Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
FrankCQI
New Contributor

iprope_in_check failed, drop

Hi, we have a fortigate 60D. I have an access point who must report to a wireless controller on another subnet going through the fortigate. Route are OK as other devices can route traffic just fine between the 2 subnet. It seems the broadcast from the access point to discover the wireless controller are blocked... Here is the result of the debug trace : id=13 trace_id=200 msg=" vd-root received a packet(proto=17, 172.25.18.206:38212->255.255.255.255:38212) from internal." id=13 trace_id=200 msg=" allocate a new session-00000663" id=13 trace_id=200 msg=" iprope_in_check() check failed, drop" Why is it blocked? How Can I allow that traffic? Both subnet are reachable via the " internal" interface of the fortigate.
Frank
Frank
20 REPLIES 20
emnoc
Esteemed Contributor III

No socket found. Drop
What type of device and how many sessions do you normally have ? My 1st guess is ephermal port exhaustation but you can check this via the cli; diag sys session stat | grep ephemera Also look at your total session counts in the 1st line & pay attention to the lash counter. next question have you custom tuned or adjusted any TTL values for the firewall sessions?

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
FrankCQI
New Contributor

I edited my previous post, that error message is not received anymore. Out of curiosity I ran the command you gave me : memory_tension_drop=0 ephemeral=0/61440 removeable=0 ha_scan=0 No custom TTL.
Frank
Frank
emnoc
Esteemed Contributor III

d=13 trace_id=200 msg=" iprope_in_check() check failed, drop"
What do you have allow under that interface " internal" ; e.g show sys interface internal You need to probably allow CAPWAP if I had to guess. I would double check the interface and the set allowaccess command

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
FrankCQI
New Contributor

Here is the result of the command, seems CAPWAP is allowed : show sys interface internal config system interface edit " internal" set vdom " root" set ip 172.25.18.139 255.255.255.0 set allowaccess ping https ssh http fgfm capwap set type physical set alias " XXXXX" set snmp-index 1 next end
Frank
Frank
ShrewLWD
Contributor

sounds like you need to enable ' set broadcast-forward enable' to allow that chatter to pass.
emnoc
Esteemed Contributor III

FWIW
172.25.18.206:38212->255.255.255.255:38212
That a local broadcast and properly with a TTL=1, so forwarding that would not help imho .

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
Carl_Wallmark
Valued Contributor

If the FAP is on another subnet other than the Fortigate, you have two options: 1. Set the IP of the Fortigate in the FAP itself, you can use http://<ip of FAP> to login if you dont want to use the CLI 2. Configure DHCP-options, there is a special dhcp-option which will pass the IP of the controller. For example: http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD33978&sliceId=1&docTypeID=DT_KCARTICLE_1_1&dialogID=61498781&stateId=0 0 61500094

FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C

FCNSA, FCNSP---FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30BFortiAnalyzer 100B, 100CFortiMail 100,100CFortiManager VMFortiAuthenticator VMFortiTokenFortiAP 220B/221B, 11C
ede_pfau
SuperUser
SuperUser

which will pass the IP to the controller
You probably mean " ...of the controller" . Isn' t it that an IP address in a DHCP option on a Fortigate has to be entered in hex? I remember there were threads about the TFTP server option some time ago where this was mentioned.
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
Carl_Wallmark
Valued Contributor

yeah, thats what I mean ;) Yep, it used to be in HEX, I dont know if its changed now, never use it.

FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C

FCNSA, FCNSP---FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30BFortiAnalyzer 100B, 100CFortiMail 100,100CFortiManager VMFortiAuthenticator VMFortiTokenFortiAP 220B/221B, 11C
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors