I have a site to site vpn mounted with my private subnet (10.0.1.0/24) and Teltonika router RUT951 subnet (192.168.10.0/24) which is connected to internet through dial up (SIM Card Telcel). The site to site is up and successfully running on phase1 and phase2 selectors..... But I canNOT ping or telnet from server in private net to the router RUT951 itself nor any device behind the router.
But I am able to do ping or telnet successfully from router RUT951 to server in private net.
From Fortigate CLI tried to do ping on 192.168.10.1, but no luck.
My guess is the issue should be on the firewall of the router RUT951, but I am new on this so I need help.
I have both policies allowing all access from RUT951 -> PRIVATE NET and PRIVATE NET -> RUT951 like below:
PRIVATE NET -> RUT951 Policy (This one does not work if doing ping or telnet disabling or enabling NAT, same result).
RUT951 -> PRIVATE NET (This one works perfect i can do ping or telnet)
Static Routes
IPSEC TUNNEL SITE TO SITE SUCCESS STATUS.
More context:
Fortigate in a VM in AWS.
Private subnet as 10.0.1.0/24 where private server resides.
Public facing subnet 10.0.0.0/24.
My Teltonika RUT951 router subnet 192.168.10.0/24 (Internet access through SIM Card Telcel, not WAN as such).
RUT951 router ip address 192.168.10.1
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @OrtizJorge97 ,
Please specify the source IP for Ping on FGT:
execute ping-options source x.x.x.x // x.x.x.x is the IP assigned to port2
execute ping 192.168.10.1
Hi @dingjerry_FTNT ,
Yes, it is actually pointing to the port2 ip address
bellow I attach the route table in the private net
Hi @OrtizJorge97 ,
I am not familiar with AWS. On the private server (I assume it is Windows based), can you see the ARP entry with 10.0.1.10?
If it is Windows based, you may run "arp -a"
You can get the MAC address of port2 on FGT with this CLI command:
diag hardware deviceinfo nic port2
Hi @OrtizJorge97 ,
My bad, your private server is Linux based. But the commands are the same.
Please run the following on the private server:
arp -a
traceroute 192.168.10.1
Please run the following on FGT:
diag hardware deviceinfo nic port2
Hi @dingjerry_FTNT ,
Here I attach the results for my arp -a and traceroute 192.168.10.1 commands
Added rule for routing table inside the linux server to redirect it through the 10.0.1.10 port2 in fgt, still no luck, also ran again diag sniffer packet any 'icmp and host 192.168.10.1' 4
still not reaching FGT in port2.
RESULTS IN FGT FOR diag hardware deviceinfo nic port2
Hi @OrtizJorge97 ,
1) Your Linux host has a gateway pointing to 10.0.1.1 if I understand it correctly. What is the gateway?
2) Your ARP entry for 10.0.1.10 has the correct MAC address.
So weird, I am not sure why it is not hitting FGT.
Maybe you can try to reboot the private server and then check everything again?
Created on 12-11-2024 10:38 AM Edited on 12-11-2024 10:39 AM
Hi @dingjerry_FTNT ,
Yes, gateway is pointing to 10.0.1.1, success ping from private server to gateway.
Gateway is the subnet private gateway ip address from AWS.
Changed destination in subnet route table for private subnet to 192.168.10.1/32 and tried ping and again not working. Change it back again to 192.168.10.0/24.
Also Rebooted the Private server, and still not getting ping response, neither fortigate cli is receiving ping request even.
Regards,
Hi @OrtizJorge97 ,
There is nothing wrong with 192.168.10.0/24, so do not make any change on 192.168.10.0/24 subnet anymore to make things more complicated.
Steps for further investigations:
1) What is the IP for your private server?
2) Can you ping this IP from FGT?
3) Run the following CLI commands:
get sys arp
diag debug flow show iprope enable
diag debug flow filter proto 1
diag debug flow filter addr 10.0.1.10
diag debug flow trace start 20
diag debug enable
Then please ping 10.0.1.10 from your private server. Please do not run continuous ping.
Hi @dingjerry_FTNT ,
What is the IP for your private server? -> 10.0.1.27
Can you ping this IP from FGT? -> Yes, i can ping private server from Fortigate CLI, picture below.
Run the following CLI commands. -> Result output for commands https://codeshare.io/Mkndop
get sys arp
diag debug flow show iprope enable
diag debug flow filter proto 1
diag debug flow filter addr 10.0.1.10
diag debug flow trace start 20
diag debug enable
Same results output of commands below too
Also as quick note, just ran "traceroute 192.168.10.1" from private ip server it does not even do a hop in the private net gateway ip 10.0.1.1.
Created on 12-11-2024 08:20 PM Edited on 12-11-2024 08:23 PM
Hi @OrtizJorge97 ,
Based on the outputs of debug flow commands:
1) The Ping traffic from the private server was hitting FortiGate;
2) FGT has the ARP entry for the private server IP.
3) However, you were Pinging 10.0.1.10.
Please run the debug flow commands again, then Ping 192.168.10.1.
Hi @dingjerry_FTNT ,
Ran first debug commands into Fortigate CLI
Then Run ping from private server, and nothing was debugged into the fgt cli terminal, it is not even reaching the interface port2 from FGT.
Regards,
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.