hi,
and welcome to the forums.
One aside, ' noobitude' got me cracking! Besides, we' re all coming from (and some still remain) there.
OK, first, I recommend you get the FortiOS Handbook and the Cookbook from http://docs.fortinet.com . Especially the Cookbook offers realworld setups with recipes to follow.
The kind of setup you are setting up is called ' hub and spoke VPN' , or at least you could implement a h&s to achieve what you are aiming at. Basically, you open up the tunnel to carry all other subnets (that' s why a supernet of all remote subnets would be VERY handy), and create static routes for each remote subnet on each satellite firewall. That is the fully routed / fully meshed setup. YMMV.
Please note that this has nothing to do with having Fortigates or Watchguards in place. It' s just about routing and IPsec VPN Quick Selectors.
On a FGT, you just create several phase2' s for one main phase1 to make the tunnel carry different subnets. In each phase2, you specify the source subnet (the net of the remote FGT) and one of the several subnets behind the branch office.
Then, the policy for the VPN ingress and egress traffic has to allow for the additional subnets also. So you will have to define address objects, one for each remote-remote subnet.
All these policies - one per phase2 - will likely clutter your policy table a bit. There are 2 constructs in FortiOS to make your life easier:
- a zone may consist of several interfaces/ports/VPN virtual interfaces and can be used in a common policy as source or destination port
- an address group combines several address objects (here: subnets)
You can take advantage of a zone policy (so to say) if you can live with a common policy, i.e. restrictions like services, schedule, UTM etc. If not, you will have to do with separate policies.
This is the coarse outlining for one remote FGT only. If you want every remote subnet to be able to reach this subnet also, you will have to set this up for each remote firewall.
A couple of questions come to my mind:
1. which version of FortiOS is used? 4.2 or 4.3 should be OK, stable and well documented.
2. how many leaves are you going to mesh? <n> leaves make <n> x <n-1> connections if fully meshed so this gets out of hand pretty quick.
3. Would it be possible to restructure your remote firewalls so that you would have a common supernet for the branches alone and a separate subnet for the central hub? This could potentially be much less effort than fully mesh single subnets.
4. I am always assuming that you have set up the IPsec VPN in Interface Mode, not in Policy Mode. You have to tick the first checkbox when creating phase1. This setting cannot be changed afterwards. If your VPN is in Policy Mode, recreate it in Interface Mode (that is, don' t even try to get by with Policy Mode).
The examples in the Handbook and/or the Cookbook should help you as well. Depending on the number of branches a straightforward ' hub and spoke' setup might mean less effort than the way I have described.
Feel free to let us know how it went.
Ede Kernel panic: Aiee, killing interrupt handler!