Hi
Our current HQ, uses Fortigate firewalls
Situation a few months ago:
BranchA had FirewallBrandA, and connected to HQ via IPSEC VPN. Users connect to branch via FirewallBrandA VPN client
BranchB had FirewallBrandB and connected to HQ via IPSEC VPN. Users connect to branchB via FirewalBrandB VPN client
Current situation:
The 2 branches merged physically.
Each 'branch' is still using the same setup as when separated except for the internet which is now common.
Planned solution:
We are going to replace FirewallBrandA and FirewallBrandB with only one Fortigate.
Initial thought was to plug each 'branch' on a different interface and have their own rules
Q1: Do we keep 2 IPSEC VPN to HQ, or can we have only 1? Not sure if we can have 2 VPN links pointing to the same HQ IP. On the other hand, I do not know how to set up a VPN link using 2 interfaces (and rules). Is it possible and how?
Q2: what about SSLVPN: I have played on our HQ firewall with having 2 SSLPortals, with each one authenticating against a different Radius server (and having their own subnets and rules). It seems to work but looks it is flaky. Also, not sure how Fortigate decices which portal to use depending of the user.
For example, from the same https address, how can UserA be authenticated by RadiusA and then get access to BranchA and how UserB be authenticated by RadiusB and then get access to BranchB
I also looked at Vlan on Fortigate on the same interface, to connect each 'branch', but will it not be the same for Ipsec and SSLVPN?
Any input would be greatly appreciated
Thanks in advance
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Did you ever get this figured out? It sounds to me like you need only one VPN link between HQ and new merged branch, but possibly different policies on the branch FortiGate to apply appropriately to legacy BranchA and BranchB. This is more a matter of understanding what can be done with policies on the FortiGate than anything else super complicated.
Hi
Sort of, but not tested yet. We only get the units last week and have not been able to work on it.
Found this article that might be the answer: https://cookbook.fortinet.com/using-zones-to-simplify-firewall-policies-56/
Will find out in a couple of weeks!
Cheers
Well both is possible.
I here e.g. use two ipsecs over different wan interfaces to have redundancy. Both route the same subnet(s). Redundancy is done by priority based routing (i.e. it primary uses the tunnel that has the route with the lowest prio and if that don't work it uses the other one).
If you don't want/need redundancy you don't need two ipsec tunnels anymore.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1518 | |
1018 | |
749 | |
443 | |
209 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.