Created on
11-23-2020
03:15 AM
Edited on
11-25-2025
02:40 AM
By
Jean-Philippe_P
Description
This article describes how to check or basic troubleshoot connectivity from internal/LAN to external.
Scope
FortiGate.
Solution
Below will be the connectivity details of the server through FortiGate.
Go to User servers -> FortiGate connected on Lan Interface -> Destination server connected on DMZ interface.
Below are a few steps to be verified on the connectivity end.
Verifying that the policies are correctly implemented as per the requirement.
This can be verified by checking the logs on FortiGate forward policy as given by the link below.
Verify the configuration with debug logs, which will give accurate information about the traffic flow.
Below are the commands for the debug flow.
diagnose debug reset
diagnose debug flow filter addr x.x.x.x <----- x.x.x.x being the IP address on the DMZ.
diagnose debug flow filter proto 1 <----- Proto 1 is for ICMP traffic filter on FortiGate.
diagnose debug flow trace start 10000
diagnose debug en
In addition to the debug flow of the traffic, a sniffer can be checked so it can be analyzed whether it is arriving on the firewall, and if yes, on which interface, also if it is leaving to the right interface. The commands to check the sniffer are given below:
diagnose sniffer packet any "host x.x.x.x and icmp" 4 0 l
All of the troubleshooting steps are given in the hyperlink below:
Troubleshooting Tip: Basic FortiGate Connectivity Diagnostics
Verify the log output or raise a TAC ticket if it is still not possible to connect to the server behind FortiGate.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.