Hello viragomann!
Thanks for reply!
I don't know the reason exactly, but, I suppose that it was requested by the remote customer IT team, and the remote firewall just accepts connections coming from this network 10.234.57.0/24 to make the tunnel up, and I suppose that the IP address 10.234.57.1, which is present in the tunnel interface of Fortigate, is used to masquerade the traffic.
Follow the attached prints of how I did the configs on Phase 2, NAT Outbound, and Firewall Rules on our OPNsense.
BR,
Edgar
Thanks for reply!
QuoteYou probably wanted to write 10.248.16.29/32 as the first one. 10.248.16.29/29 cannot be used, since this isn't a network address.Yes, you are right, it was a typo.
QuoteWhere? Local or remote?Well, even the Fortigate and this IPsec tunnel were not configured by me. The guy who did it was not in the company anymore. So, 10.234.57.0/24 was at the "Local Network" field of Phase 2 of this tunnel in the Fortigate, then I just copied it.
What you intend to achieve?
Masquerading the trafic with a different IP or subnet?
I don't know the reason exactly, but, I suppose that it was requested by the remote customer IT team, and the remote firewall just accepts connections coming from this network 10.234.57.0/24 to make the tunnel up, and I suppose that the IP address 10.234.57.1, which is present in the tunnel interface of Fortigate, is used to masquerade the traffic.
QuoteHow? Legacy setup or connections?As our OPNsense is on v25.7, I'm using Connections.
QuoteWhich settings exactly?Yes, I only need access to remote devices on the remote site. The devices on the remote site never initiate a connection to my devices on the local network.
Do you only need access to the remote site or bidirectional access?
Follow the attached prints of how I did the configs on Phase 2, NAT Outbound, and Firewall Rules on our OPNsense.
BR,
Edgar