-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A/A with ELB and ILB VPN Site 2 Site #56
Comments
Hi, Thank you for reaching out. How have you setup your VPN tunnel on the Active/Active cluster? Have you added additional public IPs on the FortiGate port1 interfaces, have you use Inbound NAT rules or something else? These are crucial items to be able to debug your setup. Regards, Joeri |
Hi, I had a ticket for months with fortigate, the github documentation is outdated, please make this setting in azure load balancer for udp 500 and 4500 and let me know if it fixes it. It did it for me, they also recommended set the tunnel to passive-mode me which i didn't have to do config vpn ipsec phase1-interface |
Hi gacpac, Thank you for reaching out. Which setup are you using? I assume an Active/Passive with ELB and ILB? Indeed for such a setup it is recommended to configure the External Load Balancer with 2 rules for UDP 500 (IKE) and UDP 4500 (NAT-T). This is documented on the link below and linked in the configuration section of the Active/Passive ELB/ILB page: Additionally, we recently added an FAQ page with additional information: The passive mode helps to make sure the branches are the one's settting up the VPN connection. Hope this gives you some more insight. |
@jvhoof Look my picture again, your setup is outdated. I spent months with support until they finally figured it out in their lab. |
Hi @gacpac, I can see that you have the client persistence changed from 5 tuple to 2 tuple and I would need more information about your setup and what behavior this solved so I can review and update the documentation. This issue was opened for an active/active setup. While the doc we discuss is about an Active/Passive setup. I can understand that you have spend much time with our support on this and we certainly would like to provide the up to date information. We have many customers that I know of running this setup with the 5 tuple persistence. The best option is to enable the passive mode to make the tunnel is setup from the remote site to the FortiGate cluster in Azure. This is because of the public IP address Azure selects for outbound connection. It would be great if you can provide me with the ticket number so I can review this. You can connect with me on linkedin (same username) or I can provide you Fortinet email address so I can review your case. Regards, Joeri |
For my setup behind the load balancer I'm using the public IP of the load balancer for IPSec connectivity. Look at ticket number 8304588 for more internal details. If you want to get in a call I also have microsoft azure with ticket open |
I have a similar issue, "set passive-mode enable" is not available for my IPsec VPN |
Oh BTW the command only needs to be in the azure firewall not the sites. And you should have the command available over cli, maybe open a ticket with Fortinet and let us know. Maybe you have other errors in your setup |
Hi I have a A/A Setup
[https://github.com/fortinet/azure-templates/tree/main/FortiGate/Active-Active-ELB-ILB]
We like to Terminate a Site 2 Site Tunnel on the Fortis.
The Tunnel is comming up and the Sessen Sync is enabaled .
But not all sessions are sucessfuly thorught the ELB Forti ILB Server ILB Forti.
I see in the Monitroing that on one Forit only traffic is outgoing to the tunnel but not incomming.
If i disable one of the Fortis or the Internal interface of one of the the VPN is working as expected.
The text was updated successfully, but these errors were encountered: