FortiWeb
A FortiWeb can be configured to join a Security Fabric through the root or downstream FortiGate.
shafiq23
Staff & Editor
Staff & Editor
Article Id 336640
Description This article describes how to resolve the '502 Bad Gateway' error accessing the website via FortiWeb-OCI server policy deployment with OCI-LB upstream.
Scope FortiWeb-OCI.
Solution

Topology:
Client -> OCI-LB -> FortiWeb -> Web Server.

 

Depending on the load balancer type used in OCI, usually, the LB is assigned with public IP and performs DNAT for traffic destined for FortiWeb VIP.

 

Typically, FortiWeb VIP is configured in backend sets configuration and the service port is HTTPS(443) parallel to FortiWeb server policy listening to service port 443(HTTPS).

 

Sample error while accessing the website through OCI-LB -> FortiWeb with backend set misconfiguration.

 

2.png

 

Example of FortiWeb server policy only listening to HTTPS service port 443.

 

3.PNG

 

Tips to verify:

 

  1. Packet capture in FortiWeb.

Sample traffic of ‘Use SSL’ disabled in OCI backend set configuration.

 

1.PNG

  • Unencrypted HTTP protocol detected over the encrypted port.
  • RST packet sent by FortiWeb VIP.

 

Resolve the '502 Bad Gateway' error by enabling ‘Use SSL’ in OCI LB backend set configuration.


GoToMeeting 019.png

 

Note: Bad backend health status in OCI might also cause a ‘502 Bad Gateway’ error.

 

Decrypting encrypted traffic in the FortiWeb administration guide:
Decrypting TLS 1.2/1.1/1.0 Traffic 
Decrypting TLS 1.3 Traffic