Description:
CAPWAP discovery requests reach the FortiGate Fortilink interface, however, the FortiGate is not responding to the CAPWAP request messages from managed FortiSwitches due to the firewall having local-in-policy configured.
- Verify that the FortiSwitch is sending the CAPWAP discovery requests to the FortiGate.
- Take a simultaneous packet capture from FortiGate to identify if the FortiGate is responding to the CAPWAP discovery or ICMP request packets :
FortiGate sniffer from CLI: Performing a sniffer trace (CLI and packet capture).
Or, FortiGate sniffer from GUI: Troubleshooting Tip: Packet Capture on FortiOS GUI.
- If the FortiGate is not responding to the CAPWAP discovery request, ensure that the following processes are running in FortiGate using the command 'diag sys top' :
fortilinkd cu_acd cw_acd cw_acd_helper acd
FortiGate-60E # 2025-03-26 01:52:15 id=65308 trace_id=12 func=print_pkt_detail line=5886 msg="vd-root:0 received a packet(proto=17, 10.255.1.2:5246->224.0.1.140:5246) tun_id=0.0.0.0 from fortilink. "
<snip>
2025-03-26 01:52:15 id=65308 trace_id=12 func=iprope_policy_group_check line=4894 msg="after check: ret-no-match, act-drop, flag-00000000, flag2-00000000" 2025-03-26 01:52:15 id=65308 trace_id=12 func=__iprope_check line=2395 msg="gnum-100001, check-5f029ff4" 2025-03-26 01:52:15 id=65308 trace_id=12 func=__iprope_check_one_policy line=2133 msg="checked gnum-100001 policy-1, ret-matched, act-accept" 2025-03-26 01:52:15 id=65308 trace_id=12 func=__iprope_user_identity_check line=1894 msg="ret-matched" 2025-03-26 01:52:15 id=65308 trace_id=12 func=__iprope_check_one_policy line=2366 msg="policy-1 is matched, act-drop" 2025-03-26 01:52:15 id=65308 trace_id=12 func=__iprope_check line=2414 msg="gnum-100001 check result: ret-matched, act-drop, flag-08010000, flag2-00000000" 2025-03-26 01:52:15 id=65308 trace_id=12 func=iprope_policy_group_check line=4894 msg="after check: ret-matched, act-drop, flag-08010000, flag2-00000000" 2025-03-26 01:52:15 id=65308 trace_id=12 func=fw_local_in_handler line=611 msg="iprope_in_check() check failed on policy 1, drop"
A sample configuration of the firewall local-in-policy that could block the CAPWAP traffic is as follows :
config firewall local-in-policy edit 1 set uuid b0036cc6-0a1d-51f0-d0b3-42036f43bacf set intf "any" set srcaddr "fortilink/any" set srcaddr-negate disable set dstaddr "all" set internet-service-src disable set dstaddr-negate disable set action deny set service "ALL" set service-negate disable set schedule "always" set status enable set comments '' next end
Resolution:
- Disable the local-in-policy if not required:
config firewall local-in-policy edit 1 set intf "any" set srcaddr "fortilink" set srcaddr-negate disable set dstaddr "all" set internet-service-src disable set dstaddr-negate disable set action deny set service "ALL" set service-negate disable set schedule "always" set status disable next end
- As the local-in policy controls the inbound traffic going to a FortiGate interface, specify the interface or the source address such that the FortiLink interface will be excluded.
For more details on local-in-policy, visit Local-in policy and Troubleshooting Tip: Debug flow messages 'iprope_in_check() check failed, drop' - 'Denied by forward...
- Basic checks for FortiSwitch showing offline in the FortiGate can be verified using the following community links:
Troubleshooting Tip: FortiSwitch Connection to FortiGate Technical Tip: How to perform basic checks to bring FortiSwitch online on FortiGate Troubleshooting Tip: Fix FortiSwitch showing with the 'Offline' status
Technical Tip: Non-FIPS FortiSwitches are offline when managed by FortiGate configured in FIPS-CC mo...
|