Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
szgabor
New Contributor

AD authenticatition problem over a VPN connection [SOLVED]

Hello,

 

We have two sites with one AD Domain Controller on each side. The two sites are connected to each other with a VPN connection. Everything works fine, but I would like to set the other site's DC in our FortiGate FG-60F (FortiOS 7.0) firewall as a secondary (safety) authentication option.

The problem is that the firewall can not access the other site's AD-DC, because it uses its outside IP address as source address which is not part of the IPSec settings. I checked the communication in CLI using the 'diagnose sniffer packets any' command.

I would like to make SNAT to change the source address to the firewall's inside IP address.

As I saw its solution would be the usage of the IP Pools. I have created an IP Pool with FortiGate's inside IP address and I used this pool in a firewall policy.

 

The main settings of the policy:

Incoming Interface: Internet (wan1)

Outgoing Interface: OtherSiteVPN

Source: Fortigate's outside IP address

Destination: Other site's AD-DC

NAT: on

IP Pool Configuration: Use Dynamic IP Pool (with the matching pool in the list)

 

Even after these settings, the firewall uses its outside IP address and can not access the other site's AD-DC.

 

What did I do wrong?

 

Thank you in advance for your help!

 

 

Best regards,

Gábor

 

1 Solution
supportombm
New Contributor III

Hi Gàbor, 

it's more easy than that!

in the cli 

[align=left]# config user ldap [/align][align=left](ldap) edit 1stLDAPServer (1stLDAPServer) set source-ip 192.168.1.99  (1stLDAPServer) end[/align][align=left]where source ip is the IP of the lan interface which is autheticated on phase2 policy[/align]

View solution in original post

3 REPLIES 3
supportombm
New Contributor III

Hi Gàbor, 

it's more easy than that!

in the cli 

[align=left]# config user ldap [/align][align=left](ldap) edit 1stLDAPServer (1stLDAPServer) set source-ip 192.168.1.99  (1stLDAPServer) end[/align][align=left]where source ip is the IP of the lan interface which is autheticated on phase2 policy[/align]
szgabor

Hi,

Your solution works perfectly! It was much simpler than I thought. :)

Thank you so much for your quick tip!

supportombm
New Contributor III

Love always 

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors