Hello Fortinet family,
Can someone provide some insight and/or solution?
I just put my fortimail in the dmz, my mail server is behind the fortigate fwl, enabled smtp traffic on fortigate, mails are processed/flowing via the fortimail perfectly(a lot of false positives though, some inspection settings might need to be tweaked down).
I have to ethernet ports enabled on my fortimail hyperv vm:
eth0 -> internal
eth1 -> dmz
I can login to Fortimail web UI via port1-internal lan(172.16.10.5) . However, i am unable to login to the web ui via port2-dmz(172.16.40.10).
What do i need to do to log in the fortimail web ui via the dmz port/IP?
ANY help would be great, thanks.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi NeoRant
The idea I suggested is as follows:
This has two benefits:
Then for more security you will add Trusted Hosts for admin access, so that you deny admin access from other than internal source.
Hi @NeoRant ,
Is the Access for HTTPS GUI enabled on interface eth1?
Created on 05-08-2024 11:57 AM Edited on 05-08-2024 12:00 PM
Hi DBU,
Yes it is. I ran traffic capture in fml, ran wireshark while attempting to connect to https://dmz ip/admin to retrieve/analysis etc. The fortigate has https enabled/allowed for the dmz ip so idk, smh
Hi NeoRant
If you enabled https access on DMZ and didn't work then I guess it is a routing issue.
As per my knowledge FortiMail doesn't have policy routes, so if you configure multiple interfaces you may have some issues when accessing from the interface on which the default route is not configured.
In your case I guess the default route is on port1. So if I'm not wrong, when you try connect to port2 the returning traffic may back from port1. You can sniff on FML CLI to confirm this.
From security prospective I think a better design for any VM is to attach it to one single VLAN/DMZ (except for firewalls, WAF and few others), this is also applicable for FortiMail, I mean to use one interface, put in DMZ, from which you manage it and in the same time for handling SMTP traffic. This will also avoid such routing issues.
Hi AEK,
So basically, i need to input the default gateway for the dmz ip in fortimail? Correct me if i am wrong.
The ip for management interface/port 1 has its default gateway configured in FML, i.e. only one default route is present so far, none for the dmz.
Observation:
- i can ping the dmz ip on the LAN perfectly.
- webadmin, https, ssh enabled on port2/dmz just like port.
- when i disconnect hyper v eth0 (port1 on fml) leaving only eth1(port2-dmz) on fml vm, i cant ping the dmz ip on lan.
-dmz ip on fml port 2 is only pingable when port1/eth0 is connected in fml vm.
Hi NeoRant
The idea I suggested is as follows:
This has two benefits:
Then for more security you will add Trusted Hosts for admin access, so that you deny admin access from other than internal source.
Hi AEK,
I will try your recommendation and get back to you as soon as i can.
Thanks alot
Created on 05-09-2024 11:26 AM Edited on 05-09-2024 11:30 AM
Hi AEK,
I followed your instruction but tweaked it a bit, using the cli to verify.
Steps i performed:
And keep in mind, in real world security guys will not let you connect a VM to more than one VLANs, since it will let you bypass the firewall for inter-VLAN communication.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.