Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Ihor
New Contributor

Basic connectivity issue

Hello everybody,

 

I am new to Fortinet (today is the first day when I try to use it) and i encountered the problem with the basic connectivity.

I use FortiGate-3600C v5.0

 

I have applied the next config in the CLI:

config system interface     edit port1         set ip 1.1.1.1/24     next     edit port2         set ip 2.2.2.1/24     next end config firewall policy     edit 1         set srcintf "any"         set dstintf "any"         set srcaddr "all"         set dstaddr "all"         set action accept         set schedule "always"         set service "ALL"     next end

 

In the Web interface I saw that packet-capture intercepts the incoming traffic from both ports, but no departing traffic.

In the Policy Tab I saw that counters are not running. So Policy sequence didn't take part...

So I mean that I simply have no connectivity through the device. 

After googling a long time and trying different combinations, including disabling RPF, but that didn't help.

 

Could anybody point me where my mistake is?

Thanks ahead!

2 REPLIES 2
tclark
New Contributor

Make sure you have a default route. If it does not have a default route, it will send an ICMP No Route To Host msg. That will not reach the policy since the packet does not get forwarded due to no route.

 

You might also want to enable NAT in your policy if you are trying to use PAT for internal to WAN traffic.

ede_pfau

First, you should clarify if you tested port1 to port2, or portX to WAN.

For port to port, the FGT already has created the necessary routes (check this in Routing > Monitor).

 

Second, NEVER, EVER, use the "any" interface if you aren't forced to! I know it's valid but it's a nightmare for debugging. In your case, there is no justification to use it so just don't.

The "any" interface and it's sibling, stacking multiple interfaces in a policy as source or destination, were introduced only recently (v5 IIRC) and they will have their right of existence in certain corner cases. But 99% of all policies can be written with a single interface pair. Just imagine you've got your FGT in production; you want to sniff traffic from portA to portB, see if this policy is hit or not - ALL and every traffic will hit this policy!

So, first day, first advice, forget the "any" interface.

 

You haven't mentioned the firmware version you're using (v5 has many flavors...). One of these had a bug where the "ALL" service was restricted to TCP only - ping wouldn't be covered by it. Easy to fix, and it only occurred during a config translation from an older release to 5.0.x but it could be happening with your FGT.


Ede

"Kernel panic: Aiee, killing interrupt handler!"
Ede"Kernel panic: Aiee, killing interrupt handler!"
Labels
Top Kudoed Authors