Hi,
Note: This post was attempted earlier but seems not to have reach the forum. Am reposting with more detail. We've been evaluating the Fortigate appliance in AWS and followed setup guides (http://docs.fortinet.com/...e-aws-deployment.pdf). It's gone ok so far but we've hit an odd issue and were hoping for some pointers. We're not too experienced with with Fortigate so perhaps have overlooked something. Background [ul]
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
As noone else is responding...how about the routing on the FGT? At least it'll need a default route as it has to handle network addresses other than those directly on the interfaces.
Could you please post a 'get router info routing all' from the FGT?
Thanks for your reply Ede.
Here's the output:
S* 0.0.0.0/0 [5/0] via 10.0.5.1, port1 [5/0] via 10.0.217.1, port2 C 10.0.5.0/24 is directly connected, port1 C 10.0.217.0/24 is directly connected, port2
Given that traffic can traverse without issue when Explicit Proxy is enabled, I'd have thought that routing would be ok. Might be showing my ignorance here.
Thanks again
I noticed that you don't mention a policy that allows DNS traffic out. Obviously, this would only cause problems with your FQDN tests and not the IPs but just something that caught my eye at a quick glance. This is for test1.
Mike Pruett
Good point, Mike. Thanks. We're using an internal DNS server so lookups are directed to that. The FQDN resolution is working fine (can be seen to resolve okay in the cli for pings, telnet etc). Thanks again though. Any other tips/insights welcomed. Cheers.
make a machine do a continuous ping to one of the boxes. Run a trace flow on the FortiGateto see if it is properly entering and leaving the FortiGate. That will provide some insight into what could be happening (if the FortiGate is wigging or not).
The more info you have on that the better IMO. Will keep you from pulling your hair out and punching babies haha
Mike Pruett
Thanks Mike. Will give it a try and let you know.
btw, babies are safe but hair was entirley pulled out last week due to this one...sigh..
I think the second default route is the culprit. What do you need it for (0.0.0.0/0 via port2 to 10.0.217.1)? If all your servers are in the internal 10.0.217.0 LAN then the 'connected' route will do fine. If you use IPs different from that you would create one route per subnet for these and not use a default route.
So, I'd delete the internal default route and retest.
As mentioned, you could run diagnostics on the FGT, 'diag debug flow' will clearly show you where the traffic is going. But this takes a bit of effort if you don't run that everyday. Besides, planning always tops debugging.
Regarding DNS, no wonder the FGT can resolve FQDNs as it's using it's system DNS. I would let all hosts use the FGT as DNS (per DHCP), and let the FGT relay DNS to the DNS you wish to use. This way, you have only one spot where to configure an external DNS, and you can prevent rogue DNS requests completely (just deny any DNS from internal to public).
@Mike: the baby joke is just rude and tasteless. It happens in real life, and each time is one time too many.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.