ec2 windows print server can't communicate with wifi printer

0

Hello, we have a windows 2016 print server we host in an ec2 instance. We have a FortiGate firewall that all the traffic routes to locally on our site. I have it configured where if a printer is hardwired, the server can see it just fine but when I try the same printer over wifi it refuses. I have the static routes configured since I am able to rdp into it on the same IoT wifi network. I did a wireshark capture and it just pulls a tcp retransmission. I have the port (9100) allowed for the inbound rules and on the outbound allow everything since it is over a private vpc. I checked firewall rules and it allows all traffic as well. Any ideas on this will be greatly appreciated. If I missed any details please let me know.

  • You mentioned that you have configured static routes and have allowed the necessary port (9100) for inbound rules on your FortiGate firewall. Additionally, the firewall rules allow all traffic, and the communication is taking place over a private VPC. However, you are still experiencing connectivity problems.

    To troubleshoot the issue, here are a few suggestions:

    Verify Wi-Fi connectivity: Ensure that the Wi-Fi network is functioning properly and that the EC2 instance hosting the print server has a stable and reliable connection to the Wi-Fi network.

    Check security group settings: Confirm that the security group associated with the EC2 instance allows inbound and outbound traffic on the necessary ports (e.g., port 9100) for printer communication.

Skyler
已提問 1 年前檢視次數 460 次
3 個答案
0
已接受的答案

Hello all, I ended up figuring out my issue here. For some reason, it was using our "backup" tunnel setup in AWS. It was using Tunnel2 rather than Tunnel1. After doing some packet captures on our FortiGate itself, it showed me this. After finding this out, I had to update the subnet on the Tunnel2 on the Firewall and then add the policy. After that, everything started kicking along. I do not know why it started using the other tunnel though.

Skyler
已回答 1 年前
  • By performing packet captures on your FortiGate firewall, you were able to identify this discrepancy. To fix the issue, you updated the subnet on Tunnel2 and added the necessary policy. After making these changes, everything started functioning properly.

    As for why the system started using the other tunnel, it could be due to various factors such as configuration changes, routing issues, or automatic failover mechanisms. Without more information, it is difficult to pinpoint the exact cause. However, the important thing is that you were able to troubleshoot and resolve the issue successfully.

    If you have any further questions or need assistance with anything else, feel free to ask. I'm here to help!

0

Do you have the ip routes on your network and vpc configured correctly?

Are the NACLs configured to allow bi directional traffic?

Does the security group on the ec2 allow outbound traffic to the subnet assigned to your WiFi network?

profile picture
專家
已回答 1 年前
0

Do you have same routing and firewall rule in AWS VPC/ EC2 sg/acl/ VPN encryption / Fortigate, for WIFI and WIRED network CIDR IP Address of your printer ?

已回答 1 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南