Description | This article explains why FortiGate, when receiving connection requests for any locally listening service (e.g., SSL-VPN, IPsec VPN, HTTPS GUI, SSH, SNMP), may fail to generate a response, even though the service daemon is running and all the configuration is correctly configured. The issue can occur for both SSL-VPN and IPsec VPN traffic, but the principles discussed here apply broadly to all services that FortiGate listens to. |
Scope | FortiGate. |
Solution |
When FortiGate receives incoming traffic for any listening service (such as SSL-VPN, IPsec VPN, HTTPS GUI, or SSH) but does not respond, the following checks should be performed.
diagnose sniffer packet "host <Public IP address of the FortiClient>" 4 0 l <----- 'l' is lowercase of 'L'.
The following output is observed, where the FortiClient's WAN IP is seen as a source for incoming to FortiGate for SSL VPN connection, but FortiGate is not generating any response.
The following output is observed in the debugs, where the FortiClient's WAN IP is seen as a source for incoming to FortiGate for SSL VPN connection, but FortiGate is not generating any response.
Debugs to run:
diag debug reset diagnose debug application fnbamd 255 diagnose debug application sslvpn -1 diagnose debug application samld -1 diagnose debug console timestamp enable diagnose debug enable
A white or blank screen may be observed on the FortiClient if FortiClient is configured with SSL VPN using SAML authentication.
For more detailed guidance on configuring VPN access, refer to the following resources: IPSec Dial-up Full Tunnel Setup FortiClient Dialup IPSec VPN Split Tunnel Setup
To verify the VIP configuration and avoid conflicts, refer to this article: Using Virtual IPs for Port Forwarding.
Use the following diagnostic commands to inspect the traffic flow and ensure that incoming VPN traffic is not being DNATed:
diagnose debug reset
The following debugs indicate an IPsec VPN connection conflict with a Virtual IP on port UDP 500, showing that the traffic is being DNATed due to the Virtual IP configuration:
Ensure no other traffic is being generated between the source public IP address and the FortiGate while running these commands. If there is a conflicting VIP configuration, traffic will be observed being DNATed.
Though this article focuses on SSL VPN and IPsec VPN traffic, the principles discussed here apply to any service FortiGate listens to. This includes administrative services like the HTTPS GUI, SSH, and SNMP. If FortiGate receives traffic for any of the listening services but does not respond, the troubleshooting steps outlined in this article can be applied. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.