내용으로 건너뛰기

Problem with site-to-site VPN, fortigate appliance

0

I have a frustrating VPN situation, where 90% of it works except the last hop. Overall situation:

Remote site: Fortigate VPN gateway, and VM EC2 site: Fortigate AMI, and VM

For EC2, the fortigate AMI and the test VM are on the same region (us-west2a), same VPC, same subnet

Does not work:

  • ping end-to-end VM to VM
  • AWS fortigate ping to AWS VM

DOES work:

  • Remote fortigate ping AWS fortigate
  • Remote VM ping AWS fortigate
  • AWS VM ping AWS fortigate
  • AWS secondary VM ping AWS VM

PACKET TRACES: pinging from AWS VM, to a remote site IP, does not show up in aws fortigate packet capture.

Because of the last bit, i would presume that i'm missing something at the AWS routing level. But.. I went to VPC, created a routing table, specifically associated it with the subnet the VM and fortigate are on, and added a route for the remote site's subnet thorugh the fortigate instance.

The VPC network acls are (allow all) as well.

So.. I'm lost. Can someone suggest anything else for me to check?

질문됨 2년 전674회 조회
1개 답변
1
수락된 답변

Found the answer myself.

I was presuming that, since I deployed the fortigate AMI from the marketplace, it would (as implied by the entire "appliance in a box" paradigm) take care of EVERYTHING needed.

it did not. I had to edit the vm, and manually disable the "source/destination" checks. Ugh!

답변함 2년 전
전문가
검토됨 2년 전
전문가
검토됨 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.