Dear,
I have a FortiGate 300C recently started blocking access to work normally. My route points to the VPN an the tunnel is up. The policy is ok.
Strangely this connection stopped working and when I try to connect it does not match the policy.
The log I'm having is this:
id=20085 trace_id=4875 func=print_pkt_detail line=4469 msg="vd-root received a packet(proto=6, 10.10.10.10:63117->11.11.11.11:9160) from my_interface. flag, seq 2788299880, ack 0, win 8192"
id=20085 trace_id=4875 func=init_ip_session_common line=4620 msg="allocate a new session-7bd3977e"
id=20085 trace_id=4875 func=fw_local_in_handler line=385 msg="iprope_in_check() check failed on policy 0, drop"
Any idea?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Most like uRPF checks. Are you sure the ingress interface is correct for that route and traffic-flow?
Ken
PCNSE
NSE
StrongSwan
emnoc wrote:Yes, I'm sure. This problem started before I had made no intervention in this flow.Most like uRPF checks. Are you sure the ingress interface is correct for that route and traffic-flow?
Ken
Well, I managed to get on the solution to this problem. I had created a virtual IP that would meet a new connectivity and it was the cause of my problems, even if not linked to any policy. That's because there was already an object using the same IP that I created. I'm not sure, but it seems I made the firewall did not understand what I wanted to do (would use the VIP or object).
Anyway ... just after deleting this VIP connectivities that used VPN normalized.
Background: when you create a VIP, the FGT will proxy arp for that address - even if it's not (yet) used in a policy. It's not just a NAT rule.
If there is no policy traffic will be denied. That's what you saw.
ede_pfau wrote:Background: when you create a VIP, the FGT will proxy arp for that address - even if it's not (yet) used in a policy. It's not just a NAT rule.
If there is no policy traffic will be denied. That's what you saw.
Thank you for the explanation!
Created on 05-18-2022 04:20 PM Edited on 05-18-2022 04:21 PM
You can control whether or not Fortigate sends out arp replies for the original IP in the VIP with this in case you need the VIP. but not the arp replies.
fortigate documentation below.
# config firewall vip
edit <name>
set arp-reply disable (default: enable)
next
end
Hi
i have the same error . Using an external public VIP which isnt part of the fortigate interface IP
find a routeind a route: flag=80000000 gw-196.x.x.x via root" id=20085 trace_id=819 func=fw_local_in_handler line=394 msg="iprope_in_check() check failed on policy 0, drop" id=20085 trace_id=819 func=fw_local_in_handler line=394 msg="iprope_in_check() check failed on policy 0, drop"
"iprope_in_check() check failed on policy 0" means that the destination IP address is seen as local/belonging to the FGT and FOS will look through the iprope_in tables.
An ippool adress belongs to the FGT if arp-reply is enabled
If you use vip, you should look if the mapped iP address is not configured somewhere in a ippool for example
Thanks for the reply . Just for clarity below is my design
client to VIP 197.x.x.147(ISP allocated IP) port 3319 mapped to 192.168.X.13 (webserver) 3319
Interface to internet where the client is coming 196.23.X.249/30
Interface to the webserver farm 192.168.x.1/24
by overlap , do you mean webserver subnet?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.