Hi Guys Hope this is the correct section to post in. We are testing a
fortigate VM64-AWS. We also have a mikrotik cloud hosted router in AWS
on EC2 as well within the same VPC and same subnet. I have done the
basic config but can't seem to pass traff...
for some reason the traffic is not reaching the fortigate. I tested this
with other instances as well other than fortigate and it is producing
the same results. I've redone all the route tables and VPCs/ subnets etc
without any luck. I decided to dit...
Yes, I have set the default route of the client to point to the
fortigate so all traffic should flow to the fortigate. Both the "client"
(cloud hosted router) and the fortigate are on the same VPC and same
subnet on AWS and I am able to ping the fort...
Hi, As I said, nothing happens when I do the debug flow for 8.8.8.8. If
I do it for the host 172.18.0.91 which is the source then I see the ping
between the host and the fortigate but if I do 8.8.8.8 I don't see
anything on the fortigate. cpt01f01 # ...
I have done all the commands but I don't see anything. If I do a packet
sniff on the LAN port I only see the ping from the router to the forti
and its reply but nothing else. cpt01f01 # diagnose sniffer packet port2
interfaces=[port2] filters=[none] ...
Hi PatelI already have the NAT rule in place. It is set up exactly as in
the cookbook. I've tried everything and I don't know what I am missing.
Not sure if it something on the AWS config that could be wrong? I've
disabled the security profiles and s...