?
Solved

Fortigate's blocking iOS traffic

Posted on 2014-01-26
4
Medium Priority
?
3,117 Views
Last Modified: 2014-02-14
Recently I have upgraded two clients to the newest firmware released for Fortigates, 5.0.5.  Both clients heavily utilize iOS in their environments and somewhere along the upgrade path to 5.0.5, iOS traffic seems be down right blocked or they start downloads but the downloads are never successful.  By blocked, the user will attempt to download iOS updates, iBooks, applications, etc and either the download never starts and eventually times out or the download does start but only gets a few Mb in before it stops.  One client has even reported this extends to Mac users attempting to use iTunes.

Besides the firmware upgrade to 5.0.5, nothing about these clients networks have changed.  Each are using different wireless setups, different switching, etc.  One client has a Fortigate 100D and the other 2x300C in an Active-Active HA cluster.

During testing with each client, I have disabled everything down to the web filter.  With the web filter active, the problems exists but with the web filter disabled, users can download successfully.  The traffic and web filter UTM logs show no traffic being blocked.  In testing, the web filter was set to allow all and web filter exceptions were placed for common URL's seen in traffic logs while users browsed to Apple/iOS related applications.

I have attempted to work with Fortinet support on the issue but their solution has been to factory reset each firewall, re-import the config, and follow the firmware upgrade matrix again in case there was corruption in the previous upgrade.  They have no been able to indicate that there actually are any signs of corruption and the 300C client firewalls came out of the box only one build behind the most recent release, so I highly doubt there was corruption upgrading one firmware release.

At this point I am contemplating downgrading the firmware on each firewall until I find the most recent release that this problem does not exist but the point of upgrading in the first place was to fix other bugs in the ipsengine and proxyworker processes that were causing issues.

Thanks for any help.
0
Comment
Question by:vthelp
  • 2
  • 2
4 Comments
 
LVL 1

Expert Comment

by:Zabo1
ID: 39810576
do you have a rule that allows iOS devices access to time.apple.com over ntp?
0
 

Author Comment

by:vthelp
ID: 39811086
I can try this in testing tomorrow with one of the clients.  Is this something that is critical to iOS updates and applications in order for them to work?  If it is and the firewalls are blocking this, any clue as to why I might not be seeing that in any of the UTM logs?

I have worked with previous Fortigate firmware releases that caused similar issues like this, blocking certain traffic but showing nothing in the logs and it was a huge time sink tracking down the resolution, just like this one has been.

Thanks again.
0
 
LVL 1

Accepted Solution

by:
Zabo1 earned 2000 total points
ID: 39817645
i know that it is critical to iOS to have access to time.apple.com, not sure why it's not showing in your Fortigate firewall logs.  some firewalls you have to specify a deny rule in order for blocked traffic to show in the log.
0
 

Author Closing Comment

by:vthelp
ID: 39859393
Fortigate ended up finding there was a bug in FortiOS 5 patch 5 and after upgrading to patch 6, the issue was resolved.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question