I have a site to site vpn mounted with my private subnet (10.0.1.0/24) and Teltonika router RUT951 subnet (192.168.10.0/24) which is connected to internet through dial up (SIM Card Telcel). The site to site is up and successfully running on phase1 and phase2 selectors..... But I canNOT ping or telnet from server in private net to the router RUT951 itself nor any device behind the router.
But I am able to do ping or telnet successfully from router RUT951 to server in private net.
From Fortigate CLI tried to do ping on 192.168.10.1, but no luck.
My guess is the issue should be on the firewall of the router RUT951, but I am new on this so I need help.
I have both policies allowing all access from RUT951 -> PRIVATE NET and PRIVATE NET -> RUT951 like below:
PRIVATE NET -> RUT951 Policy (This one does not work if doing ping or telnet disabling or enabling NAT, same result).
RUT951 -> PRIVATE NET (This one works perfect i can do ping or telnet)
Static Routes
IPSEC TUNNEL SITE TO SITE SUCCESS STATUS.
More context:
Fortigate in a VM in AWS.
Private subnet as 10.0.1.0/24 where private server resides.
Public facing subnet 10.0.0.0/24.
My Teltonika RUT951 router subnet 192.168.10.0/24 (Internet access through SIM Card Telcel, not WAN as such).
RUT951 router ip address 192.168.10.1
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @OrtizJorge97 ,
Please specify the source IP for Ping on FGT:
execute ping-options source x.x.x.x // x.x.x.x is the IP assigned to port2
execute ping 192.168.10.1
Hi @OrtizJorge97 ,
It's because you configured the incorrect "addr" filter:
diag debug flow filter addr 10.0.1.10
It has to be 192.168.10.1
Hi @dingjerry_FTNT ,
You are right, my bad there, here below I attach the debug commands with corrected ip address filter.
Fortigate CLI, this is how it was looking even after doing "ping 192.168.10.1"
Ping from private server after running debug commands.
Regards,
It looks like you're facing a one-way communication issue in your site-to-site VPN setup between the Fortigate and RUT951 routers. Since the VPN tunnel is established and you can ping and telnet from the RUT951 router to your private network but not vice versa, there are a few areas to check.
First, verify the firewall policies on both devices. Ensure that the policies allowing traffic from your private network to the RUT951 subnet are configured correctly on the Fortigate. Double-check that NAT (Network Address Translation) is disabled in both directions, as enabling it could sometimes block communication from one side.
On the RUT951 side, check its firewall rules and ensure that it allows inbound traffic from the private network (10.0.1.0/24). Sometimes, routers like the RUT951 may have more restrictive firewall settings for inbound connections, so it's important to make sure it isn't blocking traffic from your VPN network.
Created on 12-11-2024 10:44 AM Edited on 12-11-2024 10:45 AM
Hi @ModEngine2 ,
Yes, inbound rules and firewalls allow all traffic, what is happening after so much debugging is that resources (private server) in private subnet when doing ping to 192.168.10.0/24 dont know where to point the traffic to.
in FGT CLI I inspected ping request for 192.168.10.1 to see if at least the request is coming.
so from my 10.0.1.27 server do ping on 192.168.10.1, does not reach the port2 (10.0.1.10) interface of Fortigate.
Already modified the routing tables for pointing 192.168.10.0/24 destination to the network interface of port2.
@dingjerry_FTNT Got a winner!
Turns out the problem was in the interface of FGT port2 Source/dest check was enabled in aws, this one did not allow to do ping to other ips which are not inside the 10.0.1.0/24, I just disabled this check, and now I got communication from private net to RUT951 device(s)!
Ah, glad to hear that you fixed the issue. I knew that there was nothing wrong with FGT :)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1720 | |
1095 | |
752 | |
447 | |
234 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.