Hi all.
I have a main site and a remote site.
The main site is connected to the remote with IPsec Tunnel and it works perfect
I can also connect to the main site with SSL VPN without problems But When i'm trying to reach the remote site i can't
The main site is ==> 192.168.1.x
The remote site is ==> 10.0.0.x
SSL VPN ===> 172.17.0.X
I've tried everything i can - Static Route / Policy, Nothing Works
In the IPsec VPN Phase 2 it's 0.0.0.0 on both sides.
Any help how to solve this will me more then appreciated
Thank in advanced.
First of all, is SSL VPN "split tunnel" or client's internet comes over the SSL VPN when it's connected? If split, the fist thing I would suspect is 10.0.0.x/24 is not in the client machine's routing table, which should be automatically injected based on the policy.
The rest is just routeing between the main and the remote, especially the remote side to get back to 172.17.0.x since the selector is 0/0. I assume you already verified. Then check what traceroute shows from the client toward 10.0.0.x if it goes into the IPSec tunnel or not.
Make sure you have the appropriate security policies in place too, from the ssl-vpn tunnel interface to the IPsec tunnel, etc.
Hi ,
KIndly enable NAT on SSL-VPN to IPSEC Tunnel Policy which will solve your routing issue.
Regds,
Ashik
Hi,
I've check everything - NAT didn't help :\
I've created new SSL-VPN group and associated it to "tunnel-mode"
In the "tunnel mode" checked the Enable split tunneling
In the Routing Address I've putt the main site local address object and the remote site address object
On the the Source IP Pools I've putt the SSL-VPN tunnel address object which is the IP range 172.16.0.100-135
Created a new security policy - incoming - ssl.root --> dest : "IPsec VPN" --> source the tunnel address object and the newly created group ---. dest : remote site local ip addresses object -- > always / all and accept.
in the remote site i created a new object for the ssl-vpn IP and Created a policy that says :
incoming int : IPsec VPN --. src: "ssl-vpn address" --> outgoing : LAN --> always / accept...
but still no go...
2 things that I've probably did something wrong...
when looking in the IP address that i'm getting from the SSL-VPN it on subnet 255.255.255.255 because it's from the IP range - Not sure how to create a proper static route in the remote site.
second, when i did trace route to the main site it went straight from my computer IP to the server address.
when i did a trace route to the remote site it looked like it's not going trough the tunnel and trying to go out to the internet instead even though the remote site address is in the SSL-VPN "tunnel mode".
Hope i wrote everything clear.
Thank you all.
Here are some details from my own SSL VPN setup with a connection in to the main location, needing access to the branch over the IPsec connection. Note that you need to have specified an Source IP Pool object for the SSL VPN.
[ul]
Hope that helps.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.