I'm hoping that I'm overlooking something really obvious....
I have a Fortigate 60F that has been tethered to an AWS VPC via a Transit connect gateway. The individual computers on my LAN and WiFi can use the VPN to see the servers in the VPC perfectly. In the VPC I have a RADIUS server that I wish to connect to the Fortigate 60F. However, the Fortigate itself cannot use the VPN tunnel. What am I missing?
Things I've already tried:
[ul]Any ideas that can point me in the right direction to use my AD and RADIUS servers that are on the other side of a VPN?
-Tor
Sure this is a common issue. Did you 1> create a address on the vpn interface 2> did you source the radius-server cfg to use that address
e.g
config user radius edit "gcp-radius" set server "10.19.11.1" set secret ENC xxxxxxxxxx set radius-port 1812 set auth-type auto set source-ip 'my.address.vpn-interface' end Ken Felix
PCNSE
NSE
StrongSwan
We actually have narrowed the issue down to the Fortigate not being able to see *any* server on the other side of the tunnel unfortunately.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.