Hi
We have a situation where we have a point to point VPN between two Fortigates, and we need to be able to connect a fortianalyser behind one of the fortigates to the remote fortigate. Because of some internal routing issues, the internal interface of the remote fortigate is not routable from the fortianaylser, or the local fortigate. What we have done is set the remote fortigate up to NAT traffic to/from its internal network, over the VPN link. This works great for devices behind the remote fortigate, but not for traffic originating from the remote fortigate.
E.g. local fortianalyser is 10.1.1.1, local fortigate is 10.2.1.1, then the internet/VPN tunnel, then the remote fortigate is 20.1.1.1 on the internal interface, and devices are 20.1.1.x behind it. Traffic on the 10 networks, thinks that the remote subnet is 10.99.1.x, and is reached via the VPN tunnel. We have created multiple IP pools on the remote fortinet such that 10.99.1.5 maps to 20.1.1.5, and 10.99.1.6 maps to 20.1.1.6 etc. (we only have a few remote devices). We have also created a pool for the inside interface of the remote fortigate so that 10.99.1.1 maps to 20.1.1.1.
If you ping 10.99.1.1 from the fortianalyser, the remote firewall responds ok - great!! And the same for the other devices on the remote subnet. In fact the devices on the remote subnet work fine, its just getting traffic originating from the remote fortigate itself we are having issues with.
A debug trace of pings from the fortianalyser show the incoming ping being DNAT'ed on the way in, and the response being SNAT'ed on the way out to the VPN tunnel- perfect.
A debug trace of the fortigate trying to connect to the fortianalyser on port 514 shows that the packed is not being SNAT'ed before being poked in the VPN tunnel.
Any ideas. Oh by the way both ends are running 5.2.4.
Thanks
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
You can try setting the "source-ip" parameter in "conf sys fortianalyzer setting" on your remote FG to the internal IP address of your remote FG. That should do the trick.
I've got a similar issue accessing when trying to access a remote FG's internal interface from a local FG ( over vpn ) and I'm not sure NATs will solve this ... but that's only between the 2 FGs - the remote FG should be able to log to the FAZ fine over the VPN ( using the above setting ).
Regards, Robby
Sorry, I should have mentioned, we tried that and it made no difference.
Its almost as if locally generated traffic on the firewall enters the network stack after the SNAT process takes place, so it doesn't get NAT'ed
Hello, Please look at the below policy, you will have an idea. config firewall policy edit 2 set srcintf "port2" set dstintf "port1" set srcaddr "10.129.0.24" set dstaddr "Remote_LAN_10.130" set action ipsec set schedule "always" set service "ANY" set natip 20.20.20.20 255.255.255.255 set inbound enable set outbound enable set natoutbound enable set vpntunnel "VPN_To_Atl36" next
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.