Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Michel_Schuurman
New Contributor

Internal users cannot ping secondary WAN-address

Looking over things I guess...

 

Situation:

WAN1 (primary address): Static IP

WAN1 (secondary address): Static IP

WAN2 (primary address): Dynamic IP

 

From the internet I am able to ping all three IP-addresses. However, internal users cannot.

They can ping both primary addresses but not the WAN1-secondary address.

Obiously ping is enabled in all three cases. 

 

Since the WAN1-secondary address hosts an application which needs to be accessible from outside as well as inside and DNS resolves to the public IP address users are now not able to connect to this application. 

 

Does anyone have an idea what is wrong here?

14 REPLIES 14
rwpatterson
Valued Contributor III

The reason I made the wan1-wan1 comment is that on my FWF80CM, the wan ports are GB, so I use them for my inside servers, and the dmz labeled port is my Internet.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Dave_Hall
Honored Contributor

If the application hosted at the secondary WAN1 IP has a internal private IP counter-part, you may want to look into DNS-translation.

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
ede_pfau
SuperUser
SuperUser

As per the log message there is a permission problem here. This might come from a missing policy (which I doubt) but also from a missing route.

Edit: you might have a look at this : http://kb.fortinet.com/kb/viewContent.do?externalId=FD31702 .

 

What does your routing table look like? I mean, the live one (Monitor).

 

And no, I just tested with a DMZ port, you don't need any policy to ping a FGT interface. The definition of the interface address automatically inserts a policy ("connected") which is sufficient.

As Bob has posted correctly this doesn't apply to traffic from host to host.

 

BTW, any Trusted Hosts?

Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
emnoc
Esteemed Contributor III

id=13 trace_id=9610 msg="vd-root received a packet(proto=1, X.X.X.X:3->Y.Y.Y.Y.Y:8) from IntUsers." id=13 trace_id=9610 msg="allocate a new session-042326d9" id=13 trace_id=9610 msg="iprope_in_check() check failed, drop"  [/QUOTE

Iprope_in_check is probably due to  uRPF checks.

 

 

You have some things to check;

 

1: A firewall policy ( nat )

2: set allowaccess icmp ( under your secondary ) is on since you say you can ping it from the external network ( so skip that for now  )3:  and the set trusthost if used needs to match x.x.x.x  for your user.

 

 and finally,

 Do you have any thing weird with IntUsers  like a static route on the   Fortigate that overlaps the   secondary?

 

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
Nihas
New Contributor

Will the below option work out?

[ul]
  • First create an internet policy for local users ( using the primary IP as NAT).
  • Create hair pin policy  with source IP as Primary IP / int as WAN1 - and destination as Secondary IP ./int as WAN1 - select ICMP as service) [/ul]

    So the local users will be able to ping the second IP like the below. ( I think :p )

     

    192.168.0.0 ( Local users ) -- >2.2.2.2 ( Secondary IP)

    192.168.0.0 ( Local users ) -- >NATED 1.1.1.1  ( Primary IP)-- >2.2.2.2 ( Secondary IP)

     

    Best 

    Nihas

     

     

  • Nihas [\b]
    Nihas [\b]
    Announcements

    Select Forum Responses to become Knowledge Articles!

    Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

    Labels
    Top Kudoed Authors