Hi,we set up an ADVPN Hub and Spoke VPN where:HUB are 2 Fortigate 2600F
in Active-Passive HA configurationSpokes are Fortigate 60FFirmware is
7.4.9 version The VPN works fine, anyway we have problems when some bad
events occurs. For example if power ...
Hi,on Fortigate 1100e (7.4.9) we set up an SDWAN like this We would
OpenNMS pinging a public ip (8.8.8.8) through the line of ROUTER1 and
another public IP (8.8.4.4) through the line of ROUTER2. So we set up
these policy routes: SOURCE DESTINATION GA...
Hi, we set up an ADVPN Hub and Spoke network layout like this: Hub is
Fortigate 3000F, Spoke is Fortigate 60F.We configured BGP on Hub and
Spoke (on the IPSEC Tunnel)We noticed that "connected networks" of spoke
are distributed correctly: 10.39.80.0/...
Hi,we are trying to set up an Hub and Spoke VPN where Spoke have
firmware 7.4.8 while Hub has firmware 7.2.11 We found some problems with
these versions, while seems to work with spoke with firmware 7.4.7 We
got troubles when we set up these flags: a...
We have a network topology like below. If we put a traffic shaper of 50
Mbps on Fortigate (Central Site) to limit some traffic (windows update)
on site 1 and site 2 and site 1, for examples, in some moments, produces
more than 50 Mbps , network is no...
Sorry I found the problem.I used a wrong NAT on firewall PolicyWe need 2
policy:OpenNMS -> 8.8.8.8 -> NAT WAN1OpenNMS -> 8.8.4.4 -> NAT WAN2
Thanks !
Ok but we have only the implicit SDWAN rule and 2 policy routes SOURCE
DESTINATION GATEWAYOPENNMS 8.8.8.8 ROUTER1OPENNMS 8.8.4.4 ROUTER2 The
policy routes seems working when both interface are active, but if we
disable WAN1, the policy routes toward ...
I tried the setting you suggestedset auxiliary-session enable but it
doesn't work.If we disabled one interface of the SDWAN, all others
client using SDWAN works, except the ping from OpenNMS.Maybe the problem
is having policy routes AND SDWAN togethe...