background image

FortiGate-ASM-FB4 Version 1.0 Technical Note

8

01-30005-0424-20071002

Offloading requirements

FortiGate-ASM-FB4 accelerated network processing

Some traffic processing can still be hardware accelerated, even though it does not 
meet general offloading requirements. For example, some IPSec traffic originates 
from the FortiGate unit itself and does not follow the offloading requirement of 
ingress from a FortiGate-ASM-FB4 module network interface, but FortiGate units 
can still utilize FortiGate-ASM-FB4 module encryption capabilities. For information 
on exceptions, see 

“Exceptions to offloading requirements” on page 9

.

Packet forwarding rates vary by the percentage of offloadable processing and the 
type of network processing required by your configuration, but are independent of 
frame size. For optimal traffic types, network throughput can equal wire speed.

This section includes the following topics:

Offloading requirements

Exceptions to offloading requirements

Offloading requirements

Offloading traffic to the FortiGate-ASM-FB4 module requires that the FortiGate 
unit configuration and the traffic itself is suited to hardware acceleration.

Sessions must be fast path ready. Fast path ready session characteristics are:

• Layer 2 type/length must be 0x0800 (IEEE 802.1q VLAN specification is 

supported); link aggregation between FortiGate-ASM-FB4 module network 
interfaces may be used (IEEE 802.3ad specification is supported) 

• Layer 3 protocol must beIPv4
• Layer 4 protocol must be UDP, TCP or ICMP
• Layer 3 / Layer 4 header or content modification must not require a session 

helper (for example, SNAT, DNAT, and TTL reduction are supported, but 
application layer content modification is not supported)

• FortiGate unit firewall policy must not require antivirus or IPS inspection
• origin must not be local host (the FortiGate unit)
• ingress and egress network interfaces are both located on the same FortiGate-

ASM-FB4 module

If a session is not fast path ready, the FortiGate unit will not send the session key 
to the FortiGate-ASM-FB4 module. Without the session key, all session key 
lookup for incoming packets of that session fails, causing all session packets to be 
sent to the FortiGate unit’s main processing resources, and processed at normal 
speeds.

If a session is fast path ready, the FortiGate unit will send the session key to the 
FortiGate-ASM-FB4 module. Session key lookup then succeeds for subsequent 
packets from the known session. Packets within the session must then also meet 
packet requirements.

• Incoming packets must not be fragmented.

Note: 

If you disable anomaly checks by Intrusion Prevention (IPS), you can still enable 

hardware accelerated anomaly checks. For details, see 

“config system interface” on 

page 13

.

Summary of Contents for FortiGate FortiGate-ASM-FB4

Page 1: ...www fortinet com FortiGate ASM FB4 Version 1 0 T E C H N I C A L N O T E...

Page 2: ...Fortinet Inc Trademarks Dynamic Threat Prevention System DTPS APSecure FortiASIC FortiBIOS FortiBridge FortiClient FortiGate FortiGate Unified Threat Management System FortiGuard FortiGuard Antispam F...

Page 3: ...to offloading requirements 9 IPSec offloading requirements 9 HA active active offloading requirements 10 FortiGate ASM FB4 hardware 11 Installation and removal 11 To install SFP transceivers 11 To ins...

Page 4: ...FortiGate ASM FB4 Version 1 0 Technical Note 4 01 30005 0424 20071002 Contents...

Page 5: ...such as streaming multimedia traffic with long session lifetimes such as FTP IPSec VPN traffic active active HA load balanced traffic P2P traffic Eligible traffic processing is offloaded to the FortiG...

Page 6: ...duct The documents on this CD are current at shipping time For up to date versions of Fortinet documentation see the Fortinet Technical Documentation web site at http docs forticare com Fortinet Knowl...

Page 7: ...The FortiGate ASM FB4 module continuously matches packets arriving on its network interfaces against the session keys and SAs it has received from the FortiGate unit If a FortiGate ASM FB4 module s ne...

Page 8: ...800 IEEE 802 1q VLAN specification is supported link aggregation between FortiGate ASM FB4 module network interfaces may be used IEEE 802 3ad specification is supported Layer 3 protocol must beIPv4 La...

Page 9: ...but still utilize FortiGate ASM FB4 modules encryption and other capabilities Exceptions include IPSec traffic and active active high availability HA load balanced traffic IPSec offloading requiremen...

Page 10: ...yption offload Ingress packet Offloaded encryption Encrypted ESP packet egress fast path Packet from FortiGate unit Offloaded encryption Encrypted ESP packet egress HA active active offloading require...

Page 11: ...he SFP cage sockets on the FortiGate ASM FB4 module front panel 3 Hold the sides of the SFP transceiver and slide the SFP transceiver into the cage until it clicks into place Repeat this action for ea...

Page 12: ...le into the extended position This unlocks the module from the FortiGate unit 4 Gently pull the latch to remove the module SFP network interfaces FortiGate ASM FB4 modules support both SerDes and SGMI...

Page 13: ...interface When editing a network interface associated with one of the FortiGate ASM FB4 module s SFP transceivers additional settings appear The following settings configure the SFP media type and whe...

Page 14: ...curity option pass_ipsecurity Allow IP with security option to pass drop_ipssrr Drop IP with strict source record route option pass_ipssrr Allow IP with strict source record route option to pass drop_...

Page 15: ...n is enabled in Phase 2 configuration If replay detection is disabled encryption is always offloaded disable dec offload antireplay enable disable Enable or disable offloading of IPSec decryption This...

Page 16: ...05 0424 20071002 config system npu Specialized CLI settings Example You could configure the traffic shaping limit to be applied as a bidirectional total limit during hardware accelerated sessions conf...

Page 17: ...tion contains example IPSec configurations whose IPSec encryption and decryption processing is hardware accelerated by FortiGate ASM FB4 modules Figure 1 illustrates the example network topology Table...

Page 18: ...e CLI For details on encryption and decryption offloading options available in the CLI see config system npu on page 15 4 Go to Firewall Policy 5 Configure one policy to apply the Phase 1 IPSec tunnel...

Page 19: ...2 set dst 1 1 1 0 255 255 255 0 set gateway 3 3 3 1 next end 15 Activate the IPSec tunnel by sending traffic between the two protected networks To verify tunnel activation go to VPN IPSEC Monitor Acce...

Page 20: ...section select Specify and type the VPN IP address 3 3 3 1 which is the IP address of FortiGate_1 s FortiGate ASM FB4 module port 2 10 Configure Phase 2 If you enable the checkbox Enable replay detect...

Page 21: ...18 19 20 ESP 10 F fast path 5 required session characteristics 8 FortiASIC 5 FortiGate documentation commenting on 6 Fortinet documentation 6 Fortinet Knowledge Center 6 fragmented packets 8 FTP 5 9 H...

Page 22: ...n SA 7 10 15 security option 14 SerDes 14 session key 7 lifetime 5 SFP cages 11 media type 13 14 transceivers 11 SFP small form factor pluggable network interfaces 5 SFP transceivers 11 SGMII 14 15 SH...

Page 23: ...www fortinet com...

Page 24: ...www fortinet com...

Reviews: