Created on 10-05-2022 12:35 AM Edited on 11-20-2024 07:06 AM By Jean-Philippe_P
Description | This article describes how to troubleshoot PPPoE connection failure when FortiGate is configured as the PPPoE client. |
Scope | FortiGate. |
Solution |
diag sys top | grep pppoed
diag netlink interface list <pppoe> diag debug reset diag debug disable diag debug app pppoed -1 diag debug enable
To stop: diag debug disable
Client to server: Initiation (PADI) -> Server to client: Offer (PADO) -> Client to server: request (PADR) -> Server to client: session confirmation (PADS).
PPPoE consists of two phases:
Active Discovery Phase:
PPP Session Phase:
A graphical representation would look like this:
To capture packets at each stage, simply use the sniffer below:
diag sniff packet <interface name> "ether proto 0x8863" 6 0 a <----- Discovery Stage.
For the Session stage, a sample packet capture might look like this:
If the transaction is valid, it will be possible to see the transactional information in the Wireshark:
If there is only broadcast (PADI) information noticed, it may be due to incorrect physical wiring or the ISP router not responding to the request.
To help isolate the issue, use the Windows machine to determine if it does not respond to broadcast. Similar to the image below.
In these cases, it is required to check on the physical layer and/or logs on the ISP router to see if it received the broadcast packet and responded accordingly.
PPPoE connection failure when FortiGate is configured as the PPPoE client not working in the HA cluster
If issues are faced with FortiGate as a PPPoE client not working in a High Availability (HA) cluster with the default group ID 0, refer to the following articles for steps to resolve the problem: Technical Tip: Troubleshooting PPPoE connection failed Technical Tip: HA Cluster virtual MAC addresses
In the HA cluster with default HA group ID 0, it is recommended to change the HA cluster default group ID 0. The default HA MAC (group 0) is the source of the problem.
Formula: 00-09-0f-09-<group-id_hex>-<vcluster_integer><idx>. Where <group-id_hex> is the HA group ID for the cluster converted to hexadecimal.
Related articles: Technical Tip: pppoe-interface configuration. Technical Tip: How to import 'diagnose sniffer packet' data to WireShark. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.