Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
ORIGINAL: ede_pfau Remember to switch the ACTION from IPSEC to ACCEPT!Actually when you go to recreate the policy, the tunnel will not appear under the ' IPSEC' drop down any longer, so accept is the way to go.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
External Interface: internal External IP Address/Range: 172.16.48.1 - 172.16.48.90 Mapped IP Address/Range: 172.16.4.1 - 172.16.4.90Then in the policy i change destination address to my VIP. If i don' t change the static route at this point i can RDP successful with 172.16.48.x and not with 172.16.4.x. Changing the static route to 172.16.48.0/22 and point it to my tunnel interface and then it stops working again. am i using the VIP in the wrong way?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Instead of changing the static route, add a second for the .48 traffic. The FGT needs to know where the .4 traffic goes, but the LAN user needs to know where the .48 traffic goes, so both are required.But only one the .48 route is required to make the translation-tunnel part to work, or? Added route for 172.16.4.0/22 to wan1 and 172.16.48.0/22 is still routed to Tunnel interface, traffic still not finding its way..
ORIGINAL: ede_pfau 172.16.4.0/22 wan1You can' t route those RFC addresses to the Internet (unless something has changed...).
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.