Hi, having a strange issue on a basic setup...
Basic setup
site HQ: Fortigate 100F R7.4.1. Internal IP 192.168.17.252/24
site X: Fortigate 60F R7.4.1. Internal IP 10.254.28.1/24
site Y,Z, ...: Fortigate 60F R7.4.1. Other subnets (so, no overlaps)
site HQ
site X
Behavior I see
Strange thing, I had this issue with 3 of 4 remote sites.
I tried giving a different IP (or adding a secondary IP) to SiteY and for some IP's the problem is resolved (so https, ssh, ... work). When reverting back to the original situation, so SiteY has only 1 IP (the original one), it kept working.
So, in short... Ping works. SSH, https, ... do not. I see the packet is received at the correct site, but the return traffic is using the wrong tunnel.
Workaroud = the static route on SiteX, instead of pointing to the SDWAN zone I have to point to tnl1_HQ + tnl2_HQ
I'm not really sur if this i a know issue in R7.4.1 (there are similar issues in the doc, ex bug id 961796 - they are related to an incorrect routing of the response packet).
Some relevant code & diag debug output.
ps. for this post, I changed the names to tnl1_HQ, tnl1_siteX, ... (in real life it's using a different name - I tried to replace the info in the code below) - if it's too confusing I'll change my post.
I checked the policies, routes, ... via GUI (visual + using the policy+route lookup buttons) + CLI. They seem fine (this is a setup I'm using for multiple clients, so I know what has to be configured).
HQ
config router static
edit 4
set dst 10.254.28.0 255.255.255.0
set distance 1
set device "tnl1_SiteX"
set comment "SiteX: LAN"
next
end
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
edit "Internet"
next
edit "RemoteSites"
next
end
config members
edit 1
set interface "wan1"
set zone "Internet"
next
edit 2
set interface "tnl1_Genk"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 3
set interface "tnl2_Genk"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 4
set interface "tnl1_Korten"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 7
set interface "tnl2_Korten"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 6
set interface "tnl1_Neeroet"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 8
set interface "tnl2_Neeroet"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 9
set interface "tnl1_siteX"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 10
set interface "tnl2_siteX"
set zone "RemoteSites"
set source 192.168.17.252
next
edit 11
set interface "wan2"
set zone "Internet"
set gateway 89.41.54.158
next
edit 5
set source 192.168.17.252
next
end
config health-check
edit "SLA_Genk"
set server "10.254.30.1"
set update-static-route disable
set members 2 3
next
edit "SLA_Ravels"
set server "10.254.28.1"
set update-static-route disable
set members 9 10
next
edit "SLA_Kortenaken"
set server "192.168.16.252"
set update-static-route disable
set members 4 7
next
edit "SLA_Internet"
set server "8.8.8.8" "1.1.1.1"
set members 1 11
next
edit "SLA_Neeroeteren"
set server "10.254.25.1"
set update-static-route disable
set members 6 8
next
end
config service
edit 1
set name "Genk"
set dst "LAN_Genk"
set src "LAN_Tessenderlo" "SSLVPN_Tessenderlo"
set priority-members 2 3
next
edit 2
set name "Neeroeteren"
set dst "LAN_Neeroeteren"
set src "LAN_Tessenderlo" "SSLVPN_Tessenderlo"
set priority-members 6 8
next
edit 3
set name "siteX"
set dst "LANsiteX" "test"
set src "HQ" "SSLVPN_HQ-VPN"
set priority-members 9 10
next
edit 4
set name "Kortenaken"
set dst "LAN_Kortaken"
set src "LAN_Tessenderlo" "SSLVPN_Tessenderlo"
set priority-members 4 7
next
edit 5
set name "Guest_2_Internet"
set dst "all"
set src "Guest_Tessenerlo"
set priority-members 11 1
next
edit 6
set name "Internet"
set dst "all"
set src "all"
set priority-members 1 11
next
end
end
site X
config router static
edit 8
set dst 10.212.130.0 255.255.255.0
set distance 1
set comment "HQ: SSLVPN BKM"
set sdwan-zone "RemoteSites"
next
end
config system sdwan
set status enable
config zone
edit "virtual-wan-link"
next
edit "Internet"
next
edit "RemoteSites"
next
end
config members
edit 1
set interface "wan1"
set zone "Internet"
set gateway 89.41.54.166
next
edit 2
set interface "tnl1_HQ"
set zone "RemoteSites"
set source 10.254.28.1
next
edit 3
set interface "tnl2_HQ"
set zone "RemoteSites"
set source 10.254.28.1
next
edit 4
set interface "tnl1_Korten"
set zone "RemoteSites"
set source 10.254.28.1
next
edit 5
set interface "tnl1_Neeroet"
set zone "RemoteSites"
set source 10.254.28.1
next
edit 6
set interface "tnl1_Genk"
set zone "RemoteSites"
set source 10.254.28.1
next
end
config health-check
edit "SLA_Tessenderlo"
set server "192.168.17.252"
set update-static-route disable
set members 2 3
next
edit "SLA_Genk"
set server "10.254.30.250" "10.254.30.1"
set update-static-route disable
set members 6
next
edit "SLA_Neeroeteren"
set server "10.254.25.250" "10.254.25.1"
set update-static-route disable
set members 5
next
edit "SLA_Kortenaken"
set server "192.168.16.1" "192.168.16.252"
set update-static-route disable
set members 4
next
edit "SLA_Internet"
set server "8.8.8.8" "1.1.1.1"
set update-static-route disable
set members 1
next
end
config service
edit 1
set name "Genk"
set dst "LAN_Genk"
set src "LAN_Ravels"
set priority-members 6
next
edit 2
set name "Neeroeteren"
set dst "LAN_Neeroeteren"
set src "LAN_Ravels"
set priority-members 5
next
edit 3
set name "Kortenaken"
set dst "LAN_Kortenaken"
set src "LAN_Ravels"
set priority-members 4
next
edit 4
set name "HQ"
set dst "LAN_HQ" "Servers_Tessenderlo" "SSLVPN_HQ"
set src "LAN_siteX"
set priority-members 2 3
next
edit 5
set name "Internet"
set dst "all"
set src "all"
set priority-members 1
next
end
end
TUBRAVFW01 (sdwan) #
Diag debug on siteX of ssh that's going wrong
id 221 = the packet arriving (from tnl1_Tessend => I'm using tnl1_HQ in this explanation)
id 222 = the returning packet (going to 10.212.130.1, but using tnl1_Neeroet... = the wrong tunnel)
TUBRAVFW01 # diag debug flow filter addr 10.212.130.1
TUBRAVFW01 # diagnose debug flow trace start 100
TUBRAVFW01 # di deb en
TUBRAVFW01 # id=65308 trace_id=221 func=print_pkt_detail line=5832 msg="vd-root:0 received a packet(proto=6, 10.212.130.1:59596->10.254.28.1:22) tun_id=81.241.240.192 from tnl1_Tessend. flag [S], seq 2972104827, ack 0, win 64896"
id=65308 trace_id=221 func=init_ip_session_common line=6017 msg="allocate a new session-000080ff, tun_id=81.241.240.192"
id=65308 trace_id=221 func=vf_ip_route_input_common line=2611 msg="find a route: flag=80000000 gw-10.254.28.1 via root"
id=65308 trace_id=221 func=__iprope_tree_check line=539 msg="gnum-100004, use addr/intf hash, len=3"
id=65308 trace_id=222 func=print_pkt_detail line=5832 msg="vd-root:0 received a packet(proto=6, 10.254.28.1:22->10.212.130.1:59596) tun_id=0.0.0.0 from local. flag [S.], seq 1642619526, ack 2972104828, win 65535"
id=65308 trace_id=222 func=resolve_ip_tuple_fast line=5920 msg="Find an existing session, id-000080ff, reply direction"
id=65308 trace_id=222 func=ip_session_core_in line=6549 msg="dir-1, tun_id=81.241.240.192"
id=65308 trace_id=222 func=ipsecdev_hard_start_xmit line=669 msg="enter IPSec interface tnl1_Neeroet, tun_id=81.241.240.192"
id=65308 trace_id=222 func=_do_ipsecdev_hard_start_xmit line=229 msg="output to IPSec tunnel tnl1_Neeroet, tun_id=89.41.54.169, vrf 0"
id=65308 trace_id=222 func=esp_output4 line=896 msg="IPsec encrypt/auth"
id=65308 trace_id=222 func=ipsec_output_finish line=629 msg="send to 89.41.54.166 via intf-wan1"
Diag debug on SiteX of ping (which works fine)
id 230 = ping arriving to siteX (from tnl1_Tessend => I'm using tnl1_HQ in this explanation)
id 231 = reply going to HQ (sent back via tnl1_Tessend = tnl1_HQ)
TUBRAVFW01 # diag debug flow filter addr 10.212.130.1
TUBRAVFW01 # diagnose debug flow trace start 100
TUBRAVFW01 # di deb en
TUBRAVFW01 # id=65308 trace_id=230 func=print_pkt_detail line=5832 msg="vd-root:0 received a packet(proto=1, 10.212.130.1:1->10.254.28.1:2048) tun_id=81.241.240.192 from tnl1_Tessend. type=8, code=0, id=1, seq=86."
id=65308 trace_id=230 func=init_ip_session_common line=6017 msg="allocate a new session-0000850f, tun_id=81.241.240.192"
id=65308 trace_id=230 func=vf_ip_route_input_common line=2611 msg="find a route: flag=80000000 gw-10.254.28.1 via root"
id=65308 trace_id=230 func=__iprope_tree_check line=539 msg="gnum-100004, use addr/intf hash, len=3"
id=65308 trace_id=231 func=print_pkt_detail line=5832 msg="vd-root:0 received a packet(proto=1, 10.254.28.1:1->10.212.130.1:0) tun_id=0.0.0.0 from local. type=0, code=0, id=1, seq=86."
id=65308 trace_id=231 func=resolve_ip_tuple_fast line=5920 msg="Find an existing session, id-0000850f, reply direction"
id=65308 trace_id=231 func=ip_session_core_in line=6549 msg="dir-1, tun_id=81.241.240.192"
id=65308 trace_id=231 func=ipsecdev_hard_start_xmit line=669 msg="enter IPSec interface tnl1_Tessend, tun_id=81.241.240.192"
id=65308 trace_id=231 func=_do_ipsecdev_hard_start_xmit line=229 msg="output to IPSec tunnel tnl1_Tessend, tun_id=81.241.240.192, vrf 0"
id=65308 trace_id=231 func=esp_output4 line=896 msg="IPsec encrypt/auth"
id=65308 trace_id=231 func=ipsec_output_finish line=629 msg="send to 89.41.54.166 via intf-wan1"
routes on HQ
10.254.28.0 shows all the tunnels (tnl1_Ravels + tnl2_Ravels are the tnl1_X I refer too). There is no more specific route defined for this subnet
TUBTESFW01-NEW # get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
V - BGP VPNv4
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [1/0] via 89.41.54.158, wan2, [1/0]
[1/0] via 192.168.128.1, wan1, [1/0]
S 3.124.165.251/32 [10/0] via 192.168.17.1, lan, [1/0]
S 10.254.25.0/24 [1/0] via tnl1_Neeroet tunnel 89.41.54.169, [1/0]
S 10.254.28.0/24 [1/0] via tnl2_Ravels tunnel 10.0.0.4, [1/0]
[1/0] via tnl1_Ravels tunnel 89.41.54.165, [1/0]
[1/0] via 192.168.17.1, lan, [1/0]
routes on site X
10.212.130.0/24 via all the tunnels (tnl1_Tessend + tnl2_Tessend are the tnl1_HQ + tnl2_HQ I refer to in this post)
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
V - BGP VPNv4
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [1/0] via 89.41.54.166, wan1, [1/0]
S 3.124.165.251/32 [10/0] via 10.254.28.250, internal, [1/0]
S 10.212.130.0/24 [1/0] via tnl1_Tessend tunnel 81.241.240.192, [1/0]
[1/0] via tnl1_Genk tunnel 81.241.240.193, [1/0]
[1/0] via tnl2_Tessend tunnel 89.41.54.157, [1/0]
[1/0] via tnl1_Neeroet tunnel 89.41.54.169, [1/0]
[1/0] via tnl1_Korten tunnel 89.41.54.173, [1/0]
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello
Is there any related policy route on siteX?
Also please share the following commands:
For SiteX, the only policy routes are the SDWAN rules. the output is below.
The relevant line is id=2131361796, with 10.212.130.0 - .255 as destination
Auxiliary-session is disabled (but tried with enabling it before)
TUBRAVFW01 # get firewall proute
list route policy info(vf=root):
id=2131361793(0x7f0a0001) vwl_service=1(Genk) vwl_mbr_seq=6 dscp_tag=0xfc 0xfc flags=0x0 tos=0x00 tos_mask=0x00 protocol=0 port=src(0->0):dst(0->0) iif=0(any)
path(1): oif=26(tnl1_Genk)
source(1): 10.254.28.0-10.254.28.255
destination(1): 10.254.30.0-10.254.30.255
hit_count=68649 last_used=2023-11-24 09:20:07
id=2131361794(0x7f0a0002) vwl_service=2(Neeroeteren) vwl_mbr_seq=5 dscp_tag=0xfc 0xfc flags=0x0 tos=0x00 tos_mask=0x00 protocol=0 port=src(0->0):dst(0->0) iif=0(any)
path(1): oif=27(tnl1_Neeroet)
source(1): 10.254.28.0-10.254.28.255
destination(1): 10.254.25.0-10.254.25.255
hit_count=67911 last_used=2023-11-24 09:20:07
id=2131361795(0x7f0a0003) vwl_service=3(Kortenaken) vwl_mbr_seq=4 dscp_tag=0xfc 0xfc flags=0x0 tos=0x00 tos_mask=0x00 protocol=0 port=src(0->0):dst(0->0) iif=0(any)
path(1): oif=28(tnl1_Korten)
source(1): 10.254.28.0-10.254.28.255
destination(1): 192.168.16.0-192.168.16.255
hit_count=68631 last_used=2023-11-24 09:20:07
id=2131361796(0x7f0a0004) vwl_service=4(Tessenderlo) vwl_mbr_seq=2 3 dscp_tag=0xfc 0xfc flags=0x0 tos=0x00 tos_mask=0x00 protocol=0 port=src(0->0):dst(0->0) iif=0(any)
path(2): oif=24(tnl1_Tessend), oif=25(tnl2_Tessend)
source(1): 10.254.28.0-10.254.28.255
destination(4):
192.168.21.0-192.168.21.255
10.212.130.0-10.212.130.255
192.168.50.0-192.168.50.255
192.168.17.0-192.168.17.255
hit_count=6000 last_used=2023-11-24 09:20:07
id=2131361797(0x7f0a0005) vwl_service=5(Internet) vwl_mbr_seq=1 dscp_tag=0xfc 0xfc flags=0x0 tos=0x00 tos_mask=0x00 protocol=0 port=src(0->0):dst(0->0) iif=0(any)
path(1): oif=5(wan1)
source(1): 0.0.0.0-255.255.255.255
destination(1): 0.0.0.0-255.255.255.255
hit_count=87566 last_used=2023-11-24 09:20:10
TUBRAVFW01 # get sys settings | grep asymroute
asymroute : disable
asymroute-icmp : disable
asymroute6 : disable
asymroute6-icmp : disable
TUBRAVFW01 # get sys settings | grep auxiliary
auxiliary-session : disable
TUBRAVFW01 #
ps. I realize all the outputs are maybe confusing due to other IPSEC tunnels (different naming, ...). I'm going to make a similar setup in our lab environment so I can minimize the code...
Hello POMA,
>I'm not really sur if this i a know issue in R7.4.1 (there are similar issues in the doc, ex bug id 961796 - they are related to an incorrect routing of the response packet).
Most likely you are indeed matching the internal ticket you mentioned. The setup is very similar to other setups linked to that internal ticket and basically, the issue is related to the incorrect routing of response packet when activating HTTPS access on a SDWAN member interface.
The internal ticket is still under investigation and we can not share more information regarding it since it is internal information.
Feel free to open a ticket in case you have a valid support contract for your devices.
Thank you for sharing your issue and the workarounds you have found.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1663 | |
1077 | |
752 | |
446 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.