Hello everybody !
I Need some Help on a Fortigate 60D. I Have to learn how it works to sell it later.
Here's my problem :
I have connected the wan1 port, on my DMZ network and I acces it with a SSH Tunnel.
The DMZ network look like 192.168.4.0/24.
The gateway is 192.168.4.1 (which is a cisco firewall)-- I Tried to connect a computer instead of the fortigate, on the DMZ, I set a static IP with the gateway and I was able to ping 8.8.8.8.
When I set a static IP like 192.168.4.123 on my fortigate's wan1 port, with the correct gateway, everything looks fine.
But, I'm unable to ping internet. I'm able to ping all the computers in DMZ (like 19.2168.4.19 or my gateway 192.168.4.1) but I'm unable to ping 8.8.8.8.
I don't understand why :( Before configuring the network interface, I reseted the fortigate.
So my actual configuration is :
wan1 interface :
ip 192.168.4.123
netmask : /24
gateway : 192.168.4.1
default gateway for wan1 : 192.168.4.1
The ping doesn't work. On a computer with the same configuration it works.
Is there a parameter to set to make my ping work ? Where am I doing a mistake ?
Thank you :)
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Let me play dumb here;
Your gateway is another firewall?
You can ping that firewall ( assuming they respond to pings request ) ?
Are you 100% sure the firewall is allowing pings? and from your address ?
Does the cisco have allow or using NAT controls to allow your .123 address thru?
Can you conduct a trace execute trace 8.8.8.8 ( once again assuming the cisco firewall allows traceroutes )
And are you 100% sure your default is using the right interface ?
Basically you need to look at the cisco.
Ken
PCNSE
NSE
StrongSwan
Your gateway is another firewall? --> Yes, my gateway is a Cisco ISA 550W Firewall (Cisco Small Business Solutions)
You can ping that firewall ( assuming they respond to pings request ) ? --> I can ping this firewall on his DMZ interface (192.168.4.1) but not on his others interfaces (192.168.0.1 --> LAN interface, 109.2.X.X --> Public IP) Are you 100% sure the firewall is allowing pings? and from your address ? I am sure my firewall allow ping because I tried using the same address on the computer and the fortigate, and I'am able to ping with the computer but not with the fortigate(with the same IP address) Does the cisco have allow or using NAT controls to allow your .123 address thru? --> Didn't understand this :/ Can you conduct a trace execute trace 8.8.8.8 ( once again assuming the cisco firewall allows traceroutes ) --> The tracert give the following result from the fortunate :
Note : The cisco allows trace route.
And are you 100% sure your default is using the right interface ? --> To be sure, I setup only my wan1 interface and I administratively shutdown the others interface of the fortigate, so I'm sure my default is using the right interface.
Miracle !! I don't know what I did, but the ping and the tracer work properly for 8.8.8.8.
Maybe a NAT rule that takes time to act.
Thanks for your help.
When I set a static IP like 192.168.4.123 on my fortigate's wan1 port, with the correct gateway, everything looks fine.
I bet you had a 2nd default route out one of the other interfaces and hence why things where broke, but either way it worked out for you.
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.