Hey everyone!
I have a site-to-site VPN between two locations. Is there a way I can pass only one IP address through for remote browsing. For example, I have a subnet of 10.0.0.0/24 on FW A that can access all internal resources on FW B (example subnet of 10.1.1.0/24). I have one workstation (10.0.0.50) on FW A that would need to access the internet through FW B. The rest of the network would still access the internet through FW A. I tried using this KB https://community.fortinet.com/t5/FortiGate/Technical-Tip-Remote-browsing-over-IPSec-VPN-tunnel/ta-p... but am unable to get what I need to work. Any help with this would be greatly appreciated!
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I believe your default route is pointing to wan2 which is why it doesn't match the policy route. You will need another static route and point it to the IPSec tunnel. You can create a static route for 8.8.8.8 for testing and point it to the IPSec tunnel. After that, run the debug flow again.
Regards,
Created on 01-08-2024 12:34 PM Edited on 01-11-2024 08:37 AM
We have something new now. It is pinging but it is going out of it's FW instead of across the VPN.
Still show that policy route is not matching, what is your current version?
5.6 right now. I have firmware to be able to update to 6.0.13
Can you try 6.0.13, and use the diag ip proute to see if policy route matching. Here is the document https://community.fortinet.com/t5/FortiGate/Technical-Tip-Verify-the-matching-policy-route/ta-p/1906...
Can I update directly from 5.6 to 6.0.13 or do I need to stair step?
I believe your default route is pointing to wan2 which is why it doesn't match the policy route. You will need another static route and point it to the IPSec tunnel. You can create a static route for 8.8.8.8 for testing and point it to the IPSec tunnel. After that, run the debug flow again.
Regards,
Please use this tool for upgrade path https://docs.fortinet.com/upgrade-tool
Created on 01-08-2024 01:02 PM Edited on 01-11-2024 08:37 AM
So I added another static route as @hbac requested. I created on for 8.8.8.8/32 with the device as the S2S VPN distance of 10 priority 0. Ran the debug flow again and got this:
The traffic is now going through the IPsec tunnel. You can run the same debug flow on FW B to see if it is being dropped or not.
Regards,
Now what do I need to change my static route to to ensure that all internet traffic from 10.0.0.50 goes through FW B and the other devices on FW A use it for internet?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1560 | |
1034 | |
749 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.