Hello, I have a problem with simple setup
i think it could be a limitation of evaluation license but i wanted to confirm it.
Goal was to monitor and add some polices to home network with forti in Vm
Network Setup and Topology
Forti 7.4.5
• ISP Router: This is the primary internet gateway provided by the ISP, operating on its own subnet with DHCP enabled. The ISP router is connected to an ASUS Access Point.i can’t change config of this device
• ASUS Access Point (AP): Connected to the ISP router, the ASUS AP has local network (LAN) on subnet 192.168.50.0/24. It broadcasts Wi-Fi for local devices and is directly connected via Ethernet to a machine with VMware server
• FortiGate Firewall (VM): Running as a virtual machine on the server, FortiGate is configured with port1 as the primary interface, acting as both LAN and WAN within the 192.168.50.0/24 subnet. It has the IP address 192.168.50.10 and provides DHCP services, assigning itself as the default gateway for clients on this subnet
All devices, including Wi-Fi clients, use the subnet 192.168.50.0/24 with 192.168.50.10 (FortiGate) as their default gateway. The ISP router resides in a different subnet, which is not directly accessible to the internal clients it is accessed via Asus ap
Firewall Policies and Routing Configuration
1. Default Route on FortiGate: A static default route 0.0.0.0/0 points to the ASUS AP at 192.168.50.1, directing outbound traffic from the LAN to the internet via the ISP.
2. Outbound Policy: A firewall policy on FortiGate allows outbound traffic from LAN -> WAN (from port1 to port1), with logging enabled. However, despite this, logs are not being captured
Traffic Sniffing on FortiGate: Packet capture shows that outbound traffic is flowing through FortiGate. Both outbound (out) and inbound (in) packets are visible on port1, confirming that internet-bound traffic passes through FortiGate
example:
22.881926 port1 out 192.168.50.104.64201 -> 152.199.21.175.443: udp 32
22.882438 port1 in 192.168.50.104.64201 -> 152.199.21.175.443: udp 32
22.882451 port1 out 192.168.50.104.64201 -> 152.199.21.175.443: udp 32
22.884027 port1 in 192.168.50.104.64201 -> 152.199.21.175.443: udp 133
22.884039 port1 out 192.168.50.104.64201 -> 152.199.21.175.443: udp 133
22.885147 port1 in 192.168.50.104.64201 -> 152.199.21.175.443: udp 33
22.885165 port1 out 192.168.50.104.64201 -> 152.199.21.175.443: udp 33
22.885588 port1 in 192.168.50.104.64201 -> 152.199.21.175.443: udp 35
22.885600 port1 out 192.168.50.104.64201 -> 152.199.21.175.443: udp 35
22.885916 port1 in 192.168.50.104.64201 -> 152.199.21.175.443: udp 37
Logging Issues: Despite it looks like traffic passing through FortiGate, outbound traffic logs are not being recorded as expected. Suspecting that this might be related to the Evaluate license limitations or configuration details in the logging settings
i see all lan traffic in logs
The network is functioning as intended: FortiGate is routing LAN traffic to the internet through ASUS AP, with FortiGate acting as the gateway and performing NAT. However, logging and adding additional policies remains an issue, likely due to either the limitations of the Evaluate license or specific configurations Please help me to understand and solve it
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Sh0,
Thanks for using Fortinet Community Forums.
Your post was erroneously marked as spam by our automated system due to the high volume of IP address URLs with "tel:" links. I have restored your post and removed the links from your IP addresses.
I apologize for the inconvenience. If your post does not receive a reply soon, we will get you one.
Kind regards,
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1710 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.