Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Cleyton
New Contributor

Routing all internet traffic through the tunnel VPN - VPN IPSec Site-to-Site

Dear

 

I have a Site-to-Site IPSec VPN connection between two fortigate.

[style="background-color: #ffff00;"]Fortigate 80E -> HQ[/style] [style="background-color: #ffff00;"]Fortigate 50E -> Branch[/style]

I need all navigation traffic generated by the network of the fortiger 50E branch to pass through the VPN tunnel and exit through the WAN of the Fortinet 80E.

My scenario is defined as follows:

 

Windows Server - HQ - DHCP Scoping  LAN 192.168.254.101/24 GWT 192.168.254.109/24 DHCP Scopo HQ -> 192.168.254.100 -> 192.168.254.254 Scopo Branch -> 192.168.100.100 -> 192.168.100.254

 

[style="background-color: #ffff00;"]Fortigate 80E -> HQ[/style]

 

LAN -> 192.168.254.109/24 - dhcp windows server WAN -> 189.17.00.00/28

 

[style="background-color: #ffff00;"]Static Routes[/style]

 

status: enable dst: 192.168.100.0 255.255.255.0 distance: 10 weight: 0 priority: 0 device: hq-branch comment blackhole: disable dynamic-gateway: disable virtual-wan-link: disable link-monitor-exempt: disable bfd: disable

 

status: enable dst: 192.168.100.0 255.255.255.0 distance: 10 weight: 0 priority: 0 comment blackhole: enable link-monitor-exempt: disable vrf: 0

 

[style="background-color: #ffff00;"]IPv4 Policy[/style]

 

policyid: 3 name: vpn_hq-branch_remote uuid: d69a2606-91ea-51e9-662c-5456990963a1 srcintf: "hq-branch" dstintf: "lan" srcaddr: "all" dstaddr: "all" internet-service: disable internet-service-src: disable rtp-nat: disable learning-mode: disable action: accept status: enable schedule: always schedule-timeout: disable service: "ALL" dscp-match: disable utm-status: disable logtraffic: all logtraffic-start: disable auto-asic-offload: enable np-acceleration: enable session-ttl: 0 vlan-cos-fwd: 255 vlan-cos-rev: 255 wccp: disable fsso: disable groups: users: devices: disclaimer: disable natip: 0.0.0.0 0.0.0.0 diffserv-forward: disable diffserv-reverse: disable tcp-mss-sender: 0 tcp-mss-receiver: 0 comments: "" block-notification: disable custom-log-fields: replacemsg-override-group: srcaddr-negate: disable dstaddr-negate: disable service-negate: disable timeout-send-rst: disable captive-portal-exempt: disable ssl-mirror: disable ssl-mirror-intf: scan-botnet-connections: disable dsri: disable radius-mac-auth-bypass: disable delay-tcp-npu-session: disable vlan-filter: profile-protocol-options: default traffic-shaper: traffic-shaper-reverse: per-ip-shaper: nat: disable match-vip: disable

policyid: 2 name: vpn_hq-branch_local uuid: d6909a6e-91ea-51e9-c876-86e181d57320 srcintf: "lan" dstintf: "hq-branch" srcaddr: "all" dstaddr: "all" internet-service: disable internet-service-src: disable rtp-nat: disable learning-mode: disable action: accept status: enable schedule: always schedule-timeout: disable service: "ALL" dscp-match: disable utm-status: disable logtraffic: utm logtraffic-start: disable auto-asic-offload: enable np-acceleration: enable session-ttl: 0 vlan-cos-fwd: 255 vlan-cos-rev: 255 wccp: disable fsso: disable groups: users: devices: disclaimer: disable natip: 0.0.0.0 0.0.0.0 diffserv-forward: disable diffserv-reverse: disable tcp-mss-sender: 0 tcp-mss-receiver: 0 comments: '' '' block-notification: disable custom-log-fields: replacemsg-override-group: srcaddr-negate: disable dstaddr-negate: disable service-negate: disable timeout-send-rst: disable captive-portal-exempt: disable ssl-mirror: disable ssl-mirror-intf: scan-botnet-connections: disable dsri: disable radius-mac-auth-bypass: disable delay-tcp-npu-session: disable vlan-filter: profile-protocol-options: default traffic-shaper: traffic-shaper-reverse: per-ip-shaper: nat: disable match-vip: disable

 

[style="background-color: #ffff00;"]Fortigate 50E -> Branch[/style]

 

LAN -> 192.168.100.109/24 DHCP Relay agent: 192.168.254.101/24 WAN -> 177.126.00.00/28

 

[style="background-color: #ffff00;"]Static Routes[/style]

 

status: enable dst: 192.168.254.0 255.255.255.0 distance: 10 weight: 0 priority: 0 device: rj-bh comment blackhole: disable dynamic-gateway: disable virtual-wan-link: disable link-monitor-exempt: disable bfd: disable

 

status: enable dst: 192.168.254.0 255.255.255.0 distance: 10 weight: 0 priority: 0 comment blackhole: enable link-monitor-exempt: disable vrf: 0

 

[style="background-color: #ffff00;"]IPv4 Policy[/style]

 

policyid: 2 name: vpn_branch-hq_local uuid: f6daae54-91ea-51e9-8ff1-8f4af858edbe srcintf: "lan" dstintf: "branch-hq" srcaddr: "all" dstaddr: "all" internet-service: disable internet-service-src: disable rtp-nat: disable learning-mode: disable action: accept status: enable schedule: always schedule-timeout: disable service: "ALL" dscp-match: disable utm-status: disable logtraffic: utm logtraffic-start: disable session-ttl: 0 vlan-cos-fwd: 255 vlan-cos-rev: 255 wccp: disable fsso: disable groups: users: devices: disclaimer: disable natip: 0.0.0.0 0.0.0.0 diffserv-forward: disable diffserv-reverse: disable tcp-mss-sender: 0 tcp-mss-receiver: 0 comments: "" block-notification: disable custom-log-fields: replacemsg-override-group: srcaddr-negate: disable dstaddr-negate: disable service-negate: disable timeout-send-rst: disable captive-portal-exempt: disable ssl-mirror: disable ssl-mirror-intf: scan-botnet-connections: disable dsri: disable radius-mac-auth-bypass: disable delay-tcp-npu-session: disable vlan-filter: profile-protocol-options: default traffic-shaper: traffic-shaper-reverse: per-ip-shaper: nat: disable match-vip: disable

 

policyid: 3 name: vpn_branch-hq_remote uuid: f6e30aae-91ea-51e9-bf9a-87b1de772b2c srcintf: "branch-hq" dstintf: "lan" srcaddr: "all" dstaddr: "all" internet-service: disable internet-service-src: disable rtp-nat: disable learning-mode: disable action: accept status: enable schedule: always schedule-timeout: disable service: "ALL" dscp-match: disable utm-status: disable logtraffic: utm logtraffic-start: disable allow-any-host: disable enable-stun-host: disable fixedport: disable ippool: disable session-ttl: 0 vlan-cos-fwd: 255 vlan-cos-rev: 255 wccp: disable fsso: disable groups: users: devices: disclaimer: disable natip: 0.0.0.0 0.0.0.0 diffserv-forward: disable diffserv-reverse: disable tcp-mss-sender: 0 tcp-mss-receiver: 0 comments: "" block-notification: disable custom-log-fields: replacemsg-override-group: srcaddr-negate: disable dstaddr-negate: disable service-negate: disable timeout-send-rst: disable captive-portal-exempt: disable ssl-mirror: disable ssl-mirror-intf: scan-botnet-connections: disable dsri: disable radius-mac-auth-bypass: disable delay-tcp-npu-session: disable vlan-filter: profile-protocol-options: default traffic-shaper: traffic-shaper-reverse: per-ip-shaper: nat: enable match-vip: disable

 

I tried several route settings between the fortigate, but persistent problem. I'm not sure if the routes should be based on static route or policy-based routes.

 

 

2 REPLIES 2
Toshi_Esumi
SuperUser
SuperUser

There were the same discussion in this forum you can search. But the concept is if the hq has a static IP on the internet circuit you can set a /32 static route at 50E for the hq ip while the default route is toward the tunnel without GW.
Cleyton

Caro Toshi Esumi Pesquisei no forum por esta solução e não encontrei, por causa você tem link da discusão no forum? Você poderia me ajuda nesta solução?

Labels
Top Kudoed Authors