In this article i will describe some routing capabilities that Fortigate has.
Fortigate is capable of many routing Protocols:
1. Static Routes (not really a routing protocol 😉 )
The Fortigate Firewall has also a Routing table 1that displays all the learned routes and also a FIB table. You might know about FIB from the Cisco CEF.
The FIB contains all local and non-local routes that are known to the Device. It is populated by the routing table and in the High-Availability mode FIB is replicated among the clusters, but only the Master builds up the FIB, based on the routing table.
Reverse Path Forwarding (RPF)
This is used for anti-spoofing protection. You can find more about Reverse Path Forwarding here.
Bidirectional Forwarding Detection (BFD)
This is used to deal with dynamic routing protocols problems, of not having a fine granularity for detecting device failures on the network and re-routing around those failures. This works like the “hellos” of the OSPF routing protocol, but it actually connects to the router.
Default Administrative Distances for Fortigate:
1. The Fortigate Firewall assigns an AD of “20” to EBGP routes.
2. Static Routes have an AD of “10”
3. Connected Routes have an AD of “0”
4. When you configure the BGP protocol a default route-map is created to make the AS non-tranzit (cool feature)
If you have any questions please ask.