- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hight SSL Negotiation time, when web filter Security profile has enable
Hey Guys
We are facing Hight SSL Negotiation time, when WEB filter profile has enable on the rule at Security Profile.
When we disable de WEB Filter profile on the rule, the SSL Time improve considerable .
To test i'm using this curl command, for google website. But this issue occur with any destination address
curl —resolve www.google.com.br:443:142.250.219.131 -w "DNS_resolution: %{time_namelookup}| TCP_negotiation_time: %{time_connect}| SSL_negotiation_time: %{time_appconnect}| TTFB: %{time_starttransfer}| Total time: %{time_total} \n" -o /dev/null -vsL https://www.google.com.br
When WEB Filter profille is enable the SSL_negotiation_time is more 3 seconds
When WEB Filter profile is disabled the SSL_negotiation_time is not more tham milliseconds
When I check on System ==> Fortiguard My Web Filter Status is average 123 ms.
Someone experienced this same issue ?
Solved! Go to Solution.
- Labels:
-
FortiGate
-
Security profile
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Vagner
Please try these troubleshooting steps. I'm sure it will help you find the root cause.
Especially the diag debug part.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you decrypting that traffic?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
I'm not decrypting.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Vagner
Under System > FortiGuard, try enable Web Filter cache then try "twice" and see if the second attempt has better performance.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
It's already enabled with 60 minute
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Vagner
Please try these troubleshooting steps. I'm sure it will help you find the root cause.
Especially the diag debug part.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey AEK
Thank you, this link drove me to solve the issue.
Additional i used that link as well
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Configure-interface-for-IPS-TLS-protocol-a...
I were able to check when i used diagnose command some probe has been failure and some doesn't. When Failure, there is High Latency. When not, doesn't
diagnose ips debug enable ssl
diagnose ips debug enable urlfilter
diagnose debug enable
[2877@-1]eng_debug_log: Connecting to x.y.v.z:443 (test.test.com.br)
[2877@-1]probe_finish: probe is finished. id: 1127353, sess: 4042465. <<<<<<======= Probe Works Fine = low Latency
At second attempt I experienced Hight Latency more than 3 seconds on SSL connection, and like suggest document the Proble failed
[2877@-1]eng_debug_log: Server: x.y.v.z:443
[2877@-1]eng_debug_log: Probe failed: unable to connect. <<<<<<===== Proble Failure = High Latency
So i used:
diagnose debug rating
Like suggested the link that you send senthttps://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-FortiGuard-Web-Filtering-problems/ta...
So just 3 Fortinet Services address were reachable (Flag "D"), all others don't (Flag "F)
IP Weight RTT Flags TZ FortiGuard-requests Curr Lost Total Lost
12.34.97.71 20 127 DI -5 3714329 0 18578 W
208.184.237.61 50 184 D -8 32184 0 1344 W
173.243.138.91 60 178 D -8 56753 0 1244 W
140.174.22.72 20 0 F -5 170173 170173 170173
12.34.97.72 20 0 F -5 170173 170173 170173
140.174.22.73 20 0 F -5 170173 170173 170173
12.34.97.73 20 0 F -5 170173 170173 170173
12.34.97.74 20 0 F -5 170173 170173 170173
12.34.97.75 20 0 F -5 170173 170173 170173
140.174.22.71 20 0 F -5 170180 170180 170180
194.69.172.31 30 0 F 0 170173 170173 170173
194.69.172.32 30 0 F 0 170173 170173 170173
194.69.172.33 30 0 F 0 170173 170173 170173
209.40.106.91 30 0 F -6 31952 31952 31952
209.40.106.92 30 0 F -6 26192 26192 26192
83.231.212.85 40 0 F 1 170173 170173 170173
83.231.212.86 40 0 F 1 170173 170173 170173
83.231.212.84 40 0 F 1 170173 170173 170173
83.231.212.81 40 0 F 1 170173 170173 170173
83.231.212.82 40 0 F 1 170173 170173 170173
83.231.212.83 40 0 F 1 170173 170173 170173
173.243.138.92 50 0 F -8 170173 170173 170173
173.243.138.93 50 0 F -8 170173 170173 170173
208.184.237.62 50 0 F -8 170172 170172 170172
210.7.96.11 120 0 F 9 170172 170172 170172
210.7.96.12 120 0 F 9 170172 170172 170172
210.7.96.13 120 0 F 9 170172 170172 170172
210.7.96.14 120 0 F 9 170172 170172 170172
When i checked my route table, there were only static route (via internet interface) to the these three address that works. For other all there are no route.
That's reason some times works, some time doesnt.
Cause the Firewall use like a round robin feature do balance accross these all address.
The solution, i have fixed my route table to reacher all these address via internet interface.
There is no flag "F".
IP Weight RTT Flags TZ FortiGuard-requests Curr Lost Total Lost Updated Time
12.34.97.74 20 124 -5 67715 0 15431 Mon
12.34.97.72 20 127 -5 58611 0 15438 Mon
12.34.97.73 20 127 -5 23151 0 15430 Mon
12.34.97.71 20 127 DI -5 359512 0 3722 Mon
140.174.22.73 20 131 -5 55354 0 15439
140.174.22.71 20 135 -5 293970 0 15493 Mon
140.174.22.72 20 135 -5 19964 0 15426 Mon
12.34.97.75 20 136 -5 83878 0 15441 Mon
209.40.106.91 30 142 -6 18312 0 15416 Mon
209.40.106.94 30 142 -6 18311 0 15415 Mon
209.40.106.93 30 143 -6 18310 0 15414 Mon
209.40.106.92 30 144 -6 18310 0 15414 Mon
194.69.172.32 30 201 0 18310 0 15414 Mon
194.69.172.33 30 205 0 18310 0 15414 Mon
194.69.172.31 30 206 0 18310 0 15414 Mon
83.231.212.85 40 208 1 18311 0 15415 Mon
83.231.212.82 40 208 1 18311 0 15415 Mon
83.231.212.84 40 208 1 18310 0 15414 Mon
83.231.212.86 40 210 1 18311 0 15415 Mon
83.231.212.83 40 211 1 18310 0 15414 Mon
83.231.212.81 40 213 1 18310 0 15414 Mon
173.243.138.91 50 175 D -8 8312 0 480 Mon
173.243.138.93 50 177 -8 18311 0 15415 Mon
173.243.138.92 50 177 -8 18310 0 15414 Mon
208.184.237.62 50 185 -8 18310 0 15414 Mon
208.184.237.61 50 186 D -8 7722 0 441 Mon
210.7.96.13 120 272 9 18310 0 15414 Mon
210.7.96.12 120 272 9 18310 0 15414 Mon
210.7.96.14 120 274 9 18310 0 15414 Mon
210.7.96.11 120 279 9 18311 0 15415 Mon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Vagner
Glad to see you were able to resolve the issue.
