Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
birillo
New Contributor

issue sending backup to ftp server

Hi,

I'm trying to schedule a full-config backup, from a 40F to a ftp server visible on vpn s2s.

 

using this command:

execute backup full-config ftp '/xxx/FGT_%%date%%.txt' 10.3.64.113 user pwd

 

I receive this output:

"Send config file to ftp server via vdom root failed."

 

ping from fgt to the server not working, so I did a packet capture for destination ip 10.3.64.113 and I found that the Fortigate use, by default, the wan interface, but in this case that port is disabled and I'm using A port as a Wan port.

 

what can i do to route the backup procedure correctly via vpn s2s using the correct tunnel-interface?

11 REPLIES 11
dingjerry_FTNT

Hi @birillo ,

 

How does your routing table look like?  Do you have a routing entry for 10.3.64.113 pointing to the IPSec VPN tunnel?  If the VPN is interface based, do you have IP address assigned to it?

 

So for further troubleshooting, better to provide the FGT config and routing table outputs and the name of the IPSec VPN if you have multiple VPNs.

 

 

Regards,

Jerry
birillo
New Contributor

Hi @dingjerry_FTNT 

 

the configuration is quite basic, I have several firewalls

in vpn all with the same problem.

the routing table has only the 2 classic routes, one to go out on the internet and one for traffic to the "hq" headquarters with subnet 10.0.0.0/8 via vpn tunnel.

 

execute ping 10.3.64.113      (system uses the wan port disabled) 

Source IP217.59.xx.xx
Destination IP10.3.64.113

5 packets transmitted, 0 packets received, 100% packet loss

 

execute ping 8.8.8.8              (system uses A port that is the actual wan) 

Source IP185.208.xx.xx
Destination IP8.8.8.8

64 bytes from 8.8.8.8: icmp_seq=4 ttl=118 time=7.8 ms

 

so I tried with "execute ping-options source 10.3.84.254"  (firewall lan1 ip)

64 bytes from 10.3.64.113: icmp_seq=0 ttl=126 time=23.4 ms

 

and trying "execute backup full-config ftp '/xxx/FGT_%%date%%.txt' 10.3.64.113 user pwd"

Source IP217.59.34.22
Source Port20091
Destination IP10.3.64.113
Destination Port21
ProtocolTCP

 

do you still need the config?

dingjerry_FTNT

Yes, I still need the config.

 

It seems that you did not assign an IP to your IPSec VPN interface if your VPN is interface based.

Regards,

Jerry
birillo

Thanks @dingjerry_FTNT 

 

I have always set phase 2 of the tunnel with the address 0.0.0.0/0.0.0.0 and in fact the problem is exactly this.
set the correct subnets and now the firewall knows how to reach the destination

birillo
New Contributor

@dingjerry_FTNT 

problem not solved, It worked to one tunnel only.

I also tried to set ip to tunnel interface on both side.

 

How can I show you the configuration in a safe mode?

 

 

sw2090
SuperUser
SuperUser

I have a load of IPSEC VPNs that have phase2 with selectors on 0.0.0.0/0.0.0.0 and they work fine.

They're all in interface mode and I never assigned an ip to the vpn interface.

All I needed to do was to create some policy for the traffic I need to go over the vpn and also some static route for subnets behind the other side of the VPN  (and of course vice versa).

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
birillo
New Contributor

exactly like my setup. policy and routes are ok.

Hosts under lan interface can reach destination with no problem.

If I use fortigate cli and I try to ping the same destination under vpn tunnel, fortigate uses its own wan interfaces (also a wan port actualy disabled)

 

edit 4
set name "vpn SF>TG"
set uuid 2983524e-5319-51ea-8c87-211b2d99a8af
set srcintf "lan"
set dstintf "VPN-SF-HQ"
set srcaddr "SF_NET"
set dstaddr "NET_TG_HQ" "NET_TSS_HQ"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
next


edit 5
set name "vpn TG>SF"
set uuid 298f6d86-5319-51ea-e810-f4dfed618f36
set srcintf "VPN-SF-HQ"
set dstintf "lan"
set srcaddr "NET_TG_HQ" "NET_TSS_HQ"
set dstaddr "SF_NET"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all

 

S* 0.0.0.0/0 [1/0] via 81.174.0.21, ppp1
[1/0] via 192.168.40.252, lan4
S 10.3.0.0/16 [10/0] is directly connected, VPN-SF-HQ
C 81.174.x.x/32 is directly connected, ppp1
C 84.33.x.x/32 is directly connected, ppp1
C 192.168.40.0/24 is directly connected, lan4
C 192.168.134.0/24 is directly connected, lan

dingjerry_FTNT

Hi @birillo ,

 

Could you please share the info of this command?

 

show system interface "VPN-SF-HQ"

 

You may mask any sensitive info.

 

Please also let me know what IP you tried to ping with the issue.

Regards,

Jerry
birillo

show system interface "VPN-SF-HQ"
config system interface
edit "VPN-SF-HQ"
set vdom "root"
set ip 0.0.0.0 255.255.255.255
set type tunnel
set snmp-index 5
set interface "wan"
next
end

 

get router info routing-table all | grep VPN-SF-HQ
S 10.3.0.0/16 [10/0] is directly connected, VPN-SF-HQ

 

issue with every ip under 10.3.64.0/23 (I need to reach 10.3.64.113)

 

info from diagnose pcap

2 1.008408 192.168.40.248 10.3.64.113 ICMP 84 Echo (ping) request id=0x0593, seq=1/256, ttl=64 (no response found!)

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors