Hi, guys, can you help me? I am having troubles with connecting to a
remote vpn via IPsec. They are using public IP addresses for their
terminals. (See image attached). I am done with static routes, ipv4
policies, ipsec tunnels. I've done it a couple...
Hi, Emnoc, Thank you for all your help. I just talked with the people
from the cisco router and they are still checking with 10.10.0.0/21,
they prioritized 10.70.0.0/21 Thank you!
Hi, Emnoc, Already got an up on 10.70.0.0/21 -
Imagine-IPsec_local-subnet_2 Thank you, Still having troubles with
10.10.0.0/21 config vpn ipsec phase2-interface edit "Imagine-IPsec" set
phase1name "Imagine-IPsec" set proposal aes256-sha1 set pfs disa...
Yup they are expecting two subnets from us. One from local which is
10.10.0.0/21 and one from work from home employees via sslvpn
10.70.0.0/21. Should I not group them? and create another Phase two for
the 10.70? Here's the image link for the proposa...
show vpn ipsec phase1-interface Imagine-IPsec config vpn ipsec
phase1-interface edit "Imagine-IPsec" set interface "port2" set peertype
any set proposal aes256-sha1 set comments "VPN: Imagine-IPsec (Created
by VPN wizard)" set dhgrp 5 set remote-gw 2...
Hi, Emnoc,Sorry for the late reply. Thank you for your advise. Im still
new to Fortigate so bear with me. Here are the results: diag vpn ike
gateway listvd: root/0 name: Imagine-IPsec version: 1 interface: port2
10 addr: 27.110.219.186:500 -> 216.240...