config system zone edit " UntrustZONE" set interface " wan1" set intrazone allow next edit " TrustZONE" set interface " port1" set intrazone allow next end config firewall vip edit " FPTimeExt" set extip #.#.#.141 set extintf " wan1" set portforward enable set color 25 set mappedip 172.29.1.11 set extport 443 set mappedport 443 next end config firewall policy edit 20 set srcintf " UntrustZONE" set dstintf " TrustZONE" set srcaddr " all" set dstaddr " FPTimeExt" set action accept set schedule " always" set service " ANY" set logtraffic enable next end
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
and imho a zone with just one member, is adding more complexity to a fwpolicies & offers no advantageThere is an advantage: by using a zone you can completely rename a port. I cannot see how that would add complexity though, just on the contrary. The OP is probably using zones in transition from a Netscreen/JunOS firewall configuration. @Dagwyn: I remember having read about a recent quirk when using ports in firewall policies which where also members of a zone. I think 5.0.6 fixed that, have a look at the Release Notes. But READ them before upgrading, definitely! Not using zones might be a good idea after all, only for different reasons.
# diagnose debug enable # diagnose debug flow filter addr # diagnose debug flow show console enable # diagnose debug flow show function-name enable # diagnose debug flow trace start 100 id=13 trace_id=1 func=resolve_ip_tuple_fast line=4299 msg=" vd-root received a packet(proto=6, #.#.86.157:38504->#.#.#.141:443) from wan1." id=13 trace_id=1 func=init_ip_session_common line=4430 msg=" allocate a new session-00015605" id=13 trace_id=1 func=get_new_addr line=2401 msg=" find SNAT: IP-172.29.1.11(from IPPOOL), port-443" id=13 trace_id=1 func=fw_pre_route_handler line=175 msg=" VIP-172.29.1.11:443, outdev-wan1" id=13 trace_id=1 func=__ip_session_run_tuple line=2522 msg=" DNAT #.#.#.141:443->172.29.1.11:443" id=13 trace_id=1 func=vf_ip4_route_input line=1603 msg=" find a route: gw-172.29.1.11 via port1" id=13 trace_id=1 func=__iprope_tree_check line=534 msg=" use addr/intf hash, len=4" id=13 trace_id=1 func=fw_forward_handler line=663 msg=" Allowed by Policy-20:" etc.Just realised that it seems as it' s always the same unit that behave like this. When I reboot it switches to the slave and it works for a while. Both units have the same priority.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1710 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.