Hello,
I recently installed a second WAN on my FortiGate 40F. I've been facing an issue I'm not able to resolve and looking for some help. I am a beginner though, so I'll try my best to explain my goal clearly and current
Goal:
- My wan1 has a bunch of static IPs, while wan2 doesn't have any.
- I would like to access my file server via a static IP from wan1 from the internet (only wan1 has static IPs)
- I would like the application to only upload traffic via wan2 because it is 25x faster.
So, it should listen on wan1, but actually use wan2 only for data transmission.
Current Setup:
- Configured SD-WAN and added both members. WAN2 has a higher priority, and in general it is being used most of the time, which is good for me. - working fine
- Created VIP for my server (external 37.37.37.37, internal 192.168.5.111) - working fine
My Policies:
- SD-WAN to LAN (source all, destination VIP)
- LAN to SD-WAN (source all, destination all)
FOUND SOLUTION - Thank you everyone!:
Possible solution was to create DDNS and necessary firewall policies with that for dynamic/non-static IP.
- In my case: I got 1 static IP as well from my WAN2 ISP. My ISP router was giving me a local address & I can't configure it manually; it has to be DHCP.
- Solved by creating a DMZ for the Fortigate on the ISP router. Then, creating firewall policies & VIPs using the Fortigate IP address ON THE ISP ROUTER (192.168.118.4 in my case).
Thanks again everyone! A very pleasurable experience here, my first time on the forum!
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Greetings!
In this case create a port forwarding on ISP router, https://www.hellotech.com/guide/for/how-to-port-forward
ISP router should translate the traffic from public IP to private IP of FortiGate.
Thank You!
Yes, the public IP is getting resolved correctly. The DDNS is getting the correct IP.
When I sniff for packets "diagnose sniffer packet", nothing is hitting the firewall... but all other static IPs and ports from wan1 are getting traffic.. Not sure why this is happening..
Greetings!
In this case create a port forwarding on ISP router, https://www.hellotech.com/guide/for/how-to-port-forward
ISP router should translate the traffic from public IP to private IP of FortiGate.
Thank You!
Created on 08-25-2024 07:11 AM Edited on 08-25-2024 09:24 AM
Thank you so much!
After enabling Port Forwarding (I set up a Virtual Server and opened all ports one by one), I am now finally able to receive traffic.
I actually set it up as a DMZ to get all ports open to the Fortigate.
Now its another issue I'm encountering at the moment:
- VPN server say its listening at 192.168.10.10:7777 on wan2 for example. I am able to connect it to by going to 37.37.37.37:7777 now.
- I can connect to the VPN, but I am not able to RECEIVE any data; but it is successfully sending data to through the VPN.
- Should I be adding any specific firewall policy? For my policies, should I be treating it as 192.168.118.4 (which is the fortigate IP on the ISP router?) .. or should I add the static IP? i don't believe adding the static IP is working
SOLVED: Added VIP for 192.168.118.4 instead of the public IP.. everything is working now.
Thank you everyone!
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1665 | |
1077 | |
752 | |
446 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.