Hi all,
I'm wondering if there's a way to handle multiple dial-up client with the same local subnet.
I have a VDOM that act as a HUB and many spokes connected through Dial-Up connection with XAUTH authentication. From the tests I made the fact to have multiple client with the same local subnet cause instability.
Many thanks,
Maurizio
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Fix your over-lap or SNAT over-lap. We do the later if we have traffic only originating ( from the dialup ) and have them SNAT into a specific address?
e.g
( remote dialup ) (hub)
SITEA 192.168.1.0/24 SNAT-192.0.2.1 public-address-FGT@HUB
SITEB 192.168.2.0/24 SNAT-192.0.2.2 public-address-FGT@HUB
You would then use the 192.0.2.1/32 in the phase2-subnet which masks the 192.168.1.0/24. if the dialup are truly your "realm" of management, I would fix the overlap and never ever use a common 192.168.1.0/24 in a fortigate.
So for each peer define a peer in the phase1-cfg and set the phase2 for that peer with the src/dst subnets
e.g # siteA
config vpn ipsec phase1-interface edit "sitea-dynamic"
set type dynamic set interface "wan1" set ike-version 2 set keylife 20000 set authmethod signature set peertype peergrp set net-device disable set proposal aes128-sha1 set comments "SITEA" set dhgrp 14 set certificate "hubvpn" set peergrp "SITEA" set add-gw-route enable set dpd-retryinterval 60 next end
config vpn ipsec phase2-interface edit "sitea" set phase1name "sitea-dynamic" set proposal aes128-sha1 set pfs disable set comments "SITEA SNAT 192.0.2.1 " set src-subnet 10.0.0.0 255.0.0.0 set dst-subnet 192.0.2.1 255.255.255.255 next
end
e.g # siteB
config vpn ipsec phase1-interface edit "siteb-dynamic"
set type dynamic set interface "wan1" set ike-version 2 set keylife 20000 set authmethod signature set peertype peergrp set net-device disable set proposal aes128-sha1 set comments "SITEA" set dhgrp 14 set certificate "hubvpn" set peergrp "SITEB" set add-gw-route enable set dpd-retryinterval 60 next end
config vpn ipsec phase2-interface edit "siteb" set phase1name "siteb-dynamic" set proposal aes128-sha1 set pfs disable set comments "SITEB SNAT 192.0.2.2 " set src-subnet 10.0.0.0 255.0.0.0 set dst-subnet 192.0.2.2 255.255.255.255 next
end
inside peergrp with have our RSA_certificare CN, if your using some thing else ( string fqdn email ) change the config to match the remote-site remote-idenity and set the localid in the device
Ken Felix
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1633 | |
1063 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.