background image

FortiGate-ASM-FB4 accelerated network processing 

FortiGate-ASM-FB4 Version 1.0 Technical Note
01-30005-0424-20071002

7

FortiGate-ASM-FB4 accelerated 
network processing

FortiGate units can offload some types of network traffic processing from main 
processing resources to a FortiGate-ASM-FB4 module, which contains 
specialized network processing hardware. If your network contains a significant 
volume of traffic that is suitable for offloading, FortiGate-ASM-FB4 module 
hardware acceleration can significantly improve your network throughput.

Hardware acceleration generally alters packet processing flow as follows:

1

Packets initiating a session pass to the FortiGate unit’s main processing 
resources.

2

The FortiGate unit assesses whether the session matches fast path (offload) 
requirements.

To be suitable for offloading, traffic must possess only characteristics processable 
by the fast path. For a list of requirements, see 

“Offloading requirements” on 

page 8

.

If the traffic is categorized as fast path friendly, the FortiGate unit sends the 
session key or IPSec security association (SA) and configured processing action 
to the FortiGate-ASM-FB4 module.

3

The FortiGate-ASM-FB4 module continuously matches packets arriving on its 
network interfaces against the session keys and SAs it has received from the 
FortiGate unit.
• If a FortiGate-ASM-FB4 module’s network interface is configured to perform 

hardware accelerated anomaly checks, the FortiGate-ASM-FB4 module drops 
or accepts packets which match the configured anomaly patterns. These 
checks are separate from anomaly checks performed by IPS, which is not 
compatible with FortiGate-ASM-FB4 module offloading. For details, see 

“config system interface” on page 13

.

• The FortiGate-ASM-FB4 module next checks for a matching session key or 

SA. If a matching session key or SA is found, and if the packet meets packet 
requirements, the FortiGate-ASM-FB4 module processes the packet 
according to the configured action and then sends the resulting packet. Packet 
processing is hardware accelerated.

• If a matching session key or SA is not found, or if the packet does not meet 

packet requirements, the traffic cannot be offloaded. The FortiGate-ASM-FB4 
module sends the data to the FortiGate unit’s main processing resources, 
which process the packet. Packet processing is similar to normal network 
interfaces (that is, packet processing is not hardware accelerated by the 
FortiGate-ASM-FB4 module, and requires main processing resources). Packet 
forwarding occurs at normal rates.

Summary of Contents for FortiGate FortiGate-ASM-FB4

Page 1: ...www fortinet com FortiGate ASM FB4 Version 1 0 T E C H N I C A L N O T E...

Page 2: ...Fortinet Inc Trademarks Dynamic Threat Prevention System DTPS APSecure FortiASIC FortiBIOS FortiBridge FortiClient FortiGate FortiGate Unified Threat Management System FortiGuard FortiGuard Antispam F...

Page 3: ...to offloading requirements 9 IPSec offloading requirements 9 HA active active offloading requirements 10 FortiGate ASM FB4 hardware 11 Installation and removal 11 To install SFP transceivers 11 To ins...

Page 4: ...FortiGate ASM FB4 Version 1 0 Technical Note 4 01 30005 0424 20071002 Contents...

Page 5: ...such as streaming multimedia traffic with long session lifetimes such as FTP IPSec VPN traffic active active HA load balanced traffic P2P traffic Eligible traffic processing is offloaded to the FortiG...

Page 6: ...duct The documents on this CD are current at shipping time For up to date versions of Fortinet documentation see the Fortinet Technical Documentation web site at http docs forticare com Fortinet Knowl...

Page 7: ...The FortiGate ASM FB4 module continuously matches packets arriving on its network interfaces against the session keys and SAs it has received from the FortiGate unit If a FortiGate ASM FB4 module s ne...

Page 8: ...800 IEEE 802 1q VLAN specification is supported link aggregation between FortiGate ASM FB4 module network interfaces may be used IEEE 802 3ad specification is supported Layer 3 protocol must beIPv4 La...

Page 9: ...but still utilize FortiGate ASM FB4 modules encryption and other capabilities Exceptions include IPSec traffic and active active high availability HA load balanced traffic IPSec offloading requiremen...

Page 10: ...yption offload Ingress packet Offloaded encryption Encrypted ESP packet egress fast path Packet from FortiGate unit Offloaded encryption Encrypted ESP packet egress HA active active offloading require...

Page 11: ...he SFP cage sockets on the FortiGate ASM FB4 module front panel 3 Hold the sides of the SFP transceiver and slide the SFP transceiver into the cage until it clicks into place Repeat this action for ea...

Page 12: ...le into the extended position This unlocks the module from the FortiGate unit 4 Gently pull the latch to remove the module SFP network interfaces FortiGate ASM FB4 modules support both SerDes and SGMI...

Page 13: ...interface When editing a network interface associated with one of the FortiGate ASM FB4 module s SFP transceivers additional settings appear The following settings configure the SFP media type and whe...

Page 14: ...curity option pass_ipsecurity Allow IP with security option to pass drop_ipssrr Drop IP with strict source record route option pass_ipssrr Allow IP with strict source record route option to pass drop_...

Page 15: ...n is enabled in Phase 2 configuration If replay detection is disabled encryption is always offloaded disable dec offload antireplay enable disable Enable or disable offloading of IPSec decryption This...

Page 16: ...05 0424 20071002 config system npu Specialized CLI settings Example You could configure the traffic shaping limit to be applied as a bidirectional total limit during hardware accelerated sessions conf...

Page 17: ...tion contains example IPSec configurations whose IPSec encryption and decryption processing is hardware accelerated by FortiGate ASM FB4 modules Figure 1 illustrates the example network topology Table...

Page 18: ...e CLI For details on encryption and decryption offloading options available in the CLI see config system npu on page 15 4 Go to Firewall Policy 5 Configure one policy to apply the Phase 1 IPSec tunnel...

Page 19: ...2 set dst 1 1 1 0 255 255 255 0 set gateway 3 3 3 1 next end 15 Activate the IPSec tunnel by sending traffic between the two protected networks To verify tunnel activation go to VPN IPSEC Monitor Acce...

Page 20: ...section select Specify and type the VPN IP address 3 3 3 1 which is the IP address of FortiGate_1 s FortiGate ASM FB4 module port 2 10 Configure Phase 2 If you enable the checkbox Enable replay detect...

Page 21: ...18 19 20 ESP 10 F fast path 5 required session characteristics 8 FortiASIC 5 FortiGate documentation commenting on 6 Fortinet documentation 6 Fortinet Knowledge Center 6 fragmented packets 8 FTP 5 9 H...

Page 22: ...n SA 7 10 15 security option 14 SerDes 14 session key 7 lifetime 5 SFP cages 11 media type 13 14 transceivers 11 SFP small form factor pluggable network interfaces 5 SFP transceivers 11 SGMII 14 15 SH...

Page 23: ...www fortinet com...

Page 24: ...www fortinet com...

Reviews: