FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
lboaventura1990
Article Id 332678
Description This article describes a simple scenario where a workstation establishes access to the destination host and how to use the commands within FortiGate to execute the basic troubleshooting steps to solve the issues.
Scope FortiGate.
Solution

Topology:

 

image.png

 

L2 connectivity between Workstation and FortiGate:

Commonly, workstations use the DHCP as a service to receive an IP address to initiate the IP communication to internal and external hosts.

 

The FortiGate can be used as a DHCP server, but is it necessary to check the L2 connectivity between the Workstation and FortiGate.

 

Follow the basic information, and ensure that L2 communication between FortiGate and Workstation is working.

 

  • Check the port status from ports that connect the FortiGate and Workstation.

  • Verify that the Workstation is able communicate with the gateway IP which is FortiGate Interface IP where it is connected.
  • Verify the ARP table entry for the Workstation on Firewall CLI using the command 'get system arp'.
  • If using VLANS, confirm what VLAN ID is used on the connected Workstation port and connected FortiGate port. If using the 802.1Q on the FortiGate interface, ensure that this VLAN address is used as tagged VLAN on the connected FortiGate port.

  • Check the switch MAC address table, and verify if the switch is learning the FortiGate MAC address table and if the Workstation MAC is within the address table.

  • Some switches have security features to restrict the access on port, check if this feature is applied and if it is blocking the Workstation MAC address.

It is also possible to check if the DHCP request is arriving at the FortiGate interface. Check this by executing the command below, restart the Workstation nic or reboot the Workstation. After this, the Workstation will send a DHCP Request using the broadcast destination and the FortiGate will Reply to this packet with a DHCP Offer.

 

diag sniffer packet <interface_name/any> "port 67 or port 68" 4 0 l

 

image.png

 

It is also possible to collect this information by opening the captured packets using Wireshark and viewing the detailed information regarding these packets, by using the Packet Capture feature. Go under Network -> Diagnostics, select the desired interface and the filter used in the command 'diag sniffer packet'.

 

image.png

 

Select 'Start capture' and restart the Workstation NIC or reboot the Workstation.

 

image.png

 

Select 'Save as pcap'. FortiGate will save this information and generate a .pcap file. After this, it will be possible to see more detailed information about the communication via WireShark.

 

image.png

 

If this communication is happening, it is most likely that the L2 connection is OK and it is possible to check this within the ARP table from FortiGate, using the command 'get sys arp'.

 

image.png

 

Confirm if the MAC address is correct, by using the command 'ipconfig /all' on Windows devices and 'ifconfig' if using a Linux workstation.

 

image.png

 

Execute a ping to check the integrity of this connection, from FortiGate or workstation.

 

  • From FortiGate:

 

execute ping < Destination IP >

 

image.png

 
  • From the Workstation:

 

image.png

 

After following the above steps the Workstation should be able to send packets to the FortiGate. The FortiGate will decide to forward these packets to the destination if they contain the correct IPv4 policy and routes to the destination.