+-------------+ +--------------+ | | IPSec VPN | | 10.0.0.0/24 |Fortigate 80C|<------------------->| Cisco | 172.16.0.0/24 Internal | |WAN1 | | Their App | | | | +-------------+ +--------------+When the VPN is up, an application on our end (10.0.0.0 network) will communicate with a server on their end (172.16.0.0 network). We also have network monitoring software that pings their application server every second (whilst this issue is ongoing). When reviewing the session monitor, traffic is going out on the correct firewall policies (i.e. internal -> VPN_P2 = over the VPN) When the VPN goes down, our network monitoring software notes the outage. Our ping to their VPN concentrator may come back within 60 seconds - but viewing the session monitor still shows the traffic (both ICMP and HTTP) going out over an internal -> WAN1 policy i.e. straight to the internet. It can take up to an hour before the sessions to WAN1 time out and traffic resumes over the VPN. I have a suspicion this is to do with the session timeout on the Fortigate, but don' t want to alter it from defaults (3600 seconds) in case I affect other traffic. Any ideas on how I can get the VPN-bound traffic to go back over the VPN as soon as it comes back up? Happy to provide any other information you need to give me a pointer in the right direction! Thanks in advance, Will
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
edit 0 set blackhole enable set distance 254 set dst 10.0.0.0 255.0.0.0 next edit 0 set blackhole enable set distance 254 set dst 192.168.0.0 255.255.0.0 next edit 0 set blackhole enable set distance 254 set dst 172.16.0.0 255.240.0.0 nextOther than that I do not have anything else configured, and tunnel traffic comes up in seconds after an interruption. Esp, I do not have a DENY policy to WAN in place blocking the private networks. This article describes it: http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=13842
ORIGINAL: ede_pfau Here' s it:Beware, at least in version 4.2.12, this wreaks havoc with policy based VPNs. I do have a few legacy ones that I have yet to migrate over. Everything looked normal, but I had to delete the above routes and then drop/enable the policies again to get communications back up. What a pain in the a$$...edit 0 set blackhole enable set distance 254 set dst 10.0.0.0 255.0.0.0 next edit 0 set blackhole enable set distance 254 set dst 192.168.0.0 255.255.0.0 next edit 0 set blackhole enable set distance 254 set dst 172.16.0.0 255.240.0.0 next
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.