background image

FortiGate-ASM-FB4 accelerated network processing 

Exceptions to offloading requirements

FortiGate-ASM-FB4 Version 1.0 Technical Note
01-30005-0424-20071002

9

• Outgoing packets must not require fragmentation to a size less than 385 bytes. 

Because of this requirement, the configured MTU for the FortiGate-ASM-FB4 
module’s network interfaces must also meet or exceed the FortiGate-ASM-
FB4-supported minimum MTU of 385 bytes.

If packet requirements are not met, an individual packet will use FortiGate unit 
main processing resources, regardless of whether other packets in the session 
are offloaded to the FortiGate-ASM-FB4 module.

In some cases, due to these requirements, a protocol’s session(s) may receive a 
mixture of offloaded and non-offloaded processing.

For example, FTP uses two connections: a control connection and a data 
connection. The control connection requires a session helper, and cannot be 
offloaded, but the data connection does not require a session helper, and can be 
offloaded. Within the offloadable data session, fragmented packets will not be 
offloaded, but other packets will be offloaded.

Exceptions to offloading requirements

Some traffic types differ from general offloading requirements, but still utilize 
FortiGate-ASM-FB4 modules’ encryption and other capabilities. Exceptions 
include IPSec traffic and active-active high availability (HA) load balanced traffic.

IPSec offloading requirements

FortiGate-ASM-FB4 modules contain features to improve IPSec tunnel 
performance. For example, FortiGate-ASM-FB4 modules can encrypt and decrypt 
packets, reducing cryptographic load on the FortiGate unit’s main processing 
resources.

Requirements for hardware accelerated IPSec encryption or decryption are a 
modification of general offloading requirements. Differing characteristics are:

• origin can be local host (the FortiGate unit)
• in Phase 1 configuration, Local Gateway IP must be specified as an IP 

address of a network interface on the FortiGate-ASM-FB4 module

• SA must have been received by the FortiGate-ASM-FB4 module
• in Phase 2 configuration:

• encryption algorithm must be DES, 3DES, AES-128, AES-192, AES-256, 

or null

• authentication must be MD5, SHA1, or null
• if encryption is null, authentication must not also be null
• if replay detection is enabled, 

enc-offload-antireplay

 must also be 

enable

 in the CLI

Note: 

If replay detection is enabled in the Phase 2 configuration, you can enable or disable 

IPSec encryption and decryption offloading from the CLI. Performance varies by those CLI 
options and the percentage of packets requiring encryption or decryption. For details, see 

“config system npu” on page 15

.

Summary of Contents for FortiGate FortiGate-ASM-FB4

Page 1: ...www fortinet com FortiGate ASM FB4 Version 1 0 T E C H N I C A L N O T E...

Page 2: ...Fortinet Inc Trademarks Dynamic Threat Prevention System DTPS APSecure FortiASIC FortiBIOS FortiBridge FortiClient FortiGate FortiGate Unified Threat Management System FortiGuard FortiGuard Antispam F...

Page 3: ...to offloading requirements 9 IPSec offloading requirements 9 HA active active offloading requirements 10 FortiGate ASM FB4 hardware 11 Installation and removal 11 To install SFP transceivers 11 To ins...

Page 4: ...FortiGate ASM FB4 Version 1 0 Technical Note 4 01 30005 0424 20071002 Contents...

Page 5: ...such as streaming multimedia traffic with long session lifetimes such as FTP IPSec VPN traffic active active HA load balanced traffic P2P traffic Eligible traffic processing is offloaded to the FortiG...

Page 6: ...duct The documents on this CD are current at shipping time For up to date versions of Fortinet documentation see the Fortinet Technical Documentation web site at http docs forticare com Fortinet Knowl...

Page 7: ...The FortiGate ASM FB4 module continuously matches packets arriving on its network interfaces against the session keys and SAs it has received from the FortiGate unit If a FortiGate ASM FB4 module s ne...

Page 8: ...800 IEEE 802 1q VLAN specification is supported link aggregation between FortiGate ASM FB4 module network interfaces may be used IEEE 802 3ad specification is supported Layer 3 protocol must beIPv4 La...

Page 9: ...but still utilize FortiGate ASM FB4 modules encryption and other capabilities Exceptions include IPSec traffic and active active high availability HA load balanced traffic IPSec offloading requiremen...

Page 10: ...yption offload Ingress packet Offloaded encryption Encrypted ESP packet egress fast path Packet from FortiGate unit Offloaded encryption Encrypted ESP packet egress HA active active offloading require...

Page 11: ...he SFP cage sockets on the FortiGate ASM FB4 module front panel 3 Hold the sides of the SFP transceiver and slide the SFP transceiver into the cage until it clicks into place Repeat this action for ea...

Page 12: ...le into the extended position This unlocks the module from the FortiGate unit 4 Gently pull the latch to remove the module SFP network interfaces FortiGate ASM FB4 modules support both SerDes and SGMI...

Page 13: ...interface When editing a network interface associated with one of the FortiGate ASM FB4 module s SFP transceivers additional settings appear The following settings configure the SFP media type and whe...

Page 14: ...curity option pass_ipsecurity Allow IP with security option to pass drop_ipssrr Drop IP with strict source record route option pass_ipssrr Allow IP with strict source record route option to pass drop_...

Page 15: ...n is enabled in Phase 2 configuration If replay detection is disabled encryption is always offloaded disable dec offload antireplay enable disable Enable or disable offloading of IPSec decryption This...

Page 16: ...05 0424 20071002 config system npu Specialized CLI settings Example You could configure the traffic shaping limit to be applied as a bidirectional total limit during hardware accelerated sessions conf...

Page 17: ...tion contains example IPSec configurations whose IPSec encryption and decryption processing is hardware accelerated by FortiGate ASM FB4 modules Figure 1 illustrates the example network topology Table...

Page 18: ...e CLI For details on encryption and decryption offloading options available in the CLI see config system npu on page 15 4 Go to Firewall Policy 5 Configure one policy to apply the Phase 1 IPSec tunnel...

Page 19: ...2 set dst 1 1 1 0 255 255 255 0 set gateway 3 3 3 1 next end 15 Activate the IPSec tunnel by sending traffic between the two protected networks To verify tunnel activation go to VPN IPSEC Monitor Acce...

Page 20: ...section select Specify and type the VPN IP address 3 3 3 1 which is the IP address of FortiGate_1 s FortiGate ASM FB4 module port 2 10 Configure Phase 2 If you enable the checkbox Enable replay detect...

Page 21: ...18 19 20 ESP 10 F fast path 5 required session characteristics 8 FortiASIC 5 FortiGate documentation commenting on 6 Fortinet documentation 6 Fortinet Knowledge Center 6 fragmented packets 8 FTP 5 9 H...

Page 22: ...n SA 7 10 15 security option 14 SerDes 14 session key 7 lifetime 5 SFP cages 11 media type 13 14 transceivers 11 SFP small form factor pluggable network interfaces 5 SFP transceivers 11 SGMII 14 15 SH...

Page 23: ...www fortinet com...

Page 24: ...www fortinet com...

Reviews: