Hello,
I am configuring a VPN setup with a Fortigate firewall as the hub (With dynamic DNS) and several Mikrotik mAP's as spokes. (DialUp)
Spokes are configured with subnet 172.28.10.0/24, 172.28.11.0/24 and so on.
LAN on the Fortigate is 192.168.50.0/24
mAP's 172.28.x.1
VPN tunnels are up and running, and I am able to ping 172.28.11.0/24 and 192.168.50.0/24 from 172.28.10.0/24 and vice versa.
BUT I am not able to reach the mAP from the local LAN.(Unless I use winbox and the MAC address of the mAP)
172.28.10.50 is not able to ping 172.28.10.1. 172.28.11.50 is not able to ping 172.28.11.1 and so on.
To make the solution flexible and easy to expand without having to change config on all mAP's when I add a new site I have this config. (Example from 172.28.10.1)
/ip ipsec policy add dst-address=172.28.0.0/16 peer=VPN_PMR_Nettet proposal="IKEv1 Proposal" src-address=172.28.10.0/24 tunnel=yes
/ip ipsec policy add dst-address=192.168.50.0/24 peer=VPN_PMR_Nettet proposal="IKEv1 Proposal" src-address=172.28.10.0/24 tunnel=yes
If i change this to:
/ip ipsec policy add dst-address=172.28.11.0/24 peer=VPN_PMR_Nettet proposal="IKEv1 Proposal" src-address=172.28.10.0/24 tunnel=yes
/ip ipsec policy add dst-address=192.168.50.0/24 peer=VPN_PMR_Nettet proposal="IKEv1 Proposal" src-address=172.28.10.0/24 tunnel=yes
it works between 172.28.10,0/24, 172.28.11.0/24 and 192.168.50.0/24. And I am able to reach the mAp from the LAN.
So I guess I must add some kind of routing or exception to make it work with dst-address=172.28.0.0/16.
And btw: Is it possible to skip the policy for 192.168.50.0 and solve it with routing instead?
All help is highly appreciated
/Stefan