Solved

Traffic routing issue on fortigate 60d

Posted on 2015-01-19
2
721 Views
Last Modified: 2015-01-19
we have a fortigate 60 D on the perimeter through which clients connect to internet through PPPoE. Was initially running on lower firmware , however upgraded it recently to version 5.1 patch 10. things were looking ok so further updated to 5.2.2,. Had issue with internet traffic not working for internal clients so , downgraded back to 5.0.10. ever since then the speed of the internet is very slow. we have a 100mb connection and checking on the modem directly gives a pretty good throughput. However when the line is connected to the fortigate unit from the ISP directly , the speed is hardly reaching 1mb.

The downgrade of the firmware was done through the web manager only.

Have run diag on the interface running the adsl connection and didn't find any errors showing up in the output result.

what is going wrong ??

Ran a diag flow. looks like packets are not reaching wan2 interface at all and are going through wan1 only. Also tried changing the distance of wan1 and wan2 to same and making the priority of wan1 to 1 and wan2 to 0 so that wan2 gets used by default. however still seems to use only wan1.
0
Comment
Question by:Rajkumar Kamath
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 

Accepted Solution

by:
Rajkumar Kamath earned 0 total points
ID: 40557623
There are two interfaces on the fortigate. Wan1 which is for email traffic only and wan2 for internet. did a debug flow for a traceroute that I did and seem to go only through wan1 and nothing is happening via wan2. how can I fix this.
0
 

Author Closing Comment

by:Rajkumar Kamath
ID: 40559056
Issue fixed . Managed to change the priority and distance
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transparency shows that a company is the kind of business that it wants people to think it is.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question