Hello,
In a local network, a device like the FortiGate existed and clients connecting to it for use the Internet. The traceroute output is:
$ sudo traceroute -4 google.com -I
traceroute to google.com (216.239.38.120), 30 hops max, 60 byte packets
1 192.168.1.1 (192.168.1.1) 3.090 ms 3.412 ms 3.720 ms
2 two.two.two.two (2.0.0.2) 0.692 ms 0.796 ms 0.904 ms
3 192.168.1.200 (192.168.1.200) 0.202 ms 0.181 ms 0.169 ms
...
16 any-in-2678.1e100.net (216.239.38.120) 33.692 ms 33.689 ms 33.685 ms
I scanned 192.168.1.200 IP address with the Nmap, but it couldn’t detect any open ports. How can I find the port that packets pass through it?
There are ports that are filtered there, this could indicate something like an IP address whitelist, where in order to connect, you have to have a certain IP address, maybe a VPN appliance or something.
Fortigate is a Firewall device with different technics to prevent from port scanning. You can see that your first scan failed because ICMP is blocked on devices like this.
It also filtered your other scans. This could be caused by a Policy or IDS/IPS.
This does not mean there are no open ports, you just can not scan for them.
Web Application Firewalls commonly only allow certain traffic to certain websites with certain applications. My suggestion would be to use Google to find something along the lines of “bypass WAF scan” or maybe even read NMAP’s man page.