This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.
Good Morning,
I'm stumbling over a problem I cannot solve. Probably just missing something. I cannot get the second VPN up and running on my fortigate 50E in HA (Active/Standby) mode with 5.6.2
Here's the setting:
I do have two separate ISPs. Both give me static IP addresses I can and do use for NAT. Also, both PPP-Interfaces do have a static IP address. Both interfaces are up and reachable from the internet.
ISP1 is faster than ISP2 but ISP2 has a higher upload rate. So, I'd like to have my VPN running over the ISP2 and only as a backup over ISP1. But all the other traffic should go over ISP1.
Therefore I configured the PPP2-interface to have the received default route with a distance of 10, the other interface with a distance of 5.
This effectivly routes all traffic from internal addresses out of ISP1. I do have two addresses which are Policy-routed towards ISP2.
This all works very well. However, my VPN not really.
I configured two VPN-connections with the help of the VPN-wizard. One is configured to be on PPP1 (interface towards ISP1, also known as WAN1) and one on PPP2 (interface towards ISP2 also known as WAN2). Both are identical with the exception of the interface of course:
edit "Androids"
set type dynamic
set interface "wan2"
set peertype any
set proposal aes256-md5 3des-sha1 aes192-sha1
set comments "VPN: Androids (Created by VPN wizard)"
set dhgrp 2
set wizard-type dialup-android
set psksecret ENC XXXX
next
edit "Android2"
set type dynamic
set interface "wan1"
set peertype any
set proposal aes256-md5 3des-sha1 aes192-sha1
set comments "VPN: Android2 (Created by VPN wizard)"
set dhgrp 2
set wizard-type dialup-android
set psksecret ENC XXXX
If I now try to connect a VPN to the address of interface WAN1 everything works all right. VPN is up and running and traffic flows as expected.
If I try to connect to the address of interface WAN2 I get a timeout. A debug shows me that the firewall tries to send a packet back but cannot find the route for the address. (error 101). Now, this is odd because there is a default route pointing towards ISP1 over interface WAN1. And I know that this provider does allow ISP2-addresses to flow through it's network. Also, a traceroute with the option of the source address set to be the IP address of interface WAN2 does lead to the same result "no route to network". But that should actually go out interface WAN2, should'nt it?
I tried to set up a policy route (source-Interface WAN2, source-add IP-wan2, dest any, outgoing WAN2) but that did not help.
What am I doing wrong here?
I do not want to change the default routes because that would create too much overhead in routing (I do not explain other internal settings here)...
Mathias
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Mathias
I think you have to set the distance to the same value (wan1 and wan2: 10) and use different values for the priority (wan1: 10, wan2: 20).
http://cookbook.fortinet.com/redundant-internet-basic-failover-56/
Under Advanced Options, set the Priority to a low number (in this example, 5). The route with a smaller value will have a higher priority. This route will be preferred over the route you will configure for your secondary backup ISP.
Marco
I really looks like you configure distances and not priorities. Equal distances and different priorities are precisely configured for that kind of use case.
Can you please share your settings for wan1/wan2? As well as sd-wan... Just want to check.
Last idea : did you implement RPF in strict mode ?
Hi Mathias
looks good so far. Please verify if you're able to ping both WAN-IP's from an external site. Do you receive an answer from both ip addresses?
Marco
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.