Created on ‎06-24-2009 04:53 AM
customer-Network: Partner-network: 10.10.0.0/24-----Fortigate-(WANIP: AAA.BBB.CCC.238)---------INTERNET--------(WANIP: XXX.YYY.ZZZ.139)-Cisco PIX----10.0.1.0/24----translated to: 10.2.12.0/24the AAA.BBB.CCC.233 is the gateway of the fortigate The Tunnel comes up but there is no traffic transmittet trough the tunnel We pinged from the internel server (10.10.0.32) to the remote Server (10.0.1.13) i see the packets on the fortigate (see debug flow protokoll) but i don´t see any reply i also see the packets with the sniffer (see sniffer protokoll) but still no reply The remote admin see the packets from me comming in and answered by his mashine (see remote side protokoll) but i don´t see this packets on my side comming back again. Fortigate IPSEC-P1 config:
config vpn ipsec phase1-interface edit " IPSEC-P1-Emsys" set interface " wan1" set dhgrp 2 set proposal 3des-sha1 set keylife 86400 set remote-gw xxx.yyy.zzz.139 set psksecret ENC <shared-secret> next endFortigate IPSEC-P2 config:
config vpn ipsec phase2-interface edit " IPSEC-P2-Emsys" set dhgrp 2 set keepalive enable set pfs enable set phase1name " IPSEC-P1-Emsys" set proposal 3des-sha1 set dst-subnet 10.0.1.0 255.255.255.0 set keylifeseconds 3600 set src-subnet 10.10.0.0 255.255.0.0 next endFortigate Firewall policies: Incoming policy
config firewall policy edit 15 set srcintf " IPSEC-P1-Emsys" set dstintf " internal" set srcaddr " Emsys-Netzwerk" set dstaddr " Appl-Intranet" set action accept set schedule " always" set service " ANY" next endoutgoing policy
config firewall policy edit 16 set srcintf " internal" set dstintf " IPSEC-P1-Emsys" set srcaddr " Appl-Intranet" set dstaddr " Emsys-Netzwerk" set action accept set schedule " always" set service " ANY" next endFortigate Addresses:
config firewall address edit " Appl-Intranet" set associated-interface " internal" set subnet 10.10.0.0 255.255.0.0 next end config firewall address edit " Emsys-Netzwerk" set associated-interface " IPSEC-P1-Emsys" set subnet 10.0.1.0 255.255.255.0 next endFortigate debug flow protokoll:
FGT60B3908660513 # diagnose debug flow trace start 2 FGT60B3908660513 # id=20085 trace_id=1681 func=resolve_ip_tuple_fast line=2810 msg=" vd-root received a packet(proto=1, 10.10.0.32:5912->10.0.1.13:8) from internal." id=20085 trace_id=1681 func=resolve_ip_tuple_fast line=2837 msg=" Find an existing session, id-00211841, original direction" id=20085 trace_id=1681 func=ipv4_fast_cb line=57 msg=" enter fast path" id=20085 trace_id=1681 func=ipsecdev_hard_start_xmit line=122 msg=" enter IPsec interface-IPSEC-P1-Emsys" id=20085 trace_id=1681 func=esp_output4 line=467 msg=" encrypted, and send to xxx.yyy.zzz.139 with source AAA.BBB.CCC.238" id=20085 trace_id=1681 func=ipsec_output_finish line=133 msg=" send to AAA.BBB.CCC.233 via intf-wan1" id=20085 trace_id=1682 func=resolve_ip_tuple_fast line=2810 msg=" vd-root received a packet(proto=1, 10.10.0.32:5912->10.0.1.13:8) from internal." id=20085 trace_id=1682 func=resolve_ip_tuple_fast line=2837 msg=" Find an existing session, id-00211841, original direction" id=20085 trace_id=1682 func=ipv4_fast_cb line=57 msg=" enter fast path" id=20085 trace_id=1682 func=ipsecdev_hard_start_xmit line=122 msg=" enter IPsec interface-IPSEC-P1-Emsys" id=20085 trace_id=1682 func=esp_output4 line=467 msg=" encrypted, and send to xxx.yyy.zzz.139 with source AAA.BBB.CCC.238" id=20085 trace_id=1682 func=ipsec_output_finish line=133 msg=" send to AAA.BBB.CCC.233 via intf-wan1"Fortigate Sniffer protokoll:
FGT60B3908660513 # diagnose sniffer packet any ' host 10.0.1.13' 3 interfaces=[any] filters=[host 10.0.1.13] 1.302700 10.10.0.32 -> 10.0.1.13: icmp: echo request 0x0000 0000 0000 0001 000c 2945 cff6 0800 4500 ........)E....E. 0x0010 0054 0000 4000 4001 2573 0a0a 0020 0a00 .T..@.@.%s...... 0x0020 010d 0800 4953 1718 2ab2 e6c4 414a 55d0 ....IS..*...AJU. 0x0030 0400 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ 0x0040 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!" #$% 0x0050 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &' ()*+,-./012345 0x0060 3637 67 1.302740 10.10.0.32 -> 10.0.1.13: icmp: echo request 0x0000 0000 0000 0000 0000 0000 0000 0800 4500 ..............E. 0x0010 0054 0000 4000 3f01 2673 0a0a 0020 0a00 .T..@.?.&s...... 0x0020 010d 0800 4953 1718 2ab2 e6c4 414a 55d0 ....IS..*...AJU. 0x0030 0400 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ 0x0040 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!" #$% 0x0050 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &' ()*+,-./012345 0x0060 3637 67 2.329639 10.10.0.32 -> 10.0.1.13: icmp: echo request 0x0000 0000 0000 0001 000c 2945 cff6 0800 4500 ........)E....E. 0x0010 0054 0000 4000 4001 2573 0a0a 0020 0a00 .T..@.@.%s...... 0x0020 010d 0800 0f4f 1718 2ab3 e7c4 414a 8ed3 .....O..*...AJ.. 0x0030 0400 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ 0x0040 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!" #$% 0x0050 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &' ()*+,-./012345 0x0060 3637Remote Side Cisco protokoll:
ICMP echo-request from outside:10.10.0.32 to 10.0.1.13 ID=5912 seq=1780 length=64 3361: ICMP echo-request: translating outside:10.10.0.32 to inside:10.2.12.11 3362: ICMP echo-reply from inside:10.0.1.13 to 10.2.12.11 ID=5912 seq=1780 length=64 3363: ICMP echo-reply: untranslating inside:10.2.12.11 to outside:10.10.0.32Any idee what problem we have ?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Created on ‎06-24-2009 07:47 AM
edit 4 set device " IPSEC-P1-Emsys" set dst 10.0.1.0 255.255.255.0 nextor do you mean a route on the other side of the tunnel at the cisco router? i ask because we don´t know exactly the configuration of the cisco router It´s not configured by us. Regards
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Created on ‎06-24-2009 10:50 AM
PSSAWESRV01:~# traceroute 10.0.1.13 traceroute to 10.0.1.13 (10.0.1.13), 30 hops max, 40 byte packets 1 10.10.0.1 (10.10.0.1) 3.625 ms 0.276 ms 0.277 ms 2 * * * 3 * * * 4 *
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Created on ‎06-24-2009 11:10 AM
Created on ‎06-26-2009 01:45 AM
diagnose sniffer packet any ' host 10.0.1.13 or host xxx.yyy.zzz.139' interfaces=[any] filters=[host 10.0.1.13 or host xxx.yyy.zzz.139] 0.325727 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 0.554582 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 1.865384 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 1.865434 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 2.264660 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 5.324775 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 . . . . . 45.555418 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 51.039926 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 352 51.041446 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 100 51.143344 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 256 51.175829 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 180 51.276803 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 68 51.281502 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 68 51.323903 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 84 51.324468 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 51.329935 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 84 51.556746 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 84 55.765353 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 56.316778 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 . . . 137.898364 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 137.898416 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 142.477898 10.10.0.32 -> 10.0.1.13: icmp: echo request 142.477985 10.10.0.32 -> 10.0.1.13: icmp: echo request 142.512715 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 292 142.527333 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 84 143.476616 10.10.0.32 -> 10.0.1.13: icmp: echo request 143.476645 10.10.0.32 -> 10.0.1.13: icmp: echo request 144.476560 10.10.0.32 -> 10.0.1.13: icmp: echo request 144.476594 10.10.0.32 -> 10.0.1.13: icmp: echo request 144.478381 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 104 144.580308 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 84 144.612735 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 180 144.713433 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 256 144.747626 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 100 144.789254 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 68 144.790619 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 100 144.828780 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 292 144.989654 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 324 144.991814 AAA.BBB.CCC.238.500 -> xxx.yyy.zzz.139.500: udp 60 145.475813 10.10.0.32 -> 10.0.1.13: icmp: echo request 145.475844 10.10.0.32 -> 10.0.1.13: icmp: echo request 145.475965 AAA.BBB.CCC.238 -> xxx.yyy.zzz.139: ip-proto-50 116 146.475895 10.10.0.32 -> 10.0.1.13: icmp: echo request 146.475933 10.10.0.32 -> 10.0.1.13: icmp: echo request 146.476003 AAA.BBB.CCC.238 -> xxx.yyy.zzz.139: ip-proto-50 116 147.475870 10.10.0.32 -> 10.0.1.13: icmp: echo request . . 171.477868 10.10.0.32 -> 10.0.1.13: icmp: echo request 171.477906 10.10.0.32 -> 10.0.1.13: icmp: echo request 171.477972 AAA.BBB.CCC.238 -> xxx.yyy.zzz.139: ip-proto-50 116 172.029199 xxx.yyy.zzz.139.500 -> AAA.BBB.CCC.238.500: udp 172 172.478264 10.10.0.32 -> 10.0.1.13: icmp: echo request 172.478298 10.10.0.32 -> 10.0.1.13: icmp: echo request 172.478365 AAA.BBB.CCC.238 -> xxx.yyy.zzz.139: ip-proto-50 116 . 305 packets received by filter 0 packets dropped by kernel[/size] i´m not sure if this is now good or bad maybe someone else can explain me if the data comes back or not
User | Count |
---|---|
2570 | |
1364 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.