I think i'm being slow here so here goes my post.
Fortigate 1: Internal 172.10.100.1 - DHCP Server 172.100.100.100-110
Fortigate 2: Internal 192.168.40.1 - DHCP Server Relay, 172.100.100.1 IPSEC
Both Fortigates are connected together via IPSEC VPN with all the policies goes ALL->ALL.
I can get a device on Fortigate 1 to get a DHCP address, but nothing but 169 addresses on a client connected to Fortigate 2. I know I have the basic setup correct as if I enable the internal DHCP server on Fortigate 2 my two clients can talk to each other.
I've also tried changing the DHCP server on Fortigate 1 from Regular to IPSec but still don't get anything.
My basic sniffing, diag sniffer any port2 udp 1 doesn't show any request on Fortigate 1 from Fortigate 2
Any assistance would be great.
Oops, sorry, your post got lost somehow...
I'd first check that there is a valid route to the DHCP server's address which you want to use as a relay. If not even unicast requests make it to subnet1 then the routing isn't correct.
I see from your post that subnet1 is 172.10.100.1 but the server is on 172.100.x.y - just a typo?
Which netmask are you using?
Does it corrspond to the Quick Mode selectors in the phase2 of your VPN?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1741 | |
1109 | |
753 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.