I have a fortigate with multiple VDOMs. We have SSL VPN working on two
of them, and I am trying to stand it up on a third without much luck. I
can connect to the SSL VPN with my forticlient, but traffic is only one
way once connected. For instance, i...
I have two vdoms that are connected by inter vdom link. To simplify the
description, vdom 1 is 10.0.0.0/8 and vdom 2 is 192.168.0.0/21. We have
a static route defined on each to route properly, and each is the
default originator for their network. Th...
It turns out it was something simple. When initially doing the setup, I
configured a NAT pool with the same IP range by mistake. As soon as I
removed it, everything starting working as expected.
If I have a different firewall rules to be set for various services
within there, I will end up with a LOT of VIPs. I want to avoid that. On
cisco for instance my NAT rules can be seperate from my firewall rules,
so I can have one master NAT rule and...
Each VIP would then be subject to the same firewall rule though, right?
How can I make a large VIP range and use multiple firewall rules on
subsets of it?
Attached is a diagram. The green item is the one that is added. All I
want to do is map ips on vdom2 into another range in a static 1:1
manner. 192.168.1.1 becomes 10.192.1.1, 192.168.1.2 becomes 10.192.1.2,
etc.. It's pretty easy to accomplish this ...
You are leaving our website
You are leaving our site and we cannot be held responsible for the content of external websites