You created your first website which uses just only one web server in AWS. This site is a hosted service for your client.
In order for them to access this server, you created VPN gateway in your VPC. And your clients told you they configured their Fortigate to connect to your VPN Gateway.
However your clients are still not able to connect your server.
In this quiz, you can assume AWS configuration is correct. I used Fortigate on AWS to emulate the scenario, however you should be able to apply the same technique you used here to the on-premise.
Spot the misconfiguration on Fortigate.
[Fortigate] VPN Interfaces
[Fortigate] Security Policies
[Fortigate] Routing Monitor
[Fortigate] IPSec Monitor
terraform configuration file Download
Usually NAT(or specifically IP masquerading) is used for the internet access.
In this case, I don't need NAT because both of the subnets(10.0.0.0/24 and 172.16.1.0/24) are routable.
However you still need to use NAT in rare cases as follows:
- Connect to the subnets which overlaps -e.g. 10.0.0.0/24 are used both in on-premise and on AWS
In this quiz, I just simply disable NAT in each policy: