two office location , link together with vpn tunnel successfully first
office have static public ip on fortigate 60B WAN interface. second
office is rented office which using internet from lanlord network that
we have no control of. fortigate 50B is ...
I already put subnet 192.168.100.0/24 and 192.168.5.0/24 in ipsec phase2
but it still show in " vpn monitor" as a range as you mention. the
different is because on FGT100A remote gateway is " Dialup type" but on
FGT50B remote gateway is " static ip" ...
I have delete all policy routing. so there is no policy routing in my
setting anymore. attach picture is current in-use configuration. you can
test network as in picture (DMZ ip must exist) and tracert from FGT50B
to FGT100A, you will see about routi...
this is normal tracert from office1 to office2 (on computer ip
192.168.100.10) it is path 192.168.100.1---> 192.168.5.254 --->
192.168.5.10 so if you tracert it back from office2 to office1 (on
computer ip 192.168.5.10) you would expected 192.168.5.2...