Created on 12-20-2013 04:05 AM Edited on 12-03-2024 10:15 PM By Anthony_E
Description
This article describes some possible causes for non-working GUI access. In some cases, it is possible to reach the FortiGate unit through a Ping, Telnet, or SSH, but not through the web admin GUI.
Scope
FortiGate.
Solution
To initiate access, start by pinging the management IP address to verify that the FortiGate is actively listening on the specified management IP. This step helps isolate whether the FortiGate is operational and responsive, assuming that ping is enabled on the management port.
To proceed, attempt to access via SSH using PuTTY as demonstrated below, ensuring that SSH is enabled on the management port:
If SSH access is unsuccessful, then use the following article to access the FortiGate via console cable and move on to next steps:
How to connect to the FortiGate and FortiAP console port
CLI commands:
config system interface
edit <interface name>
set allowaccess ping http https
end
For example:
When a FortiGate network interface is connected to a network segment that supports such extended size packets.
For Telnet or SSH, packets typically remain of smaller size.
To be then able to use the web admin GUI, the fragmentation must be allowed at certain points in the network infrastructure (points, where a jumbo frame reaches a network segment that does not support it), or jumbo frames must be allowed along the whole communication path.
Note about Jumbo frames: jumbo frames are packets that are larger than the standard 1500 maximum transmission unit (MTU) size. Jumbo frames increase data transfer speeds by carrying more data per frame, reducing the overhead from headers.
All networks that carry jumbo frames must have network units that all support jumbo frames.
Otherwise, jumbo frames will be dropped, when they reach network devices that do not support them.
Enable the following debug and try to access the GUI again:
config sys global
set admin-server-cert Fortinet_Factory
end
diag sys process pidof httpsd
1003
2956
3213
di sys kill 11 1003
di sys kill 11 2956
di sys kill 11 3213
To restart the httpsd process, use the 'fnsysctl killall httpsd' command.
In some cases, no HTTPS processes are seen to be running, so it may be necessary to restart the FortiGate firewall.
This may be the case if a recent firmware upgrade was completed and the GUI login issues are observed after the upgrade.
After the restart, the HTTPS process will appear in the results of diag sys top. It will be possible to log in normally through the GUI.
Modify the TLS version for the FortiGate GUI access.
By default, TLS 1.1 and TLS 1.2 are enabled when accessing the FortiGate GUI via a web browser.
To verify what version is enabled, run the following commands:
config system global
get | grep 'min-proto'
If Multi-VDOMs are enabled, run the following commands:
config global
config system global
get | grep 'min-proto'
To change this setting from the CLI:
config system global
set admin-https-ssl-versions (shift + ?) <- To list the available TLS version.
tlsv1-0 TLS 1.0.
tlsv1-1 TLS 1.1.
tlsv1-2 TLS 1.2.
set admin-https-ssl-versions tlsv1-2 <- With this setting, only TLS 1.2 is allowed.
end
From v6.4, tlsv1-0 is no longer supported and instead, tlsv1-3 was introduced:
config system global
set admin-https-ssl-versions
tlsv1-1 TLS 1.1.
tlsv1-2 TLS 1.2.
tlsv1-3 TLS 1.3.
end
If the GUI is not reachable, that may also be that packets are not reaching the webserver or interface or responses from the web interface are not transmitted back to the user.
To verify, run a packet capture via CLI and see how the TCP handshake is made and if follow-up packets are visible.
The command is:
diag sniffer packet any 'port 8443' 4 0 a (replace the port if the web interface is reachable via a different port).
Filters, adding a host IP, if the connecting IP is known, can be added:
diag sniffer packet any 'host 192.168.48.2 and port 8443' 4 0 a
Example output:
FGT# diag sniffer packet any 'port 8443' 4 0 a
Using Original Sniffing Mode
interfaces=[any]
filters=[port 8443]
2024-08-28 16:36:30.527027 port1 in 192.168.48.2.56662 -> 10.191.19.1728443: syn 1919112407
2024-08-28 16:36:30.527238 port1 out 10.191.19.1728443 -> 192.168.48.2.56662: syn 3263049518 ack 1919112408
2024-08-28 16:36:30.527648 port1 in 192.168.48.2.56662 -> 10.191.19.1728443: ack 3263049519
Related documents:
Steps to enable remote management.
Configuring Administrator access to a FortiGate unit using Trusted Hosts.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.