Hello
I have this configuration:
Modem vdsl tplink--> interfaces in bridge mode (lan+wifi), wan ppoe linked to provider (lan 192.168.1.0/24)
Firewall 60E--> wan connected to tplink lan 1 port with static ip address 192.168.1.100, lan 1-2-3-4 internal of FG60E have address 192.168.2.0 with dhcp.
I can reach all from internal (192.168.2.0/24) to wan lan 192.168.1.0/24 but cannot reach from wan 192.168.1.0 the internal lan of fg60e 192.168.2.0, I have tried inserting a policy on the fg60e (from wan to lan all).
But it doesn't work.
I need thar from wifi address network (192.168.1.0) reach internal fg lan (192.168.2.0), can someone help me please?
Thank you
What is your routing table and gatway settings to WAN?
You need correct routing and GW to route traffic to WAN.
Fortigate <3
Well BrUz: routing shoud be correct alas there is interfaces where the subnet is on and with that there are net-routes.
I think the problem is more likely this:
if you come from the tp-link side you might not have a default gateway that knows the subnet behind the fgt.
A simple policy will only work if you use the FGT as default gateway.
Alas this might not be useful on the tp-link side since the internet comes from the tp-link you would need two things here:
The tp-link must know that the subnet behind the FGT ihas to be routed to to the FGT.
On the FGT you will need a policy to allow the traffic but as you come from an outside network you will have to do NAT on that policy.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Well sw2090: He get reply from from 192.168.2.0 to the 192.168.1.0 network.
I assume that your policy is correct.
Can you run:
1)
get router info routing-table all
2)
execute ping-options source 192.168.2.1
execute ping 8.8.8.8
francesco NewFortigate <3
Well sw2090: He get reply from from 192.168.2.0 to the 192.168.1.0 network.
I assume that your policy is correct.
Can you run:
1)
get router info routing-table all
2)
execute ping-options source 192.168.2.1
execute ping 8.8.8.8
Fortigate <3
Sorry, read the first post again and misunderstood. Thought he had problems from fgt lan to wan. :D
tp-link must tell the 192.168.1.0 network where 192.168.2.0 net is.
Fortigate <3
Hi, thank you for your answer,
do you mean the routing table on my router tplink or on the fg60e?
on my fg60e the routing table is 192.168.1.1 that is the tplink DG, I think that when I try to reach 192.168.2.x from 192.168.1.x the tplink redirect all the traffic to wan using 192.168.1.1 default gateway.
I tried also to add a static route but without success
thank you
if you want to access 192.168.2.0/24 from 192.168.1.0/24 (i.e. access the net behind your fgt from the net at your tp-link router) then the routing table on the tp-link must provide a route for 192.168.2.0/24 that leads your traffic through your tplink's port 1 to your Fortigate.
On your FGT this means:
From 192.168.1.0/24 to 192.168.2.0/24 will have to do dNAT in the policy since devices in 192.168.1.0/24 I suppose to have the tp-link as default gateway. You will not need any further routing here.
From 192.168.2.0/24 to 192.168.1.0/24 will have to have a static route pointing to port1 and the FGT as Gateay on your tp-link. Or alternatively do dNAT on the tp-link.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
User | Count |
---|---|
2037 | |
1169 | |
770 | |
448 | |
333 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.