Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
isei_olivier
New Contributor

Site to Site VPN and ping

Hello everyone

 

First please excuse my mediocre English in the rest of this post.

 

I've recently configure a Site-to-site VPN for my company between two Fortigate 60C

 

On the HQ side the fortigate is directly behind the public IP

On the Branch side the fortigate is behind a NAT router (Freebox, french internet provider), it's IP on the subnet of this router is 192.168.0.110.

 

I've managed to set up a route based VPN (Interface + static route and policies) and no issue to bring it up.

 

The issue I get is that the VPN seems to be one way only.

I can ping from Branch to HQ and connect (using local network) with a remote controle software like AMMYY but the same from HQ to Branch doesn't work. 

I'd would really appreciate your help on this topic.

I have to add that I'm not completely familiar with the Fortigate so if you ask me some logs I would need explanation to get them.

 

Thanks,

 

Olivier

 

6 REPLIES 6
ede_pfau
SuperUser
SuperUser

hi,

 

and welcome to the forums.

 

I can only guess that you have created a dial-in VPN, with the 'hidden' branch FGT dialing in to the HQ.

On the branch FGT, you already have a static route to the HQ network, and a policy allowing 'internal' to 'tunnel'.On the HQ FGT, you have just one policy, allowing traffic from 'dial-in tunnel' to 'internal'.

 

The HQ FGT will create an ad-hoc route when the tunnel comes up - check that in Router > Monitor. It will use this route to direct the reply traffic back to the branch.

Check the network mask of this route: /32 denotes a host route only, /24 the whole branch subnet. This will determine which hosts the HQ FGT can reach.

 

For traffic originating in the HQ, you will at least need a policy 'internal' to 'dial-in tunnel', allowing ALL services for testing.

Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
isei_olivier

ede_pfau wrote:

hi,

 

and welcome to the forums.

 

I can only guess that you have created a dial-in VPN, with the 'hidden' branch FGT dialing in to the HQ.

On the branch FGT, you already have a static route to the HQ network, and a policy allowing 'internal' to 'tunnel'.On the HQ FGT, you have just one policy, allowing traffic from 'dial-in tunnel' to 'internal'.

 

The HQ FGT will create an ad-hoc route when the tunnel comes up - check that in Router > Monitor. It will use this route to direct the reply traffic back to the branch.

Check the network mask of this route: /32 denotes a host route only, /24 the whole branch subnet. This will determine which hosts the HQ FGT can reach.

 

For traffic originating in the HQ, you will at least need a policy 'internal' to 'dial-in tunnel', allowing ALL services for testing.

Hi thanks for the reply.

 

I've configure a Static IP VPN

I've set static route on both Branch and HP pointing on the remote local subnet

I've configured policies for HQ to Branch and Branch to IQ on both side

I've use /24 as network mask.

rwpatterson
Valued Contributor III

The static routes need a lower distance than the default gateway distance.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
ede_pfau

On the HQ FGT, please go to Router > Monitor (with the tunnel being up) and post the current Routing Table.

Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
isei_olivier

Here is the table.

 

The VPN is hpn_vpn_p1

rwpatterson
Valued Contributor III

Is PING enabled on the remote device's interface?

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors