Fortigate Troubleshooting 50
Fortigate Troubleshooting 50
Fortigate Troubleshooting 50
Technical Documentation
docs.fortinet.com
Knowledge Base
kb.fortinet.com
support.fortinet.com
Training Services
training.fortinet.com
FortiGuard
fortiguard.com
Document Feedback
techdocs@fortinet.com
Contents
Introduction........................................................................................................6
Before you begin....................................................................................................... 6
How this guide is organized...................................................................................... 6
Page 3
Page 4
FortiGuard troubleshooting..................................................................................... 54
Troubleshooting process for FortiGuard updates............................................. 54
FortiGuard server settings ................................................................................ 55
FortiGuard URL rating....................................................................................... 57
Index .................................................................................................................74
Page 5
Introduction
Welcome and thank you for selecting Fortinet products for your network protection.
This guide is intended for administrators who need guidance on different network needs and
information on basic and advanced troubleshooting.
This chapter contains the following topics:
Before you begin
How this guide is organized
Page 6
Life of a Packet
Directed by security policies, a FortiGate unit screens network traffic from the IP layer up
through the application layer of the TCP/IP stack. This chapter provides a general, high-level
description of what happens to a packet as it travels through a FortiGate security system.
The FortiGate unit performs three types of security inspection:
stateful inspection, that provides individual packet-based security within a basic session
state
flow-based inspection, that buffers packets and uses pattern matching to identify security
threats
proxy-based inspection, that reconstructs content passing through the FortiGate unit and
inspects the content for security threats.
Each inspection component plays a role in the processing of a packet as it traverses the
FortiGate unit in route to its destination. To understand these inspections is the first step to
understanding the flow of the packet.
This section contains the following topics:
Stateful inspection
Flow inspection
Proxy inspection
Comparison of inspection layers
FortiOS functions and security layers
Packet flow
Example 1: client/server connection
Example 2: Routing table update
Example 3: Dialup IPsec VPN with application control
Stateful inspection
With stateful inspection, the FortiGate unit looks at the first packet of a session to make a
security decision. Common fields inspected include TCP SYN and FIN flags to identity the start
and end of a session, the source/destination IP, source/destination port and protocol. Other
checks are also performed on the packed payload and sequence numbers to verify it as a valid
communication and that the data is not corrupted or poorly formed.
What makes it stateful is that one or both ends must save information about the session history
in order to communicate. In stateless communication, only independent requests and
responses are used, that do not depend on previous data. For example, UDP is stateless by
nature because it has no provision for reliability, ordering, or data integrity.
The FortiGate unit makes the decision to drop, pass or log a session based on what is found in
the first packet of the session. If the FortiGate unit decides to drop or block the first packet of a
session, then all subsequent packets in the same session are also dropped or blocked without
being inspected. If the FortiGate unit accepts the first packet of a session, then all subsequent
packets in the same session are also accepted without being inspected.
Page 7
What is a session?
A session is established on an existing connection, for a defined period of time, using a
determined type of communication or protocol. Sessions can have specific bandwidth , and
time to live (TTL) parameters.
You can compare a session to a conversation. A session is established when one end point
initiates a request by establishing a TCP connection on a particular port, the receiving end is
listening on that port, and replies. You could telnet to port 80 even though telnet normally uses
port 23, because at this level, the application being used cannot be determined.
However, the strong points of sessions and stateful protocols can also be their weak points.
Denial of service (DoS) attacks involve creating so many sessions that the connection state
information tables are full and the unit will not accept additional sessions.
Page 8
1
3
nt
Se et
ck
Pa
SY
N,
IP,
TC
1
P
2
3
1
3
ed
eiv t
c
Re cke
Pa
Flow inspection
With flow inspection (also called flow-based inspection), the FortiGate unit samples multiple
packets in a session and multiple sessions, and uses a pattern matching engine to determine
the kind of activity that the session is performing and to identify possible attacks or viruses. For
example, if application control is operating, flow inspection can sample network traffic and
identify the application that is generating the activity. Flow inspection using IPS samples
network traffic and determines if the traffic constitutes an attack. Flow inspection can also be
used for antivirus protection, web filtering, and data leak protection (DLP). Flow inspection
occurs as the data is passing from its source to its destination. Flow inspection identifies and
blocks security threats in real time as they are identified.
Figure 2: Flow inspection of packets through the FortiGate unit
IPS
,
Ap Flow
p C -AV
ont ,
rol
2
3
2
nt
Se et
ck
Pa
1
2
ed
eiv t
c
Re cke
Pa
Flow inspection typically requires less processing than proxy inspection, and therefore flow
antivirus, web filtering, and DLP inspection performance can be better than proxy inspection
performance. However, some threats can only be detected when a complete copy of the
payload (for example a complete email attachment) is obtained so, proxy inspection tends to be
more accurate and complete than flow inspection.
Page 9
Proxy inspection
Proxy inspection examines the content contained in content protocol sessions for security
threats. Content protocols include HTTP, FTP, and email protocols. Security threats can be
found in files and other content downloaded using these protocols. With proxy inspection, the
FortiGate unit downloads the entire payload of a content protocol session and re-constructs it.
For example, proxy inspection can reconstruct an email message and its attachments. After a
satisfactory inspection the FortiGate unit passes the content on to the client. If the proxy
inspection detects a security threat in the content, the content is removed from the
communication stream before it reaches its destination. For example, if proxy inspection
detects a virus in an email attachment, the attachment is removed from the email message
before its sent to the client. Proxy inspection is the most thorough inspection of all, although it
requires more processing power, and this may result in lower performance.
Figure 3: Proxy inspection of packets through the FortiGate unit
1
3
nt
Se et
ck
Pa
Em
a
filteil filter
r, D , we
LP, b
AV
3
2
1
3
ed
eiv t
c
Re cke
Pa
Feature
Stateful
Flow
first packet
low
medium
high
good
better
best
Authentication
yes
yes
Antivirus protection
yes
yes
Web Filtering
yes
yes
yes
yes
Page 10
Proxy
Feature
Stateful
Flow
Proxy
Application control
yes
IPS
yes
Delay in traffic
no
small
no
yes
Security Function
Stateful
Firewall
yes
IPsec VPN
yes
Traffic Shaping
yes
User Authentication
yes
Management Traffic
yes
SSL VPN
yes
Flow
Intrusion Prevention
yes
Antivirus
yes
Application Control
yes
Web filtering
yes
DLP
Proxy
yes
yes
yes
Email Filtering
yes
VoIP inspection
yes
yes
Packet flow
After the FortiGate units external interface receives a packet, the packet proceeds through a
number of steps on its way to the internal interface, traversing each of the inspection types,
depending on the security policy and security profile configuration. The diagram in Figure 4 on
page 12 is a high level view of the packets journey.
Page 11
The description following is a high-level description of these steps as a packet enters the
FortiGate unit towards its destination on the internal network. Similar steps occur for outbound
traffic.
1
2
Packet
Stateful
Inspection
Engine
DoS
Sensor
Session
Helpers
IP Integrity
Header checking
Management
Traffic
NAT
(DNAT)
IPsec
User
Authentication
SSL VPN
Traffic
Shaping
Routing
Session
Tracking
Policy
Lookup
No (Fast Path)
UTM
Yes
Additional
Proxy
Inspection
Required
No
IPS
Application
Control
Flow-based
Antivirus
Flow-based
Web Filter
Data Leak
Prevention
Email Filter
Web Filter
Antivirus
Flow-based
Inspection Engine
Yes
VoIP
Inspection
IPsec
NAT
(SNAT)
ICAP
3
Routing
Interface
Proxy-based
Inspection
Engine
1
2
Packet
Interface
Ingress packets are received by a FortiGate interface.The packet enters the system, and the
interface network device driver passes the packet to the Denial of Service (DoS) sensors, if
enabled, to determine whether this is a valid information request or not.
Page 12
DoS sensor
DoS scans are handled very early in the life of the packet to determine whether the traffic is
valid or is part of a DoS attack. Unlike signature-based IPS which inspects all the packets within
a certain traffic flow, the DoS module inspects all traffic flows but only tracks packets that can
be used for DoS attacks (for example TCP SYN packets), to ensure they are within the
permitted parameters. Suspected DoS attacks are blocked, other packets are allowed.
IPsec
If the packet is an IPsec packet, the IPsec engine attempts to decrypt it. The IPsec engine
applies the correct encryption keys to the IPsec packet and sends the unencrypted packet to
the next step. IPsec is bypassed when for non-IPsec traffic and for IPsec traffic that cannot be
decrypted by the FortiGate unit.
Routing
The routing step determines the outgoing interface to be used by the packet as it leaves the
FortiGate unit. In the previous step, the FortiGate unit determined the real destination address,
so it can now refer to its routing table and decide where the packet must go next.
Routing also distinguishes between local traffic and forwarded traffic and selects the source
and destination interfaces used by the security policy engine to accept or deny the packet.
Policy lookup
The policy look up is where the FortiGate unit reviews the list of security policies which govern
the flow of network traffic, from the first entry to the last, to find a match for the source and
destination IP addresses and port numbers. The decision to accept or deny a packet, after
being verified as a valid request within the stateful inspection, occurs here. A denied packet is
discarded. An accepted packet will have further actions taken. If IPS is enabled, the packet will
go to Flow-based inspection engine, otherwise it will go to the Proxy-based inspection engine.
Page 13
If no other security options are enabled, then the session was only subject to stateful
inspection. If the action is accept, the packet will go to Source NAT to be ready to leave the
FortiGate unit.
Session tracking
Part of the stateful inspection engine, session tracking maintains session tables that maintain
information about sessions that the stateful inspection module uses for maintaining sessions,
NAT, and other session related functions.
User authentication
User authentication added to security policies is handled by the stateful inspection engine,
which is why Firewall authentication is based on IP address. Authentication takes place after
policy lookup selects a security policy that includes authentication. This is also known as
identify-based policies. Authentication also takes place before security features are applied to
the packet.
Management traffic
This local traffic is delivered to the FortiGate unit TCP/IP stack and includes communication
with the web-based manager, the CLI, the FortiGuard network, log messages sent to
FortiAnalyzer or a remote syslog server, and so on. Management traffic is processed by
applications such as the web server which displays the FortiOS web-based manager, the SSH
server for the CLI or the FortiGuard server to handle local FortiGuard database updates or
FortiGuard Web Filtering URL lookups.
ICAP traffic
If you enable ICAP in a security policy, HTTP (and optionally HTTPS) traffic intercepted by the
policy is transferred to ICAP servers in the ICAP profile added to the policy. The FortiGate unit is
the surrogate, or middle-man, and carries the ICAP responses from the ICAP server to the
ICAP client; the ICAP client then responds back, and the FortiGate unit determines the action
that should be taken with these ICAP responses and requests.
Session helpers
Some protocols include information in the packet body (or payload) that must be analyzed to
successfully process sessions for this protocol. For example, the SIP VoIP protocol uses TCP
control packets with a standard destination port to set up SIP calls. To successfully process SIP
VoIP calls, FortiOS must be able to extract information from the body of the SIP packet and use
this information to allow the voice-carrying packets through the firewall.
FortiOS uses session helpers to analyze the data in the packet bodies of some protocols and
adjust the firewall to allow those protocols to send packets through the firewall.
Page 14
Once the packet has passed the flow-based engine, it can be sent to the proxy inspection
engine or egress.
IPsec
If the packet is transmitted through an IPsec tunnel, it is at this stage the encryption and
required encapsulation is performed. For non-IPsec traffic (TCP/UDP) this step is bypassed.
Routing
The final routing step determines the outgoing interface to be used by the packet as it leaves
the FortiGate unit.
Egress
Upon completion of the scanning at the IP level, the packet exits the FortiGate unit.
Page 15
Page 16
1
2
Interface
(Link layer)
Stateful
Policy
Engine
IP Integrity
Header checking
DoS
Sensor
Session
Tracking
Proxy
Inspection
Engine
FortiGate Unit
User
Authentication
NAT
(DNAT)
Policy
Lookup
Antivirus
Routing
FortiGuard
Web Filtering
Web Filter
FortiGuard
NAT
(SNAT)
Interface
(Link layer)
Routing
Proxy Inspection
Engine
Packet
Exits
Internet
Web Server
Antivirus
DoS
Sensor
NAT
(SNAT)
Session
Tracking
Interface
(Link layer)
IP Integrity
Header checking
Packet
Enters
Routing
Stateful Policy
Engine
Interface
(Link layer)
1
2
Page 17
1
2
Routing
update
packet
Packet
FortiGate Unit
Interface
(Link layer)
IP Integrity
Header checking
DoS
Sensor
Management
Traffic
Stateful
Policy
Engine
Routing
Module
Routing Table
Page 18
1
2
IPsec packet
received from
Internet
Encrypted or
encapsulated packet
FortiGate Unit
Interface
(Link layer)
IP Integrity
Header checking
DoS
Sensor
IPsec
NAT
Packet decryption
Application
Control
Next Hop
Route
Session
Tracking
IPS
Packet Exits
Source
NAT
Routing
Interface
(Link layer)
1
2
Internal
Server
Destintion
NAT
IP Integrity
Header checking
DoS
Sensor
Interface
(Link layer)
1
2
Response Packe
Packet Enters
Application
Control
Session
Tracking
IPS
Next Hop
Route
Routing
IPsec
Packet encryption
1
2
Packet
Exits and returns
to source
Encrypted or
encapsulated packet
Page 19
For example, if you want to add an admin profile that does not allow changing firewall policies,
when you configure the admin profile set Firewall Configuration to None or Ready Only.
Change the admin account name and limit access to this account
The default super_admin administrator account, admin, is a well known
administrator name so if this account is available it could be
easier for attackers to access the FortiGate unit because they know
they can log in with this name, only having to determine the
password. You can improve security by changing this name to one
more difficult for an attacker to guess.
To do this, create a new administrator account with the super_admin
admin profile and log in as that administrator. Then go to System >
Admin > Administrators and edit the admin administrator and change
the Administrator name.
Once the account has been renamed you could delete the super_admin
account that you just added. Consider also only using the
super-admin account for adding or changing administrators. The
less this account is used to less likely that it could be
compromised. You could also store the account name and password for
this account in a secure location in case for some reason the
account name or password is forgotten.
Page 21
Page 22
The time-out can be set as high as 480 minutes, or eight hours, although this is not recommend.
To set the idle time out, go to System > Admin > Settings and enter the amount of time for the
Idle Timeout. A best practice is to keep the default of 5 min.
When logging into the console using SSH, the default time of inactivity to successfully log into
the FortiGate unit is 120 seconds (2 minutes). You can configure the time to be shorter by using
the CLI to change the length of time the command prompt remains idle before the FortiGate unit
will log the administrator out. The range can be between 10 and 3600 seconds. To set the
logout time enter the following CLI commands:
config system global
set admin-ssh-grace-time <number_of_seconds>
end
Page 23
Page 24
Troubleshooting resources
Before you begin troubleshooting, you need to know Fortinets troubleshooting resources.
Doing so will shorten the time to solve your issue. Indeed, an administrator can save time and
effort during the troubleshooting process by first checking if the issue has been experienced
before. Several self-help resources are available to provide valuable information about FortiOS
technical issues, including:
Technical Documentation
Installation Guides, Administration Guides, Quick Start Guides, and other technical documents
are available online at the following URL:
http://docs.fortinet.com
Release Notes
Issues that are uncovered after the technical documentation has been published will often be
listed in the Release Notes that accompany the device.
Knowledge Base
The Fortinet Knowledge Base provides access to a variety of articles, white papers, and other
documentation providing technical insight into a range of Fortinet products. The Knowledge
Base is available online at the following URL:
http://kb.fortinet.com
Page 25
Page 26
Troubleshooting tools
FortiOS provides a number of tools that help with troubleshooting both hardware and software
issues. These tools include diagnostics and ports; ports are used when you need to understand
the traffic coming in or going out on a specific port, for example, UDP 53, which is used by the
FortiGate unit for DNS lookup and RBL lookup.
This section also contains information about troubleshooting FortiGuard issues.
This section contains the following topics:
FortiOS diagnostics
FortiOS ports
FortiAnalyzer/FortiManager ports
FortiGuard troubleshooting
FortiOS diagnostics
A collection of diagnostic commands are available in FortiOS for troubleshooting and
performance monitoring. Within the CLI commands, the two main groups of diagnostic
commands are get and diagnose commands. Both commands display information about
system resources, connections, and settings that enable you to locate and fix problems, or to
monitor system performance.
This topic includes diagnostics commands to help with:
Check date and time
Resource usage
Proxy operation
Hardware NIC
Traffic trace
Session table
Firewall session setup rate
Finding object dependencies
Flow trace
Packet sniffing and packet capture
FA2 and NP2 based interfaces
Debug command
The execute tac report command
Other commands
Additional diagnostic commands related to specific features are covered in the chapter for that
specific feature. For example in-depth diagnostics for dynamic routing are covered in the
dynamic routing chapter.
Use Network Time Protocol (NTP) to set the date and time if possible. This is an automatic
method that does not require manual intervention. However, you must ensure the port is
allowed through the firewalls on your network. FortiToken synchronization requires NTP in many
situations.
How to check the date and time - web-based manager
1. Go to System Information > System Time on the dashboard.
Alternately, you can check the date and time using the CLI commands execute date and
execute time.
2. If required, select Change to adjust the date and time settings.
You can set the time zone, date and time, and select NTP usage. In the CLI, use the
following commands to change the date and time:
config system global
set timezone (use ? to get a list of IDs and descriptions of their
timezone)
set
config system ntp
config ntpserver
edit 1
set server ntp1.fortinet.net
next
edit 2
set server ntp2.fortinet.net
next
end
set ntpsync enable
set syncinterval 60
end
Resource usage
Each program running on a computer has one or more processes associated with it. For
example if you open a Telnet program, it will have an associated telnet process. The same is
true in FortiOS. All the processes have to share the system resources in FortiOS including
memory and CPU.
Use get system performance status command to show the FortiOS performance
status.
Page 28
Sample output:
FGT#get system performance status
CPU states: 0% user 0% system 0% nice 100% idle
CPU0 states: 0% user 0% system 0% nice 100% idle
CPU1 states: 0% user 0% system 0% nice 100% idle
CPU2 states: 0% user 0% system 0% nice 100% idle
CPU3 states: 0% user 0% system 0% nice 100% idle
Memory states: 25% used
Average network usage: 0 kbps in 1 minute, 0 kbps in 10 minutes, 0 kbps
in 30 minutes
Average sessions: 5 sessions in 1 minute, 5 sessions in 10 minutes, 4
sessions in 30 minutes
Average session setup rate: 0 sessions per second in last 1 minute, 0
sessions per second in last 10 minutes, 0 sessions per second in
last 30 minutes
Virus caught: 0 total in 1 minute
IPS attacks blocked: 0 total in 1 minute
Uptime: 0 days, 12 hours, 7 minutes
Monitor the CPU/memory usage of internal processes using the following command:
get system performance top <delay> <max_lines>
The data listed by the command includes the name of the daemon, the process ID, whether the
process is sleeping or running, the CPU percentage being used, and the memory percentage
being used.
Sample output:
FGT#get system performance top 10 100
Run Time: 0 days, 11 hours and 30 minutes
0U, 0S, 100I; 1977T, 1470F, 121KF
pyfcgid
120
S
0.0
pyfcgid
121
S
0.0
pyfcgid
122
S
0.0
pyfcgid
53
S
0.0
ipsengine
75
S <
0.0
ipsengine
66
S <
0.0
ipsengine
73
S <
0.0
ipsengine
74
S <
0.0
ipsengine
79
S <
0.0
ipsengine
80
S <
0.0
cmdbsvr
43
S
0.0
proxyworker
110
S
0.0
proxyworker
111
S
0.0
httpsd
125
S
0.0
httpsd
52
S
0.0
httpsd
124
S
0.0
newcli
141
R
0.0
newcli
128
S
0.0
fgfmd
102
S
0.0
iked
86
S
0.0
Fortinet Technologies Inc.
Page 29
1.3
1.3
1.3
1.3
1.3
1.3
1.3
1.3
1.3
1.3
1.0
1.0
1.0
0.8
0.8
0.8
0.7
0.7
0.7
0.7
Proxy operation
Monitor proxy operations using the following command:
diag test application <application> <option>
The <application> value can include the following:
acd
Aggregate Controller.
ddnscd
dhcp6c
dhcprelay
dlpfingerprint
dlpfpcache
dnsproxy
DNS proxy.
dsd
forticldd
FortiCloud daemon.
forticron
FortiCron daemon.
fsd
FortiExplorer daemon.
ftpd
FTP proxy.
harelay
HA relay daemon.
http
HTTP proxy.
imap
IMAP proxy.
info-sslvpnd
ipldbd
ipsengine
ips sensor
ipsmonitor
ips monitor
ipsufd
l2tpcd
lted
miglogd
nat64d
NAT 64 daemon.
nntp
NNTP proxy.
pop3
POP3 proxy.
Page 30
pptpcd
PPTP client.
proxyacceptor
Proxy acceptor.
proxyworker
Proxy worker.
quarantined
Quarantine daemon.
radiusd
RADIUS daemon.
reportd
Report daemon.
reputation
scanunit
Scanning unit.
sflowd
sFlow daemon.
smtp
SMTP proxy.
snmpd
SNMP daemon.
sqldb
ssh
SSH proxy.
sslacceptor
SSL proxy.
sslworker
SSL proxy.
swctrl_authd
uploadd
Upload daemon.
urlfilter
wa_cs
wa_dbd
wad
wad_diskd
wccpd
WCCP daemon.
wpad
WPA daemon.
The <option> value depends from the application value used in the command. Here are some
examples:
If the application is http, the CLI command will be
diag test application http <option>
The <option> value can be one from the following:
Page 31
22
222
44
444
4444
44444
55
70
71
72
11
12
13
14
80
81
82
Page 32
10
11
12
13
14
15
IPSA statistics
97
98
99
Hardware NIC
Monitor hardware network operations using the following command:
diag hardware deviceinfo nic <interface>
The information displayed by this command is important as errors at the interface are indicative
of data link or physical layer issues which may impact the performance of the FortiGate unit.
The following is sample output when <interface> = internal:
System_Device_Name
Current_HWaddr
Permanent_HWaddr
Link
Speed
Duplex
[]
Rx_Packets=5685708
Tx_Packets=4107073
Rx_Bytes=617908014
Tx_Bytes=1269751248
Rx_Errors=0
Tx_Errors=0
Rx_Dropped=0
Tx_Dropped=0
[..]
port5
00:09:0f:68:35:60
00:09:0f:68:35:60
up
100
full
Page 33
The diag hardware deviceinfo nic command displays a list of hardware related error
names and values. The following table explains the items in the list and their meanings.
Table 3: Possible hardware errors and meanings
Field
Rx_Errors = rx error count
Rx_CRC_Errors +
Rx_Length_Errors Rx_Align_Errors
Rx_Dropped or
Rx_No_Buffer_Count
Rx_Missed_Errors
Definition
Bad frame was marked as error by PHY.
This error is only valid in 10/100M mode.
Page 34
Rx_Frame_Too_Longs
Rx_Frame_Too_Shorts
Rx_Align_Errors
Symbol Error Count
Definition
Counts defer events. A defer event occurs when the
transmitter cannot immediately send a packet due to the
medium being busy because another device is transmitting,
the IPG timer has not expired, half-duplex deferral events are
occurring, XOFF frames are being received, or the link is not
up. This register only increments if transmits are enabled.
This counter does not increment for streaming transmits that
are deferred due to TX IPG.
The Rx frame is over size.
The Rx frame is too short.
This error is only valid in 10/100M mode.
Counts the number of symbol errors between reads SYMERRS. The count increases for every bad symbol
received, whether or not a packet is currently being received
and whether or not the link is up. This register only
increments in internal SerDes mode.
Traffic trace
Traffic tracing allows a specific packet stream to be followed. This is useful to confirm packets
are taking the route you expected on your network.
View the characteristics of a traffic session though specific security policies using:
diag sys session
Trace per-packet operations for flow tracing using:
diag debug flow
Trace per-Ethernet frame using:
diag sniffer packet
Session table
A session is a communication channel between two devices or applications across the network.
Sessions enable FortiOS to inspect and act on a sequential group of packets in a session all
together instead of inspecting each packet individually. Each of these sessions has an entry in
the session table that includes important information about the session.
Use as a tool
Session tables are useful troubleshooting tools because they allow you to verify connections
that you expect to see open. For example, if you have a web browser open to browse the
Fortinet website, you would expect a session entry from your computer, on port 80, to the IP for
the Fortinet website. Another troubleshooting method is if there are too many sessions for
FortiOS to process, you can examine the session table for evidence why this is happening.
The FortiGate session table can be viewed from either the CLI or the web-based manager. The
most useful troubleshooting data comes from the CLI. The session table in web-based manager
also provides some useful summary information, particularly the current policy number that the
session is using.
Page 35
Session monitor
The session monitor is the session table. It lists the protocol used, source and destination
addresses, source and destination ports, what policy ID was matched (if any), how long until the
session expires, and how long it has been established.
If there is no policy ID listed in the session entry, the traffic originated from the FortiGate unit.
Otherwise all sessions must match a security policy to pass through the FortiGate unit. You can
specify a filter to show Forward Traffic only. To do this, click on the Edit icon (it looks like a
pencil)
As there are potentially many sessions active at one time, there are different methods you can
use to filter unimportant sessions out of your search. The easiest filter is to display only IPv4 or
IPv6 sessions. By default both are displayed.
Page 36
address. It can also tell you the security policy number it matches, so you can check what is
happening in that policy.
1. Know your connection information.
You need to be able to identify the session you want. For this you need the source IP
address (usually your computer), the destination IP address if you have it, and the port
number which is determined by the program being used. Some commons ports are:
port 80 (HTTP for web browsing),
port 22 (SSH used for secure login and file transfers)
port 23 (telnet for a text connection)
port 443 (HTTPS for secure web browsing
2. Find your session and policy ID.
Follow System > Dashboard> Top Sources to the session table monitor. Find your session by
finding your source IP address, destination IP address if you have it, and port number. The
policy ID is listed after the destination information. If the list of sessions is very long, you can
filter the list to make it easier to find your session.
3. When there are many sessions, use a filter to help you find your session.
If there are multiple pages of sessions it is difficult to find a single session. To help you in
your search you can use a filter to block out sessions that you dont want. Select the filter
icon next to Src Address. In the window that pops up, enter your source IP address and
select Apply. Now only sessions that originate from your IP address will be displayed in the
session table. If the list is still too long, you can do the same for the Src port. That will make
it easy to find your session and the security policy ID. When you are finished remember to
clear the filters.
Page 37
Sample Output:
FGT# diag sys session list
session info: proto=6 proto_state=05 expire=89 timeout=3600
flags=00000000 av_idx=0 use=3
bandwidth=204800/sec
guaranteed_bandwidth=102400/sec
traffic=332/sec prio=0 logtype=session ha_id=0 hakey=4450
tunnel=/
state=log shape may_dirty
statistic(bytes/packets/err): org=3408/38/0 reply=3888/31/0 tuples=2
orgin->sink: org pre->post, reply pre->post oif=3/5
gwy=192.168.11.254/10.0.5.100
hook=post dir=org act=snat
10.0.5.100:1251->192.168.11.254:22(192.168.11.105:1251)
hook=pre dir=reply act=dnat
192.168.11.254:22->192.168.11.105:1251(10.0.5.100:1251)
pos/(before,after) 0/(0,0), 0/(0,0)
misc=0 domain_info=0 auth_info=0 ftgd_info=0 ids=0x0 vd=0
serial=00007c33 tos=ff/ff
Since output can be verbose, the filter option allows specific information to be displayed, for
example:
diag sys session filter <option>
The <option> values available include the following:
clear
dintf
Destination interface.
dport
Destination port.
dst
Destination IP address.
duration
duration
expire
expire
negate
Inverse filter.
nport
nsrc
policy
Policy ID.
proto
Protocol number.
proto-state
Protocol state.
sintf
Source interface.
sport
Source port.
src
Source IP address.
vd
Page 38
Even though UDP is a sessionless protocol, the FortiGate unit still keeps track of the following
two different states:
UDP reply not seen with a value of 0
UDP reply seen with a value of 1
The following illustrates FW session states from the session table:
Table 4:
State
Meaning
log
local
ext
may_dirty
ndr
nds
br
Page 39
CLI method
When running multiple VDOMs, this command is run in the Global configuration only and it
searches for the named object both in the Global and VDOM configuration most recently used:
diag sys checkused <path.object.mkey>
For example, to verify which objects are referred to in a security policy with an ID of 1, enter the
command as follows:
diag sys checkused firewall.policy.policyid 1
To check what is referred to by interface port1, enter the following command:
diag sys checkused system.interface.name port1
Page 40
To show all the dependencies for an interface, enter the command as follows:
diag sys checkused system.interface.name <interface name>
Sample Output:
entry
entry
entry
entry
entry
entry
entry
entry
used
used
used
used
used
used
used
used
by
by
by
by
by
by
by
by
table
table
table
table
table
table
table
table
firewall.address:name '10.98.23.23_host
firewall.address:name 'NAS'
firewall.address:name 'all'
firewall.address:name 'fortinet.com'
firewall.vip:name 'TORRENT_10.0.0.70:6883'
firewall.policy:policyid '21'
firewall.policy:policyid '14'
firewall.policy:policyid '19'
In this example, the interface has dependent objects, including four address objects, one VIP,
and three security policies.
Flow trace
To trace the flow of packets through the FortiGate unit, use the following command:
diag debug flow trace start
Page 41
Enable the output to be displayed to the CLI console using the following command:
diag debug flow show console
diag debug flow output is recorded as event log messages and are sent to a
FortiAnalyzer unit if connected. Do not let this command run longer than necessary
since it generates significant amounts of data.
Start flow monitoring with a specific number of packets using this command:
diag debug flow trace start <N>
The following is an example of the flow trace for the device at the following IP address:
203.160.224.97
diag
diag
diag
diag
diag
debug
debug
debug
debug
debug
enable
flow filter addr 203.160.224.97
flow show console enable
flow show function-name enable
flow trace start 100
Page 42
Page 43
Page 44
Packet sniffing in the CLI is well suited for spot checking traffic from the CLI, but if you have
complex filters to enter it can be a lot of work to enter them each time. You can also save the
sniffing output; however, you must log to a file and then analyze the file later by hand.
Packet capture in the web-based manager makes it easy to set up multiple filters at once and
just run one or two as you need them. You also have controls to start and stop capturing as you
wish. Packet capture output is downloaded to your local computer as a *.pcap file which
requires a third party application to read the file, such as Wireshark. This method is useful to
send Fortinet support information to help resolve an issue.
Features
Packet sniffing
Packet capture
Command location
CLI
web-based manager
puTTY to log
plaintext output
Wireshark to read
*.pcap files
yes
no
no
yes
no
yes
no
no
yes
sniff IPv6
hard
easy
no
yes
easy
easy
easy
easy
Packet sniffing
Before you start sniffing packets on the CLI, you should be prepared to capture the output to a
file there can be huge amounts of data that you will not be able to see without saving it to a
file. One method is to use a terminal program like puTTY to connect to the FortiGate units CLI.
Then once the packet sniffing count is reached you can end the session and analyze the output
in the file.
Details within packets passing through particular interfaces can be displayed using the packet
sniffer with the following command:
diag sniffer packet <interface> <filter> <verbose> <count> <tsformat>
The <interface> value is required, with the rest being optional. If not included the default
values will be none.
For example the simplest valid sniffer command would be:
diag sniffer packet any
The <interface> value can be any physical or virtual interface name. Use any to sniff packets
on all interfaces.
Fortinet Technologies Inc.
Page 45
The <filter> value limits the display of packets using filters, including Berkeley Packet
Filtering (BPF) syntax. The <filter> value must be enclosed in quotes.
'[[src|dst] host <host_name_or_IP1>] [[src|dst] host
<host_name_or_IP2>] [[arp|ip|ip6|gre|esp|udp|tcp] [port_no]]
[[arp|ip|ip6|gre|esp|udp|tcp] [port_no]]
If a second host is specified in the filter, only the traffic between the two hosts will be displayed.
Optionally, you can use logical OR to match only one of the hosts, or match one of multiple
protocols or ports. When defining a port, there are up to two parts protocol and port number.
For example, to display UDP 1812 traffic or TCP 8080 traffic, use the following:
'udp port 1812 or tcp port 8080
To display all IP traffic that has a source of 192.168.1.2 and a destination of 192.168.2.3:
'ip src host 192.168.1.2 and dst host 192.168.2.3
The <verbose> option allows different levels of information to be displayed. The verbose levels
include:
1 Print header of packets
2 Print header and data from the IP header of the packets
3 Print header and data from the Ethernet header of the packets
4 Print header of packets with interface name
5 Print header and data from ip of packets with interface name
6 Print header and data from ethernet of packets with interface name
The <count> value indicates the number of packets to sniff before stopping. If this variable is
not included, or is set to zero, the sniffer will run until you manually halt it with Ctrl-C.
The <tsformat> value define the format of timestamp. It can be:
a: absolute UTC time, yyyy-mm-dd hh:mm:ss.ms
l: absolute LOCAL time, yyyy-mm-dd hh:mm:ss.ms
otherwise: relative to the start of sniffing, ss.ms
Packet capture
FortiOS 5 includes packet capture to the web-based manager. To configure packet capture
filters, go to System > Network > Packet Capture.
Page 46
When you add a packet capture filter, enter the following information and select OK.
Max Packets to
Capture
Enable Filters
Host(s)
Port(s)
VLAN(s)
Protocol
Include IPv6
packets
Capture Non-IP
packets
If you select a filter and go back to edit it, you have the added option of starting and stopping
packet capture in the edit window, or downloading the captured packets. You can also see the
filter status and the number of packets captured.
You can also select the filter and select Start to start capturing packets. While the filter is
running, you will see the number of captured packets increasing until it reaches the max packet
count or you select Stop. While the filter is running you cannot download the output file.
When the packet capture is complete, you can select Download to send the packet capture
filter captured packets to your local computer as a *.pcap file. To read this file format, you will
need to use Wireshark or a similar third party application. Using this tool you will have extensive
analytics available to you and the full contents of the packets that were captured.
Page 47
Sample output:
ID PORTS
-- ----0 port1
0 port2
0 port3
0 port4
ID PORTS
-- ----1 port5
1 port6
1 port7
1 port8
ID PORTS
-- ----2 port9
2 port10
2 port11
2 port12
ID PORTS
-- ----3 port13
3 port14
3 port15
3 port16
Sample output:
NP2 Fast Path Sniffer on port1 enabled
Fortinet Technologies Inc.
Page 48
This will cause all traffic on port1 of NP2 to be sent to the CPU meaning a standard sniffer trace
can be taken and other diag commands should work if it was a standard CPU driven port.
These commands are only for the newer NP2 interfaces. FA2 interfaces are more limited as the
sniffer will only capture the initial packets before the session is offloaded into HW (FA2). The
same holds true for the diag debug flow command as only the session setup will be shown,
however, this is usually enough for this command to be useful.
Debug command
Debug output provides continuous, real-time event information. Debugging output continues
until it is explicitly stopped or until the unit is rebooted. Debugging output can affect system
performance and will be continually generated even though output might not be displayed in the
CLI console.
Debug information displayed in the console will scroll in the console display and may prevent
CLI commands from being entered, for example, the command to disable the debug display. To
turn off debugging output as the display is scrolling by, press the key to recall the recent diag
debug command, press backspace, and type 0, followed by Enter.
Debug output display is enabled using the following command:
diag debug enable
When finished examining the debug output, disable it using:
diag debug disable
Once enabled, indicate the debug information that is required using this command:
diag debug <option> <level>
Debug command options include the following:
application
application
authd
Authentication daemon.
cli
Debug CLI.
cmdb-trace
Trace CLI.
console
crashlog
disable
enable
flow
fsso-polling
info
kernel
kernel
rating
Page 49
report
reset
rtmon
rtmon daemon
sql-log-error
urlfilter
urlfilter
The debug level can be set at the end of the command. Typical values are 2 and 3, for example:
diag debug application DHCPS 2
diag debug application spamfilter 2
Fortinet support will advise which debugging level to use.
Timestamps can be enabled to the debug output using the following command:
diag debug console timestamp enable
Sample Output:
FGh_FtiLog1: IPsec SA connect 0 192.168.11.2->192.168.10.201:500,
natt_mode=0 rekey=0 phase2=FGh_FtiLog1
FGh_FtiLog1: using existing connection, dpd_fail=0
FGh_FtiLog1: found phase2 FGh_FtiLog1
FGh_FtiLog1: IPsec SA connect 0 192.168.11.2 -> 192.168.10.201:500
negotiating
FGh_FtiLog1: overriding selector 225.30.5.8 with 192.168.11.2
FGh_FtiLog1: initiator quick-mode set pfs=1536...
FGh_FtiLog1: try to negotiate with 1800 life seconds.
FGh_FtiLog1: initiate an SA with selectors:
192.168.11.2/0.0.0.0->192.168.10.201, ports=0/0, protocol=0/0
Send IKE Packet(quick_outI1):192.168.11.2:500(if0) ->
192.168.10.201:500, len=348
Initiator: sent 192.168.10.201 quick mode message #1 (OK)
FGh_FtiLog1: set retransmit: st=168, timeout=6.
In this example:
192.168.11.2->192.168.10.201:500
Page 50
dpd_fail=0
pfs=1536...
Other commands
ARP table
To view the ARP cache, use the following command:
get sys arp
Sample output:
index=14 ifname=internal 224.0.0.5 01:00:5e:00:00:05 state=00000040
use=72203 confirm=78203 update=72203 ref=1
index=13 ifname=dmz 192.168.3.100 state=00000020 use=1843
confirm=650179 update=644179 ref=2
? VIP
index=13 ifname=dmz 192.168.3.109 02:09:0f:78:69:ff state=00000004
use=71743 confirm=75743 update=75743 ref=1
index=14 ifname=internal 192.168.11.56 00:1c:23:10:f8:20
state=00000004 use=10532 confirm=10532 update=12658 ref=4
To remove all entries associated with a particular interface, use this command:
diag ip arp flush <interface name>
Page 51
If all devices have the same time, it helps to correlate log entries from different devices.
IP address
There may be times when you want to verify the IP addresses assigned to the FortiGate unit
interfaces are what you expect them to be. This is easily accomplished from the CLI using the
following command.
diag ip address list
The output from this command lists the IP address and mask if available, the index of the
interface (a sort of ID number) and the devname is the name of the interface. While physical
interface names are set, virtual interface names can vary. Listing all the virtual interface names is
a good use of this command. For vsys_ha and vsys_fgfm, the IP addresses are the local host
these are internally used virtual interfaces.
# diag ip address list
IP=10.31.101.100->10.31.101.100/255.255.255.0 index=3 devname=internal
IP=172.20.120.122->172.20.120.122/255.255.255.0 index=5 devname=wan1
IP=127.0.0.1->127.0.0.1/255.0.0.0 index=8 devname=root
IP=127.0.0.1->127.0.0.1/255.0.0.0 index=11 devname=vsys_ha
IP=127.0.0.1->127.0.0.1/255.0.0.0 index=13 devname=vsys_fgfm
Other related commands include flushing the IP addresses (diag ip address flush), which
will force a reload of the IP addresses. This can be useful if you think an IP address is wrong and
dont want to reboot the unit. You can add or delete a single IP address (diag ip address
add <ipv4_addr> or diag ip address delete <ipv4_addr>).
FortiOS ports
In the TCP and UDP stacks, there are 65 535 ports available for applications to use when
communicating with each other. Many of these ports are commonly known to be associated
with specific applications or protocols. These known ports can be useful when troubleshooting
your network.
Page 52
Port(s)
Functionality
UDP 53
UDP 53 or
UDP 8888
UDP 53
(default) or
UDP 8888 and
UDP 1027 or
UDP 1031
UDP 123
NTP Synchronization
UDP 162
SNMP Traps
UDP 514
TCP 22
TCP 25
TCP 389 or
TCP 636
TCP 443
TCP 443
TCP 514
TCP 541
TCP 514
TCP 1812
RADIUS authentication
Page 53
FortiAnalyzer/FortiManager ports
If you have a FortiAnalyzer unit or FortiManager unit on your network you may need to use the
following ports for troubleshooting network traffic.
Table 6:
Functionality
Port(s)
DNS lookup
UDP 53
NTP synchronization
UDP 123
Windows share
UDP 137-138
SNMP traps
UDP 162
UDP 514
TCP 21 or TCP 22
TCP 25
RVS update
TCP 443
RADIUS authentication
TCP 1812
TCP 3000
FortiGuard troubleshooting
The FortiGuard service provides updates to Antivirus, IPsec, Webfiltering, and more. The
FortiGuard Distribution System (FDS) involves a number of servers across the world that
provide updates to your FortiGate unit. Problems can occur both with connection to FDS, and
its configuration on your local FortiGate unit. Some of the more common troubleshooting
methods are listed here including
Troubleshooting process for FortiGuard updates
FortiGuard server settings
FortiGuard URL rating
Page 54
2. If the device is part of an HA cluster, do all members of the cluster have the same level of
support?
As with the previous step, you can verify the support contract status for all the devices in
your HA cluster at the Fortinet Support website.
3. Have services been enabled on the device?
To see the FortiGuard information and status for a device, in the web-based manager go to
System > Config > FortiGuard. On that page you can verify the status of each component,
and if required enable each service. If there are problems, see the FortiGuard section of the
FortiOS Handbook.
4. Is the device able to communicate with FortiGuard servers?
At System > Config > FortiGuard you can also attempt to update AV and IPS, or test the
availability of WF and AS default and alternate ports. If there are problems, see the
FortiGuard section of the FortiOS Handbook.
5. Is there proper routing to reach the FortiGuard servers?
Ensure there is a static or dynamic route that enables your ForitGate unit to reach the
FortiGuard servers. Usually a generic default route to the internet is enough, but you may
need to verify this if your network is complex.
6. Are there issues with DNS?
An easy way to test this is to attempt a traceroute from behind the FortiGate unit to an
external network using the FQDN for a location. If the traceroute FQDN name does not
resolve, you have general DNS problems.
7. Is there anything upstream that might be blocking FortiGuard traffic, either on the network or
ISP side?
Many firewalls block all ports by default, and often ISPs block ports that are low. There may
be a firewall between the FortiGate unit and the FortiGuard servers that is blocking the
traffic. FortiGuard uses port 53 by default, so if it is being blocked you need to either open a
hole for it, or change the port it is using.
8. Is there an issue with source ports?
It is possible that ports used to contact FortiGuard are being changed before reaching
FortiGuard or on the return trip before reaching your FortiGate unit. A possible solution for
this is to use a fixed-port at NATd firewalls to ensure the port remains the same. Packet
sniffing can be used to find more information on what is happening with ports.
9. Are there security policies that include antivirus?
If no security policies include antivirus, the antivirus databse will not be updated. If antivirus
is included, only the database type used will be updated.
Page 55
Weight
0
10
20
20
20
25
RTT
1
329
169
182
184
181
Flags
DI
TZ
2
1
0
0
0
0
Packets
1926879
10263
16105
6741
5249
12072
CurrLost
0
0
0
0
0
0
TotalLost
11176
633
80
776
987
178
Output Details
Hostname is the name of the FortiGuard server the FortiGate unit will attempt to contact. The
Server List includes the IP addresses of alternate servers if the first entry cannot be reached. In
this example the IP addresses are not public addresses
The following flags in get webfilter status indicate the server status:
D - the server was found through the DNS lookup of the hostname. If the hostname returns
more than one IP address, all of them will be flagged with D and will be used first for INIT
requests before falling back to the other servers.
I - the server to which the last INIT request was sent.
F - the server has not responded to requests and is considered to have failed.
T - the server is currently being timed.
Calculating weight
The weight for each server increases with failed packets and decreases with successful
packets. To lower the possibility of using a remote server, the weight is not allowed to dip below
a base weight, calculated as the difference in hours between the FortiGate unit and the server
Page 56
times 10. The further away the server is, the higher its base weight and the lower in the list it will
appear.
The output for the diag debug rating command will vary based on the state of the
FortiGate device.
The following output is from a FortiGate device that has no DNS resolution for
service.fortiguard.net.
If only three IP addresses appear with the D flag, it means that DNS is good but probably the
FortiGuard ports 53 and 8888 are blocked.
When the license is expired, an INIT request will be sent every 10 minutes for up to six attempts.
If a license is not found after this limit is reached, the INIT requests will be sent every day.
A low source port number may appear which means that ports 1024 and 1025 could be blocked
on the path to the FDS. Increase the source port on the FortiGate device with the following
commands:
config sys global
set ip-src-port-range
Be careful moving ports like this as it may cause some services to stop working if they cant
access their original ports. If you make this change, ensure all services that use ports are
checked and updated to new port numbers if needed.
Sample output:
id=93000 msg="pid=57 urlfilter_main-723 in main.c received
pkt:count=91, a=/tmp/.thttp.socket/21" id=22009 msg="received a
request /tmp/.thttp.socket, addr_len=21: d=
="www.goodorg.org:80, id=12853, vfid=0, type=0,
client=192.168.3.90, url=/" id=99501 user="N/A" src=192.168.3.90
sport=1321 dst=<dest_ip> dport=80 service="http" cat=43
cat_desc=Organisation" hostname="www.goodorg.org" url="/"
status=blocked msg="URL belongs to a denied category in policy"
Fortinet Technologies Inc.
Page 57
Sample output:
id=22009 msg="received a request /tmp/.thttp.socket, addr_len=21:
d=pt.dnstest.google.com:80, id=300, vfid=0, type=0,
client=192.168.3.12, url=/gen_204"
id=93003 user="N/A" src=192.168.3.12 sport=21715 dst=<dest_ip>
dport=80 service="http" cat=41 cat_desc="Search Engines"
hostname="pt.dnstest.google.com" url="/gen_204"
status=passthrough msg="URL belongs to an allowed category in
the policy"
Table 7: Breakdown of sample output parts from URL rating command
id=93000
msg="pid=57
urlfilter_main-723 in
main.c received
pkt:count=91,
a=/tmp/.thttp.socket/2
1"
id=22009
msg="received a request
/tmp/.thttp.socket,
addr_len=21: d=
="www.goodorg.org:80,
id=12853, vfid=0,
type=0,
client=192.168.3.90,
url=/"
id=99501
user="N/A"
src=192.168.3.90
sport=1321
dst=<dest_ip> dport=80
service="http" cat=43
cat_desc=Organisation
"
hostname="www.goodorg.
org" url="/"
status=blocked
msg="URL belongs to a
denied category in
policy"
Page 58
Troubleshooting methodologies
Before you begin troubleshooting anything but the most minor issues, you need to prepare.
Doing so will shorten the time to solve your issue. This section helps to explain how you prepare
before troubleshooting, as well as creating a troubleshooting plan and contacting support.
This section contains the following topics:
Establish a baseline
Define the problem
Gathering Facts
Create a troubleshooting plan
Obtain any required additional equipment
Ensure you have administrator level access to required equipment
Contact Fortinet customer support for assistance
Establish a baseline
FortiGate units operate at all layers of the OSI model. For this reason troubleshooting problems
can become complex. If you establish a normal operation parameters, or baseline, for your
system before the problem occurs it will help reduce the complexity when you are
troubleshooting.
Many of the guiding questions in the following sections are some form of comparing the current
problem situation to normal operation on your FortiGate unit. For this reason it is a best practice
that you know what your normal operating status is, and have a record of it you can refer to.
This can easily be accomplished by monitoring the system performance with logs, SNMP tools,
or regularly running information gathering commands and saving the output. This regular
operation data will show trends, and enable you to see when changes happen and there may be
a problem.
Back up your FortiOS configuration on a regular basis. This is a good practice for
everyday as well as when troubleshooting. You can restore the backed up configuration
when needed and save the time and effort of re-creating it from the factory default
settings.
Some fundamental CLI commands you can use to obtain normal operating data for your
system:
Page 59
These commands are just a sample. Feel free to include any extra information gathering
commands that apply to your system. For example if you have active VPN connections, record
information about them using the get vpn * series of commands.
For an extensive snapshot of your system, run the CLI command used by TAC to gather
extensive information about a system exec tac report. It runs many diagnostic
commands that are for specific configurations. This means no matter what features you are
using, this command will record their current state. Then if you need to perform troubleshooting
at a later date, you can run the same command again and compare the differences to quickly
locate suspicious output you can investigate.
Page 60
Before you can solve a problem, you need to understand it. Often this step can be the longest in
this process.
Ask questions such as:
What is not working? Be specific.
Is there more than one thing not working?
Is it partly working? If so, what parts are working?
Is it a connectivity issue for the whole device, or is there an application that isnt reaching the
Internet?
Be as specific as possible with your answers, even if it takes awhile to find the answers.
These questions will help you define the problem. Once the problem is defined, you can search
for a solution and then create a plan on how to solve it.
Gathering Facts
Fact gathering is an important part of defining the problem. Record the following information as
it applies to the problem:
Where did the problem occur?
When did the problem occur and to whom?
What components are involved?
What is the affected application?
Can the problem be traced using a packet sniffer?
Can the problem be traced in the session table or using system debugging?
Can log files be obtained that indicate a failure has occurred?
Answers to these questions will help you narrow down the problem, and what you have to
check during your troubleshooting. The more things you can eliminate, the fewer things you
need to check during troubleshooting. For this reason, be as specific and accurate as you can
while gathering facts.
Page 61
Do not provide the output from exec tac report unless Support requests it. The output
from that command is very large and is not required in many cases.
For additional information about contacting Fortinet Customer Support, see Technical Support
Organization Overview on page 63.
All of this is your troubleshooting plan.
Page 62
Page 63
APAC
AMER
Corporate
CSS
Regional TAC
Focused Teams
Technical Support
RMA
Customer Services
Remote Access Labs
AMEA
24x7
Regional TAC
Global Call
Handling Layer
Creating an account
To receive technical support and service updates, Fortinet products in the organization must be
registered. The Product Registration Form on the support website will allow the registration to
be completed online.
Creating an account on the support website is the first step in registering products
Page 64
Once the account has been created, the Product Registration Form will be displayed and the
product details can be provided. Alternately, the product registration can be completed at a
later time.
Registering a device
Complete the following steps when registering a device for support purposes:
1. Log in using the Username and Password defined when the account was created
Page 65
Page 66
7. In the Product Description field, explain where this unit is physically located.
8. Click Next and accept the End User License Agreement (EULA) to complete the registration.
Reporting problems
Problems can be reported to a Fortinet Technical Assistance Center in the following ways:
By logging an online ticket
By phoning a technical support center
Fortinet partners
Fortinet Partners are entitled to priority web-based technical support. This service is designed
for partners who provide initial support to their customers and who need to open a support
ticket with Fortinet on their behalf. We strongly encourage submission and follow up of support
tickets using this service.
The support ticket can be submitted after logging into the partner website using one of the
following links using FortiPartner account details:
http://partners.fortinet.com
This link will redirect to the general Partner Extranet website. Click Support > Online Support
Ticket.
https://forticare.fortinet.com/customersupport/Login/CommonLogin.aspx
Fortinet customers
Fortinet customers should complete the following steps to report a technical problem online:
1. Log in to the support web site at the following address with the account credentials used
when the account was created:
https://support.fortinet.com
2. Click View Products.
3. In the Products List, select the product that is causing the problem.
4. Complete the Create Support Ticket fields.
Page 67
Page 68
3. Select the appropriate ticket number. Closed tickets cannot be updated. A new ticket must
be submitted if it concerns the same problem.
4. Add a New Comment or Attachment.
5. Click Submit when complete.
Every web ticket update triggers a notification to the ticket owner, or ticket queue
supervisor.
Page 69
Priority 1
This Critical priority is assigned to support cases in which:
The network or system is down causing customers to experience a total loss of service.
There are continuous or frequent instabilities affecting traffic-handling capability on a
significant portion of the network.
There is a loss of connectivity or isolation to a significant portion of the network.
This issue has created a hazard or an emergency.
Priority 2
This Major priority is assigned to support cases in which:
The network or system event is causing intermittent impact to end customers.
There is a loss of redundancy.
There is a loss of routine administrative or diagnostic capability.
There is an inability to deploy a key feature or function.
There is a partial loss of service due to a failed hardware component.
Priority 3
This Medium priority is assigned to support cases in which:
The network event is causing only limited impact to end customers.
Issues seen in a test or pre-production environment exist that would normally cause adverse
impact to a production network.
The customer is making time sensitive information requests.
There is a successful workaround in place for a higher priority issue.
Page 70
Priority 4
This Minor priority is assigned to support cases in which:
The customer is making information requests and asking standard questions about the
configuration or functionality of equipment.
Customers must report Priority 1 and 2 issues by phone directly to the Fortinet EMEA Support
Center.
For lower priority issues, you may submit an assistance request (ticket) via the web system.
The web ticket system also provides a global overview of all ongoing support requests.
The Product Support Details for the selected device will be displayed.
Page 71
3. In the RMA Replacement section of the Product Support Details page, enter the serial
number of the replacement device and click RMA Replace.
Page 72
This will transfer the support contract from the defective unit to the new unit with the serial
number provided.
Page 73
Index
A
ARP
cache 51
middle-man 14
C
connectionless 8
D
date 27, 52
default
password 6
Define the problem 59
Denial of Service (DoS) 12
E
Establish a baseline 59
F
firewall session setup rate 39
flow inspection 9
flow-based
inspection 9
FortiGuard Distribution System (FDS) 54
Antispam 6
Antivirus 6
servers 56
G
global 40
I
ICAP 14
identify-based policies 14
inspection
flow 9
flow-based 9
proxy 10
security layers 11
stateful 7
IP stack validation 12
L
layer 4 12
LDAP 53
life of a packet 7
UDP 7
N
P
packet
flow 11
life of 7
Packet verification 12
password
administrator 6
ports
port 1024 57
port 1025 57
port 53 57
port 8888 57
problem scope 60
proxy inspection 10
R
RADIUS 53
Return Material Authorization (RMA) 71
Round Trip Time (RTT) 56
routing table 13
S
security layers 11
Session creation 12
session helper 14
session tables 14
signature-based IPS 13
ssl.root 14
stateful inspection 7
stateless 7
SYSLOG 53
T
TCP header flags 7
TCP SYN packets 13
TCP/IP stack 14
Technology Assistance Center (TAC) 62
time 27, 52
U
UDP 7
V
VDOM 39, 40, 62
Verifications of IP options 12
Page 74