Hello,
How would like to know how to configure the policy which permit to an internal host a client-to-site VPN towards a remote VPN terminator.
In particular I would like to know how to fill the source, destination, service and action fields.
thank you.
--
Nicola Venosta
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Strange but interesting.
Assuming you mean "IPsec VPN":
source IF: internal
source addr: the PC's IP address
dest IF: wan
dest addr: the public IP address of the remote VPN gateway
service: at least 500/udp and 4500/udp (plus PING as always).
action: ACCEPT
NAT: yes (to interface address)
I think you think about the private addresses behind the remote VPN tunnel end. They are not controlled by the policy. That's why using a VPN tunnel is such a great evasion technique.
Of course, you will see the remote addresses on the LAN segment where they appear to be 'alien'. But the PC which initiated the VPN tunnel knows how to handle these - by using an ad-hoc route to the remote subnet. All other hosts on the LAN cannot communicate with the remote subnet - destination unknown, so traffic to these addresses will be routed out the WAN interface of the FGT.
I hope this helps with the concept.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.