Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Not applicable

IPSEC VPN and inbound 1-to-1 NAT

Hi, I have a FG300 and I need to set up a site-to-site VPN to connect a remote partner. Remote partner' s equipment is a Cisco. On my FG300 there are several policy-based IPSEC VPN, all working fine. Remote partner requires to access with some clients to the servers on my internal LAN; clients IP addresses must be natted 1-to-1 eg: remote client1 IP 172.22.0.10 must be natted to 10.1.0.10; remote client2 IP 172.20.0.99 natted to 10.1.0.11 and so on; ... FG address on LAN is 10.1.0.1, server addresses from 10.1.0.5 to 10.1.0.7 FG OS 3.0 MR7 I haven' t found any tip on manuals, please help ! Thanks
9 REPLIES 9
Not applicable

you can refer the below link for FG to Cisco,but this docs talk abt full subnet mask site to site vpn, however I hope this will helpful you to get an idea. http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=13574&sliceId=1&docTypeID=DT_KCARTICLE_1_1&dialogID=5739733&stateId=0%200%205741545
Not applicable

Thanks Muhammed, I' ve read it but it doesn' t expain how to configure the nat 1-to-1 :(
Not applicable

Remote partner requires to access with some clients to the servers on my internal LAN; clients IP addresses must be natted 1-to-1 eg: remote client1 IP 172.22.0.10 must be natted to 10.1.0.10; remote client2 IP 172.20.0.99 natted to 10.1.0.11 and so on;
Can you please explain the quoted area?
Not applicable

I' ve tried to put a schema but it doesn' t work... There are 3 or 4 clients on remote pertner' s side which need to access to Servers on my side. The remote partner requires that ALL clients access to servers using a natted IP address (not the original IP address) and, because of internal policies, every client must have an assigned IP address. In other words: remote client 172.22.0.10 must be always natted to 10.1.0.10 in order to access to server1 and server2. In the same way, remote client 172.22.0.99 must be always natted to 10.1.0.11 and so on... Any suggestion?
Not applicable

If i am wrong please forgive me!! partner side:create a VIP 172.22.0.10 to 10.1.0.10 and same for other IP.. say for: on FG side- set src-subnet 10.1.0.0 255.255.255.252/30 (or create a group for the servers only) set dst-addr-type subnet set dst-subnet 10.1.0.10 255.255.255.255 /32 (partner systems or create a group destination IP) Does it make any sense? ;)
Not applicable

Ehm, I fear that I need a more precise explaination. Keeping in mind that I cannot modify in any way remote partner' s equipment, I' ve tried this way: 1) I' ve configured vpn as usual ( on FG side configured Phase 1 with preshared; remote peer address etc; local interface (=vpn interface) = port2. Phase 2 quick mode selectors configured as source address 10.1.0.0/24 and destination address 172.22.0.0/24 Firewall policy source ifc = port1; source address = 10.1.0.0/24; dest ifc = port2 dest address = 172.22.0.0/24; action = ipsec; allow inbound and outbound ) 2) checked vpn -- OK!! 3) enabled inbound NAT -- all 172.22.0.x address has been natted to FG' s port1 address... this doesn' t meet requirements :-( 4) defined a VIP as External Interface = port2 External IP Address/Range = 172.22.0.99 Mapped IP Address/Range = 10.1.0.11 NOTHING WORKED!! VIP doesn' t seem to be bound to any policy Where am I wrong??
rwpatterson
Valued Contributor III

The only way I can see this working as you desire is to create many single 1 to 1 phase 2 relations and force the mappings on a 1 to 1 basis. No way to do this religiously covering a /24 subnet.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Not applicable

The only way I can see this working as you desire is to create many single 1 to 1 phase 2 relations and force the mappings on a 1 to 1 basis. No way to do this religiously covering a /24 subnet.
Sorry, I can' t understand :-( Do you mean create a phase1 definition and many phase2 definitions (1 for every remote host)? Do you mean instead one phase1 definition, one phase2 definition and one firewall policy for every host? Can you send a configuration example, please? Thanks for your support
rwpatterson
Valued Contributor III

I mean create a phase1 definition and many phase2 definitions and firewall policies, one for every host.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors