- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to route traffic to virtual server in fortigate on azure
I would like to ask some questions about "virtual servers" in FortiGate. I deployed my firewall on azure with three subnets:
1) External Subnet: 192.168.200.0/24
2) Internal Subnet: 192.168.90.0/24
3) Protected Subnet: 192.168.100.0/24
My two database servers are deployed on Protected subnet 192.168.100.10 and 192.168.100.11. They are listening Port TCP 1521. I would like to load balancing these two servers in FortiGate. The virtual ip will be 192.168.100.240.
My configuration cannot route TCP port-1521 from client to this virtual Ip. I can access from client VM to each server with TCP port 1521. Any suggestion?
My firewall Rules:
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can yry enable all log in the policy (and in the implicit deny policy) and check if you see any related traffic log?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yeah, but no traffic is found.no deny log found.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Client's packets are probably not reaching FGT.
You can confirm with packet sniffer as suggested by @hbac .
If this is confirmed you may check routing from client to FGT.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When I do WAN to LAN virtual server configuration, it was working well. But for Lan-to-Lan virtual server configuration, the traffic could not pass to this virtual lan ip.
I have two database server in lan network (192.168.100.4 and 192.168.100.5) and then i created virtual server with virtual ip 192.168.100.240 and put these two server into the backend. But the Lan client (192.168.100.0/24) cannot access the virtual ip address.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This Firewall is running on azure.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I did enable deny policy.There is no traffic flow through.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @johnie,
You can run packet sniffer to see if the traffic even hits the FortiGate: https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-Using-the-FortiOS-built-in-packet-sn...
Regards,
