Hello,
i'm trying to set up a Dialup ipsec vpn with cisco Duo as Mfa in order to allow remote users to connect to my company.
The fortigate version 7.4.7 has 4 Vdoms (root + internet, mydmz, myvpn).
the internet vdom is used to manage internet traffic inbound and outbound.
mydmz vdom exposes my public services and has ip 161.10.10.1/28, the myvpn vdom instead is where i want to terminate the vpn and has ip 161.10.10.6/28 (this is the ip configured in forticlient).
I'm able to ping ip 161.10.10.6 and from a debug flow i see the traffic passing correctly from port 10 associated to internet vdom to port11 associated to mydmz vdom (i'm not able to see traffic arriving to port 12 in the myvpn vdom but the ping is ok....).
However when connecting via forticlient (version 7.4.3 or 7.4.0) i see in the log UNIDIRECTIONAL flow from outside to inside and never viceversa; internet to mydmz vdom.
What could be the problem?
The policy to allow traffic from internet to myvpn vdom is in place (i'm not using inter vdom links), why ping is ok and ike is unidirectional?
Do you have any tips? i'm stuck in this situation for 15 days....
It's a little bit hard to explain by writing but tell me if you have any question.
this is the log:
id=65308 trace_id=124 func=print_pkt_detail line=5932 msg="vd-internetTLC:0 received a packet(proto=17, 65.6.5.4:500->161.10.10.6:500) tun_id=0.0.0.0 from port10.25. "
id=65308 trace_id=124 func=resolve_ip_tuple_fast line=6027 msg="Find an existing session, id-982f4d2e, original direction"
id=65308 trace_id=124 func=npu_handle_session44 line=1342 msg="Trying to offloading session from port10.25 to port11.220, skb.npu_flag=00000400 ses.state=00012204 ses.npu_state=0x00003094"
id=65308 trace_id=124 func=np7_fos_set_nturbo_ips_fwd_session line=594 msg="push nturbo session oid 12"
id=65308 trace_id=124 func=np7_fos_set_nturbo_ips_fwd_session line=600 msg="ses->npu_state 0x3094 pnpu->pol_nturbo_acct_idx 358"
id=65308 trace_id=124 func=ip_session_install_npu_session line=386 msg="npu session installation succeeded"
id=65308 trace_id=124 func=fw_forward_dirty_handler line=444 msg="state=00012204, state2=00000301, npu_state=00003494"
id=65308 trace_id=124 func=np7_hif_nturbo_build_vtag line=912 msg="vtag->magic d153beef, vtag->coretag 130, vtag->vid 120
vtag->sip[0] 0, vtag->sip[1] 0, vtag->sip[2] 0, vtag->sip[3] 0
vtag->sport 0, vtag->mtu 1500, vtag->flags 0, vtag->np7_index 64"
Thank you
User | Count |
---|---|
2587 | |
1380 | |
796 | |
658 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.