Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi,in my AnyConnect VPN setup , the headend ASA firewall is behind Fortigate Firewall, Fortigate is connected to the Internet via 2 ISPs lines. There are two public IP addresses in the Fortigate (one from each ISP) pointing back to the outside interf...
i have ASA 5510 firewall and Fortigate is connected to vlan interface in ASA. I have public IP address NATed (object NAT) to the outside interface of the Fortigate. the NAT doesn't seems to work, I see the traffic hitting the public IP address but no...
Sorry Rob for the delay getting back to you , i was testing the solution.i have added the backup server, the AnyConnect still failing to establish the tunnel to the backup server. we are using certificate for authentication, checking the DART , i can...
Thanks Rob for your reply,the FQDN is the same but with 2 IP addresses, for example :int-fw.example.co.uk 31.1.10.12 31.1.150.4 so when you do nslookup , you will get 2 IP addresses for the same FQDN
sorted,just re-added the NAT statement at the top of the all NAT rules and its worked.1 (OUTSIDE) to (any) source static any any destination static Fortigate-IP CD-BFS-NORTHW thanks all for your help
ICMP, HTTP, HTTPS FW01/pri/act# sh run object-group id DM_INLINE_SERVICE_11object-group service DM_INLINE_SERVICE_11service-object icmpservice-object tcp-udp destination eq wwwservice-object tcp destination eq https