Hello People,
User asked me to allow lan network to access a dmz device ip: 10.10.10.50lan ip-range is 192.168.100.110-192.168.100.210 gateway: 192.168.100.99 1- i went to addresses > create new> i didnt find a place to create an object for dmz device 10.10.10.50so the first question question how do i create an object and give it a name and an ip address. what i found is to create subnet and ip range and this is not what i was looking for.i need to create this dmz object because i want to allow lan only to this dmz machine. how do i do that in forti. 2- what i did for now for testing is allowing lan to all dmz network, even this didnt work and i dont know why...i went to policy and objects > addresses > created 2 new ip range pbjectsname dmz-network and name internal-network ip ranges.then i went to ipv4 policy > create newname: lan_to_dmzincoming interface: internaloutgoing interface: dmzsource: internal networkdestination: dmz-networkshedule: alwaysservice: allaction: acceptnat: disabled when i went to a pc in lan tried to ping 10.10.10.50 there was no ping?how do i go from here? please assist.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
what did you put into your ranges?
you can enter one host as a subnet wih <ipofhost>/255.255.255.255 as a FGT Address object.
If 10.10.10.50 is the ip of the dmz interface, does the interface allow ping?
Is that dmz_network connected to the dmz interface?
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Hello,
ok i create the dmz object.
10.10.10.50 is a device in dmz network listening on port 80
10.10.10.1/255.255.255.0 dmz interface
i need to allow ALL lan Computers to access one specific device in dmz 10.10.10.50 on port
when they open a browser lan users type: 10.10.10.50 and they should reach a web interface.
lan interface is: 192.168.100.99
hope its more clear now.
hm ok
your policy seems to be correct so far.
If you enable ping access on your dmz interface and then try to piing 10.10.10.1 from out of you lan ip range - does that work?
Do you have any other policy that matches that traffic and comes before this one?
For further debug you might use the debug package flow feature on cli:
diag debug enable
diag debug flow show console enable
diag debug flow filter clear
diag debug flow filter daddr 10.10.10.50
diag debug flow trace start <numberofpackets>
then ping 10.10.10.50 and watch the console. You will see the incoming ping (ICMP Echo) and you will see what happens to it.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
hello,
thanks for your response.
1- tried to ping from lan computer not ping to dmz interface 10.10.10.1 pr the dmz device
ping is enabled on dmz interface
2- no policy other policy that matches that traffic and comes before this one
i run debug and this is what i see
Connected
FGT60ETK18099PXJ # diag debug enable FGT60ETK18099PXJ # FGT60ETK18099PXJ # diag debug flow show console enable command parse error before 'console' Command fail. Return code -61 FGT60ETK18099PXJ # FGT60ETK18099PXJ # diag debug flow filter clear FGT60ETK18099PXJ # FGT60ETK18099PXJ # diag debug flow filter daddr 10.10.10.50 FGT60ETK18099PXJ # FGT60ETK18099PXJ # diag debug flow trace start FGT60ETK18099PXJ # id=20085 trace_id=1 func=print_pkt_detail line=5494 msg="vd-root:0 received a packet(proto=1, 192.168.100.153:1->10.10.10.50:2048) from internal. type=8, code=0, id=1, seq=104." id=20085 trace_id=1 func=init_ip_session_common line=5654 msg="allocate a new session-01c712b4" id=20085 trace_id=1 func=vf_ip_route_input_common line=2591 msg="find a route: flag=04000000 gw-10.10.10.50 via dmz" id=20085 trace_id=1 func=fw_forward_handler line=751 msg="Allowed by Policy-8:"
policy 8 is the rule that allow all traffic from lan to dmz.
what's next?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
227 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.