Good afternoon. I am not a networking guru, so I hope ask these questions in the correct manner. I have a port that I want open and forwarding to a specific client machine. I have gone through and done the VIP, VIP Group and entered the policy. Everything seems good according to what I read in the cookbook. Running v4.0 MR3 Patch 12.
When I do an external port test, I get a time out error, and that the port is not available. Subscriptions are not up to date. Am I missing something to open this specific port? Lets say it is port 4080. Is there a specific area in the panel that I need to specifically open that port before port forwarding will even work, or is the set up of port forwarding essentially opening that port?
I just know there is also the Services\Custom set up, and I have done nothing in that area...
Help is deeply appreciated.
Solved! Go to Solution.
hi,
if you've set up the VIP correctly and use it in a policy 'wan' -> 'internal' it should just work. If you post your config (' config firewall vip' and 'config firewall policy', only the relevant parts) I'll check it for you.
Having no subscription is a pity as the AV signatures will be not old but ancient. But that won't prevent the firewalling from working.
One thing, though hard to do without a current contract: upgrade from v4.3.12 to the latest v4.3.18. v4.3 is very mature and stable in the latest patches, not sure which quirks patch 12 had. Just in case you've got access to the firmware.
thegreatwhay wrote:
When I do an external port test, I get a time out error, and that the port is not available.
What type of external test are you performing, if I may ask? For example, if the port forward is for HTTP, then only HTTP will work. A PING test will always fail. Also, in the policy, the service needs to be the native service for the server's IP port, not the presented external VIP port. (80 in my prior example, not 4080)
Hope that all helps
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
hi,
if you've set up the VIP correctly and use it in a policy 'wan' -> 'internal' it should just work. If you post your config (' config firewall vip' and 'config firewall policy', only the relevant parts) I'll check it for you.
Having no subscription is a pity as the AV signatures will be not old but ancient. But that won't prevent the firewalling from working.
One thing, though hard to do without a current contract: upgrade from v4.3.12 to the latest v4.3.18. v4.3 is very mature and stable in the latest patches, not sure which quirks patch 12 had. Just in case you've got access to the firmware.
Ede,
Thank you for your reply. You are indeed correct, the settings ended up being correct. Because I am new at reading packet information and certainly green when it comes to diagnosing firewalls, I was not confident in what I found. I had a friend come by last night who was able to show me some things and actually found that despite the ports being open on the firewall of the specific server that I was forwarding to, the packets were being dropped. Turned off the firewall on that specific server, and everything worked fine.
Now to figure out what is causing that!
Bob,
I was using an externally hosted telnet service to test ports. But your information is still helpful. Thank you for sharing with me the points that you did.
Another time saving tip. Always try it from the same subnet first. If it won't work there, it won't work from anywhere.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
thegreatwhay wrote:
When I do an external port test, I get a time out error, and that the port is not available.
What type of external test are you performing, if I may ask? For example, if the port forward is for HTTP, then only HTTP will work. A PING test will always fail. Also, in the policy, the service needs to be the native service for the server's IP port, not the presented external VIP port. (80 in my prior example, not 4080)
Hope that all helps
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Hi and good day,
Currently i am working on port forwarding for fortigate 1000D v5.2.4. We have codian MCU for video conferencing (internal server) and all i need to do is to let the public user access to one public ip instead of the internal ip. So, the port forwarding might be the solution to work on that. Already gone through all the step shown on the youtube and cookbook but however, when i try to access thru http, I got a time out error,even with the icmp also got request timed out. I have done the configuration shown as below:
Add virtual Ips:
Name: server-http
interface: wan1
external ip addrs/range: 1.2.3.4 - 1.2.3.4
mapped ip addrs/range: 192.16.1.100 - 192.16.1.100
port forwarding:
Protocol: tcp
External service port: 80 - 80
Map to port: 80-80
*also do the same for icmp
*Put in the Virtual IP Group name webserver
Policy IPV4:
Incoming interface: wan1
source address: all
outgoing interface: lan
destination interface: webserver
schedule: always
service: http & icmp
Action: Accept
Firewall/Network Option: NAT
Logging options: Log allowed traffic All session
I really hope someone can figure out how to solve this problem. Thank you in advance.
@Sophea
Please start your own post as opposed to hijacking a current one. Your requirements and parameters are different from those of the OP, and you will lack the exposure you want if you tag along at the end of a mature post.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
What is this that so many posts pop up about NAT these days...it's one of the most solid features of a FGT.
@sophea89:
Config looks OK. There are many ways you can proceed from here.
1- disable port forwarding. Actually, you don't need it as you don't translate the port and you block anything except HTTP in the service field. Removing port forwarding will automatically allow you to test the VIP via ping.
A VIP for ICMP or ping is superflous then (you probably set it up for testing).
2- In the CLI, 'diag debug flow' is your friend. Please search the forums for 'debug flow' from user 'emnoc' to get a zillion writeups of how to use it. The debug output will show where the traffic comes in, whether it is translated and where it exits, or why it is dropped.
@thegreatwhay:
Same for you, 'diag deb flow'. One idea, make sure you have a route back to the ingress interface, probably a default route. Otherwise, traffic of 'unknown' origin is dropped silently by the FGT.
Try this:
sophea89 wrote:Yours:
Policy IPV4: Incoming interface: wan1 source address: all outgoing interface: lan destination interface: webserver schedule: always service: http & icmp Action: Accept Firewall/Network Option: NAT Logging options: Log allowed traffic All session Probable fix:
Policy IPV4:
Incoming interface: wan1 source address: all outgoing interface: lan destination address: server-http schedule: always service: http & icmp Action: Accept Firewall/Network Option: NAT Logging options: Log allowed traffic All session
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.