Description |
This article describes how to resolve internet connectivity issues when using FORTIEXTENDER in LAN-Extension mode. |
Scope | FortiExtender. |
Solution |
For example, initiating traffic to a website with the public IP address 193.99.x.x:
listening on le-switch, link-type EN10MB (Ethernet), snapshot length 262144 bytes 09:14:42.274196 IP 172.20.x.x.56774 > 193.99.144.x.443: Flags [.], seq 93324996:93326196, ack 524921853, win 1026, length 1200 09:14:42.460443 IP 172.20.x.x56772 > 193.99.144.x.80: Flags [P.], seq 1246749234:1246749734, ack 68398799, win 1026, length 500: HTTP: GET / HTTP/1.1 09:14:47.079418 IP 172.20.x.x.56774 > 193.99.144.x.443: Flags [.], seq 0:1200, ack 1, win 1026, length 1200 09:14:47.261938 IP 172.20.x.x.56772 > 193.99.144.x.80: Flags [P.], seq 0:500, ack 1, win 1026, length 500: HTTP: GET / HTTP/1.1 09:14:56.681202 IP 172.20.x.x.56774 > 193.99.144.x.443: Flags [R.], seq 1200, ack 1, win 0, length 0 09:14:56.683754 IP 172.20.x.x.56784 > 193.99.144.x.443: Flags [S], seq 962974866, win 64240, options [mss 1200,nop,wscale 8,nop,nop,sackOK], length 0 09:14:56.697486 IP 193.99.x.x.443 > 172.20.x.x.56784: Flags [S.], seq 3048524569, ack 962974867, win 3990, options [mss 1200,nop,wscale 2,sackOK,eol], length 0 09:14:56.698295 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [.], ack 1, win 1026, length 0 09:14:56.701593 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [.], seq 1:1201, ack 1, win 1026, length 1200 09:14:56.701595 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [P.], seq 1201:1755, ack 1, win 1026, length 554 09:14:56.743119 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [P.], seq 555:1755, ack 1, win 1026, length 1200 09:14:56.876505 IP 172.20.x.x.56772 > 193.99.x.x.80: Flags [R.], seq 500, ack 1, win 0, length 0 09:14:57.045479 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [.], seq 1:1201, ack 1, win 1026, length 1200 09:14:57.653176 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [.], seq 1:1201, ack 1, win 1026, length 1200 09:14:58.857534 IP 172.20.x.x.56784 > 193.99.x.x.443: Flags [.], seq 1:1201, ack 1, win 1026, length 1200 09:15:00.816036 IP 172.20.x.x.56789 > 193.99.x.x.80: Flags [S], seq 2550976472, win 64240, options [mss 1200,nop,wscale 8,nop,nop,sackOK], length 0 09:15:00.819356 IP 172.20.x.x.56773 > 193.99.x.x.80: Flags [P.], seq 1382135982:1382136482, ack 728427635, win 1026, length 500: HTTP: GET / HTTP/1.1 09:15:00.830222 IP 193.99.x.x.80 > 172.20.x.x.56789: Flags [S.], seq 2461675492, ack 2550976473, win 3990, options [mss 1200,nop,wscale 2,sackOK,eol], length 0 09:15:00.830795 IP 172.20.x.x.56789 > 193.99.x.x.80: Flags [.], ack 1, win 1026, length 0
Check the debug flow to ensure the policy ID matches(it uses policy id - 61) and the traffic is being routed to the internet and returned via the tunnel between the FortiGate and FortiExtender:
12:53 id=65308 trace_id=4827 func=init_ip_session_common line=6127 msg="allocate a new session-012516f1" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=rpdb_srv_match_input line=1148 msg="Match policy routing id=2139291649: to 193.99.x.x via ifindex-20" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=__vf_ip_route_input_rcu line=1988 msg="find a route: flag=00000000 gw-80.155.171.209 via port14" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=__iprope_tree_check line=524 msg="gnum-100004, use int hash, slot=20, len=8" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=get_new_addr line=1274 msg="find SNAT: IP-80.155.x.x(from IPPOOL), port-56734" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=fw_forward_handler line=997 msg="Allowed by Policy-61: SNAT" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=ip_session_confirm_final line=3141 msg="npu_state=0x100, hook=4" 2024-10-01 11:12:53 id=65308 trace_id=4827 func=__ip_session_run_tuple line=3474 msg="SNAT 172.20.x.x->80.155.x.x:56734" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=print_pkt_detail line=5942 msg="vd-root:0 received a packet(proto=6, 172.20.x.x:56735->193.99.144.85:80) tun_id=0.0.0.0 from FX0015919003108. flag [S], seq 2723957095, ack 0, win 64240" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=init_ip_session_common line=6127 msg="allocate a new session-012516f6" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=rpdb_srv_match_input line=1148 msg="Match policy routing id=2139291649: to 193.99.x.x via ifindex-20" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=__vf_ip_route_input_rcu line=1988 msg="find a route: flag=00000000 gw-80.155.171.209 via port14" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=__iprope_tree_check line=524 msg="gnum-100004, use int hash, slot=20, len=8" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=get_new_addr line=1274 msg="find SNAT: IP-80.155.x.x(from IPPOOL), port-56735" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=fw_forward_handler line=997 msg="Allowed by Policy-61: SNAT" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=ip_session_confirm_final line=3141 msg="npu_state=0x100, hook=4" 2024-10-01 11:12:53 id=65308 trace_id=4828 func=__ip_session_run_tuple line=3474 msg="SNAT 172.20.x.x->80.155.x.x:56735" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=print_pkt_detail line=5942 msg="vd-root:0 received a packet(proto=6, 193.99.144.85:80->80.155.x.x:56734) tun_id=0.0.0.0 from port14. flag [S.], seq 884565577, ack 2844206421, win 3600" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=resolve_ip_tuple_fast line=6030 msg="Find an existing session, id-012516f1, reply direction" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=__ip_session_run_tuple line=3487 msg="DNAT 80.155.x.x:56734->172.20.x.x:56734" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=__vf_ip_route_input_rcu line=1988 msg="find a route: flag=00000000 gw-0.0.0.0 via FX0015919003108" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=npu_nturbo_unset_flags line=287 msg="ses->npu_state=0x100 skb->npu_flag=0x400" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=npu_nturbo_unset_flags line=287 msg="ses->npu_state=0x108 skb->npu_flag=0x400" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=npu_handle_session44 line=1355 msg="Trying to offloading session from port14 to FX0015919003108, skb.npu_flag=00000400 ses.state=04010204 ses.npu_state=0x00000108" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=ip_session_install_npu_session line=384 msg="npu session installation succeeded" 2024-10-01 11:12:53 id=65308 trace_id=4829 func=fw_forward_dirty_handler line=443 msg="state=04010204, state2=00000001, npu_state=00000908"
edit 61 set name "Policy_Name" set uuid bf25d09c-7b64-51ef-295f-9cd3cc16ec2a set srcintf "FORTIEXTENDER-Interface" set dstintf "WAN" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "HTTP" "HTTPS" "PING" set logtraffic all set auto-asic-offload disable
diagnose debug flow filter addr <User IP address> diagnose debug console timestamp enable diagnose debug flow trace start <number of packets> diagnose debug enable
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.