Hello everyone,
I'm trying to figure out how I can allow one of my Fortinet inferface to be able to ping the "IPsec VPN" IP of my remote users (connected with Forticlient).
From the Fortinet itself, I'm able to ping those IPsec VPN connected workstations just fine, but I'm unable to do the same from any other interfaces (i.e. like from a server behind the Fortigate).
I already created an IPv4 Policy to allow the "PING" to go through between one of my internal interface to the interface of the "IPsec" interface, but that does not seem to work...
I also tried adding a static route, but that did not seem to help.
Anyone faced a similar issue like this before ?
Thanks for your help and best regards,
--
Eric
--
Eric
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
hi,
and welcome to the forums.
For a dial-in IPsec VPN, the FGT will dynamically create a host route back to the FortiClient host. So you will not need a static route (to which gateway anyway??). But you need a policy to allow outbound traffic.
Can you try to access the client's host in a different way? Windows PCs often block ping by the internal Windows firewall (for which I hate it).
Or just make sure there is no software (Win FW, AV "all around security package") blocking external access.
I'm actually not only trying to allow "ping" from a device (workstation/server) within my organization to the "Ipsec VPN connected devices (with forticlient)", but I would like to allow other kinds of traffic as well (i.e. being able to access the local C$ shared drive on one of those remote workstations). Once I can get the ICMP (ping) working, the rest should be easy-peasy...
--
Eric
hi,
and welcome to the forums.
For a dial-in IPsec VPN, the FGT will dynamically create a host route back to the FortiClient host. So you will not need a static route (to which gateway anyway??). But you need a policy to allow outbound traffic.
Can you try to access the client's host in a different way? Windows PCs often block ping by the internal Windows firewall (for which I hate it).
Or just make sure there is no software (Win FW, AV "all around security package") blocking external access.
Hello Ede,
Thank you so much for your response about my current issue!
I was assuming that a static route was not required, thanks for clearing that one out.
I already have a policy that has been created for trying to get the ICMPv4 to get through:
- From: <my_internal_interface>
- To: <my_IPsec_VPN_interface>
- Source: <one of my servers>
- Destination: <List_of_IP_addresses_used_by_IPsec_VPN_forticlients>
- Service: Ping and Traceroute
On the Windows PC connected with forticlient, I even turned off the firewall.
I can ping it using the fortigate "cli", but I still cannot ping it using my server (the one specified in my Policy).
Please let me know if you think that I might still be missing something..
Thanks again!
--
Eric
--
Eric
If anyone has any experience in allowing internal traffic (internal interface) to an IPsec VPN tunnel (Forticlient connected devices), please let me know.
Thank you.
--
Eric
--
Eric
Hello everyone,
I just wanted to update this forum with the solution to my original issue.
(I had to open a case with support, to get this resolved)
Turns out that all my routes and IPv4 Policies were setup just fine.
My issue was caused by the "net-device" feature of my IPsec tunnel that was set to "enable".
I simply had to set to "disable", in order to fix my issue, like follow:
==========================
config vpn ipsec phase1-interface edit <VPN_name> set net-device dis end
==========================
After that, I was able to ping and traceroute the PCs of my remotely VPN connected users.
In FortiOS 6.0 branch net-device feature is only available for dial-up tunnels. "enable" Creates a kernel device for every dialup instance. "disable" Does not create a kernel device for dialup instances. If enabled, the VPN will be creating individual interfaces.
It might create problems in handling the policy routes...
Hope this helps anyone else that had the same issue as mine.
Thanks!
--
Eric
--
Eric
Hi folks ! the same problem here ! solution ?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1733 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.