Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
wsoosw
New Contributor

Virtual IP

HI i have foritage 200b os 5.0 my problem is i cant get to sewer www via wan 2. I use wan 1 to connect vpn through foritgate to asa and its works fine this is my configuration edit " port14" set vdom " root" set ip 81.*.*.150 255.255.255.252 set allowaccess fgfm capwap set type physical set description " wan1 TPSA DLS link do INTERNETU" set alias " wan1" set snmp-index 4 next edit " port15" set vdom " root" set ip 82.*.*.74 255.255.255.248 set allowaccess fgfm capwap set type physical set description " wan2 TPSA 2" set alias " wan2" set snmp-index 5 edit " port9" set vdom " root" set ip 10.182.209.254 255.255.255.0 set allowaccess fgfm capwap set type physical set alias " eds" edit " port13" set vdom " root" set ip 10.9.0.1 255.255.255.252 set allowaccess ping https ssh fgfm capwap set type physical set description " dmz1 Link do CISCO ASA" set alias " dmz1" set snmp-index 3 set snmp-index 10 edit 1 set input-device " port13" set src 10.182.201.0 255.255.255.0 set gateway 81.*.*.149 set output-device " port14" next edit 2 set input-device " port13" set src 10.182.202.0 255.255.255.0 set gateway 82.*.*.73 set output-device " port15" next edit 3 set input-device " port13" set src 10.182.205.0 255.255.255.0 set gateway 81.*.*.149 set output-device " port14" next edit 5 set input-device " wifi" set src 10.182.208.0 255.255.255.0 set gateway 82.*.*.73 set output-device " port15" edit 6 set input-device " port9" set src 10.182.209.0 255.255.255.0 set gateway 82.*.*.73 set output-device " port15" next end S* 0.0.0.0/0 [1/0] via 81.*.*.149, port14 C 10.9.0.0/30 is directly connected, port13 S 10.9.0.14/32 [10/0] via 10.9.0.2, port13 S 10.182.201.0/24 [10/0] via 10.9.0.2, port13 S 10.182.202.0/24 [10/0] via 10.9.0.2, port13 S 10.182.205.0/24 [10/0] via 10.9.0.2, port13 C 10.182.207.0/24 is directly connected, port12 C 10.182.208.0/24 is directly connected, wifi C 10.182.209.0/24 is directly connected, port9 C 82.*.*.72/29 is directly connected, port15 C 81.*.*.148/30 is directly connected, port14 C 192.168.8.0/24 is directly connected, switch edit " VPN1" set extip 81.*.*.150 set extintf " port14" set mappedip 10.9.0.2 edit " VIPEDS" set extip 82.*.*.74 set extintf " port15" set mappedip 10.182.209.10 edit 8 set srcintf " port14" set dstintf " port13" set srcaddr " all" set dstaddr " VPN1" set action accept set schedule " always" set service " IKE" " AH" " ESP" " IPSEC_TCP" " NAT-T" set logtraffic all edit 22 set srcintf " port15" set dstintf " port9" set srcaddr " all" set dstaddr " VIPEDS" set action accept set schedule " always" set service " ALL" set logtraffic all
4 REPLIES 4
Warren_Olson_FTNT

Have you tried specifying destination ports on the internal host?
emnoc
Esteemed Contributor III

Diag debug flow is your friend and first step in debugging.search here for numerous examples on how to use

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
AtiT
Valued Contributor

I aggree with emnoc - try the diag debug flow or diag sniffer packet first to see whether any packets are received. Do you see something in the logs? Maybe sent packets but not received etc.?

AtiT

AtiT
wsoosw
New Contributor

Hi, thx for replay problem was with policy router. Problem solved
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors