Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Virtual IP
HI
i have foritage 200b os 5.0
my problem is i cant get to sewer www via wan 2. I use wan 1 to connect vpn through foritgate to asa and its works fine
this is my configuration
edit " port14"
set vdom " root"
set ip 81.*.*.150 255.255.255.252
set allowaccess fgfm capwap
set type physical
set description " wan1 TPSA DLS link do INTERNETU"
set alias " wan1"
set snmp-index 4
next
edit " port15"
set vdom " root"
set ip 82.*.*.74 255.255.255.248
set allowaccess fgfm capwap
set type physical
set description " wan2 TPSA 2"
set alias " wan2"
set snmp-index 5
edit " port9"
set vdom " root"
set ip 10.182.209.254 255.255.255.0
set allowaccess fgfm capwap
set type physical
set alias " eds"
edit " port13"
set vdom " root"
set ip 10.9.0.1 255.255.255.252
set allowaccess ping https ssh fgfm capwap
set type physical
set description " dmz1 Link do CISCO ASA"
set alias " dmz1"
set snmp-index 3
set snmp-index 10
edit 1
set input-device " port13"
set src 10.182.201.0 255.255.255.0
set gateway 81.*.*.149
set output-device " port14"
next
edit 2
set input-device " port13"
set src 10.182.202.0 255.255.255.0
set gateway 82.*.*.73
set output-device " port15"
next
edit 3
set input-device " port13"
set src 10.182.205.0 255.255.255.0
set gateway 81.*.*.149
set output-device " port14"
next
edit 5
set input-device " wifi"
set src 10.182.208.0 255.255.255.0
set gateway 82.*.*.73
set output-device " port15"
edit 6
set input-device " port9"
set src 10.182.209.0 255.255.255.0
set gateway 82.*.*.73
set output-device " port15"
next
end
S* 0.0.0.0/0 [1/0] via 81.*.*.149, port14
C 10.9.0.0/30 is directly connected, port13
S 10.9.0.14/32 [10/0] via 10.9.0.2, port13
S 10.182.201.0/24 [10/0] via 10.9.0.2, port13
S 10.182.202.0/24 [10/0] via 10.9.0.2, port13
S 10.182.205.0/24 [10/0] via 10.9.0.2, port13
C 10.182.207.0/24 is directly connected, port12
C 10.182.208.0/24 is directly connected, wifi
C 10.182.209.0/24 is directly connected, port9
C 82.*.*.72/29 is directly connected, port15
C 81.*.*.148/30 is directly connected, port14
C 192.168.8.0/24 is directly connected, switch
edit " VPN1"
set extip 81.*.*.150
set extintf " port14"
set mappedip 10.9.0.2
edit " VIPEDS"
set extip 82.*.*.74
set extintf " port15"
set mappedip 10.182.209.10
edit 8
set srcintf " port14"
set dstintf " port13"
set srcaddr " all"
set dstaddr " VPN1"
set action accept
set schedule " always"
set service " IKE" " AH" " ESP" " IPSEC_TCP" " NAT-T"
set logtraffic all
edit 22
set srcintf " port15"
set dstintf " port9"
set srcaddr " all"
set dstaddr " VIPEDS"
set action accept
set schedule " always"
set service " ALL"
set logtraffic all
4 REPLIES 4
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Have you tried specifying destination ports on the internal host?
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Diag debug flow is your friend and first step in debugging.search here for numerous examples on how to use
PCNSE
NSE
StrongSwan
PCNSE
NSE
StrongSwan
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I aggree with emnoc - try the diag debug flow or diag sniffer packet first to see whether any packets are received.
Do you see something in the logs? Maybe sent packets but not received etc.?
AtiT
AtiT
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi, thx for replay problem was with policy router. Problem solved