Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
itmonteur
New Contributor

FortiManager GUI not accessible FMG-VM64-HV

I have installed  FMG-VM64-HV  on hyper-v

FMG firmware v 7.2.10.

 

I am able to ping and ssh the FMG but not able to https or http on GUI however I have allowed https http ping ssh on the allowaccess interface setting.

4 REPLIES 4
rmoussa
Contributor

Hello,

 

Did you made sure that you allowed the administrative protocol on the correct interface ? Another reason maybe in this case is the certififcate.

 

Regards

Rony

Rony Moussa
Fortinet NSE Certified: Level 8
Rony MoussaFortinet NSE Certified: Level 8
itmonteur

Hi Rony,

 

Yes I allowed the administrative protocol on the correct interface and it also it is not giving me any certificate error. 

itmonteur

name : port1
status : enable
ip : 192.168.200.10 255.255.255.0
allowaccess : ping https ssh http
serviceaccess :
lldp : disable
speed : auto
description : (null)
alias : (null)
mtu : 1500
type : physical
ipv6:
ip6-address: ::/0 ip6-allowaccess: ip6-autoconf: enable
(port1)#


FMG-VM64-HV # diagnose sniffer packet any "host 192.168.200.2" 4 30
interfaces=[any]
filters=[host 192.168.200.2]
24.473422 192.168.200.2.65499 -> 192.168.200.10.443: syn 2066255653
24.473498 arp who-has 192.168.200.2 tell 192.168.200.10
24.473799 arp reply 192.168.200.2 is-at 0:15:5d:64:8a:4
24.473808 192.168.200.10.443 -> 192.168.200.2.65499: rst 0 ack 2066255654
24.475424 192.168.200.2.65500 -> 192.168.200.10.443: syn 164657381
24.475453 192.168.200.10.443 -> 192.168.200.2.65500: rst 0 ack 164657382
24.725139 192.168.200.2.65501 -> 192.168.200.10.443: syn 860961106
24.725218 192.168.200.10.443 -> 192.168.200.2.65501: rst 0 ack 860961107
24.973881 192.168.200.2.65499 -> 192.168.200.10.443: syn 2066255653
24.973942 192.168.200.10.443 -> 192.168.200.2.65499: rst 0 ack 2066255654
24.976725 192.168.200.2.65500 -> 192.168.200.10.443: syn 164657381

itmonteur
New Contributor

FMG-VM64-HV # diagnose sniffer packet any "host 192.168.200.2" 4 30
interfaces=[any]
filters=[host 192.168.200.2]
24.473422 192.168.200.2.65499 -> 192.168.200.10.443: syn 2066255653
24.473498 arp who-has 192.168.200.2 tell 192.168.200.10
24.473799 arp reply 192.168.200.2 is-at 0:15:5d:64:8a:4
24.473808 192.168.200.10.443 -> 192.168.200.2.65499: rst 0 ack 2066255654
24.475424 192.168.200.2.65500 -> 192.168.200.10.443: syn 164657381
24.475453 192.168.200.10.443 -> 192.168.200.2.65500: rst 0 ack 164657382
24.725139 192.168.200.2.65501 -> 192.168.200.10.443: syn 860961106
24.725218 192.168.200.10.443 -> 192.168.200.2.65501: rst 0 ack 860961107
24.973881 192.168.200.2.65499 -> 192.168.200.10.443: syn 2066255653
24.973942 192.168.200.10.443 -> 192.168.200.2.65499: rst 0 ack 2066255654
24.976725 192.168.200.2.65500 -> 192.168.200.10.443: syn 164657381

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors