Recently we setup a DR site with a new FGT100F firewall.
we configured a IPsec site-to-site tunnel from our main firewall to the new DR site.
the tunnel is working and we can connect to the DR site with no issues.
But when we realize that SSLVPN users cannot connect to the DR site.
is there any special routing needed at both end of the firewall in order for SSLVPN users to connect to the DR site.
SSLVPN have no issues connecting back to main office subnet or other remote office subnets which are connected via MPLS circuits.
main office -> 172.16.0.0/24 <-----------> new DR site 172.32.0.0/24
SSLVPN users -> 172.15.0.0/24
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @yeowkm99 ,
As I have understand you are trying to access DR subnet as below setup.
[Src : Remote User]---------SSLVPN-------[Main Office]---------Ipsec VPN-------[DR Office]-----[Dst]
Refer below article and verify the configuration.
If you have found a solution, please like and mark it as solved to make it easily accessible for everyone.
Thanks,
Hi yeowkm99,
On the main office Fortigate the IPsec traffic selectors should include 172.15.0.0/24 (local) to 172.32.0.0/24 (remote)
In the SSL VPN portal, if split tunnel is enabled then add 172.32.0.0/24 to the list in routing address override.------> This should answer your above query
There should be a policy from SSL VPN to IPsec tunnel interface where source should be 172.15.0.0/24 and destination should be 172.32.0.0/24
On the DR FortIgate,
IPsec traffic selector should include 172.32.0.0/24 (local) to 172.15.0.0/24 (remote)
Add the destination 172.15.0.0/24 in the existing IPsec policy.
Hi @yeowkm99 ,
As I have understand you are trying to access DR subnet as below setup.
[Src : Remote User]---------SSLVPN-------[Main Office]---------Ipsec VPN-------[DR Office]-----[Dst]
Refer below article and verify the configuration.
If you have found a solution, please like and mark it as solved to make it easily accessible for everyone.
Thanks,
I don't understand what it means by this
"When the dialup tunnel split tunnel enable needs to have the routing address in our case it needs to have 10.158.0.0/20 and 10.157.0.0/20"
Hi yeowkm99,
On the main office Fortigate the IPsec traffic selectors should include 172.15.0.0/24 (local) to 172.32.0.0/24 (remote)
In the SSL VPN portal, if split tunnel is enabled then add 172.32.0.0/24 to the list in routing address override.------> This should answer your above query
There should be a policy from SSL VPN to IPsec tunnel interface where source should be 172.15.0.0/24 and destination should be 172.32.0.0/24
On the DR FortIgate,
IPsec traffic selector should include 172.32.0.0/24 (local) to 172.15.0.0/24 (remote)
Add the destination 172.15.0.0/24 in the existing IPsec policy.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1733 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.