config system zone
edit " UntrustZONE"
set interface " wan1"
set intrazone allow
next
edit " TrustZONE"
set interface " port1"
set intrazone allow
next
end
config firewall vip
edit " FPTimeExt"
set extip #.#.#.141
set extintf " wan1"
set portforward enable
set color 25
set mappedip 172.29.1.11
set extport 443
set mappedport 443
next
end
config firewall policy
edit 20
set srcintf " UntrustZONE"
set dstintf " TrustZONE"
set srcaddr " all"
set dstaddr " FPTimeExt"
set action accept
set schedule " always"
set service " ANY"
set logtraffic enable
next
end
PCNSE
NSE
StrongSwan
and imho a zone with just one member, is adding more complexity to a fwpolicies & offers no advantageThere is an advantage: by using a zone you can completely rename a port. I cannot see how that would add complexity though, just on the contrary. The OP is probably using zones in transition from a Netscreen/JunOS firewall configuration. @Dagwyn: I remember having read about a recent quirk when using ports in firewall policies which where also members of a zone. I think 5.0.6 fixed that, have a look at the Release Notes. But READ them before upgrading, definitely! Not using zones might be a good idea after all, only for different reasons.
# diagnose debug enable # diagnose debug flow filter addr # diagnose debug flow show console enable # diagnose debug flow show function-name enable # diagnose debug flow trace start 100 id=13 trace_id=1 func=resolve_ip_tuple_fast line=4299 msg=" vd-root received a packet(proto=6, #.#.86.157:38504->#.#.#.141:443) from wan1." id=13 trace_id=1 func=init_ip_session_common line=4430 msg=" allocate a new session-00015605" id=13 trace_id=1 func=get_new_addr line=2401 msg=" find SNAT: IP-172.29.1.11(from IPPOOL), port-443" id=13 trace_id=1 func=fw_pre_route_handler line=175 msg=" VIP-172.29.1.11:443, outdev-wan1" id=13 trace_id=1 func=__ip_session_run_tuple line=2522 msg=" DNAT #.#.#.141:443->172.29.1.11:443" id=13 trace_id=1 func=vf_ip4_route_input line=1603 msg=" find a route: gw-172.29.1.11 via port1" id=13 trace_id=1 func=__iprope_tree_check line=534 msg=" use addr/intf hash, len=4" id=13 trace_id=1 func=fw_forward_handler line=663 msg=" Allowed by Policy-20:" etc.Just realised that it seems as it' s always the same unit that behave like this. When I reboot it switches to the slave and it works for a while. Both units have the same priority.
| User | Count |
|---|---|
| 2712 | |
| 1416 | |
| 810 | |
| 733 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.