Description | This article describes an issue with FortiGate-VM on Azure dropping health probes and how to troubleshoot. |
Scope | FortiOS. |
Solution |
Health probes from a load balancer on Azure by default uses HTTP probes. Though there is no limitation to using any other TCP port, hence some customers may use some other ports, for example TCP port 22 used for SSH.
While using this port, it may happen that the FortiGate doesn't respond to the health probes or simply drop the packets, as this won't be allowed by the local-in-policy.
In such cases, check whether SSH is allowed on the interface, connecting to external and internal load balancers respectively.
edit "port1"
No responses seen on sniffer, just SYN packets:
diagnose sniffer packet any "host 168.63.129.16" 4 0 a
Debugs, showing the packet dropped by local-in-policy:
d2024-09-10 14:22:45 id=65308 trace_id=322 func=print_pkt_detail line=5942 msg="vd-root:0 received a packet(proto=6, 168.63.129.16:59987->10.240 2024-09-10 14:22:45 id=65308 trace_id=322 func=__iprope_check_one_policy line=2374 msg="policy-4294967295 is matched, act-drop"
Next thing to check is, if trusted host is configured in system admin settings:
config system admin
In the above example, trusted host is configured, add the load balancer host address 168.63.129.16/32, in trust host under the 'admin' user. With this, SSH is allowed by the device and the traffic from the load balancer is not dropped by the local in policy.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.