First of all: new to fortigate so sorry if I write down info that doesn't make sense to you guys.
Situation:
we have a draytek router that needs to be replaced as it breaks down constantly. We bought a fortigate 60e which I upgraded to latest firmware v7.0. I'm using the gui because is makes understanding the configurations a bit clearer than using cli so please provide answers using gui if possible.
What I have:
I've setup lan, wan, 2 vlans en 2 sites-site connections. I've also setup a native-windows l2tp-ipsec dialup vpn using the wizard. We have mulltiple laptops in the field already configured to so at the moment I want to use native windows vpn, and not ssl vpn I'm afraid.
What I don't have and want:
What I don't understand:
When I create a vpn using the wizard it created two interfaces: l2t.root and one with the name of the VPN tunnel. Also 2 policies are created: interface with vpn_tunnel_name -> Wan with service L2tp, and l2t.root->internal all services. I wanted to allow internet through vpn and added a policy using the interface with vpn_tunnel_name as source because that seemed logical. However that didn't work, I tries l2t.root and that did work. Why do I have 2 interfaces and why is the L2tp policy based on source iinterface vpn_tunnel_name and the 'allow traffic' policies on l2t.root?
Please help me out while explaining why certains changed/choice are made. I have basic knowledge of the networking aspects but am learning here. I configured the Draytek with above wishes without problems, but that is much more wizard-style and doesn't hide (or not show in GUI) configured items after the wizard is done, something the fortigate does...
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I think you can start by reading this official document and the following guide for some explanations related to your queries. By your description it seems that you configured correctly the l2tp and the users (check the documents) but you are doing something wrong (expecting both to work when separating the users):
https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/386346/l2tp-over-ipsec
For monitoring logged users try Dashboard > Users and devices
for CLI (maybe): execute vpn sslvpn list // diag firewall auth list
https://docs.fortinet.com/document/fortigate/6.0.0/handbook/247320/monitoring-authenticated-users
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.