タグ: FortiGate

  • Measured Downtime During Inline Insertion of a Transparent Firewall

    Measured Downtime During Inline Insertion of a Transparent Firewall

    Measured Downtime During Inline Insertion of a Transparent Firewall

    This test measures the interruption window observed during inline insertion of a transparent-mode firewall.


    Test Objective

    To evaluate the impact of physically inserting a transparent firewall into an active network path, focusing on real-world deployment conditions.


    Test Environment

    • Firewall: FortiGate (transparent mode)
    • Upstream device: Cisco CBS250-8T-D-JP (default settings)
    • Client: Windows PC
    • Topology: PC → FortiGate → Router → Internet

    The firewall was fully booted and operational before insertion.


    Test Method

    A continuous ICMP echo request was sent to a public endpoint.

    ping 8.8.8.8 -t | ForEach-Object { "{0:HH:mm:ss.fff} {1}" -f (Get-Date), $_ }
    

    During the test, the WAN-side cable of the firewall was removed and immediately reinserted, simulating a real inline deployment operation.

    The test was performed multiple times under identical conditions. The maximum observed interruption window was used for evaluation, to reflect a conservative estimate suitable for real-world deployment planning.


    Observed Result

    21:34:45.787 8.8.8.8 からの応答: バイト数 =32 時間 =3ms TTL=117
    21:34:50.571 要求がタイムアウトしました。
    21:34:55.575 要求がタイムアウトしました。
    21:34:56.585 8.8.8.8 からの応答: バイト数 =32 時間 =4ms TTL=117
    

    The last successful reply was recorded at 21:34:45.787, and successful replies resumed at 21:34:56.585.

    This indicates an observed interruption window of approximately 10.8 seconds.


    Interpretation

    The observed interruption includes multiple factors:

    • Physical cable reseat
    • Link state detection timing
    • Interface state transition
    • Upper-layer recovery behavior

    Theoretical worst-case interruption was estimated to be up to approximately 10 seconds, depending on link state detection timing.

    In practice, based on repeated observations in Cisco environments, similar operations tend to result in approximately 7 seconds of interruption.

    This test demonstrates that interruption windows on the order of 10 seconds can occur under real deployment conditions.


    Operational Considerations

    In real deployments, sufficient maintenance time must be secured in advance, as even short interruptions can impact active sessions and services.

    This measurement prioritizes worst-case behavior over average performance, to support safe deployment planning.


    Related Evidence

    View all validation results

  • Allowing VRRP, HSRP, and STP Through Transparent-Mode FortiGate

    Allowing VRRP, HSRP, and STP Through Transparent-Mode FortiGate

    Allowing VRRP, HSRP, and STP Through Transparent-Mode FortiGate

    This post records validation results for passing control traffic through a FortiGate deployed in transparent mode. The focus is on VRRP, HSRP, and STP/BPDU behavior.

    The purpose of this test is not to repeat vendor documentation, but to confirm actual behavior with real devices and real command outputs.


    Scope of Validation

    • VRRP forwarding
    • HSRP forwarding
    • STP/BPDU forwarding
    • Effect of set stpforward enable

    VRRP Verification (Cisco)

    Two Cisco routers were connected with a transparent-mode FortiGate inserted between them.

    Router#show vrrp brief
    Interface          Grp Pri Time  Own Pre State   Master addr     Group addr
    Gi0/5              1   100 3609       Y  Backup  192.168.84.2    192.168.84.254
    Router#

    The router remained in Backup state, confirming that the Master was detected.


    HSRP Verification (Cisco)

    Router#show standby brief
    Interface   Grp  Pri P State   Active          Standby         Virtual IP
    Gi0/5       1    100   Standby 192.168.84.1    local           192.168.84.254
    Router#

    The router remained in Standby state, confirming that the Active router was detected.


    VRRP Verification (NEC IX)

    Two NEC IX routers were connected with a transparent-mode FortiGate inserted between them. VRRP operated normally.


    STP/BPDU Behavior

    Layer 2 switches were tested with a transparent-mode FortiGate inserted between them.

    Topology

    • Cisco Catalyst 2960
    • Aruba 2530

    Result (via FortiGate)

    Switch#show spanning-tree | i root
    This bridge is the root
    
    HP-2530# show spanning-tree | i root
    This switch is root
    

    Both switches identified themselves as root, indicating that STP was not exchanged.


    Direct Connection Check

    When directly connected, STP operated normally.

    This confirms that FortiGate blocked BPDU in the default configuration.


    Configuration Change

    config system interface
    edit <interface-name>
    set stpforward enable
    next
    end

    After enabling this setting, STP communication became functional.


    Conclusion

    • VRRP passes through transparent FortiGate
    • HSRP passes through transparent FortiGate
    • STP is blocked by default
    • stpforward is required for BPDU forwarding

    If BPDU forwarding is not enabled, multiple root bridges may form, leading to unstable Layer 2 topology.


    This case is part of our Validation Evidence.

    View Validation Evidence