization on page 24. Select TCP if the WAN optimization tunnel accepts sessions that use more than one protocol or that do not use the CIFS, FTP, HTTP, or MAPI protocol. Available only if Mode is set to Full Optimization, and Auto-Detect is set to Off. Select the peer host ID of the peer that this peer-to-peer WAN optimization rule will start a WAN optimization tunnel with. You can also select [Create New...] from the list to add a new peer. Available only if Mode is set to Full Optimization, and Auto-Detect is set to Off or Passive. If Auto-Detect is set to Off, then Protocol must be set to HTTP. Select to apply WAN optimization web caching to the sessions accepted by this rule. For more information, see Using web caching on page 63. Available only if Mode is set to Full Optimization and Auto-Detect is set to Active or Off, or if Mode is set to Web Cache Only. Servers receiving packets after WAN optimization see different source addresses depending on whether or not you select Transparent Mode. For more information, see WAN optimization transparent mode on page 38. Available only if Mode is set to Full Optimization, and Auto-Detect is set to Off or Active. Select to apply WAN optimization byte caching to the sessions accepted by this rule. For more information, see Byte caching on page 25. Available only if Auto-Detect is set to Active or Off. Select to apply SSL offloading for HTTPS traffic. You can use SSL offloading to offload SSL encryption and decryption from one or more HTTP servers to the FortiGate unit. If you enable this option, you must configure the rule to accept SSL-encrypted traffic. For example, you can configure the rule to accept HTTPS traffic by setting Port to 443. If you enable SSL offloading, you must also use the CLI command config wanopt ssl-server to add an SSL server for each HTTP server that you want to offload SSL encryption/decryption for. For more information, see SSL offloading for WAN optimization and web caching on page 103.
Protocol
Peer
Transparent Mode
Enable SSL
Enable Secure Available only if Mode is set to Full Optimization, and Auto-Detect is set to Active or Off. Tunnel If you select Enable Secure Tunnel, the WAN optimization tunnel is encrypted using SSL encryption. You must also add an authentication group to the rule. For more information, see Secure tunneling on page 34. Authentication Available only if Mode is set to Full Optimization, and Auto-Detect is set to Active or Off. Group Select this option and select an authentication group from the list if you want groups of FortiGate units to authenticate with each other before starting the WAN optimization tunnel. You must also select an authentication group if you select Enable Secure Tunnel. You must add identical authentication groups to both of the FortiGate units that will participate in the WAN optimization tunnel started by the rule. For more information, see Configuring authentication groups on page 32.
44
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To add a WAN optimization rule - CLI Using the guidance in the previous table, enter the following commands. For more information, see the wanopt and rules listings in the FortiGate CLI Reference. config wanopt rule edit <index_int> set auth-group <auth_group_name> set auto-detect {active | off | passive} set byte-caching {disable | enable} set dst-ip <address_ipv4>[-<address-ipv4>] set mode {full | webcache-only} set peer <peer_name> set port <port_int>[-<port-int>] set proto {cifs | ftp | http | mapi | tcp} set secure-tunnel {disable | enable} set src-ip <address_ipv4>[-<address-ipv4>] set ssl {disable | enable} set status {disable | enable} set transparent {disable | enable} set tunnel-non-http {disable | enable} set tunnel-sharing {express-shared | private | shared} set unknown-http-version {best-effort | reject | tunnel} set webcache {disable | enable} end
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
45
46
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
You can do this by adding three active WAN optimization rules to the client-side FortiGate unit, one for each protocolwith port set to 80 for the HTTP rule, 21 for the FTP rule and 1-65535 for the CIFS rule. Then you arrange the rules in the WAN optimization rule list with the CIFS rule last because the HTTP and FTP rules include single port numbers.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
47
To configure peers on the client-side FortiGate unit and add a firewall policy 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the client-side FortiGate unit:
Local Host ID User_net
48
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
3 Select Create New and add a Peer Host ID and the IP Address for the server-side FortiGate unit:
Peer Host ID IP Address Web_servers 192.168.20.1
4 Select OK. 5 Go to Firewall > Policy and select Create New to add a firewall policy to the client-side FortiGate unit to accept the traffic to be optimized:
Source Interface/Zone Source Address Destination Interface/Zone Schedule Service Action port1 all port2
To add the active rules to the client-side FortiGate unit 1 Go to WAN Opt. & Cache > Rule. 2 Select Create New to add the active rule to optimize CIFS traffic from IP addresses 172.20.120.100 to 172.20.120.200:
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Full Optimization 172.20.120.[100-200] 192.168.10.0 1 - 65535 Active CIFS Select
3 Select OK. 4 Select Create New to add the active rule to optimize HTTP traffic for IP addresses 172.20.120.100 to 172.20.120.150:
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Full Optimization 172.20.120.[100-150] 192.168.10.0 80 Active HTTP Select
5 Select OK.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
49
6 Select Create New to add the active rule to optimize FTP traffic from IP addresses 172.20.120.151 172.20.120.200:
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Full Optimization 172.20.120.[151-200] 192.168.10.0 21 Active FTP Select
7 Select OK. 8 If required, use the Move To icon to change the order of the rules in the list so that the HTTP and FTP rules are above the CIFS rule in the list. You may need to do this if you have other WAN optimization rules in the list. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
Figure 25: HTTP, FTP, and CIFS rules in the rule list
To configure the server-side FortiGate unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the server-side FortiGate unit:
Local Host ID Web_servers
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the client-side FortiGate unit:
Peer Host ID IP Address User_net 172.30.120.1
4 Select OK. 5 Go to WAN Opt. & Cache > Rule and select Create New. 6 Add the passive rule. The source address matches the 172.20.120.100 to 172.20.120.200 IP address range and the 1-65535 port range. You can also enable web caching for the HTTP traffic:
Mode Source Destination Full Optimization 172.20.120.[100-200] 192.168.10.0
50
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
7 Select OK. The rule is added to the bottom of the rule list. 8 If required, move the rule to a different position in the list so that the tunnel request from the client-side FortiGate unit matches with this rule. For more information, see Moving a rule to a different position in the rule list on page 41.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
51
To add the active rules to the client-side FortiGate unit 1 Add the following active rule to optimize CIFS traffic for IP addresses 172.20.120.100 to 172.20.120.200: config wanopt rule edit 2 set auto-detect active set src-ip 172.20.120.100-172.20.120.200 set dst-ip 192.168.10.0 set port 1-65535 set proto cifs end Accept default settings for transparent (enable), status (enable), mode (full), byte-caching (enable), ssl (disable), secure-tunnel (disable), auth-group (null), unknown-http-version (tunnel), and tunnel-non-http (disable). 2 Add the following active rule to optimize HTTP traffic for IP addresses 172.20.120.100 to 172.20.120.150: config wanopt rule edit 3 set auto-detect active set src-ip 172.20.120.100-172.20.120.150 set dst-ip 192.168.10.0 set port 80 end Accept default settings for transparent (enable), proto (http), status (enable), mode (full), byte-caching (enable), ssl (disable), securetunnel (disable), auth-group (null), unknown-http-version (tunnel), and tunnel-non-http (disable). 3 Add the following active rule to optimize FTP traffic from IP addresses 172.20.120.151 172.20.120.200: config wanopt rule edit 4 set auto-detect active set src-ip 172.20.120.151-172.20.120.200 set dst-ip 192.168.10.0 set port 21 set proto ftp end Accept default settings for transparent (enable), status (enable), mode (full), byte-caching (enable), ssl (disable), secure-tunnel (disable), authgroup (null), unknown-http-version (tunnel), and tunnel-non-http (disable). 4 If required, use the move command to change the order of the rules in the list so that the HTTP and FTP rules are above the CIFS rule in the list. You may need to do this if you have other WAN optimization rules in the list. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41. To configure the server-side FortiGate unit 1 Add the Local Host ID to the server-side FortiGate configuration:
52
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
config wanopt settings set host-id Web_servers end 2 Add the client-side Local Host ID to the server-side peer list: config wanopt peer edit User_net set ip 172.20.120.1 end 3 Add the following passive rule to the server-side FortiGate unit: config wanopt rule edit 5 set auto-detect passive set src-ip 172.20.120.[100-200] set dst-ip 192.168.10.0 set port 1-65535 set webcache enable end Accept default settings for status (enable) and mode (full). 4 If required, use the move command to move the rule to a different position in the list so that the tunnel request from the client-side FortiGate unit matches with this rule. For more information, see Moving a rule to a different position in the rule list on page 41.
In a peer-to-peer WAN optimization configuration you create a peer-to-peer WAN optimization rule on the client-side FortiGate unit with Auto-Detect to Off and include the peer host ID of the server-side FortiGate unit. Using this rule, the client-side FortiGate unit can create a WAN optimization tunnel only with the peer that is added to the rule. You do not have to add a rule to the server-side FortiGate unit. But the server-side FortiGate unit peer list must include the client FortiGate unit. The server-side FortiGate unit uses the WAN optimization settings in the client-side rule.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
53
54
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To configure the client-side FortiGate unit and firewall policy 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the client-side FortiGate unit:
Local Host ID Peer_Fgt_1
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the server-side FortiGate unit:
Peer Host ID IP Address Peer_Fgt_2 192.168.30.12
4 Select OK. 5 Go to Firewall > Policy and add a firewall policy to the client-side FortiGate unit that accepts traffic to be optimized:
Source Interface/Zone Source Address Destination Interface/Zone Schedule Service Action port1 all port2
6 Go to WAN Opt. & Cache > Rule and select Create New. 7 Configure the rule:
Mode Source Destination Port Auto-Detect Protocol Peer Transparent Mode Full Optimization 172.20.120.0 192.168.10.0 1-65535 Off MAPI Peer_Fgt_2 Select
8 Select OK. The rule is added to the bottom of the WAN optimization list. 9 If required, move the rule to a different position in the list so that the rule accepts the required MAPI sessions. Depending on your rule list configuration, this may involve moving the rule above more general rules that would also match MAPI traffic. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
55
To configure the server-side FortiGate unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the server-side FortiGate unit:
Local Host ID Peer_Fgt_2
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the peer side FortiGate unit:
Peer Host ID IP Address Peer_Fgt_1 172.20.34.12
4 Select OK.
56
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
end Accept default settings for auto-detect (off), transparent (enable), status (enable), mode (full), byte-caching (enable), ssl (disable), secure-tunnel (disable), auth-group (null), unknown-http-version (tunnel), and tunnel-non-http (disable). 5 If required, move the rule to a different position in the list. For more information, see Moving a rule to a different position in the rule list on page 41. 6 If required, use the move command to change the order of the rules in the list so that the rule accepts the required MAPI sessions. Depending on your rule list configuration, this may involve moving the rule above more general rules that would also match MAPI traffic. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41. To configure the server-side FortiGate unit 1 Add the Local Host ID to the server-side FortiGate configuration: config wanopt settings set host-id Peer_Fgt_2 end 2 Add the client-side Local Host ID to the server-side peer list: config wanopt peer edit Peer_Fgt_1 set ip 192.168.30.12 end
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
57
Figure 29: Example active-passive WAN optimization and secure tunneling topology
Web server network 192.168.10.0 Client-side (active rule) Local Host ID: User_net WAN IP address 172.30.120.1 IP address 192.168.20.1 Server-side (passive rule) Local Host ID: Web_servers
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the server-side FortiGate unit:
Peer Host ID IP Address Web_servers 192.168.20.1
4 Select OK. 5 Go to Firewall > Policy and select Create New to add a firewall policy to the client-side FortiGate unit to accept the traffic to be optimized:
Source Interface/Zone Source Address port1 all
58
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
port2
To add the authentication group and WAN optimization rule to the client-side FortiGate unit 1 Go to Wan Opt. & Cache > Peer > Authentication Group. 2 Select Create New to add a new authentication group to be used for secure tunneling:
Name Authentication Method Password Peer Acceptance Auth_Secure_Tunnel Pre-shared key 2345678 Accept Any Peer
3 Select OK. 4 Go to Wan Opt. & Cache > Rule. 5 Select Create New to add an active rule that enables secure tunneling and includes the authentication group:
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Enable Byte Caching Enable Secure Tunnel Authentication Group Full Optimization 172.20.120.[100-200] 192.168.10.0 80 Active HTTP Select Select Select Auth_Secure_Tunnel
6 Select OK. To configure peers on the server-side FortiGate unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the server-side FortiGate unit:
Local Host ID Web_servers
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the client-side FortiGate unit:
Peer Host ID IP Address User_net 172.30.120.1
4 Select OK.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
59
To add the authentication group and WAN optimization rule to the server-side FortiGate unit 1 Go to Wan Opt. & Cache > Peer > Authentication Group. 2 Select Create New and add a new authentication group to be used for secure tunneling:
Name Authentication Method Password Peer Acceptance Auth_Secure_Tunnel Pre-shared key 2345678 Accept Any Peer
3 Go to WAN Opt. & Cache > Rule and select Create New. 4 Add the passive rule. The source address matches the 172.20.120.100 to 172.20.120.200 IP address range and the 1-65535 port range. You can also enable web caching for HTTP traffic:
Mode Source Destination Port Auto-Detect Enable Web Cache Full Optimization 172.20.120.[100-200] 192.168.10.0 1-65535 Passive Select
5 Select OK.
60
end end To add the authentication group and WAN optimization rule to the client-side FortiGate unit 1 Add a new authentication group to be used for secure tunneling: config wanopt auth-group edit Auth_Secure_Tunnel set auth-method psk set psk 2345678 end Leave peer-accept at its default value. 2 Add the following active rule to optimize HTTP traffic for IP addresses 172.20.120.100 to 172.20.120.200: config wanopt rule edit 1 set auto-detect active set src-ip 172.20.120.100-172.20.120.200 set dst-ip 192.168.10.0 set port 80 set proto http set secure-tunnel enable set auth-group Auth_Secure_Tunnel end Leave the rest of the settings at their default values. To configure peers on the server-side FortiGate unit 1 Add the Local Host ID to the server-side FortiGate configuration: config wanopt settings set host-id Web_servers end 2 Add the client-side Local Host ID to the server-side peer list: config wanopt peer edit User_net set ip 172.20.120.1 end To add the authentication group and WAN optimization rule to the server-side FortiGate unit 1 Add a new authentication group to be used for secure tunneling: config wanopt auth-group edit Auth_Secure_Tunnel set auth-method psk set psk 2345678 end Leave peer-accept at its default value. 2 Add the following passive rule to the server-side FortiGate unit: config wanopt rule edit 5 set auto-detect passive
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
61
62
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
You can use web caching to cache any web traffic that passes through the FortiGate unit, including web pages from web servers on a LAN, WAN or on the Internet. The FortiGate unit caches web objects for all HTTP traffic processed by WAN optimization rules that include web caching. You can add WAN optimization rules for web caching only. You can also add web caching to WAN optimization rules for HTTP traffic that also include byte caching, protocol optimization, and other WAN optimization features. If you use WAN optimization rules to apply web caching, end users do not have to configure their web browsers to use the FortiGate unit as a proxy server.
Note: You can also enable web caching for the FortiGate explicit web proxy. For more information, see To enable web caching for the explicit web proxy on page 115.
Web caching cannot determine if a file is compressed (for example a zip file) and caches compressed and non-compressed versions of the same file separately. If the HTTP protocol considers the compressed and uncompressed versions of a file the same object, only the compressed or uncompressed file will be cached. This chapter contains the following topics: Configuring Web Cache Only WAN optimization Example: Web Cache Only WAN optimization Configuring active-passive web caching Example: Active-passive Web Caching Configuring peer-to-peer web caching Example: Peer-to-peer web caching Changing web cache settings
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
63
64
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
11010010101
Web cache
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
65
3 Go to Firewall > Policy and select Create New to add a firewall policy that accepts traffic to be web cached:
Source Interface/Zone Source Address Destination Interface/Zone Schedule Service Action port1 Client_Net port2
To add a Web Cache Only WAN optimization rule 1 Go to WAN Opt. & Cache > Rule and select Create New. 2 Select Web Cache Only. 3 Configure the Web Cache Only rule:
Mode Source Destination Port Web Cache Only 172.20.120.0 192.168.10.0 80 Tip: Usually you would set the port to 80 to cache normal HTTP traffic. But you can change the Port to a different number (for example 8080) or to a port number range so that the FortiGate unit provides web caching for HTTP traffic using other ports. Transparent Mode Enable SSL Select Do not select Tip: In this example SSL offloading is disabled. For an example of a reverse proxy Web Cache Only configuration that also includes SSL offloading, see Example: SSL offloading for a WAN optimization tunnel on page 103.
4 Select OK. The rule is added to the bottom of the WAN optimization list. 5 If required, use the Move To icon to move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
66
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To add the firewall addresses and firewall policy 1 Add the firewall address for the client network: config firewall address edit Client_Net set type ipmask set subnet 172.20.120.0 255.255.255.255 end 2 Add the firewall address for the web server network: config firewall address edit Web_Server_Net set type ipmask set subnet 192.168.10.0 255.255.255.255 end 3 Add a firewall policy that accepts traffic to be web cached: config firewall policy edit 2 set srcintf port1 set dstintf port2 set srcaddr Client_Net set dstaddr Web_Server_Net set action accept set service HTTP set schedule always end end To add a Web Cache Only WAN optimization rule 1 Add the following Web Cache Only rule: config wanopt rule edit 2 set mode webcache-only set src-ip 172.20.120.0 set dst-ip 192.168.10.0 set port 80 set peer Peer_Fgt_2 end Accept default settings for transparent (enable), status (enable), ssl (disable), unknown-http-version (tunnel), and tunnel-non-http (disable).
Tip: In this example, SSL offloading is disabled. For an example of a reverse proxy Web Cache Only configuration that also includes SSL offloading, see Example: SSL offloading for a WAN optimization tunnel on page 103.
2 If required, use the move command to move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
67
68
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Client-side (active rule) Protocol=HTTP Local Host ID: Client_Side WAN IP address 172.10.10.1
Server-side (passive rule) Enable Web Cache Local Host ID: Server_Side
IP address 172.20.20.1
11010010101
Web cache
To configure the client-side FortiGate unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the client FortiGate unit:
Local Host ID Client_Side
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the server-side FortiGate unit:
Peer Host ID IP Address Server_Side 172.20.20.1
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
69
4 Select OK. 5 Go to Firewall > Policy and add a firewall policy that accepts traffic to be web cached:
Source Interface/Zone Source Address Destination Interface/Zone Schedule Service Action port1 all port2
6 Go to WAN Opt. & Cache > Rule and select Create New. 7 Configure the rule:
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Enable Byte Caching Full Optimization 172.20.120.0 192.168.10.0 1-65535 Active HTTP Select Select
8 Select OK. The rule is added to the bottom of the WAN optimization list. 9 If required, use the Move To icon to move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41. To configure the server-side FortiGate unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the server-side FortiGate unit:
Local Host ID Server_Side
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the client-side FortiGate unit:
Peer Host ID IP Address Client_Side 172.10.10.1
4 Go to WAN Opt. & Cache > Rule and select Create New. 5 Configure the passive web cache rule:
Mode Source Full Optimization 172.20.120.0
70
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
6 Select OK. The rule is added to the bottom of the WAN optimization rule list. 7 If required, use the Move To icon to move the rule to a different position in the list. For more information, see Moving a rule to a different position in the rule list on page 41.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
71
end Accept default settings for transparent (enable), status (enable), mode (full), byte-caching (enable), ssl (disable), secure-tunnel (disable), authgroup (null), unknown-http-version (tunnel), and tunnel-non-http (disable). 5 If required, use the move command to move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41. To configure the server-side FortiGate unit 1 Add the Local Host ID to the server-side FortiGate configuration: config wanopt settings set host-id Server_Side end 2 Add the client-side Local Host ID to the server-side peer list: config wanopt peer edit Client_Side set ip 172.10.10.1 end 3 Add the following passive web cache rule: config wanopt rule edit 5 set auto-detect passive set src-ip 172.20.120.0 set dst-ip 192.168.10.0 set port 1-65535 set webcache enable end Accept default settings for status (enable) and mode (full). 4 If required, use the move command to move the rule to a different position in the list so that the tunnel request from the client-side FortiGate unit matches with this rule. For more information, see Moving a rule to a different position in the rule list on page 41.
72
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
For web caching to work, the WAN optimization tunnel must allow HTTP (and optionally HTTPS) traffic. To do this, the WAN optimization rule must include the ports used for HTTP (and HTTPS) traffic. Set Protocol to HTTP to perform protocol optimization of the HTTP traffic. You can also enable WAN optimization transparent mode, byte caching, SSL offloading, and secure tunneling, as well as add an authentication group.
Figure 35: Adding the server-side peer host ID to the client-side peer list
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
73
11010010101
Web Cache
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the server-side FortiGate unit:
Peer Host ID IP Address Server_Side 192.168.30.12
4 Select OK. 5 Go to Firewall > Policy and add a firewall policy that accepts traffic to be web cached:
Source Interface/Zone Source Address Destination Interface/Zone port1 all port2
74
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
6 Go to WAN Opt. & Cache > Rule and select Create New. 7 Configure the rule:
Mode Source Destination Port Auto-Detect Protocol Peer Enable Web Cache Transparent Mode Enable Byte Caching Full Optimization 172.20.120.0 192.168.10.0 80 Off HTTP Server_Side Select Select Select
8 Select OK. The rule is added to the bottom of the WAN optimization list. 9 If required, use the Move To icon to move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
Figure 38: Adding the client-side peer host ID to the server-side peer list
To configure the server-side FortiGate unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the server FortiGate unit:
Local Host ID Server_Side
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the client-side FortiGate unit:
Peer Host ID IP Address Client_Side 172.20.34.12
4 Select OK.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
75
76
set host-id Server_Side end 2 Add the client-side Local Host ID to the server-side peer list: config wanopt peer edit Client_Side set ip 172.20.34.12 end
Select to always revalidate requested cached object with content on the server before serving it to the client. Set the maximum object size to cache. The default size is 512000 KB. This object size determines the maximum object size to store in the web cache. Objects retrieved that are larger than the maximum size are still delivered to the client but are not stored in the web cache.
Negative Response Set how long in minutes to cache negative responses. The default is 0, meaning negative responses are not cached. The content server might send Duration a client error code (4xx HTTP response) or a server error code (5xx HTTP response) as a response to some requests. If the web cache is configured to cache these negative responses, it returns that response in subsequent requests for that page or image for the specified number of minutes.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
77
Fresh Factor
Set the fresh factor as a percentage. The default is 100, and the range is 1 to 100. For cached objects that do not have an expiry time, the web cache periodically checks the server to see if the objects have expired. The higher the fresh factor the less often the checks occur. For example, if you set the Max TTL value and Default TTL at 7200 minutes (5 days) and set the Fresh Factor at 20, the web cache will check the cached objects 5 times before they expire, but if you set the Fresh Factor at 100, the web cache will check once. The maximum amount of time (Time to Live) an object can stay in the web cache without the cache checking to see if it has expired on the server. The default is 7200 minutes (120 hours or 5 days). The minimum amount of time an object can stay in the web cache before the web cache checks to see if it has expired on the server. The default is 5 minutes. The default expiry time for objects that do not have an expiry time set by the web server. The default expiry time is 1440 minutes (24 hours). Indicates whether the explicit proxy has been enabled for the FortiGate unit. See Using the FortiGate explicit web proxy on page 113. Select to enable using the WAN optimization web cache to cache for the explicit proxy.
Max TTL
Min TTL
If-modified-since By default, if the time specified by the if-modified-since (IMS) header in the client's conditional request is greater than the last modified time of the object in the cache, it is a strong indication that the copy in the cache is stale. If so, HTTP does a conditional GET to the Overlay Caching Scheme (OCS), based on the last modified time of the cached object. Enable ignoring If-modifiedsince to override this behavior. HTTP 1.1 Conditionals HTTP 1.1 provides additional controls to the client over the behavior of caches toward stale objects. Depending on various cache-control headers, the FortiGate unit can be forced to consult the OCS before serving the object from the cache. For more information about the behavior of cache-control header values, see RFC 2616. Typically, if a client sends an HTTP GET request with a pragma no-cache (PNC) or cache-control no-cache header, a cache must consult the OCS before serving the content. This means that the FortiGate unit always refetches the entire object from the OCS, even if the cached copy of the object is fresh. Because of this behavior, PNC requests can degrade performance and increase server-side bandwidth utilization. However, if ignore Pragma-nocache is enabled, then the PNC header from the client request is ignored. The FortiGate unit treats the request as if the PNC header is not present at all. Some versions of Internet Explorer issue Accept / header instead of Pragma no-cache header when you select Refresh. When an Accept header has only the / value, the FortiGate unit treats it as a PNC header if it is a type-N object. When ignore IE Reload is enabled, the FortiGate unit ignores the PNC interpretation of the Accept / header.
Pragma-nocache
IE Reload
78
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Applies only to type-1 objects. When this option is selected, expired type-1 objects are cached (if all other conditions make the object cacheable).
Revalidated Pragma- The pragma-no-cache (PNC) header in a client's request can affect the efficiency of the FortiGate units bandwidth. If you do not want to completely no-cache ignore PNC in client requests (which you can do by selecting to ignore Pragma-no-cache, above), you can nonetheless lower the impact on the bandwidth by selecting Revalidate Pragma-no-cache. When this option is selected, a client's non-conditional PNC-GET request results in a conditional GET request sent to the OCS if the object is already in the cache. This gives the OCS a chance to return the 304 Not Modified response, which consumes less server-side bandwidth, because the OCS has not been forced to otherwise return full content. By default, Revalidate Pragma-no-cache is disabled and is not affected by changes in the top-level profile. When the Substitute Get for PNC configuration is enabled, the revalidate PNC configuration has no effect. Most download managers make byte-range requests with a PNC header. To serve such requests from the cache, you should also configure byte-range support when you configure the Revalidate pragma-no-cache option.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
79
80
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
port1 172.10.10.2
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
81
The client-side FortiGate-300A unit uses policy routing to offload WAN optimization of HTTP and FTP sessions by re-directing all HTTP and FTP sessions to the FortiGate-311B unit. The FortiGate-311B and 620B units work together to apply web caching, byte caching, and HTTP and FTP protocol optimization to HTTP and FTP sessions. The WAN optimization tunnel between the 311B and the 620B operates in Transparent mode. The FortiGate-311B unit also web caches all Internet HTTP traffic from the client network. The client-side FortiGate-311B unit also applies a protection profile to the HTTP and FTP traffic. To do this, the FortiGate-311B unit is configured for multiple VDOM operation. A new VDOM named Wanopt is added to the FortiGate-311B. HTTP and FTP sessions are received by the root VDOM. Firewall policies in the root VDOM accept HTTP and FTP sessions and apply a protection profile to them. To preserve the source addresses of the HTTP and FTP sessions, NAT is not enabled for these policies. The sessions are then routed through an inter-VDOM link to the Wanopt VDOM. The Wanopt VDOM includes firewall policies that accept the HTTP and FTP sessions and WAN optimization rules that apply WAN optimization and web caching to the sessions. The server-side FortiGate-620B unit includes a passive WAN optimization rule that accepts WAN optimization tunnel requests from the FortiGate-311B unit. Only one passive rule is required on the FortiGate-620B unit. The FortiGate-620B unit also forwards sessions to the server-side FortiGate-1000A cluster which forwards them to the server network. WAN optimization is operating in Transparent mode, so the packets from the client network include their client network source IP addresses. To preserve these source IP addresses, the firewall policies on the FortiGate-1000A cluster that accept the sessions from the FortiGate- 620B unit should not apply NAT. If the firewall policies were to apply NAT, the client network addresses would be replaced with the port1 IP address of the FortiGate-1000A cluster and the client network source IP addresses would be lost. The optimizing FortiGate units operate in NAT/Route mode and are directly connected to the Internet. This configuration requires two Internet connections and two Internet IP addresses for each network. (Reminder: All of the example IP addresses shown in Figure 40 are private IP addresses because all Fortinet documentation examples use only private IP addresses.) If these extra Internet IP addresses are not available, you can install a router between the WAN and the FortiGate units or install the optimizing FortiGate units out of path on the private networks and configure routing on the private networks to route HTTP and FTP sessions to the optimizing FortiGate units.
Configuration steps
This example is divided into client-side and the server-side steps, as configured through the web-based manager and the CLI. Use either method, but for best results, follow the procedures in the order given. Also, note that if you perform any additional actions between procedures, your configuration may have different results. This example includes the following sections: Client-side configuration steps - web-based manager on page 83 Server-side configuration steps - web-based manager on page 90 Client-side configuration steps - CLI on page 93 Server-side configuration steps - CLI on page 100
82
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Configure other policy settings that you may require. For example, you could add a protection profile. 3 Select Create New to add a firewall policy that allows all port5 to port4 FTP sessions:
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
83
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT
Configure other policy settings that you may require. 4 Select OK. 5 If required, use the Move To icon to change the order of the firewall policies. Follow the normal rules for ordering firewall policies in the policy list. For example, move specific rules above general rules. For more information about these rules, see the FortiGate Administration Guide. 6 Go to Router > Static > Policy Route and select Create New to add a policy route to redirect HTTP traffic received at port5 to exit the FortiGate unit using port4. Set the gateway address of the route to 172.10.10.2 so that the HTTP sessions are directed to the FortiGate-311B port1 interface. For HTTP traffic, the protocol is 6 (TCP) and the destination port is 80:
Protocol Incoming interface Source address / mask Destination Ports Type of Service Outgoing interface Gateway Address 6 port5 0.0.0.0/0.0.0.0 From 80 to 80 bit pattern: 00 (hex) bit mask: 00 (hex) port4 172.10.10.2
7 Select OK. 8 Select Create New to add a policy route to redirect FTP traffic received at port5 to exit the FortiGate unit using port4. Set the gateway address of the route to 172.10.10.2 so that the HTTP sessions are directed to the FortiGate-311B port1 interface. For FTP traffic, the protocol is 6 (TCP) and the destination port is 21:
Protocol Incoming interface Source address / mask Destination Ports Type of Service Outgoing interface Gateway Address 6 port5 0.0.0.0/0.0.0.0 From 21 to 21 bit pattern: 00 (hex) bit mask: 00 (hex) port4 172.10.10.2
9 Select OK.
84
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To configure the FortiGate-311B unit for multiple VDOM operation and add an interVDOM link 1 Go to System > Status > Dashboard. 2 In the System Information widget, select Enable beside Virtual Domain to enable multiple VDOM operation and log back in to the web-based manager. 3 Go to System > VDOM and select Create New to add a new virtual domain named Wanopt. 4 Select OK twice to add the Wanopt VDOM with default resource limits. 5 Go to System > Network, edit the port10 interface, and configure the following settings to add the port10 interface to the Wanopt VDOM:
Virtual Domain Addressing Mode IP/Netmask Wanopt Manual 10.10.10.2/24
Configure other settings that you may require. 6 Select OK. 7 Select Create New > VDOM Link and add an inter-VDOM link with the following settings:
Name Interface #0 Virtual Domain IP/Netmask Interface #1 Virtual Domain IP/Netmask Wanopt 172.1.1.2/24 root 172.1.1.1/24 Vlink
8 Select OK. To configure routing for the FortiGate-311B root VDOM 1 Log in to the root VDOM. 2 Go to Router > Static and select Create New to add a default route. The destination of the default route is the inter-VDOM link interface in the root VDOM. The gateway of the default route is the IP address of the inter-VDOM link interface in the Wanopt VDOM. The result is the default route sends all traffic out the inter-VDOM link and into the Wanopt VDOM:
Destination IP/Mask Device Gateway Distance 0.0.0.0/0.0.0.0 Vlink0 172.1.1.2 10
3 Select OK. 4 Select Create New to add a route to send return traffic from the server network destined for the client network out the port1 interface to the port4 interface of the FortiGate-300A which has IP address 172.10.10.1:
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
85
5 Select OK. To add firewall policies to the FortiGate-311B root VDOM to accept HTTP and FTP sessions received at port1 destined for Vlink0 and apply a protection profile 1 Log in to the root VDOM. 2 Go to Firewall > Policy and select Create New to add a firewall policy that accepts HTTP sessions received at port1 destined for Vlink0 and applies a protection profile to them:
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT port1 all Vlink0 all always HTTP ACCEPT Do not select. Tip: To preserve the source addresses of the HTTP sessions, NAT should not be enabled for this policy. Protection Profile scan (Alternatively, you can create a custom protection profile)
Configure other policy settings that you may require. You can also use more specific firewall addresses or add one firewall policy that accepts both FTP and HTTP traffic. 3 Select OK. 4 Go to Firewall > Policy and select Create New to add a firewall policy that accepts FTP sessions received at port1 and destined for Vlink0 and applies a protection profile to them:
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT port1 all Vlink0 all always FTP ACCEPT Do not select. Tip: To preserve the source addresses of the FTP sessions, NAT should not be enabled for this policy. Protection Profile scan (Alternatively, you can instead create a custom protection profile.)
Configure other policy settings that you may require. You can also use more specific firewall addresses or add one firewall policy that accepts both FTP and HTTP traffic.
86
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
5 Select OK. To configure routing for the FortiGate-311B Wanopt VDOM 1 Log in to the Wanopt VDOM. 2 Go to Router > Static and select Create New to add a default route. The destination of the default route is the port10 interface. The gateway of the default route is the next hop router that the port10 interface connects with:
Destination IP/Mask Device Gateway Distance 0.0.0.0/0.0.0.0 port10 (next hop router IP address) 10
3 Select OK. 4 Select Create New to add a route to send return traffic from the server network destined for the client network out the Vlink1 interface to the Vlink0 interface in the root VDOM, which has the IP address 172.1.1.2:
Destination IP/Mask Device Gateway Distance 172.20.120.0/24 Vlink1 172.1.1.2 10
5 Select OK. To add firewall policies to the FortiGate-311B Wanopt VDOM to accept HTTP and FTP sessions received at the Vlink1 interface of the inter-VDOM link and destined for port10 1 Log in to the Wanopt VDOM. 2 Go to Firewall > Policy and select Create New to add a firewall policy that accepts HTTP sessions received at Vlink1 and destined for port10:
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
87
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT
Vlink1 all port10 all always HTTP ACCEPT Select Tip: NAT is ignored for all HTTP sessions for the server network because these sessions are intercepted by a full optimization WAN optimization rule. However, HTTP sessions for the Internet are intercepted by the Web Cache Only rule, so source NAT is required for replies.
Protection Profile
Do not select. Tip: Do not select a protection profile because you cannot apply a protection profile and WAN optimization to the same session in the same VDOM. A protection profile was applied to the session in the root VDOM.
Configure other settings that you may require. 3 Select OK. 4 Go to Firewall > Policy and select Create New to add a firewall policy that accepts FTP sessions received at Vlink1 and destined for port10:
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT Vlink1 all port10 all always FTP ACCEPT Select Tip: NAT is ignored for all FTP sessions for the server network because these sessions are intercepted by a full optimization WAN optimization rule. However, FTP sessions for the Internet are allowed to reach their destination, so source NAT is required for replies. Protection Profile Do not select. Tip: Do not select a protection profile because you cannot apply a protection profile and WAN optimization to the same session in the same VDOM. A protection profile was applied to the session in the root VDOM.
Configure other settings that you may require. 5 Select OK. To configure peers for the FortiGate-311B Wanopt VDOM 1 Log in to the Wanopt VDOM.
88
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
2 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the client-side FortiGate-311B unit:
Local Host ID Client_Fgt
3 Select Apply to save your setting. 4 Select Create New and add a Peer Host ID and the IP Address for the server-side FortiGate-620B unit:
Peer Host ID IP Address Server_Fgt 10.20.20.2
5 Select OK. To add WAN optimization rules for HTTP and FTP to the FortiGate-311B Wanopt VDOM 1 Log in to the Wanopt VDOM. 2 Go to WAN Opt. & Cache > Rule. 3 Select Create New to add an active rule to optimize HTTP traffic from IP addresses on the Client network (172.20.120.0) with a destination address on the server network (192.168.10.0):
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Enable Byte Caching Enable SSL Enable Secure Tunnel Full Optimization 172.20.120.0 192.168.10.0 80 Active HTTP Select Select Do not select. Do not select. Tip: For improved privacy you can select this option and add an authentication group to both optimizing FortiGate units. Authentication Group Do not select.
4 Select OK. 5 Select Create New to add an active rule to optimize FTP traffic from IP addresses on the Client network (172.20.120.0) with a destination address on the server network (192.168.10.0):
Mode Source Destination Port Auto-Detect Protocol Transparent Mode Enable Byte Caching Full Optimization 172.20.120.0 192.168.10.0 21 Active FTP Select Select
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
89
Do not select. Do not select. Tip: For improved privacy you can select this option and add an authentication group to both optimizing FortiGate units.
Authentication Group
Do not select.
6 Select OK. 7 Select Create New to add a rule to web cache HTTP traffic from IP addresses on the Client network (172.20.120.0) with any destination address:
Mode Source Destination Port Transparent Mode Enable SSL Web Cache Only 172.20.120.0 0.0.0.0 80 Select Do not select.
8 Select OK. 9 If required, use the Move To icon to move the Web Cache Only rule below the full optimization HTTP and FTP rules in the list. The Web Cache Only rule should be below the full optimization rules because it will match all HTTP traffic and you need HTTP sessions with destination address 192.168.10.0 to match the full optimization HTTP rule.
90
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
2 Select OK. 3 Select Create New to add a route to send traffic for the server network out port1 to the port5 interface of the FortiGate-1000A cluster, which has the IP address 192.20.20.1:
Destination IP/Mask Device Gateway Distance 192.168.10.0/24 port1 192.20.20.1 10
4 Select OK. To configure peers for the server-side FortiGate-620B unit 1 Go to WAN Opt. & Cache > Peer and enter a Local Host ID for the server-side FortiGate-620B unit:
Local Host ID Server_Fgt
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the client-side FortiGate-311B unit:
Peer Host ID IP Address Client_Fgt 10.10.10.2
4 Select OK. To add a passive WAN optimization rule to the server-side FortiGate-620B unit You can add one passive WAN optimization rule to the server-side FortiGate-620B unit for both active rules on the FortiGate-311B unit. This rule can also allow the FortiGate-620B to perform WAN optimization with other client-side devices as long as the required Peer Host IDs are added to the FortiGate-620B configuration and to the client-side configurations. 1 Go to WAN Opt. & Cache > Rule and select Create New to add a passive rule that accepts any WAN optimization tunnel request:
Mode Source Destination Port Full Optimization 0.0.0.0 192.168.10.0 1-65535 Tip: You can also use a narrower port range such as 21-80 or add two rules, one with port set to 80 and one with port set to 21. Auto-Detect Enable Web Cache Passive Select
2 Select OK. 3 If required, use the Move To icon to move the rule to a different position in the list so that the tunnel request from the client-side FortiGate unit matches with this rule. For more information, see Moving a rule to a different position in the rule list on page 41.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
91
To configure the FortiGate-1000A cluster to accept HTTP and FTP connections at port5 and forward them out port1 to the server network 1 Go to Firewall > Address and select Create New to add an address for the server network:
Address Name Type Subnet / IP Range Interface Server_Net Subnet / IP Range 192.168.10.0 Any
2 Select OK. 3 Go to Firewall > Address and select Create New to add an address for the client network:
Address Name Type Subnet / IP Range Interface Client_Net Subnet / IP Range 172.20.120.0 Any
4 Select OK. 5 Go to Firewall > Policy and select Create New to add an firewall policy that accepts HTTP sessions at port5 destined for port1 and the server network:
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule Service Action NAT port5 Client_Net port1 Server_Net always HTTP ACCEPT Do not select. Tip: WAN optimization is operating in Transparent mode so the packets from the client network include their client network source IP addresses. To preserve these source IP addresses the firewall policies on the FortiGate-1000A cluster that accept the sessions from the FortiGate- 620B unit should not apply NAT. If the policies were to apply NAT, the client network addresses would be replaced with the port1 IP address of the FortiGate-1000A cluster and the client network source IP addresses would be lost.
6 Select OK. 7 Go to Firewall > Policy and select Create New to add an firewall policy that accepts FTP sessions at port5 destined for port1 and the server network:
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Schedule port5 Client_Net port1 Server_Net always
92
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
FTP ACCEPT Do not select Tip: As described above, selecting NAT would cause the loss of client network source IP addresses.
8 Select OK.
93
set nat enable end end Configure other policy settings that you may require. For example, you could add a protection profile. 3 Add a firewall policy that allows all port5 to port4 FTP sessions: config firewall policy edit 2 set srcintf port5 set dstintf port4 set srcaddr all set dstaddr all set action accept set service FTP set schedule always set nat enable end end Configure other policy settings that you may require. 4 If required, use the move command to change the order of the policies in the policy list. Follow the normal rules for ordering firewall policies in the policy list. For example, move specific rules above general rules. For more information about these rules, see the FortiGate Administration Guide. 5 Add a policy route to redirect HTTP traffic received at port5 to exit the FortiGate unit using port4. Set the gateway address of the route to 172.10.10.2 so that the HTTP sessions are directed to the FortiGate-311B port1 interface. For HTTP traffic, the protocol is 6 (TCP) and the destination port is 80: config router policy edit 1 set protocol 6 set input-device port5 set output-device port4 set src 0.0.0.0/0.0.0.0 set dst 0.0.0.0/0.0.0.0 set start-port 80 set end port 80 set gateway 172.10.10.2 end end Accept default settings for tos (0x00) and tos-mask (0x00). 6 Add a policy route to redirect FTP traffic received at port5 to exit the FortiGate unit using port4. Set the gateway address of the route to 172.10.10.2 so that the FTP sessions are directed to the FortiGate-311B port1 interface. For FTP traffic, the protocol is 6 (TCP) and the destination port is 21: config router policy edit 1 set protocol 6 set input-device port5 set output-device port4 set src 0.0.0.0/0.0.0.0 set dst 0.0.0.0/0.0.0.0
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
94
set start-port 21 set end port 21 set gateway 172.10.10.2 end end Accept default settings for tos (0x00) and tos-mask (0x00). To configure the FortiGate-311B unit for multiple VDOM operation and add an interVDOM link 1 Enable multiple VDOM operation and log back in to the web-based manager: config system global set vdom-admin enable end 2 Log back in to the CLI. 3 Add a new virtual domain named Wanopt. config vdom edit Wanopt end 4 Add the port10 interface to the Wanopt VDOM: config global config system interface edit port10 set vdom Wanopt set IP 10.10.10.2/24 end end 5 Add an inter-VDOM named Vlink and configure the Vlink0 and Vlink1 interfaces: config global config system vdom-link edit Vlink end config system interface edit Vlink0 set vdom root set ip 172.1.1.1/24 next edit Vlink1 set vdom Wanopt set ip 172.1.1.2/24 end end To configure routing for the FortiGate-311B root VDOM 1 Log in to the root VDOM from the CLI. 2 Add a default route. The destination of the default route is the inter-VDOM link interface in the root VDOM. The gateway of the default route is the IP address of the inter-VDOM link interface in the Wanopt VDOM. The result is the default route sends all traffic out the inter-VDOM link and into the Wanopt VDOM: config router static edit 1
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
95
3 Add a route to send return traffic from the server network destined for the client network out the port1 interface to the port4 interface of the FortiGate-300A which has IP address 172.10.10.1: config router static edit 2 set dst 172.20.120.0/24 set device port1 set gateway 172.10.10.1 set distance 10 end To add firewall policies to the FortiGate-311B root VDOM to accept HTTP and FTP sessions received at port1 and destined for Vlink0 and apply a protection profile 1 Log in to the root VDOM from the CLI. 2 Add a firewall policy that accepts HTTP sessions received at port1 and applies a protection profile to them: config firewall policy edit 20 set srcintf port1 set dstintf Vlink0 set srcaddr all set dstaddr all set action accept set service HTTP set schedule always set profile-status enable set profile scan end
Tip: To preserve the source addresses of the HTTP sessions, NAT should not be enabled for this policy.
Tip: You can select any protection profile that you may require.
Configure other policy settings that you may require. You can also use more specific firewall addresses or add one firewall policy that accepts both FTP and HTTP traffic. 3 Add a firewall policy that accepts FTP sessions received at port1 and applies a protection profile to them: config firewall policy edit 20 set srcintf port1 set dstintf Vlink0 set srcaddr all set dstaddr all set action accept
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
96
Tip: To preserve the source addresses of the HTTP sessions, NAT should not be enabled for this policy.
Tip: You can select any required protection profile that you may require.
Configure other policy settings that you may require. You can also use more specific firewall addresses or add one firewall policy that accepts both FTP and HTTP traffic. To configure routing for the FortiGate-311B Wanopt VDOM 1 Log in to the Wanopt VDOM from the CLI. 2 Add a default route. The destination of the default route is the port10 interface. The gateway of the default route is the next hop router that the port10 interface connects with: config router static edit 1 set dst 0.0.0.0/0.0.0.0 set device port10 set gateway (next hop router IP address) set distance 10 end 3 Add a route to send return traffic from the server network destined for the client network out the Vlink1 interface to the Vlink0 interface in the root VDOM, which has the IP address 172.1.1.2: config router static edit 2 set dst 172.20.120.0/24 set device Vlink1 set gateway 172.1.1.2 set distance 10 end To add firewall policies to the FortiGate-311B Wanopt VDOM to accept HTTP and FTP sessions received at the Vlink1 interface of the inter-VDOM link destined for port10 1 Log in to the Wanopt VDOM from the CLI. 2 Add a firewall policy that accepts HTTP sessions received at Vlink1 and destined for port10: config firewall policy edit 20 set srcintf Vlink1 set dstintf port10 set srcaddr all set dstaddr all
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
97
Tip: NAT is ignored for all HTTP sessions for the server network because these sessions are intercepted by a full optimization WAN optimization rule. However, HTTP sessions for the Internet are intercepted by the Web Cache Only rule, so source NAT is required for replies. Tip: Do not select a protection profile because you cannot apply a protection profile and WAN optimization to the same session in the same VDOM. A protection profile was applied to the session in the root VDOM.
Configure other settings that you may require. 3 Go to Firewall > Policy and select Create New to add a firewall policy that accepts FTP sessions received at Vlink1 and destined for port10: config firewall policy edit 20 set srcintf Vlink1 set dstintf port10 set srcaddr all set dstaddr all set action accept set service FTP set schedule always set nat enable end
Tip: NAT is ignored for all HTTP sessions for the server network because these sessions are intercepted by a full optimization WAN optimization rule. However, HTTP sessions for the Internet are intercepted by the Web Cache Only rule, so source NAT is required for replies. Tip: Do not select a Protection Profile because you cannot apply a protection profile and WAN optimization to the same session in the same VDOM. A protection profile was applied to the session in the root VDOM.
Configure other settings that you may require. To configure peers for the FortiGate-311B Wanopt VDOM 1 Log in to the Wanopt VDOM from the CLI. 2 Add the Local Host ID for the client-side FortiGate-311B unit: config wanopt settings set host-id Client_Fgt end 3 Add a Peer Host ID and the IP Address for the server-side FortiGate-620B unit. config wanopt peer edit Server_Fgt set ip 10.20.20.2 end
98
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To add WAN optimization rules for HTTP and FTP to the FortiGate-311B Wanopt VDOM 1 Log in to the Wanopt VDOM from the CLI. 2 Add an active rule to optimize HTTP traffic from IP addresses on the Client network (172.20.120.0) with a destination address on the server network (192.168.10.0): config wanopt rule edit 4 set auto-detect active set src-ip 172.20.120.0 set dst-ip 192.168.10.0 set port 80 set proto http end Accept default settings for transparent (enable), status (enable), mode (full), byte-caching (enable), ssl (disable), secure-tunnel (disable), authgroup (null), unknown-http-version (tunnel), and tunnel-non-http (disable).
Tip: For improved privacy you can enable secure-tunnel and add an authentication group to both optimizing FortiGate units.
3 Add an active rule to optimize FTP traffic from IP addresses on the Client network (172.20.120.0) with a destination address on the server network (192.168.10.0): config wanopt rule edit 5 set auto-detect active set src-ip 172.20.120.0 set dst-ip 192.168.10.0 set port 21 set proto ftp end Accept default settings for transparent (enable), status (enable), mode (full), byte-caching (enable), ssl (disable), secure-tunnel (disable), authgroup (null), unknown-http-version (tunnel), and tunnel-non-http (disable).
Tip: For improved privacy you can enable secure-tunnel and add an authentication group to both optimizing FortiGate units.
4 Add a rule to web cache HTTP traffic from IP addresses on the Client network (172.20.120.0) with any destination address: config wanopt rule edit 6 set mode webcache-only set src-ip 172.20.120.0 set dst-ip 0.0.0.0 set port 80 set proto http
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
99
end Accept default settings for transparent (enable), status (enable), ssl (disable), unknown-http-version (tunnel), and tunnel-non-http (disable). 5 If required, use the move command to move the Web Cache Only rule below the full optimization HTTP and FTP rules in the list. The Web Cache Only rule should be below the full optimization rules because it will match all HTTP traffic and you need HTTP sessions with destination address 192.168.10.0 to match the full optimization HTTP rule For more information, see Moving a rule to a different position in the rule list on page 41.
100
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To configure peers for the server-side FortiGate-620B unit 1 Add the Local Host ID for the server-side FortiGate-620B unit: config wanopt settings set host-id Server_Fgt end 2 Add a Peer Host ID and the IP Address for the client-side FortiGate-311B unit: config wanopt peer edit Client_Fgt set ip 10.10.10.2 end To add a passive WAN optimization rule to the server-side FortiGate-620B unit You can add one passive WAN optimization rule to the server-side FortiGate-620B unit for both active rules on the FortiGate-311B unit. This rule can also allow the FortiGate-620B to perform WAN optimization with other client-side devices as long as the required Peer Host IDs are added to the FortiGate-620B configuration and to the client-side configurations. 1 Go to WAN Opt. & Cache > Rule and select Create New to add a passive rule that accepts any WAN optimization tunnel request: config wanopt rule edit 5 set auto-detect passive set src-ip 0.0.0.0 set dst-ip 192.168.10.0 set port 1-65535 set webcache enable end Accept default settings for status (enable) and mode (full).
Tip: You can also use a narrower port range such as 21-80 or add two rules, one with port set to 80 and one with port set to 21.
2 If required, use the move command to move the rule to a different position in the list so that the tunnel request from the client-side FortiGate unit matches with this rule. For more information, see Moving a rule to a different position in the rule list on page 41. To configure the FortiGate-1000A cluster to accept HTTP and FTP connections at port5 and forward them out port1 to the server network 1 Add a firewall address for the server network: config firewall address edit Server_Net set type ipmask set subnet 192.168.10.0 255.255.255.255 end 2 Add a firewall address for the client network: config firewall address edit Client_Net set type ipmask set subnet 172.20.120.0 255.255.255.255
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
101
end 3 Go to Firewall > Policy and select Create New to add an firewall policy that accepts HTTP sessions at port5 destined for port1 and the server network: config firewall policy edit 10 set srcintf port5 set dstintf port1 set srcaddr Client_Net set dstaddr Server_Net set action accept set service HTTP set schedule always end end
Tip: WAN optimization is operating in Transparent mode so the packets from the client network include their client network source IP addresses. To preserve these source IP addresses, the firewall policies on the FortiGate-1000A cluster that accept the sessions from the FortiGate- 620B unit should not apply NAT. If the policies were to apply NAT, the client network addresses would be replaced with the port1 IP address of the FortiGate1000A cluster and the client network source IP addresses would be lost.
4 Go to Firewall > Policy and select Create New to add an firewall policy that accepts FTP sessions at port5 destined for port1 and the server network: config firewall policy edit 11 set srcintf port5 set dstintf port1 set srcaddr Client_Net set dstaddr Server_Net set action accept set service FTP set schedule always end end
Tip: As described above, selecting NAT would cause the loss of the client network source IP addresses.
102
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
103
The server-side FortiGate unit includes an SSL server configuration with ip set to 192.168.10.20 and port to 443. The unit also includes the web server CA.
Figure 41: SSL offloading WAN optimization configuration
Client network 172.20.120.0 Client side Rule: autodetect: off Local Host ID: User_net WAN IP address 172.20.120.1 IP address 192.168.10.1 Decrypted traffic
3 2 1
Web server Server side (port 80) SSL server and Web server CA Local Host ID: Web_servers IP:192.168.10.20
Encrypted traffic
3 2 1
When the client-side FortiGate unit accepts an HTTPS connection for 192.168.10.20, the SSL server configuration provides the information that the client-side unit needs to decrypt the traffic and send it in clear text across a WAN optimization tunnel to the server-side unit. The server-side unit then forwards the clear text packets to the web server. The web server CA is not downloaded from the server side to the client-side FortiGate unit. Instead, the client-side FortiGate unit proxies the SSL parameters from the client side to the server side, which returns an SSL key and other required information to the clientside unit so that it can decrypt and encrypt HTTPS traffic.
Note: In this peer-to-peer configuration you do not need to add a WAN optimization rule to the server-side FortiGate unit as long as this server-side unit includes the peer host ID of the client-side FortiGate unit in its peer list. However, you can set Auto-Detect to Active on the client-side FortiGate unit and then add a passive rule to the server-side unit.
In this example, you do not require the secure tunnel and the authentication group configurations, but they are included to show how to protect the privacy of the WAN optimization tunnel.Alternataively, you could configure a route-based IPSec VPN between the FortiGate units and use IPSec to protect the privacy of the WAN optimization tunnel. In this example, it is assumed that you have a local CA named Web_Server_Cert_1.crt stored in a file that you will import when you configure the server-side FortiGate unit.
104
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Local Host ID
User_net
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the peer side FortiGate unit:
Peer Host ID IP Address Web_servers 192.168.10.1
4 Select OK. 5 Go to WAN Opt. & Cache > Peer > Authentication Group and select Create New to add an authentication group named SSL_auth_grp to the client-side FortiGate unit. The authentication group includes a pre-shared key and the peer added in step 3. An authentication group with the same name and the same pre-shared key must also be added to the server-side FortiGate unit. This authentication group is required for the secure tunnel:
Name Password Peer Acceptance SSL_auth_grp <pre-shared_key> Specify Peer: Web_servers
6 Select OK. 7 Go to WAN Opt. & Cache > Rule and select Create New to add the WAN optimization rule:
Mode Source Destination Port Auto-Detect Protocol Peer Transparent Mode Enable Byte Caching Enable SSL Enable Secure Tunnel Authentication Group Full Optimization 172.20.120.0 192.168.10.0 443 Off HTTP Web_servers Select Select Select Select SSL_auth_grp
8 Select OK. The rule is added to the bottom of the WAN optimization list. 9 If required, move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
105
Example: SSL offloading and reverse proxy web caching for an Internet web server
2 Select Apply to save your setting. 3 Select Create New and add a Peer Host ID and the IP Address for the peer side FortiGate unit:
Peer Host ID IP Address User_net 172.20.120.1
4 Select OK. 5 Go to WAN Opt. & Cache > Peer > Authentication Group and select Create New to add an authentication group named SSL_auth_grp to the server-side FortiGate unit. The authentication group includes a pre-shared key and the peer added to the serverside FortiGate unit in step 3:
Name Password Peer Acceptance SSL_auth_grp <pre-shared_key> Specify Peer: User_net
6 Select OK. 7 Go to System > Certificates > Local Certificates and select Import to import the web servers CA. For Type, select Local Certificate. Select the Browse button to locate the file, Web_Server_Cert_1.crt. The certificate key size must be 1024 or 2048 bits. 4096-bit keys are not supported. 8 From the CLI, enter the following command to add the SSL server to the server-side FortiGate unit: config wanopt ssl-server edit example_server set ip 192.168.10.20 set port 443 set ssl-cert Web_Server_Cert_1 end Configure other ssl-server settings that you may require for your configuration.
Example: SSL offloading and reverse proxy web caching for an Internet web server
This example shows how to configure SSL offloading for a reverse proxy Web Cache Only WAN optimization configuration.
106
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
SSL offloading for WAN optimization and web caching Example: SSL offloading and reverse proxy web caching for an Internet web
When planning a reverse proxy implementation, the web server's content should be written so that it is cache aware to take full advantage of the reverse proxy cache. In reverse proxy mode, the FortiGate unit functions more like a web server for the clients it services. Unlike internal clients, external clients are not reconfigured to access the proxy server. Instead, the site URL routes the client to the FortiGate unit as if it were a web server. Replicated content is delivered from the proxy cache to the external client without exposing the web server or the private network residing safely behind the firewall. In this example, the site URL translates to IP address 192.168.10.1, which is the port2 IP address of the FortiGate unit. The port2 interface is connected to the Internet. This example also includes two Web Cache Only rules, one that accepts the HTTP traffic for web caching and one that accepts the HTTPS traffic for SSL offloading and web caching. You could instead add only one rule for both the HTTP and HTTPS traffic. For this example, it is also assumed that all HTTP traffic uses port 80 and all HTTPS traffic uses port 443. The FortiGate unit includes the web server CA and an SSL server configuration for IP address 172.10.20.30 and port to 443. The name of the file containing the CA is Rev_Proxy_Cert_1.crt.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
107
Example: SSL offloading and reverse proxy web caching for an Internet web server
To configure the FortiGate unit as a reverse proxy web cache server 1 Go to Firewall > Virtual IP and select Create New to add a virtual IP that translates the destination IP address from 192.168.10.1 to 172.10.20.30:
Name External Interface Type External IP Address/Range Mapped IP Address/Range Port Forwarding Reverse_proxy_VIP port2 Read only description of currently mode, usually Static NAT. 192.168.10.1 172.10.20.30 Do not select.
2 Select OK to save your settings. 3 Go to Firewall > Policy and select Create New to add a port2 to port1 firewall policy that accepts HTTP and HTTPS traffic from the Internet: Do not select a protection profile. Set the destination address to the virtual IP. You do not have to enable NAT.
Source Interface/Zone Source Address Destination Interface/Zone Destination Address Service port2 all port1 Reverse_proxy_VIP HTTP and HTTPS Note: Select Multiple to display a screen for entering more than one service. Action ACCEPT
4 Select OK to save your settings. 5 Go to WAN Opt. & Cache > Rule and select Create New to add a Web Cache Only WAN optimization rule. 6 Configure the rule to accept the HTTP traffic accepted by the firewall policy:
Mode Source Web Cache Only 0.0.0.0
108
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
SSL offloading for WAN optimization and web caching Example: SSL offloading and reverse proxy web caching for an Internet web
Destination
192.168.10.1 Note: You need to set Destination to the IP address that is translated by the virtual IP (192.168.10.1) and not to the server IP (172.10.20.30).
7 Select OK. The rule is added to the bottom of the WAN optimization list. 8 If required, move the rule to a different position in the list. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41. To configure the FortiGate unit for SSL offloading of HTTPS traffic The firewall policy added in the first procedure accepts HTTPS traffic so you do not have to add another one. 1 Go to WAN Opt. & Cache > Rule and select Create New to add a Web Cache Only WAN optimization rule. 2 Configure the rule to accept the HTTPS traffic accepted by the firewall policy:
Mode Source Destination Web Cache Only 0.0.0.0 192.168.10.1 Note: You need to set Destination to the IP address that is translated by the virtual IP (192.168.10.1) and not to the server IP (172.10.20.30). Port Transparent Mode Enable SSL 443 Select. Select.
3 Select OK. The rule is added to the bottom of the WAN optimization list. 4 If required, move the rule to a different position in the list. The HTTPS rule can be above or below the HTTP rule. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41. To add an SSL server to offload SSL encryption and decryption for the web server. 1 Go to System > Certificates > Local Certificates and select Import to import the web servers CA. For Type, select Local Certificate. Select the Browse button to locate the file Rev_Proxy_Cert_1.crt. The certificate key size must be 1024 or 2048 bits. 4096-bit keys are not supported. 2 From the CLI, enter the following command to add the SSL server. config wanopt ssl-server edit rev_proxy_server set ip 172.10.20.30
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
109
Example: SSL offloading and reverse proxy web caching for an Internet web server
set port 443 set ssl-cert Rev_Proxy_Cert_1 end 3 Configure other ssl-server settings that you may require for your configuration. The order of the rules in the list significantly affects how the rules are applied. For more information, see How list order affects rule matching on page 40 and Moving a rule to a different position in the rule list on page 41.
110
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Private network
WAN optimization
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
111
4 Set Maximum Disk Cache to 512, 1024, or 2048 MB. The default is 512 MB. If the PC hard disk can accommodate a larger cache, better optimization performance is possible. 5 Select Apply. To configure FortiClient WAN Optimization on the FortiGate unit Because PCs running the FortiClient application can have IP addresses that change often, it is usually not practical to add PCs running the FortiClient application to the WAN optimization peer list. Instead, a FortiGate unit that accepts WAN optimization tunnel requests from the FortiClient application should be configured to accept any peer (see Accepting any peers on page 29) by adding an authentication group named auth-fc with Peer acceptance set to Accept Any Peer. On the FortiGate unit, you also need to add a passive rule that includes source and destination addresses that will accept connections from the IP addresses of PCs running the FortiClient application. If these PCs can be anywhere on the Internet, the source address for this rule is 0.0.0.0. You can also use a more restrictive address range if the PCs running the FortiClient application have a restricted range of addresses. You do not need to add firewall policies to the FortiGate unit because it is on the server side of the WAN optimization tunnel. 1 Go to WAN Opt. & Cache > Peer > Authentication Group and select Create New. 2 Configure the authentication group:
Name Authentication Method Certificate Peer Acceptance auth-fc Certificate Fortinet_Firmware Accept Any Peer
3 Select OK. 4 Go to WAN Opt. & Cache > Rule and select Create New. 5 Configure a rule to accept FortiClient WAN optimization sessions:
Mode Source Destination Port Auto-Detect Full Optimization 0.0.0.0 0.0.0.0 1-65535 Passive
6 Select OK.
112
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Proxy FQDN
Enter the fully qualified domain name (FQDN) for the proxy server. This is the domain name to enter into browsers to access the proxy server. Enter the maximum length of an HTTP request. Larger requests will be rejected.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
113
Max HTTP message length Add headers to Forwarded Requests Client IP Header Via Header X-forwarded-for Header
Enter the maximum length of an HTTP message. Larger messages will be rejected. The web proxy server will forward HTTP requests to the internal network. You can include the following headers in those requests: Enable to include the Client IP Header from the original HTTP request. Enable to include the Via Header from the original HTTP request. Enable to include the X-Forwarded-For (XFF) HTTP header. The XFF HTTP header identifies the originating IP address of a web client or browser that is connecting through an HTTP proxy, and the remote addresses it passed through to this point.
Front-end HTTPS Header Enable to include the Front-end HTTP Header from the original HTTPS request. Explicit Web Proxy Options Web proxies can be transparent or explicit. Transparent web proxy does not modify the web traffic in any way, but just forwards it to the destination. Explicit web proxy can modify web traffic to provide extra services and administration. Explicit web proxy is configured with the following options. Enable the explicit web proxy. Enter the explicit web proxy server port. To use the explicit proxy, users must add this port to their web browser proxy configuration. The default value of 0 means 8080. Displays the interfaces that are being monitored by the explicit web proxy server. Select the action to take when the proxy server must handle an unknown HTTP version request or message. Choose from either Reject or Best Effort. The Reject option is more secure.
114
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
To enable and configure the explicit web proxy - web-based manager 1 Go to System > Network > Web Proxy. 2 Select Enable Explicit Proxy. 3 Set Port to 8888. 4 Select Apply. To enable web caching for the explicit web proxy You can enable web caching for the explicit web proxy on FortiGate units that support WAN optimization and web caching. For more information, see Using web caching on page 63. 1 Go to WAN Opt. & Cache > Cache and select Enable Cache Explicit Proxy. 2 Select Apply. Web content requested by users using the explicit proxy are now cached by the FortiGate unit using the WAN optimization web cache.
115
CLI configuration
set status enable set http-incoming-port 8888 end The result of this configuration is that TCP sessions received by the FortiGate unit at port1 with a destination port number of 8888 are processed by the explicit web proxy. 3 Enable web caching for the explicit web proxy on FortiGate units that support WAN optimization and web caching. config wanopt webcache set explicit enable end
CLI configuration
config web-proxy explicit
Use the conifg web-proxy explicit command to configure an explicit web proxy.
Syntax
config web-proxy explicit set http-incoming-port <port_num> set status {enable | disable} set unknown-http-version {best-effort | reject} end
Variable http-incoming-port <port_num> status {enable | disable} unknown-http-version {best-effort | reject} Description Select the port the incoming HTTP traffic will use. Valid numbers range from 0 to 65535. Enable to activate explicit web proxies. When disabled, passive web proxies are used. Select the action to take when an unknown version of HTTP is encountered. disable reject Default
Syntax
config web-proxy global set add-header-client-ip {enable | disable} set add-header-front-end-https {enable | disable} set add-header-via {enable | disable} set add-header-x-forwarded-for {enable | disable} set max-message-length <kBytes> set max-request-length <kBytes> set proxy-fqdn <fqdn> end
116
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
CLI configuration
Variables add-header-client-ip {enable | disable} add-header-front-endhttps {enable | disable} add-header-via {enable | disable} add-header-xforwarded-for {enable | disable} max-message-length <kBytes> max-request-length <kBytes> proxy-fqdn <fqdn>
Description Enable to add the client IP to the header of forwarded requests Enable to add a front-end-https header to forwarded requests. Enable to add the via header to forwarded requests. Enable to add x-forwarded-for header to forwarded requests. Set the maximum length, in KB, of the HTTP message not including body. Range 16 to 256. Set the maximum length, in kBytes, of the HTTP request line. Range 2 to 64.
disable disable
32 4
Set the fully qualified domain name (FQDN) for default.fqdn the proxy. This is the domain that clients connect to.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
117
CLI configuration
118
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Syntax
execute scsi-dev list execute scsi-dev partition create <device_ref_int> <partition_size_int> execute scsi-dev partition delete <partition_ref_int>
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
119
execute scsi-dev partition resize <partition_ref_int> <partition_size_int> execute scsi-dev storage <partition_ref_int> <storage_size_int> <storage_name_str>
Variable list Description List the SCSI devices and partitions. The list displays device reference numbers <device_ref_int>, partition reference numbers <partition_ref_int>, and partition sizes <partition_size_int>. Create new SCSI device partitions. Delete SCSI device partitions. Expand or shrink a SCSI device partition. Only the last partition on a device can be resized. SCSI device reference number displayed by the execute scsidev list command. These numbers uniquely identify each SCSI device. Partition reference number displayed by the execute scsi-dev list command. These numbers uniquely identify each SCSI device partition. Add WAN optimization storages. The first time you add a storage to a partition using the execute scsi-dev storage command the partition is labelled with a random string (for example, 77A2A1AB1D0EF8B7). This label is used for all storages added to a given partition. A different label is created for each partition. The labels appear when you use the execute scsi-dev list command to list the partitions. The size of a WAN optimization storage in MB. The storage can be from 16 MB up to the size of the partition. The name of the WAN optimization storage.
storage
<storage_size_int> <storage_name_str>
Examples
Use the following command to list the SCSI devices for a FortiGate unit that includes a FortiGate-ASM-S08 module. #execute scsi-dev list Device 1 492.0 MB ref: 0 (Vendor: Model: USB DISK 2.0 partition 1 39.1 MB ref: 1 partition 2 39.1 MB ref: 2 partition 3 39.1 MB ref: 3 Device 2 74.5 GB FUJITSU MH W2080B Rev: 0) partition 1 74.5 GB 404913186405899C ref: 16 ref: 17 Rev: PMAP) label: <none> label: <none> label: <none> (Vendor: ATA Model: label:
In this example, the device reference number for the hard disk on the FortiGate-ASM-S08 module is 16 and the partition reference number for the partition on this hard disk is 17. The label 404913186405899C for partition ref 17 indicates that WAN optimization storages have been added to this partition. Use the following command to add a WAN optimization storage named is WAN_sto_1 to partition reference number 17. The storage size is 20 GB or 20000 MB.
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
120
Example: WAN optimization storage on a FortiGate-111C unit with two hard disks
execute scsi-dev storage 17 20000 WAN_sto_1 Storage created; size: 20000MB signature: WAN-sto_1404913186405899C
Example: WAN optimization storage on a FortiGate-111C unit with two hard disks
This example shows how to configure WAN optimization storage on a FortiGate-111C with two hard disks. The example describes how to use the first disk for byte caching and the second disk for web caching. This example does not describe how to install the second hard disk. To configure WAN optimization storage on a FortiGate-111C with two hard disks The FortiGate unit finds both hard disks and the single partitions on the hard disks and assigns the disks and partitions reference numbers. Use the following command to display the disk information:
execute scsi-dev list Device 1 60.2 GB Rev: J090) partition 1 60.2 GB Device 2 60.2 GB Rev: J090) partition 1 60.2 GB ref: 0 ref: 1 ref: 2 ref: 3 (Vendor: ATA Model: STT_FTM64GL25H
In the example output, Device 1 is the first hard disk and Device 2 is the second hard disk. The reference number for the first hard disk is 0 and the reference number for the partition on the first hard disk is 1. The reference number for the second hard disk is 2 and the reference number for the partition on the first hard disk is 3. These are example numbers only. They may be different on some units. Use the following steps to configure the partition on the first disk for byte caching and the partition on the second disk for web caching. 1 Enter the following command to add a WAN optimization storage named byte_cache_sto to be used for byte caching. The command adds the WAN optimization storage to partition reference 1: execute scsi-dev storage 1 60000 byte_cache_storage Storage created; size: 60000MB signature: byte-cache-sto2CC878A743254E58 See About partition labels on page 122 for more information about adding storages to a partition. 2 Enter the following command to add a WAN optimization storage named web_cache_sto to be used for web caching. The command adds the WAN optimization storage to partition reference 3: execute scsi-dev storage 3 60000 web_cache_sto Storage created; size: 60000MB signature: web_cache_sto77A2A1AB1D0EF8B7 See About partition labels on page 122 for more information about adding storages to a partition. You cannot list these WAN optimization storages using the execute scsi-dev command. Instead, use the following command to list the WAN optimization storages that you have added: get wanopt storage
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
121
== [ byte_cache_sto ] name: byte_cache_sto partition-label: 2CC878A743254E58 partition-size: 61608 storage-size: 60000 == [ web_cache_sto ] name: web_cache_sto partition-label: 77A2A1AB1D0EF8B7 partitionsize: 61608 storage-size: 60000 3 Enter the following command to configure web caching to use the web_cache_sto storage and byte caching to use the byte_cache_sto storage: config wanopt cache-storage set web-cache-storage web_cache_sto set byte-cache-storage byte_cache_sto end
label: 77A2A1AB1D0EF8B7
122
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Index
Index
Symbols
_email, 11 _fqdn, 11 _index, 11 _int, 11 _ipv4, 11 _ipv4/mask, 11 _ipv4mask, 11 _ipv6, 11 _ipv6mask, 11 _name, 11 _pattern, 11 _str, 11 _v4mask, 11 _v6mask, 11
E
explicit mode WAN optimization, 38, 44 explicit web proxy, 113
F
firewall policy matching, 40 firewall load balancing, 38 firewall policy, 21, 37 accept action, 26, 27 changing the position in the policy list, 41 deleting, 41 identity-based, 38 insert policy before, 40 matching, 40 maximum bandwidth, 39 moving, 41 traffic priority, 39 FortiClient peer, 22 FortiGate documentation commenting on, 13 FortiGuard Antispam, 8 Antivirus, 8 Fortinet customer service, 12 Fortinet documentation, 13 Fortinet Knowledge Center, 13 fully qualified domain name (FQDN), 11
A
accept action firewall policy, 26, 27 accept any peer, 29 active-passive WAN optimization rules, 37 authentication, 38 authentication method, 33 peer, 30 WAN optimization peer authentication, 29 authentication group authentication method, 33 certificate, 33 password, 33 pre-shared key, 33
H
host ID peer, 22, 29 HTTP unknown HTTP sessions, 45 HTTP rule non-HTTP sessions, 45
B
bandwidth maximum, 39 byte cache, 15
C
certificate authentication group, 33 CIDR, 11, 42 comments, documentation, 13 configuring WAN optimization peer, 31 customer service, 12
I
identity-based firewall policies, 38 index number, 11 insert policy before firewall policy, 40 installation, 8 introduction Fortinet documentation, 13 IP address peer, 22 WAN optimization, 29
D
default password, 8 documentation commenting on, 13 Fortinet, 13 dotted decimal, 11
L
load balancing, 38 local host ID peer, 29
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
123
Index
M
matching firewall policy, 40 maximum bandwidth, 39 firewall policy, 39 traffic shaping, 39 mode operation, 8 monitoring WAN optimization, 25 moving a firewall policy, 41
protocol optimization, 15
R
regular expression, 11 reverse proxy web cache, 19, 107 routing configuring, 113 rule, 37 active-passive, 37 non-HTTP sessions, 45 peer-to-peer, 37 unknown HTTP sessions, 45 WAN optimization, 37
N
NAT, 38 NAT/Route mode, 22 non-HTTP sessions HTTP rule, 45
S
secure tunnelling, 15 sharing WAN optimization tunnels, 23 SSL offloading, 15 string, 11
O
operation mode, 8 out of path topology, 16
T
TCP port WAN optimization tunnels, 22 technical support, 12 topology out of path, 16 Traffic Priority, 39 traffic priority firewall policy, 39 traffic shaping, 39 traffic shaping, 38 maximum bandwidth, 39 traffic priority, 39 Transparent mode, 22 transparent mode WAN optimization, 38, 44 tunnel sharing WAN optimization tunnels, 23 TCP port, 22 WAN optimization, 22 tunnel request, 30 tunnel-non-http, 45
P
password administrator, 8 authentication group, 33 pattern, 11 peer accept any peer, 29 host ID, 22, 29 IP address, 22 local host ID, 29 WAN optimization, 29 peer authentication, 30 WAN optimization, 29 peer host ID WAN optimization, 29 peer IP address WAN optimization, 29 peer-to-peer WAN optimization rules, 37 policy accept action, 26, 27 changing the position in the policy list, 41 deleting, 41 firewall, 21 insert policy before, 40 matching, 40 maximum bandwidth, 39 move, 41 traffic priority, 39 pre-shared key authentication group, 33 protection profile, 37
U
unknown HTTP sessions, 45
V
value parse error, 11 VDOMs, 22 virtual domains, 22 virtual IP WAN optimization, 38
124
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
Index
W
WAN optimization and virtual IPs, 38 explicit mode, 44 FortiGate models supported, 8 IP address, 29 monitoring, 25 peer authentication, 29 peer host ID, 29 peer IP address, 29 peers, 29 transparent mode, 44 WAN optimization peer configuring, 31
web cache, 15 active-passive WAN optimization, 68 adding to passive WAN optimization rule, 68 client/server WAN optimization, 68 non-standard ports, 66 peer to peer WAN optimization, 72 reverse proxy, 19, 107 web proxy, 113 wild cards, 11
X
X-Forwarded-For (XFF), 114
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
125
Index
126
FortiGate WAN Optimization, Web Cache and Web Proxy Version 4.0 MR1 User Guide 01-410-96996-20091116 http://docs.fortinet.com/ Feedback
www.fortinet.com
www.fortinet.com