config firewall policy
edit 0
set srcintf "wan1"
set dstintf "port1"
set srcaddr "all"
set dstaddr "local_192.168.1.0/24"
set action ssl-vpn
set identity-based enable
config identity-based-policy
edit 1
set schedule "always"
set groups "Guest-group"
set service "ALL"
set sslvpn-portal "full-access"
next
end
next
edit 0
set srcintf "ssl.root"
set dstintf "port1"
set srcaddr "SSLVPN_TUNNEL"
set dstaddr "local_192.168.1.0/24"
set action accept
set schedule "always"
set service "ALL"
next
edit 0
set srcintf "ssl.root"
set dstintf "port1"
set srcaddr "SSLVPN_TUNNEL"
set dstaddr "local_192.168.1.0/24"
set action accept
set schedule "always"
set groups "Guest-group"
set service "ALL"
next
config firewall policy
edit 0
set srcintf "Ipsec1"
set dstintf "port1"
set srcaddr "remote_10.10.1.0/24"
set dstaddr "local_192.168.1.0/24"
set action accept
set schedule "always"
set service "ALL"
edit 0
set srcintf "port1"
set dstintf "Ipsec1"
set srcaddr "local_192.168.1.0/24"
set dstaddr "remote_10.10.1.0/24"
set action accept
set schedule "always"
set service "ALL"
config router static
edit 0
set device Ipsec1
set dst 10.10.1.0 255.255.255.0
next
end
# get router info routing-table database
config firewall policy
edit 0
set srcintf "wan1"
set dstintf "Ipsec1"
set srcaddr "all"
set dstaddr "remote_10.10.1.0/24"
set action accept
set schedule "always"
set service "ALL"
set nat enable
next
edit 0
set srcintf "ssl.root"
set dstintf "Ipsec1"
set srcaddr "SSLVPN_TUNNEL"
set dstaddr "remote_10.10.1.0/24"
set action accept
set schedule "always"
set service "ALL"
config firewall policy
edit 0
set srcintf "Ipsec2"
set dstintf "port2"
set srcaddr "remote_192.168.1.0/24" "SSLVPN_TUNNEL"
set dstaddr "local_10.10.1.0/24"
set action accept
set schedule "always"
set service "ALL"
edit 0
set srcintf "port2"
set dstintf "Ipsec2"
set srcaddr "local_10.10.1.0/24"
set dstaddr "remote_192.168.1.0/24" "SSLVPN_TUNNEL"
set action accept
set schedule "always"
set service "ALL"
config router static
edit 0
set dst 192.168.1.0 255.255.255.0
set device "Ipsec2"
next
edit 0
set dst 192.168.8.0 255.255.255.0
set device "Ipsec2"
next
end
# diagnose sniffer packet any "host x.x.x.x and icmp" 4 0 aor
# diagnose sniffer packet any "host x.x.x.x and icmp" 6 0 a
# diag debug reset
# diag debug flow filter clear
# diag debug flow filter addr x.x.x.x
# diag debug flow filter proto 1
# diag debug flow show console enable
# diag debug flow show function-name enable
# diag debug console timestamp enable
# diag debug enable
# diag debug flow trace start 1000
(now start pinging)
# diag deb flow trace stop
# diag deb disable
# diag deb reset
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.