FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
nithincs
Staff & Editor
Staff & Editor
Article Id 191978
Description
This article describes how to check the internet reachability using ping from backup WAN interface.

Solution
Assume the following scenario:





FortiGate is connected with two ISP connection via port1 and port2.

In FortiGate routing-table, port1 route is made default and port2 as backup route to reach Internet.
# get router  info routing-table static

Routing table for VRF=0
S*      0.0.0.0/0 [10/0] via 10.40.31.254, port1                      <----- Active route.
                  [10/0] via 10.40.63.254, port2, [5/0]

To test the Internet access from port2, in FortiGate, if  public IP is pinged by setting ping-option source IP as port2 interface IP, this will not work.
# execute ping-options source 10.40.48.57
# exe ping 8.8.8.8

PING 8.8.8.8 (8.8.8.8): 56 data bytes
^C
--- 8.8.8.8 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
Since port1 is active route, FortiGate will forward the ping from port2 interface IP to public IP from port1 interface.
# dia sniffer packet any "host 8.8.8.8 and icmp" 4
interfaces=[any]
filters=[host 8.8.8.8 and icmp]
7.111475 port1 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
8.122485 port1 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
9.142524 port1 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
10.162514 port1 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
11.182491 port1 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
In order to test the Internet reachability from port2 ISP, set the source interface for the ping-options.
# exe ping-options interface port2
# exe ping 8.8.8.8

PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=57 time=7.9 ms
64 bytes from 8.8.8.8: icmp_seq=1 ttl=57 time=7.6 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=57 time=7.6 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=57 time=7.6 ms
^C
--- 8.8.8.8 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max = 7.6/7.6/7.9 ms

# dia sniffer packet any "host 8.8.8.8 and icmp" 4
interfaces=[any]
filters=[host 8.8.8.8 and icmp]
2.680030 port2 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
2.687883 port2 in 8.8.8.8 -> 10.40.48.57: icmp: echo reply
3.682608 port2 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
3.690104 port2 in 8.8.8.8 -> 10.40.48.57: icmp: echo reply
4.692567 port2 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
4.700130 port2 in 8.8.8.8 -> 10.40.48.57: icmp: echo reply
5.702577 port2 out 10.40.48.57 -> 8.8.8.8: icmp: echo request
5.710105 port2 in 8.8.8.8 -> 10.40.48.57: icmp: echo reply

Contributors