I am try to load test FortiGate VM using cisco Trex. While this works perfectly on the current pfsense setup, I cannot get it to work on FortiGate.
Simple routing and firewall rules have been set up the same as pfsense and can see that the one firewall rule is beng used based on the bandwidth usage. When looking at foward traffic logs it seems that some traffic is getting through fine but the majority of traffic does not seem to be accepted as is mostly droppped.
I have tried the following so far;
Looking at forward traffic it seems that traffic that is having issues is the following
Duration | 5 |
Session ID | 63,877 |
VDOM | root |
NAT Translation | noop |
Source | 16.0.0.14 |
Source Port | 5,796 |
Source Country/Region | United States |
Primary Source Mac | 00:0c:29:93:42:f3 |
Source Interface |
port1 |
Destination | 48.0.7.7 |
Destination Port | 80 |
Destination Country/Region | United States |
Destination Interface |
port2 |
Application Name | HTTP |
Category | unscanned |
Protocol | 6 |
Service | HTTP |
Received Bytes | 33.02 kB |
Received Packets | 23 |
Sent Bytes | 813 B |
Sent Packets | 14 |
Action | client-rst |
Security Action | |
Policy ID | 0to1 |
Policy UUID | 57417294-aca1-51ed-d32e-e59d083a0abd |
Policy Type | Firewall |
Level | notice |
Service | HTTP |
Log event original timestamp | 1676410894150044700 |
Timezone | +0000 |
Log ID | 0000000013 |
Type | traffic |
Sub Type | forward |
Source Interface Role | wan |
Destination Interface Role | lan |
Policy Name | 0to1 |
Source Server | 0 |
Ive tested a few different combinations of guest os types and still gettng same result not matter what the test speed is
When i enable NAT in the firewall rules then TREX report packet loss straight away but forward log show all as accepted rather than being blank like it is with NAT turned off.
5
3
Above is a few of the debug packets for address 16.0.0.1 when starting load test if this provides any aditional information
Definatly some sort of issue with FortiGate. Ive gone through may settings combinations over the last 7 days, even tried on an older version of FortiGate and always the same result. Works for about 10 seconds then packet loss. With the Forward traffic result column empty, client rst packet drop is the only thing I can identify as a potential issue. Have tried both set timeout-send-rst enable and set timeout-send-rst disable
It should be simple enough, set up interface IP's, set up routing, set up firewall rules. I have tried this with SonicWall and it works perfectly first time.
Im just at a total loss for anything to try next as I am unable to resolve after days of research and going through different settings.
If anyone has any other sugestions on what could be wrong i my setup I'd be increadable greatful.
Cheers
Can you disable the offloading in the firewall policy and check?
config firewall policy
edit x
set auto-asic-offload disable
Also, share the output of the session table after initiating the traffic, with the address list output.
diag sys session filter src <source IP address>
diag sys session list
diag ip address list
Same result sadly. The output seems to be the same for src ip 11.11.11.10 and 16.0.0.1
This is the TREX output, 0.00Mbps drop-rate until exactly 10 seconds
Hi Vishal,
The forward traffic results are still blank for most of the logs in the result column with most packets having this entry
Received Bytes | 33.02 kB |
Received Packets | 23 |
Sent Bytes | 813 B |
Sent Packets | 14 |
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.