I have a fortigate with multiple VDOMs. We have SSL VPN working on two
of them, and I am trying to stand it up on a third without much luck. I
can connect to the SSL VPN with my forticlient, but traffic is only one
way once connected. For instance, i...
I have two vdoms that are connected by inter vdom link. To simplify the
description, vdom 1 is 10.0.0.0/8 and vdom 2 is 192.168.0.0/21. We have
a static route defined on each to route properly, and each is the
default originator for their network. Th...
It turns out it was something simple. When initially doing the setup, I
configured a NAT pool with the same IP range by mistake. As soon as I
removed it, everything starting working as expected.
If I have a different firewall rules to be set for various services
within there, I will end up with a LOT of VIPs. I want to avoid that. On
cisco for instance my NAT rules can be seperate from my firewall rules,
so I can have one master NAT rule and...
Each VIP would then be subject to the same firewall rule though, right?
How can I make a large VIP range and use multiple firewall rules on
subsets of it?
Attached is a diagram. The green item is the one that is added. All I
want to do is map ips on vdom2 into another range in a static 1:1
manner. 192.168.1.1 becomes 10.192.1.1, 192.168.1.2 becomes 10.192.1.2,
etc.. It's pretty easy to accomplish this ...