Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ping Problem after SSL VPN Connection
Hi
I ' m using fortigate SSL VPN to setup vpn tunnel between a computer in external network ( internet ) and our network behind fortigate gateway
after verification in our forum i test with ceation local user and ssl profiles etc ...
when i try to connect tou our network using SSL VPN
server : ip adresse of our gateway:10433
username and password
connection ==)>ok
but i can ping only to my ip adresse not for all other network ip adresse and i can not access to our sharing ressources
Could you give me solution for this problem
Thank You
oukabri Lassaad
Information Technology Engineer
ATU Tunisie S.A.R.L
Zine El Abidine Ben Ali Enfidha International Airport
Tunis-TUNISIA
Phone : (+216) 98 702 603
www.atu.com.tr
oukabri Lassaad Information Technology Engineer ATU Tunisie S.A.R.L Zine
El Abidine Ben Ali Enfidha International Airport Tunis-TUNISIA Phone :
(+216) 98 702 603 www.atu.com.tr
23 REPLIES 23

Not applicable
Created on ‎01-06-2010 12:48 AM
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
hi
which firmware version are you using?
How do your policies look like?
I would guess you' re missing a policy from the ssl.root to the desired interface and subnet
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you referring to the remote PC network shares being dropped? If so, you need to look into ' Split Tunneling' .
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Bob - self proclaimed posting junkie!See my Fortigate related scripts
at: http://fortigate.camerabob.com
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Team
firmware version : Fortigate-60B 3.00-b0 744(MR7 Patch6)
policies look :
1/ external -->internal
action SSL-VPN
All --->LAN
2/ssl.root ---->port 1 external
all--->all
accept
3/ ssl.root ---->port2 external
accept
PLZ have you demonstration with pictures to all steps in fortigate
Thank you very much
oukabri Lassaad
Information Technology Engineer
ATU Tunisie S.A.R.L
Zine El Abidine Ben Ali Enfidha International Airport
Tunis-TUNISIA
Phone : (+216) 98 702 603
www.atu.com.tr
oukabri Lassaad Information Technology Engineer ATU Tunisie S.A.R.L Zine
El Abidine Ben Ali Enfidha International Airport Tunis-TUNISIA Phone :
(+216) 98 702 603 www.atu.com.tr
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
For tunnel mode, you should have:
1) Policy from outside to ssl.root (SSL-VPN)
2) Policy from ssl.root to internal entity(s) (ACCEPT)
3) Static route for SSL VPN IP range from inside to ssl.root
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Bob - self proclaimed posting junkie!See my Fortigate related scripts
at: http://fortigate.camerabob.com
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Team
I configure Fortigate SSL VPN using this document :http://www.beyaz.net/tr/dokumanlar/fortinet-ssl-vpn-konfigurasyonu.html
Connection --->OK
ping --->NOK
Please See attachement for recieved bytes
Thank you

oukabri Lassaad
Information Technology Engineer
ATU Tunisie S.A.R.L
Zine El Abidine Ben Ali Enfidha International Airport
Tunis-TUNISIA
Phone : (+216) 98 702 603
www.atu.com.tr
oukabri Lassaad Information Technology Engineer ATU Tunisie S.A.R.L Zine
El Abidine Ben Ali Enfidha International Airport Tunis-TUNISIA Phone :
(+216) 98 702 603 www.atu.com.tr
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Team
just please verify with me this problem
when i do ipconfig /all
i have ansewer but gateway is wrong is the same like my ipadress so i can not ping
PLease can you verify with me
Thank you
oukabri Lassaad
Information Technology Engineer
ATU Tunisie S.A.R.L
Zine El Abidine Ben Ali Enfidha International Airport
Tunis-TUNISIA
Phone : (+216) 98 702 603
www.atu.com.tr
oukabri Lassaad Information Technology Engineer ATU Tunisie S.A.R.L Zine
El Abidine Ben Ali Enfidha International Airport Tunis-TUNISIA Phone :
(+216) 98 702 603 www.atu.com.tr
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Try changing your static route and use the destination as your ssl-vpn IP range and the gateway set to ssl.root
The IP you are given will be the same as your gateway i.e.
Say the range was configured 10.254.254.0/24
You connect to the VPN, you are given 10.254.254.1 as your address and this is also set as your gateway. You then attempt your ping, which is allowed using the following policies:
External (Internet) -> ssl.root
ACTION = SSL-VPN
Service = ANY
(also ensure you respective users/groups are defined in this policy)
ssl.root -> Internal
ACTION = ACCEPT
Service = Any (change this once you have it working to ICMP_ANY or ECHO, etc)
Now if you attempt to PING an Internal node it should work.
Routing:
i.e. internal 192.168.2.2
ping 192.168.2.2
With you being connected to the VPN, and your default gatetway being 10.254.254.1 the traffic will be forwarded to this interface. With your destination being set to the range 10.254.254.0/24 - gateway ssl.root, your policy ssl.root -> internal - ACCEPT - ANY should see these packets routed to the internal network.
Providing the internal node does not have a firewall enabled, and routing is configured correctly you will get your reply?
Hope this helps?
Fortigate 1000A
v4.0,build194,100121 (MR1 Patch 4)
Fortianalyzer 800B
v4.0,build0130 (MR1 Patch 3)
Fortigate 1000A v4.0,build194,100121 (MR1 Patch 4) Fortianalyzer 800B
v4.0,build0130 (MR1 Patch 3)
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello Team
I' m so sorry because i test with this configuration but allways the same problem
This a part of my ipconfig /all
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Broadcom NetLink (TM) Gigabit Ethern
et
Physical Address. . . . . . . . . : X-X-X-X-X-X
Dhcp Enabled. . . . . . . . . . . : No
IP Address. . . . . . . . . . . . : 192.168.5.183
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.5.1
DNS Servers . . . . . . . . . . . : 192.168.5.1
Ethernet adapter Local Area Connection 3:
Media State . . . . . . . . . . . : Media disconnected
Description . . . . . . . . . . . : Fortinet virtual adapter
Physical Address. . . . . . . . . : X-X-X-X-X-X
PPP adapter fortissl:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : WAN (PPP/SLIP) Interface
Physical Address. . . . . . . . . : X-X-X-X-X-X
Dhcp Enabled. . . . . . . . . . . : No
IP Address. . . . . . . . . . . . : 10.185.200.235
Subnet Mask . . . . . . . . . . . : 255.255.255.255
Default Gateway . . . . . . . . . : 10.185.200.235
DNS Servers . . . . . . . . . . . : 10.185.200.3
10.185.200.4
Primary WINS Server . . . . . . . : 10.185.200.4
Secondary WINS Server . . . . . . : 10.185.200.3
My IP range 10.185.200.235 ---->10.185.200.239
Please can you explain to me what i put in the part of
static route
destination IP/Mask : ..................
Devise : ssl.root
gatway 0.0.0.0
--->all time recieved bytes is 139
Thank you
oukabri Lassaad
Information Technology Engineer
ATU Tunisie S.A.R.L
Zine El Abidine Ben Ali Enfidha International Airport
Tunis-TUNISIA
Phone : (+216) 98 702 603
www.atu.com.tr
oukabri Lassaad Information Technology Engineer ATU Tunisie S.A.R.L Zine
El Abidine Ben Ali Enfidha International Airport Tunis-TUNISIA Phone :
(+216) 98 702 603 www.atu.com.tr
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
you should use a different IP range from your internal range!
Rackmount your Fortinet --> http://www.rackmount.it/fortirack
Rackmount your Fortinet --> http://www.rackmount.it/fortirack
