Force Utf-8 Login; Fortigate Wireless Controller; Interface Status Detection For Gateway Load Balancing; Enhanced Ecmp Route Failover And Load Balancing - Fortinet FortiGate Series Administration Manual

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

FortiGate wireless controller

Force UTF-8 login

FortiGate wireless controller

Interface status detection for gateway load balancing

Enhanced ECMP route failover and load balancing

SCEP extensions

44
To facilitate authentication with some LDAP servers, the login credentials must use UTF-8
encoding. Enable this as follows:
config vpn ssl settings
set force-utf8-login enable
end
Most FortiGate units, but not FortiWiFi models, can act as a wireless network controller,
managing the wireless Access Point (AP) functionality of FortiWiFi units. All units must be
running the most FortiOS 4.0 MR1 firmware.
For more information, see
FortiOS 4.0 MR1 interface status detection now includes enabling up to three different
protocols to confirm that an interface can connect to the IP address of a server. Usually
the server is the next-hop router that leads to an external network or the Internet.
For more information, see
page
193.
Previous versions of FortiOS provided source IP-based load balancing for ECMP routes.
FortiOS 4.0 MR1 includes three configuration options for ECMP route failover and load
balancing:
Source based
The FortiGate unit load balances sessions among ECMP routes based on the
source IP address of the sessions to be load balanced. This is the default load
(also called
balancing method. No configuration changes are required to support source IP
source IP based)
load balancing.
Weighted (also
The FortiGate unit load balances sessions among ECMP routes based on
weights added to ECMP routes. More traffic is directed to routes with higher
called
weights.
weight-based)
Spill-over (also
The FortiGate unit distributes sessions among ECMP routes based on how busy
the FortiGate interfaces added to the routes are.
called
After selecting spill-over you add route Spillover Thresholds to interfaces added
usage-based)
to ECMP routes. The FortiGate unit sends all ECMP-routed sessions to the
lowest numbered interface until the bandwidth being processed by this interface
reaches its spillover threshold. The FortiGate unit then spills additional sessions
over to the next lowest numbered interface.
The Spillover Thresholds range is 0-2097000 KBps.
For more information, see
FortiOS 4.0 MR1 supports automatic update of system certificates. When a certificate is
about to expire, the FortiGate unit uses SCEP to request and download a new certificate.
This applies to both Local and CA certificates. You can also configure periodic updating of
a Certificate Revocation List (CRL).
"Wireless Controller" on page
"Interface status detection for gateway load balancing" on
"ECMP route failover and load balancing" on page
FortiGate Version 4.0 MR1 Administration Guide
What's new in FortiOS Version 4.0 MR1
703.
344.
01-410-89802-20090903
http://docs.fortinet.com/
Feedback

Advertisement

Table of Contents
loading

Table of Contents