I have a Fortigate 60D at my remote office. I have a IPSec VPN from my remote office to corporate:
Remote network 192.169.1.x
Corporate network 172.16.x.x
This is all working ok.
I have enabled dns-server on my internal interface:
config system dns-server
edit "internal"
set mode recursive
set webfilter-profile ''
next
end
I have a dns zone for the corporate network:
# get
name : corporate
status : enable
domain : corporate.com
type : master
view : shadow
ttl : 10
authoritative : disable
forwarder : "172.16.1.46"
source-ip : 0.0.0.0
allow-transfer :
primary-name : cp-dc01
contact : bbergquist@canoga.com
If I try resolving an entry such as "somehost.corporate.com" using nslookup, it fails.
Nothing seems to be forwarding to the DNS server @ 172.16.1.46.
Just on a whim now, I try pinging 172.16.1.46 from the unit:
FGT60D4615029118 # execute ping 172.16.1.46
PING 172.16.1.46 (172.16.1.46): 56 data bytes
--- 172.16.1.46 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
FGT60D4615029118 #
I can ping this from any workstation on the internal network however.
So I guess how do I setup to do forwarding over the VPN to the corporate network's DNS server? I don't really understand why I cannot ping from the Fortigate unit either.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Actually, I believe I have solved the issue. I needed to set the source-ip to be the internal IP of the firewall which I believe is allowing the request to be properly picked up by the Phase 2 Selectors of the IPSec VPN tunnel to direct the forwarding across the VPN.
I also figured out the ping issue with the
execute ping-options source 192.169.1.1
which again I believe is allowing the request to be mapped by the Phase 2 Selectors of the IPSec VPN tunnel to direct the ping across the VPN.
You are correct. The important factor here is traffic initiated by the FortiGate itself or traffic passing through the FortiGate. When traffic is initiated by the FortiGate it will use it's own routing table to look up the destination and then use the IP address of the most nearby interface as it's source. When doing "execute ping 172.16.1.46" it will select the outside IP address as its source, but it cannot send the packet out on the WAN link nor the VPN tunnel as the source does not match. For many things this is worked around on the FortiGate by using the source-ip command, such as DNS, syslog, radius, tacacs. In problematic situations for these kinds of management traffic, it is better to use multiple VDOM's and use root as management VDOM. This is also more secure as management traffic is split off from production. But yea not so useful for these smaller 60D units :)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.