Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
0.0.0.0/0.0.0.0 192.168.0.99 toHub 10 0and additionally setting the phase 2 quick mode selector destination to ' 0.0.0.0' . My guts tell me that you might have a basic flaw in your design that will cause you a lot of trouble now and in the future. Your HQ network is part of your remote networks if you use a network mask wider than ' /24' . I don' t know if it is possible to change the remote subnets or the central subnet but I' d try to do that. Apart from that, on the FG200B put all VPN tunnel interfaces (spokes) into a zone and handle traffic to and from that zone alone; you don' t have to deal with 100 policies in and another 100 policies out. That applies to routing as well: you' d need one static route 192.168.1.0/23 to Spokes_zone and not 100. (How come you only route the 192.168.0.0 subnet to Spokes, and not the other 99?) The main question whether I would recommend routing all traffic to HQ and doing UTM and traffic shaping there is not easy to answer but probably not. 100 FGs give you 100 CPUs to handle AV. AV and IPS is handled not by the ASICs but the CPU, and even a FG200B can be maxed out by this. For 100 IPSec tunnels alone I would strongly consider using NP (network processor) offloading of the encryption/decryption; one prerequisite for this is that there must not be any UTM feature in the protection profile of the tunnel policy. (Of course you can AV on the remote FG - FG50Bs don' t do offloading anyway.) Combined bandwidth might well exceed your WAN bandwidth at HQ. With a remote bw of say 2 Mbps HQ must handle 200 Mbps in and 200 Mbps out. Again, I' ve got no clue what your situation is. And besides, it' s not that difficult to configure 100 FGs remotely - for that number of devices you can always justify buying a FortiManager appliance and push the configs from central to remote. So, in a nutshell, I think you' re building the perfect bottleneck there, based on the limited information that you gave us.
" (How come you only route the 192.168.0.0 subnet to Spokes, and not the other 99?)"Which other 99? Our financial manager won' t approve the FortiManager purchase. Since I was planning to join all Windows PCs behind the Spoke_networks to our HQ Active Directory domain and create domain accounts for the users on the remote locations, would using LDAP to map users ease the configuration and managment of FG devices?
In the example configuration, the protected networks 10.1.0.0/24, 10.1.1.0/24 and 10.1.2.0/24 are all part of the larger subnet 10.1.0.0/16. The steps for setting up the example hub-and-spoke configuration create a VPN among Site 1, Site 2, and the HR Network.That is similar to our configuration with 192.168.1.0/24 for the HQ subnet behind the FG Hub and 192.168.[2-255].0/24 for Spokes with a larger subnet definition as 192.168.0.0/16. Am I missing something or should this also apply to our situation?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
192.168.0.0/255.255.255.0 to Spokes 10 0which leads traffic destined to HQ (the 192.168.0 subnet only) to the spokes -?? On a remote FG you define
192.168.0.0/255.255.128.0 toHub 10 0which doesn' t cover all spokes. Here it should read ' /16' =255.255.0.0 Notice that you don' t have to define static routes to all 100 remote subnets in a dial-in VPN scenario. The remote subnet dials in and for the return traffic a temporary route is established. Otherwise, this would be the first point where a summary ' protected network' would cause a lot of work, as you shouldn' t include the local network in a route to the spokes. Still, for redirecting all traffic from a remote subnet to HQ you need to define a static route on the remote FG with destination ' 0.0.0.0' , pointing to the VPN interface (no gateway IP). And in the HQ, you need a policy from VPN_zone (if you create one) to WAN, with NAT enabled. HTH.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.