Created on
12-29-2023
05:33 AM
Edited on
05-07-2025
07:56 AM
By
Stephen_G
Description | This article describes how to ensure ping is reachable to a FortiGate WAN IP in the Dashboard with VIP configured. |
Scope | FortiGate 6.4.8 and below. |
Solution |
In this example, the WAN IP is 161.142.148.52.
Sniffer:
Debug:
config firewall vip
edit <name>
set arp-reply disable (default: enable)
next
end
In addition to the previously mentioned factors, the way a Virtual IP (VIP) is configured on a FortiGate device can directly affect whether ping (ICMP) requests to the FortiGate's WAN IP receive a reply.
Understanding the Behavior:
When a VIP is configured to map the FortiGate’s WAN IP to an internal IP address without specifying a particular port, all inbound traffic, including ICMP, is forwarded to the internal IP. This causes FortiGate to act as a forwarder rather than a responder, meaning:
If no firewall policy explicitly permits ICMP traffic from the WAN interface to the internal IP address defined in a Virtual IP (VIP), FortiGate will drop the traffic.
This behavior is confirmed in the debug flow output, where the following line is observed:
id=65308 trace_id=100 func=fw_forward_handler line=849 msg="Denied by forward policy check (policy 0)" In this instance, a VIP is configured to perform DNAT from FortiGate's WAN IP to 10.11.10.10:60418, as shown in:
id=65308 trace_id=100 func=__ip_session_run_tuple line=3593 msg="DNAT <x.x.x.x>:8 > 10.11.10.10:60418"
However, because no matching firewall policy allows this ICMP traffic, FortiGate does not forward it, and the session is denied.
Recommended Configuration Practices for Ping Handling:
Related document:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.