Looking over things I guess...
Situation:
WAN1 (primary address): Static IP
WAN1 (secondary address): Static IP
WAN2 (primary address): Dynamic IP
From the internet I am able to ping all three IP-addresses. However, internal users cannot.
They can ping both primary addresses but not the WAN1-secondary address.
Obiously ping is enabled in all three cases.
Since the WAN1-secondary address hosts an application which needs to be accessible from outside as well as inside and DNS resolves to the public IP address users are now not able to connect to this application.
Does anyone have an idea what is wrong here?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
The diag debug flow is you friend. Did you set allowaccss for ping
config secondaryip edit 1 set ip x.x.x.x/30 unset allowaccess next end
and
set allowaccess fgfm fortimanager access http http access https https access ping ping access snmp snmp access ssh ssh access telnet telnet access
Ken
PCNSE
NSE
StrongSwan
Even though they are on the same interface, you still need policies between the two. Are they in place?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
You mean that I need a WAN1 - WAN1 policy?
MichelSchuurman wrote:I think they mean an internal->WAN1 (secondary IP) fw policy.You mean that I need a WAN1 - WAN1 policy?
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Wan1-subnet1 <-> Wan1-subnet2
Yes
Think about it this way: Even though the subnets are on the same physical wire, they are on unique subnets. They need to pass through the FGT (their default gateway) to get anywhere that is not on their subnet. We're talking strict IP traffic here, not old school broadcast traffic like NetBEUI and such. So yes, to talk to any device (even on the same interface) that is not on the same subnet as your source device, you need to go through the FGT. The target subnet happens to be on the same physical interface, so it's Wan1 - Wan1.
Been there, done that.
I'll have to go look into that device, but I believe that some policy routes were involved as well. Not sure. Will check if you need.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Create addresses representing the subnets of both the interface and the secondary addresses.
Created policies allowing all traffic:
WAN1/addrWAN1Pri - WAN1/addrWan1Sec
and
WAN1/addrWAN1Sec - WAN1/addrWan1Pri
Still, unfortunately:
id=13 trace_id=9610 msg="vd-root received a packet(proto=1, X.X.X.X:3->Y.Y.Y.Y.Y:8) from IntUsers." id=13 trace_id=9610 msg="allocate a new session-042326d9" id=13 trace_id=9610 msg="iprope_in_check() check failed, drop"
Where of course X.X.X.X represents the host sending Ping and Y.Y.Y.Y is the secondary IP address on WAN1.
OK. I'm a bit off here. I was referring to pinging objects on the second subnet, not the interface IP itself. Sorry aout that. What model FGT are we referring to?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Bob, thanks for thinking with me...
Situation is like:
BBBB (wan1 primary) bbbb (wan1 secondary) AAAA (internal network) CCCC (wan2 primary)
Ping from AAAA to BBBB successful
Ping from AAAA to CCCC successful
Ping from AAAA to bbbb unsuccessful
Since BBBB is a dirty subnet (was used by spammers before) we requested another subnet for our Exchange server. Through BBBB the server always was reachable from the internal net using the public subnet or the FQDN.
Since we moved the Exchange server to bbbb we can no longer reach the server through the FQDN. Temporarily solved it by creating an entry in the internal DNS but I would like to have it back the way it was.
Have you tried flipping the two addresses? Make the primary secondary and vice-versa?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1710 | |
1093 | |
752 | |
446 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.