Solved

Traffic routing issue on fortigate 60d

Posted on 2015-01-19
2
626 Views
Last Modified: 2015-01-19
we have a fortigate 60 D on the perimeter through which clients connect to internet through PPPoE. Was initially running on lower firmware , however upgraded it recently to version 5.1 patch 10. things were looking ok so further updated to 5.2.2,. Had issue with internet traffic not working for internal clients so , downgraded back to 5.0.10. ever since then the speed of the internet is very slow. we have a 100mb connection and checking on the modem directly gives a pretty good throughput. However when the line is connected to the fortigate unit from the ISP directly , the speed is hardly reaching 1mb.

The downgrade of the firmware was done through the web manager only.

Have run diag on the interface running the adsl connection and didn't find any errors showing up in the output result.

what is going wrong ??

Ran a diag flow. looks like packets are not reaching wan2 interface at all and are going through wan1 only. Also tried changing the distance of wan1 and wan2 to same and making the priority of wan1 to 1 and wan2 to 0 so that wan2 gets used by default. however still seems to use only wan1.
0
Comment
Question by:Rajkumar Kamath
  • 2
2 Comments
 

Accepted Solution

by:
Rajkumar Kamath earned 0 total points
ID: 40557623
There are two interfaces on the fortigate. Wan1 which is for email traffic only and wan2 for internet. did a debug flow for a traceroute that I did and seem to go only through wan1 and nothing is happening via wan2. how can I fix this.
0
 

Author Closing Comment

by:Rajkumar Kamath
ID: 40559056
Issue fixed . Managed to change the priority and distance
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CMDB relationships for hardware assets 2 71
Cisco ASA 3 25
Configuring local auth. list 1 22
Failover VPN Question Sonicwall 5 31
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Is your computer hacked? learn how to detect and delete malware in your PC
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question