Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
DonL
New Contributor

Incoming VIP traffic being dropped

I have a home lab environment, and I have created a VIP for my Citrix Lab with NetScaler frontend. Regardless of what I try traffic to the VIP is being dropped based on debug view, but I don't see any traffic in the logs. This used to work with another service but that stopped working as well.

 

Fortigate-70F

Firmware: 7.6.1

 

policy2.pngservice.pngvip2.png

 

 

Debug Trace

 

2025/06/12 09:31:54,"vd-root:0 received a packet(proto=6, X.X.X.X:30212->X.X.24.153:8445) tun_id=0.0.0.0 from wan1. flag [S], seq 3633665461, ack 0, win 65535"
2025/06/12 09:31:54,allocate a new session-0005eb2b
2025/06/12 09:31:54,"in-[wan1], out-[]"
2025/06/12 09:31:54,len=1
2025/06/12 09:31:54,checking gnum-100000 policy-1061
2025/06/12 09:31:54,"result: skb_flags-02000000, vid-0, ret-no-match, act-accept, flag-00000000"
2025/06/12 09:31:54,find a route: flag=80000000 gw-X.X.24.153 via root
2025/06/12 09:31:54,"in-[wan1], out-[], skb_flags-02000000, vid-0"
2025/06/12 09:31:54,"gnum-100017, check-ffffffbffc02ca54"
2025/06/12 09:31:54,"after check: ret-no-match, act-accept, flag-00000000, flag2-00000000"
2025/06/12 09:31:54,"in-[wan1], out-[], skb_flags-02000000, vid-0"
2025/06/12 09:31:54,"gnum-100011, check-ffffffbffc02db70"
2025/06/12 09:31:54,"after check: ret-no-match, act-drop, flag-00000000, flag2-00000000"
2025/06/12 09:31:54,"gnum-100001, check-ffffffbffc02ca54"
2025/06/12 09:31:54,"checked gnum-100001 policy-1, ret-no-match, act-accept"
2025/06/12 09:31:54,"gnum-100001 check result: ret-no-match, act-accept, flag-00000000, flag2-00000000"
2025/06/12 09:31:54,"after check: ret-no-match, act-accept, flag-00000000, flag2-00000000"
2025/06/12 09:31:54,"gnum-10000e, check-ffffffbffc02ca54"
2025/06/12 09:31:54,"checked gnum-10000e policy-4294967295, ret-no-match, act-accept"

 

1 Solution
funkylicious

what i would do are these:

- the custom service, i would remove udp-port and iprange, leave a classic object with only tcp port 8445 that's needed and use it in the firewall rule

- the vip, i would remove the extintf and leave any instead

 

afterwards do another debug of the traffic while trying to access it.

"jack of all trades, master of none"

View solution in original post

"jack of all trades, master of none"
4 REPLIES 4
funkylicious
SuperUser
SuperUser

do you have an ip pool configured with X.X.24.153 ? if so, set arp-reply disable to it.

https://community.fortinet.com/t5/FortiGate/Technical-Tip-ARP-reply-setting-in-Virtual-IP-IP-Pool/ta... 

"jack of all trades, master of none"
"jack of all trades, master of none"
DonL

No IP Pool, that is the IP address of my WAN. I disabled arp-reply for testing but not change in behavior. 

funkylicious

what i would do are these:

- the custom service, i would remove udp-port and iprange, leave a classic object with only tcp port 8445 that's needed and use it in the firewall rule

- the vip, i would remove the extintf and leave any instead

 

afterwards do another debug of the traffic while trying to access it.

"jack of all trades, master of none"
"jack of all trades, master of none"
DonL

taking off the custom service port and doing just the port number resolved it? Should I be concerned with the why?

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors