Created on
09-16-2025
03:35 AM
Edited on
09-16-2025
03:35 AM
By
Jean-Philippe_P
Description | This article provides a step-by-step guide on how to verify and troubleshoot a VIP in policy-based mode (NGFW). |
Scope | FortiGate. |
Solution |
In this example, VIP is configured to access the internal RDP server through VIP, as shown in the topology below:
Server: 10.102.0.202:3389. External IP: 10.5.192.200.
config firewall vip
Step 2: Make sure there is an allowed policy under SSL Inspection & Authentication. Generally, there will be a ‘Default’ policy that allows any to any. If there is no Default policy, create a new SSL Inspection & Authentication policy from the External Interface to the Internal interface to allow the traffic: config firewall policy
Step 3: Also, there must be a Security Policy from the External interface to the Internal interface :
config firewall security-policy
Note: With a FortiGate firewall in policy-based mode, it does not need to add the Virtual IP (VIP) to the firewall policy's destination. The firewall will automatically handle the port forwarding as long as the VIP is configured.
Step 4: Confirm the traffic is reaching the FortiGate.
diagnose sniffer packet wan1 'host 10.5.192.200 and port 3389' 4 0 l
Step 5: Run debug commands to verify DNAT is happening properly and SSL Inspection & Authentication Policy Match:
diagnose debug reset diagnose debug flow filter addr 10.5.192.200 diagnose debug flow filter port 3389 diagnose debug flow show function-name enable diagnose debug flow trace start 20 diagnose debug enable
id=65308 trace_id=10008 func=print_pkt_detail line=5879 msg="vd-root:0 received a packet(proto=6, 10.5.255.254:64441->10.5.192.200:3389) tun_id=0.0.0.0 from wan1. flag [S], seq 3272374413, ack 0, win 64240" Step 6: Run PME debug to verify the Security Policy Match:
To start debugging:
diagnose ips pme debug enable
The CLI output of the pme debug command confirms a policy match for the specified source and destination IP addresses:
PME[482/0] auth query not needed PME[482/0] current {
To stop debugging:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.