Fortigate VPN to AWS - AWS016

Posted on Wed 22 May 2019 in quiz

Alt Text

You created your first website which uses just only one web server in AWS. This site is a hosted service for your client. In order for them to access this server, you created VPN gateway in your VPC. And your clients told you they configured their Fortigate to connect to your VPN Gateway.
However your clients are still not able to connect your server.

In this quiz, you can assume AWS configuration is correct. I used Fortigate on AWS to emulate the scenario, however you should be able to apply the same technique you used here to the on-premise.

Spot the misconfiguration on Fortigate.


[Fortigate] Address Object

fg-addrobj

[Fortigate] BGP

fg-bgp

[Fortigate] Interfaces

fg-interfaces

[Fortigate] VPN Interface 1

fg-interface-vpn1

[Fortigate] VPN Interface 2

fg-interface-vpn2

[Fortigate] Security Policies

fg-security-policies

[Fortigate] VPN 1

fg-vpn1

[Fortigate] VPN 2

fg-vpn2

[Fortigate] Routing Monitor

fg-routingmonitor

[Fortigate] IPSec Monitor

fg-ipsecmonitor


terraform configuration file Download Terraform output


Answer
There is no security policy allowing the traffic to use vpn tunnel.

Unlike the router, firewall usually does not allow the traffic between two separate segments by default. It is called "implicit deny", and all traffic is dropped if there is no explicit rule to allow that traffic.

You can create security policies as follows:
answer-policies

fortigate-trafficflow