Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Anne
New Contributor III

Lan-to-lan Ipsec tunnel

Hi there, I am trying to setup a LAN-to-LAN vpn tunnel between a Fortigate and another firewall (lets call it X). 192.168.1.0/24 -- Fortigate === VPN Tunnel === Firewall X -- 192.168.2.0/24 The firewall X has already a VPn tunnel with Firewall Y with the same ip addressing 192.168.1.0/24 -- Firewall y === VPN Tunnel === Firewall x -- 192.168.2.0/24 I would be able to setup the tunnel between the fortigate and the Firewall X but I know that it would not be able to pass the traffic through because of the existing tunnel with firewall y. How can I change the source ip of the LAN behind the Fortigate so that the Firewall X sees the traffic as 192.168.10.0/24 and not 192.168.1.0/24. How would the fortigate firewall translate the ip address back to 192.168.1.0/24 when it receives the response from the remote side. I hope I have explained what I am trying to achieve. Thanks a ton. Anne
4 REPLIES 4
Anne
New Contributor III

How can I change the source ip of the LAN behind the Fortigate on the fortigate firewall so that the Firewall X sees the traffic as 192.168.10.0/24 and not 192.168.1.0/24. How would the fortigate firewall translate the ip address back to 192.168.1.0/24 when it receives the response from the remote side.
310 4.3.6
ede_pfau
SuperUser
SuperUser

You' ve explained your plan as clear as possible. What you need to do is source-NAT the traffic that enters through the tunnel, coming from the FGT LAN. I can tell you what to configure on the FGT side, and take care of what to do on the Firewall X to handle the .10 traffic. Source NAT is done by IP pools. Here' s how (all on the FGT). You' ve got one policy ' internal' to ' tunnel2X' (or whatever you call it). First, you create an IP pool with a /24 subnet: 192.168.10.0/24. Then you check ' NAT' in the policy, check ' Dynamic NAT' and select the IP pool. That' s it. The receiving end will only see traffic coming from 192.168.10.x. The FGT will translate the whole subnet 1:1, i.e. 192.168.1.14 will become .10.14. Reply traffic coming from FW X is translated back to the original IP address. Make sure your Quick Mode selectors on FW X reflect the translated subnet, ie. .10.x now. And the route pointing back to the FGT has to be changed as well. Tell us how it went, please.
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
Anne
New Contributor III

Thanks ede_pfau. I will update you once this has been successfully implemented. Another way to do it would be using " Central NAT table" . Would that work?
ede_pfau
SuperUser
SuperUser

Yes. But IMHO the Central NAT table is the Rolls Royce when the VW IP pool will do as well. But you can try both of course.
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors