hi,
i've configured a ispec site to site tunnell and a lot of ssl roadwarrior vpn. Now i want to comunicate from ssl roadwarrior to ipsec tunnel but does not work.i can comunicate from ssl to all my netowrk and from ipsec to all my network. i create a policy from ssl to ipsec and viceversa but 2 network does not comunicate.
Welcome to the forums.
Are the unreachable networks local to the Fortigate?
If not:
Make sure your phase 2 selectors cover the SSL VPN IP ranges.
Make sure you have all the necessary static routes defined for the remote (and SSL) networks.
Make sure you have all the necessary policies in place, originating from both directions.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
phase 2 ipsec cover ssl subnet range
i've static route for :
1 destionation remote_subnet_ipsec no gateway interface ipsec tunnell
2 destionation remote_subnet_ipsec no gateway interface blackhole
3 destination remote_roadwarrior_ssl no gateway interface ssl.root
i've configured policy for connection from ssl.root interface to ipsec_tunnell_interface
but ipsec can connect to all subnet but no roadwarrior and roadwarrior can connect to all subnet but not to ipsec_tunnell
this is the traffic log from roadwarrior_remote (172.16.198.10) to ipsec remote (10.100.1.4)
Security Level notice General Log ID 0000000013 Session ID 666284 Time 17:16:09 Tran Display noop VDom root Source Device Name FG5H0E5819900765 Group VPN_TEST Source 172.16.198.10 Source Interface ssl.root Source Port 51177 Source Interface Role undefined Destination Destination 10.100.1.4 Destination Interface AZURE_CLASSIC Destination Port 3389 Destination Interface Role undefined Action Firewall Action timeout Policy ID 110 Application Application Type unscanned Protocol 6 Service RDP Data Duration 18 Received Packets 0 Sent Packets 3 Type Sub Type forward Type traffic Others Policy Type policy
What is/are the phase 2 selectors?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
on phase 2 i've
local address-named adresses-named group with all local address that want to comunicate with remote nd one of this is 172.16.168.0/24
remote address named adrress net_ipsec_remote (10.100.0.0/21)
If the far end device is not familiar with named groups, you may need to split up the selectors into individual subnets. If all else works currently from the WAN, then it would either be a routing issue, or the far end may not have the correct policies in place. Either way a sniffer on the interface or a debug flow will get you more detail.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1113 | |
759 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.