got a setup with a fortigate cluster at the main office and one cluster on a remote location (both running 5.2). setup a route based IPsec tunnel, added routes, added policies and able to access a server on the remote location from the main location.
but want to access the firewall on the remote location also to do management. there are two management access configured interfaces:
1) an IP on one of the internal subnets (which also acts as default gateway for that subnet)
2) the management ports in another internal subnet
locally both types of access work fine but via the IPsec tunnel not so well. for 1) i can ping and ssh, but http(s) fails. ssh also fails once the packets get close to 1500 bytes. i see lots of fragmented traffic via wireshark, not sure what is up here.
with 2) i cant ping, ssh, http(s) or anything, the traffic reaches the interface according to debug diag flow, but no return traffic is seen.
is this something which is simply not possible or should it be? what are the known caveats in a case like this?