After many hours of trying to get this to work, I've got it working. Can anyone tell me any other settings I should be changing (NAT on or off on rules?) and why I can't log into the fortigate admin interface via the VPN connection.
I'll run down how I got it working.
Fortigate running 5.2.10
Internal subnet 192.168.50.0/24
Internal DNS & DHCP server 192.168.50.11
VPN subnet 192.168.70.0/24
Setup 192.168.70.0/24 subnet on Windows DHCP server (192.168.50.11), set value 003 (router) to 192.168.70.1, all other ip config vars should also be set either manually in this subnet or from a global option eg. DNS servers, suffix name.
On Fortigate create User&Device group for vpn auth users, then create and add users to this group
In fortigate create new custom tunnel >
[ul]
In Policy objects create the VPN subnet 192.168.70.0/24 on any interface, (should already have the local subnet on there too)
Create two policy rules >
[ul]
Open the cli and run:
config vpn ipsec phase2-interface
edit "newly created VPN interface name"
set dhcp-ipsec enable
next
end
Go to System Interfaces, edit new interface VPN tunnel
Set IP and remote IP as 192.168.70.1
Uncheck all Administrative Access options
Enable DHCP
Advanced - Set to Relay, DHCP server 192.168.50.11, Type IPSec
Install Forticlient VPN on offsite computer
Add connection
[ul]
So that's what I've done to successfully get an offsite computer to connect to internal DHCP, as said above not really sure on the NAT settings for the policy rules and I can't access the fortigate web access from a remote computer, fortigate is on 192.168.50.1, the policies are allowing all traffic to and from 50.0 and 70.0 but this is still blocked. I've checked HTTPS on Administrative Access on the 192.168.70.1 VPN tunnel interface but still can't login to web access, either via 192.168.50.1 or 192.168.70.1.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
If you can ping the admin access interface IP when the VPN is up, port conflict with SSL VPN (default 443) is likely the problem. You need to change either of them to something else. I saw the same case in a different thread.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.