PCNSE
NSE
StrongSwan
CHN_FGT60C~ # get router info CAN_FGT60C~ # get router infoI have attached a screen snip showing the static route for the VPN. Ping from head office (CAN) to remote office (CHN):
CAN_FGT60C~ # exec ping 10.20.x.1 PING 10.20.x.1 (10.20.x.1): 56 data bytes 64 bytes from 10.20.x.1: icmp_seq=0 ttl=255 time=210.9 ms 64 bytes from 10.20.x.1: icmp_seq=1 ttl=255 time=210.0 ms 64 bytes from 10.20.x.1: icmp_seq=2 ttl=255 time=210.1 ms 64 bytes from 10.20.x.1: icmp_seq=3 ttl=255 time=212.2 ms 64 bytes from 10.20.x.1: icmp_seq=4 ttl=255 time=210.0 ms --- 10.20.x.1 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 210.0/210.6/212.2 msPing from remote office (CHN) to head office (CAN):
CHN_FGT60C~ # exec ping 10.51.x.1 PING 10.51.x.1 (10.51.x.1): 56 data bytes --- 10.51.x.1 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet lossWhy the different behaviour?! From a client at CHN I can ping the head office FortiGate just fine:
C:\Users\X>ping 10.51.x.1 Pinging 10.51.x.1 with 32 bytes of data: Reply from 10.51.x.1: bytes=32 time=210ms TTL=254 Reply from 10.51.x.1: bytes=32 time=216ms TTL=254 Reply from 10.51.x.1: bytes=32 time=210ms TTL=254 Reply from 10.51.x.1: bytes=32 time=210ms TTL=254 Ping statistics for 10.51.x.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 210ms, Maximum = 216ms, Average = 211msThere is no NAT involved here. No NAT traversal on the IPSec VPNs even; they are dedicated static IPs at each end point. I need two services to work from the FortiGate itself to head office servers: SMTP and FSSO. It would be nice for ping to work too for periodic performance measurement (e.g., latency) and troubleshooting. And beyond that I would really like it to work the same as my other FortiGates. I don' t want it to be complicated; the main reason I introduced VLANs was so that I could eliminate the separate interfaces for wireless access.
CHN_FGT60C~ # execute ping-options source 10.20.x.1 CHN_FGT60C~ # execute ping 10.51.x.1 PING 10.51.x.1 (10.51.x.1): 56 data bytes 64 bytes from 10.51.x.1: icmp_seq=0 ttl=255 time=210.6 ms 64 bytes from 10.51.x.1: icmp_seq=1 ttl=255 time=210.3 ms 64 bytes from 10.51.x.1: icmp_seq=2 ttl=255 time=210.1 ms 64 bytes from 10.51.x.1: icmp_seq=3 ttl=255 time=210.3 ms 64 bytes from 10.51.x.1: icmp_seq=4 ttl=255 time=215.2 ms --- 10.51.x.1 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 210.1/211.3/215.2 ms
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
veechee wrote:Hi everyone and sorry to bump up this old post, I have exactly the same problem with FortiGate 200D and the last FortiOS version available: v5.6.3 build1547 (GA).
I' ve opened a ticket with support to help me get this figured out. I will post the resolution.
Is there any way to set the source IP of the FG as the "internal" interface only for ICMP requests?
I've searched around but didn't find anything related.
Thanks in advance!
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1744 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.