Hello.
First of all, I am sorry that the sentence is not smooth because I used a translator.
I am a FortiGate 100D user.
Create three hardware switch interfaces on the firewall and use a DHCP server.
And I created an IPv4 policy to enable communication between each interface.
However, if there is a lot of traffic during communication, the firewall blocks the network connection.
Why is that?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello @newbie92 ,
Can you please specify which network connection firewall is blocking ?
As you mentioned you have created an IPv4 policy to enable communication between each interface, is it not happening ?
Created on 08-23-2023 05:02 PM Edited on 08-23-2023 05:16 PM
Hello, @rtichkule.
Thank you for your interest in my problem.
The configured IPv4 policy is operating normally, and smooth communication is possible for each interface.
However, sending and receiving many files will block the client, which is a problem for all clients.
For example, when a client with IP 192.168.100.26 downloads a file from a server with IP 192.168.200.200, it is blocked while downloading data normally.
It's a pity that I can't attach the log because I don't know how to view it.
Even if you ping test multiple clients at the same time, the network is blocked.
Hi,
Thank you for the information. As I understand both the source and destination is behind the same firewall and you are facing issues in accessing multiple files at the same time.
Could you confirm if you are getting any error when the connection gets blocked? Also, Could you check the logs under the logs and reports by filtering the source and destination IP to check if you are able to see any relevant logs for connection getting blocked.
Regards,
Vimala
Of course, I'd be happy to clarify!
The firewall is currently blocking specific high-traffic network connections. Unfortunately, without more detailed information about the nature of these connections and the associated rules and configurations, it's challenging to pinpoint the exact connections being affected.
You mentioned that you've established an IPv4 policy to facilitate communication between each interface. If this policy is properly configured, it should allow traffic to flow between these interfaces as intended. However, there are a few aspects to consider in this context:
Policy Verification: Verify that your IPv4 policy is correctly defined to allow communication between the relevant interfaces. Double-check the source and destination zones, IP ranges, ports, and protocols specified in the policy. Any discrepancies could potentially lead to blocked connections.
Logging and Monitoring: Enable logging for your firewall rules, particularly for the policy in question. This will generate logs detailing the traffic that is processed by the policy. By reviewing these logs, you can identify if the firewall is indeed blocking certain connections and gather insights into why they are being blocked.
Traffic Patterns: Examine the traffic patterns associated with the blocked connections. Are there any commonalities among the connections being blocked? This could include specific ports, protocols, or IP addresses. Understanding these patterns can provide valuable clues about the nature of the issue.
Security Profiles and Threat Detection: If your firewall employs security profiles to scan traffic for threats, it's possible that certain high-traffic connections are triggering these profiles and subsequently being blocked. Review the settings of these profiles and analyze whether legitimate traffic is being mistaken for malicious content.
Resource Utilization: High-traffic connections might strain system resources. Monitor the firewall's resource utilization during periods of high traffic to ensure that it's not leading to automatic connection blocks.
NAT and Routing Analysis: Inspect your network address translation (NAT) and routing configurations. Incorrect settings could potentially divert traffic away from its intended path, resulting in blocked connections.
Rule Order and Precedence: Ensure that the order of your firewall rules is appropriate. Rules are processed sequentially, so a higher-priority rule could inadvertently block traffic before it reaches the intended rule allowing it.
Support and Assistance: If you've thoroughly reviewed these aspects and are still encountering challenges, consider seeking assistance from your firewall's technical support or consulting with network experts who can provide specific insights into your configuration.
In essence, understanding the nature of the blocked connections and meticulously assessing the associated rules and configurations will help you identify the root cause of the issue and take the necessary steps to resolve it. Mesas DE Billar
Certainly, I'd be glad to help!
The situation you're describing, where your firewall is blocking high-traffic network connections, can be quite frustrating. This issue could arise due to a variety of reasons, and addressing it effectively involves a systematic approach to troubleshooting. Here's a comprehensive solution to consider:
Review Firewall Rules: Begin by carefully reviewing your firewall rules. Make sure that the rules governing high-traffic connections are properly configured. Verify that the rules are allowing the intended traffic and are not inadvertently set to block or deny it.
Traffic Logs Examination: Investigate the firewall's traffic logs to understand why high-traffic connections are being blocked. The logs should provide insights into which rule or security feature is triggering the block. This information is pivotal in diagnosing the root cause.
Resource Utilization Analysis: High-traffic situations can strain system resources such as CPU and memory. Monitor these resources during periods of increased traffic to ensure they're not reaching critical levels. Inadequate resources can lead to automatic connection blocks.
Security Profiles Check: Some firewalls include security profiles that inspect traffic for threats. While these profiles enhance security, they can inadvertently flag legitimate traffic as malicious. Examine your security profiles, ensuring that they are appropriately configured and not overzealous in blocking valid connections.
Update Firmware and Security Definitions: Keeping your firewall's firmware and security definitions up to date is crucial. Regular updates often include bug fixes, performance enhancements, and new threat definitions that can help mitigate issues like false positives in traffic blocking.
Session Limit Consideration: Some firewalls have session limits in place to prevent overwhelming the system. If high-traffic connections are causing numerous simultaneous sessions, review and adjust these limits if necessary.
Quality of Service (QoS) and Traffic Shaping: Implement Quality of Service (QoS) and traffic shaping policies to manage and prioritize network traffic. These tools can help ensure that high-traffic connections don't negatively impact other essential services.
Network Address Translation (NAT) and Routing Verification: Check your Network Address Translation (NAT) and routing configurations. Incorrect settings can lead to traffic not reaching its intended destination, potentially triggering the firewall to block connections.
Firewall Performance Monitoring: Employ firewall performance monitoring tools to gain insights into the firewall's behavior during high-traffic periods. This data can help identify patterns and potential bottlenecks.
Technical Support Engagement: If you've exhausted your troubleshooting efforts without resolution, consider reaching out to the firewall's technical support or consulting with network professionals. They can provide tailored guidance based on your specific setup.
Remember, the key to addressing this issue lies in a patient and systematic approach. By meticulously examining your firewall's configuration, logs, and performance metrics, you're better equipped to identify the exact cause of the issue and take appropriate corrective actions. Apply4u
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1692 | |
1088 | |
752 | |
446 | |
228 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.