Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
rwpattersonThanks rwpatterson! I just re-setup the site-to-site IPSec VPN in Interface Mode at mid-night. Now the tunnel is up and traffic could be redirected to both side. However, I have a bit confuse with the static route and the local IP / remote IP that " should be" configured on the Interface as a virtual one. Does the virtual IP have to be setup? Because it' s indicated on the fg doc, the IPs should not be used in any network. During the traceroute, that interface IP would be one of the hop as gateway to another side... can I omit that interface IP and use the firewall' s internal IP just like in policy based vpn mode? Also, it seems that I still cannot allow the SSLVPN subnet to access to the remote Office B resource...
ORIGINAL: wcbenyip However, I have a bit confuse with the static route and the local IP / remote IP that " should be" configured on the Interface as a virtual one. Does the virtual IP have to be setup? Because it' s indicated on the fg doc, the IPs should not be used in any network. During the traceroute, that interface IP would be one of the hop as gateway to another side... can I omit that interface IP and use the firewall' s internal IP just like in policy based vpn mode?You only need the interface IP if you are doing higher level routing (OSPF, BGP, etc).
Also, it seems that I still cannot allow the SSLVPN subnet to access to the remote Office B resource...The easiest way to fix that would be to NAT that traffic with an IP address that is permitted in the phase 2 selectors for the tunnel. The long way would be to add another phase 2 that covers the SSL VPN IP subnet. Oh yes, and the correct policy needs to be in place!
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.