Description |
This article describes that administrators may need access to the firewall by setting up the HTTPS HTTP and SSH admin tools on the WAN interface however when trying to access it traffic is denied by implicit deny policy id 0.
This should not happen since this traffic has the WAN interface ip address as the destination while firewall policy only deals with traffic passing through the firewall. |
Scope | FortiGate. |
Solution |
This issue may happen due to FortiGate not determining that the traffic destination is the wan interface. To troubleshoot the issue the following are recommended steps:
config system interface
config sys gloabal show full | grep sport set admin-sport 443
diagnose sniffer packet any "host <x.x.x.x>" 4 0 l <-- where x.x.x.x is the public IP of the admin device trying to access the FortiGate.
diagnose debug flow filter addr x.x.x.x diagnose debug flow filter port 443 <-- Assuming admin port is default at 443. diagnose debug flow trace start 5 diagnose debug console timestamp enable <-- Recording events with time. diagnose debug enable
A possible cause for this issue is a configured Virtual IP - VIP - using the WAN interface as the external IP without port forwarding. This will lead to the FortiGate not differentiating between traffic for the WAN interface and traffic with the VIP as the destination. A possible solution in this case is to enable port forwarding/mapping on the VIP address object:
config firewall vip edit <vip name> set portforward enable set extport <externa port> set mappedport <internal port> end
Another possible cause of admin denial is a trusted host or local-in policy configured. To check those settings, refer to the following documents: |