- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Fortigate 40F Policy Based S2S with Source NAT
Hello,
i am trying to setup a VPN Site2Site connection, policy based with source NAT.
Fortigate 40F, v7.2.4
The target network is a customer network and cannot be configured.
I'm basically following the tutorial in this article (Scenario A)
The topology looks like this (where SiteB is Customer), and the NATting should only be done for the 10.129.0.24 IP Address (in my case, cus_local_subnet_1)
Despite the article instructions, i'm doing the configuration from the Web Interface.
The VPN Tunnel is up and running for Phase 1 and Phase 2:
 
The problem starts, when i want to configure the Firewall policy. If i check "IPSec" in the policy, i loose the option to setup the IP Pool for Nating.
On the other hand, if i choose "ACCEPT", i can choose the Nating, but i cannot set IPSEC on the policy.
The article does not state how to handle this scenario, with the CLI it seems it can be defined:
How can i bind the IPPool and NAT by also using the IPSEC in the policy?
 
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Gateberg
- Try to do it with CLI. Many features available with CLI can't be done with GUI
- Article is old, it may be related to FortiOS 5.x. Many commands and methods change between 5.x and 7.2.x. So you can find the right method in FGT 7.2 admin guide
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is there a reason you are you using policy-based ipsec? Can you use route-based?
When using route-based you can just create a basic fw policy with SNAT applied for that one device.
Graham
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Route based is not possible, we cannot make changes on the customer site.
Maybe the issue starts earlier, as i cannot see any traffic on the tunnel:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You may try to use Central NAT for such scenario which will separate NAT from Firewall rules. But this change has to be planned if you are already using NAT in the Firewall rules.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
AFAIK route-based vs policy-based is a local construct on the FGT. It's just two different ways of configuring the IPSec tunnel. The remote side does not care what you are using. It's just typically a much easier way to manage and configure the IPSec tunnel on the FGT.
Graham
