Hi Guys,
I have seen so many threads on this topic and i followed each and everyone but no success so far. I would like to explain you my situation. I have made a tunnel (route-based) between FGT and Cisco ASA and that is working fine with no issue. I have included all my networks like local, SSL and remote in IPsec phase2 selectors and implement the policies as required. My SSL user can connect to FGT successfully and can reach my local network but cant through into the Ipsec tunnel.
After few attempts, i have used a trick and changed my SSL subnet same as my local subnet and i got through into tunnel and SSL user can use resources on both local and remote network. BUT obviously this is not a solution which i want to see. I want to understand what is missing in my configuration. I would really appropriate any advise.
Local Subnet - 192.168.2.0/24
Remote Subnet - 192.168.40.0/24
SSL Subnet - 10.10.10.0/24
Regards,
Moami
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
SSL VPN comes from ssl.root, if not vdom env, just like IPSec comes from its own interface. So you have to have a route for 10.10.10.0/24 subnet to ssl.root and a policy from (and to if local or the other end of IPSec need to reach them) the SSL VPN clients. Probably you know this part well.
Then, the IPSec needs to carry the traffic fro/to 10.10.0/24 so ASA needs to have a proper route and policy (I'm not an ASA expert) for the same subnet. My guess is on the ASA side.
Hi,
Thanks for the reply,
I have already configured routing on FGT, one static route to IPsec pointing to remote network. one static route to ssl.root pointing to 10.10.10.0/24.The polices are set from IPsec to ssl.root and from ssl.root to ipsec.
The ipsec tunnel is up and running. i have configured a default route on ASA pointing to internet and setup a policy to allow FGT local and ssl subnet. Still cant access ipsec tunnel via ssl client.
Only way that things works is change my ssl subnet same as local subnet then i can connect tunnel via ssl.
I will be appreciated any advise.
Regds
Make sure the static route to both tunnels is lower than the default gateway distance.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
I still think the ASA doesn't route 10.10.10.0/24 into the tunnel while packets toward 192.168.40.0/24 are reaching ASA over the tunnel. To verify, you need to sniff packets between these subnets at the FG by disabling auto-asic-offload on the IPSec policies. You're situation is nothing different from having another router behind the FG and the router serving a separate subnet, say 192.168.50.0/24. The router needs to know where to route to get back to 10.10.10.0/24.
The cli-cmd diag debug flow is your friend.
Ken
PCNSE
NSE
StrongSwan
Thanks guys for your comments !
I have fixed this issue. I have done following steps,
FGT End:
- Created IPsec tunnel (Policy Based)
- Allowed policy LAN to WAN with ipsec action for site to site tunnel
- using one default route 0.0.0.0/0.0.0.0 ---> WAN
- Allowed policy for SSL.root to Ipsec with action ipsec, included local and remote protected traffic
ASA End:
- Created Object group for both Local. remote and ssl
- Created access-list and allowed protected traffic
- disable NAT
- Created default route outside 0.0.0.0/0.0.0.0 ---> next hop
Enjoy ! :)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.