Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A/A with ELB and ILB VPN Site 2 Site #56

Open
sanktis opened this issue Jun 8, 2023 · 8 comments
Open

A/A with ELB and ILB VPN Site 2 Site #56

sanktis opened this issue Jun 8, 2023 · 8 comments

Comments

@sanktis
Copy link

sanktis commented Jun 8, 2023

Hi I have a A/A Setup
[https://github.com/fortinet/azure-templates/tree/main/FortiGate/Active-Active-ELB-ILB]
We like to Terminate a Site 2 Site Tunnel on the Fortis.
The Tunnel is comming up and the Sessen Sync is enabaled .
But not all sessions are sucessfuly thorught the ELB Forti ILB Server ILB Forti.

I see in the Monitroing that on one Forit only traffic is outgoing to the tunnel but not incomming.

If i disable one of the Fortis or the Internal interface of one of the the VPN is working as expected.

@jvhoof
Copy link
Collaborator

jvhoof commented Jun 8, 2023

Hi,

Thank you for reaching out. How have you setup your VPN tunnel on the Active/Active cluster? Have you added additional public IPs on the FortiGate port1 interfaces, have you use Inbound NAT rules or something else? These are crucial items to be able to debug your setup.

Regards,

Joeri

@gacpac
Copy link

gacpac commented Jun 30, 2023

Hi,

I had a ticket for months with fortigate, the github documentation is outdated, please make this setting in azure load balancer for udp 500 and 4500 and let me know if it fixes it. It did it for me, they also recommended set the tunnel to passive-mode me which i didn't have to do

image

image

config vpn ipsec phase1-interface
edit
set passive-mode enable
next
end

https://community.fortinet.com/t5/Customer-Service/Technical-Tip-How-to-make-sure-the-FortiGate-will-act-as-a/ta-p/244166

@jvhoof
Copy link
Collaborator

jvhoof commented Jun 30, 2023

Hi gacpac,

Thank you for reaching out. Which setup are you using? I assume an Active/Passive with ELB and ILB? Indeed for such a setup it is recommended to configure the External Load Balancer with 2 rules for UDP 500 (IKE) and UDP 4500 (NAT-T).

This is documented on the link below and linked in the configuration section of the Active/Passive ELB/ILB page:
https://github.com/40net-cloud/fortinet-azure-solutions/blob/main/FortiGate/Active-Passive-ELB-ILB/doc/config-inbound-connections.md#configuration---ipsec

Additionally, we recently added an FAQ page with additional information:
https://github.com/40net-cloud/fortinet-azure-solutions/blob/main/FortiGate/Documentation/faq-ipsec-connectivity.md

The passive mode helps to make sure the branches are the one's settting up the VPN connection.

Hope this gives you some more insight.

@gacpac
Copy link

gacpac commented Jul 3, 2023

@jvhoof Look my picture again, your setup is outdated. I spent months with support until they finally figured it out in their lab.

@jvhoof
Copy link
Collaborator

jvhoof commented Jul 3, 2023

Hi @gacpac,

I can see that you have the client persistence changed from 5 tuple to 2 tuple and I would need more information about your setup and what behavior this solved so I can review and update the documentation. This issue was opened for an active/active setup. While the doc we discuss is about an Active/Passive setup.

I can understand that you have spend much time with our support on this and we certainly would like to provide the up to date information. We have many customers that I know of running this setup with the 5 tuple persistence. The best option is to enable the passive mode to make the tunnel is setup from the remote site to the FortiGate cluster in Azure. This is because of the public IP address Azure selects for outbound connection.

It would be great if you can provide me with the ticket number so I can review this. You can connect with me on linkedin (same username) or I can provide you Fortinet email address so I can review your case.

Regards,

Joeri

@gacpac
Copy link

gacpac commented Jul 3, 2023

For my setup behind the load balancer I'm using the public IP of the load balancer for IPSec connectivity.

Look at ticket number 8304588 for more internal details. If you want to get in a call I also have microsoft azure with ticket open

@emmanuelg34
Copy link

Hi,

I had a ticket for months with fortigate, the github documentation is outdated, please make this setting in azure load balancer for udp 500 and 4500 and let me know if it fixes it. It did it for me, they also recommended set the tunnel to passive-mode me which i didn't have to do

image

image

config vpn ipsec phase1-interface edit set passive-mode enable next end

https://community.fortinet.com/t5/Customer-Service/Technical-Tip-How-to-make-sure-the-FortiGate-will-act-as-a/ta-p/244166

I have a similar issue, "set passive-mode enable" is not available for my IPsec VPN
Any ideas ?

@gacpac
Copy link

gacpac commented Jul 20, 2023

Oh BTW the command only needs to be in the azure firewall not the sites. And you should have the command available over cli, maybe open a ticket with Fortinet and let us know. Maybe you have other errors in your setup

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants