Home site: 192.168.0.0/24
Remote site: 10.2.2.0/24
Tunnel is up. Clients on either subnet can access resources on either. Remote site FGT cannot see anything on home site.
ie can't ping 192.168.0.1 from FGT or access FortiManager and Fortianalyzer on 192.168.0.0.
id=20085 trace_id=6 func=print_pkt_detail line=5497 msg="vd-root:0 received a packet(proto=1, XX.XX.XX.XX:1024->192.168.0.100:2048) from local. type=8, code=0, id=1024, seq=0."
id=20085 trace_id=6 func=init_ip_session_common line=5657 msg="allocate a new session-0000112e"
id=20085 trace_id=6 func=ipsecdev_hard_start_xmit line=692 msg="enter IPsec interface-To_HOME"
id=20085 trace_id=6 func=ipsec_common_output4 line=804 msg="No matching IPsec selector, drop"
I'm assuming I'm missing something on the interfaces of the remote site?
WAN1: XX.XX.XX.XX (external IP)
-TO_HOME 0.0.0.0 (Tunnel Interface)
Hardware switch: 10.2.2.2
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Draw a quick pic so we can see the network layout. IP addresses are optional as long as you lay out with names, similar to:
[remote]---[10.2.2.0]--vpn--[home]
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Home: FGT200 192.168.0.100/24 (Transparent Mode) - Router - |Internet| - Remote: FGT60E NAT 10.2.2.0/24
When I change the ping-source to 10.2.2.2, I can get a reply from anything 192.168.0.x but still no connectivity to FortiManager or FortiAnalyzer (both on 192.168.0.x and can be pinged)
Remote config:
config system interface
edit "wan1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set role wan
set snmp-index 1
next
edit "wan2"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set role wan
set snmp-index 2
next
edit "dmz"
set vdom "root"
set ip 10.10.10.1 255.255.255.0
set allowaccess ping https http fgfm capwap
set status down
set type physical
set role dmz
set snmp-index 3
next
edit "modem"
set vdom "root"
set mode pppoe
set type physical
set snmp-index 4
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 5
next
edit "internal"
set vdom "root"
set ip 10.2.2.2 255.255.255.0
set allowaccess ping https ssh http fgfm capwap
set type hard-switch
set stp enable
set role lan
set snmp-index 6
next
edit "To_HOME"
set vdom "root"
set ip 0.0.0.0 255.255.255.255
set allowaccess fgfm
set type tunnel
set snmp-index 7
set interface "wan1"
next
edit "internal4"
set vdom "root"
set type physical
set snmp-index 8
next
end
Set an ip like 10.0.0.1/32 on one side, like Home-site's To_HOME interface, and 10.0.0.2/32 on "remote-ip" on the same interface. Do the opposite on the other side. Then add them to phase2 selector sets to let it access to the other side subnets. Routing would be automatically there as connected routes. When you access from the FGT, the FGT use it as the source IP. With interface-mode IPSec the tunnel interface should have an IP for routing to work.
I can see where to add this on the remote firewall on the To_HOME tunnel interface. Right now it is 0.0.0.0/32. I'm a little confused on where to add it on HOME (FGT200 transparent).
The root vdom is in transparent mode and does not have any addresses tied to an interface. Our edge router forwards UDP 500/4500 to 192.168.0.100 which is the manageip of the root vdom.
config system settings
set opmode transparent
set inspection-mode flow
set manageip 192.168.0.100/255.255.252.0
set sip-helper enable
set gui-policy-based-ipsec enable
set gui-ips enable
set gui-wireless-controller disable
set gui-allow-unnamed-policy enable
end
If there are other portions of the config I can upload, please let me know.
Thanks
I didn't know a transparent mode FGT (or vdom) can terminate IPSec VPNs. And I'm not sure if you can access the other side FROM the transparent mode FGT. I'll let the other who knows more about transparent mode speak up.
Entered a support ticket and got the problem resolved in case anyone stumbles across this.
On Phase 1 of the tunnel on the FGT200: set npu-offload disable
That's not a resolution but a work-around. It must be a bug related asic handling. What version of FortiOS are you running?
6.04
You should consider upgrading it to the latest 6.0, which is 6.0.9 released this week. Without asic-offload enabled, performance of encrypting/decrypting traffic over the tunnel is lower and it impacts CPU load.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1661 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.