在HUB/SPOKE1/SPOKE2状态观察:
HUB
IPsec VPN建立情况:
Monitor--->IPsec
Monitor
HUB路由学习情况:
Monitor--->Routing
Monitor
FortiGate1-HQ-BJ
# get router info routing-table all
S* 0.0.0.0/0 [10/0] via 100.1.1.254, port1
C 100.1.1.0/24 is directly connected, port1
C 192.168.0.0/24 is directly connected, port2
S 192.168.1.0/24 [15/0] via 101.1.1.1, Dia_VPN_1
S 192.168.2.0/24 [15/0] via 102.1.1.1, Dia_VPN_2
SPOKE1
IPsec VPN建立情况(只和HUB建立IPsec):
Monitor--->IPsec
Monitor
SPOKE1路由学习情况:
Monitor--->Routing
Monitor
FortiGate2-Branch-SH
# get router info routing-table all
S* 0.0.0.0/0 [5/0] via 101.1.1.254, port1
C 101.1.1.0/24 is directly connected, port1
S 192.168.0.0/16 [10/0] is directly connected, TO-HUB
C 192.168.1.0/24 is directly connected, port2
SPOKE2
IPsec VPN建立情况(只和HUB建立IPsec):
Monitor--->IPsec
Monitor

SPOKE2路由学习情况:
Monitor--->Routing
Monitor
FortiGate3-Branch-GZ
# get router info routing-table all
S* 0.0.0.0/0 [5/0] via 102.1.1.254, ppp0
C 102.1.1.1/32 is directly connected, ppp0
C 102.1.1.254/32 is directly connected, ppp0
S 192.168.0.0/16 [10/0] is directly connected, TO-HUB
C 192.168.2.0/24 is directly connected, port2
SPOKE1(192.168.1.99)访问HUB(192.168.0.99):
FortiGate2-Branch-SH #
FortiGate2-Branch-SH # execute ping-options source 192.168.1.99
FortiGate2-Branch-SH # execute ping 192.168.0.99
PING 192.168.0.99 (192.168.0.99): 56 data bytes
64 bytes from 192.168.0.99: icmp_seq=0 ttl=255 time=2.2 ms
64 bytes from 192.168.0.99: icmp_seq=1 ttl=255 time=1.4 ms
64 bytes from 192.168.0.99: icmp_seq=2 ttl=255 time=1.2 ms
64 bytes from 192.168.0.99: icmp_seq=3 ttl=255 time=1.4 ms
64 bytes from 192.168.0.99: icmp_seq=4 ttl=255 time=1.5 ms
--- 192.168.0.99 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 1.2/1.5/2.2 ms
在HUB上抓包:
FortiGate1-HQ-BJ # diagnose sniffer packet any "icmp" 4
interfaces=[any]
filters=[icmp]
2.464818 Dia_VPN_1 in 192.168.1.99 -> 192.168.0.99: icmp: echo request
2.464909 Dia_VPN_1 out 192.168.0.99 -> 192.168.1.99: icmp: echo reply
3.478489 Dia_VPN_1 in 192.168.1.99 -> 192.168.0.99: icmp: echo request
3.478530 Dia_VPN_1 out 192.168.0.99 -> 192.168.1.99: icmp: echo reply
4.487863 Dia_VPN_1 in 192.168.1.99 -> 192.168.0.99: icmp: echo request
4.487903 Dia_VPN_1 out 192.168.0.99 -> 192.168.1.99: icmp: echo reply
5.497287 Dia_VPN_1 in 192.168.1.99 -> 192.168.0.99: icmp: echo request
5.497326 Dia_VPN_1 out 192.168.0.99 -> 192.168.1.99: icmp: echo reply
6.506914 Dia_VPN_1 in 192.168.1.99 -> 192.168.0.99: icmp: echo request
6.506954 Dia_VPN_1 out 192.168.0.99 -> 192.168.1.99: icmp: echo reply
SPOKE1(192.168.1.99)访问SPOKE2(192.168.2.99):
FortiGate2-Branch-SH # execute ping-options source 192.168.1.99
FortiGate2-Branch-SH # execute ping 192.168.2.99
PING 192.168.2.99 (192.168.2.99): 56 data bytes
64 bytes from 192.168.2.99: icmp_seq=0 ttl=254 time=2.7 ms
64 bytes from 192.168.2.99: icmp_seq=1 ttl=254 time=2.2 ms
64 bytes from 192.168.2.99: icmp_seq=2 ttl=254 time=1.9 ms
64 bytes from 192.168.2.99: icmp_seq=3 ttl=254 time=2.3 ms
64 bytes from 192.168.2.99: icmp_seq=4 ttl=254 time=2.3 ms
--- 192.168.2.99 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 1.9/2.2/2.7 ms
FortiGate2-Branch-SH #
在HUB上抓包:
FortiGate1-HQ-BJ # diagnose sniffer packet any "icmp" 4
interfaces=[any]
filters=[icmp]
2.640652 Dia_VPN_1 in 192.168.1.99 -> 192.168.2.99: icmp: echo request
2.640855 Dia_VPN_2 out 192.168.1.99 -> 192.168.2.99: icmp: echo request
2.642251 Dia_VPN_2 in 192.168.2.99 -> 192.168.1.99: icmp: echo reply
2.642360 Dia_VPN_1 out 192.168.2.99 -> 192.168.1.99: icmp: echo reply
3.653507 Dia_VPN_1 in 192.168.1.99 -> 192.168.2.99: icmp: echo request
3.653567 Dia_VPN_2 out 192.168.1.99 -> 192.168.2.99: icmp: echo request
3.654513 Dia_VPN_2 in 192.168.2.99 -> 192.168.1.99: icmp: echo reply
3.654534 Dia_VPN_1 out 192.168.2.99 -> 192.168.1.99: icmp: echo reply
4.662893 Dia_VPN_1 in 192.168.1.99 -> 192.168.2.99: icmp: echo request
4.662909 Dia_VPN_2 out 192.168.1.99 -> 192.168.2.99: icmp: echo request
4.663698 Dia_VPN_2 in 192.168.2.99 -> 192.168.1.99: icmp: echo reply
4.663705 Dia_VPN_1 out 192.168.2.99 -> 192.168.1.99: icmp: echo reply
5.672198 Dia_VPN_1 in 192.168.1.99 -> 192.168.2.99: icmp: echo request
5.672214 Dia_VPN_2 out 192.168.1.99 -> 192.168.2.99: icmp: echo request
5.673367 Dia_VPN_2 in 192.168.2.99 -> 192.168.1.99: icmp: echo reply
5.673376 Dia_VPN_1 out 192.168.2.99 -> 192.168.1.99: icmp: echo reply
6.681687 Dia_VPN_1 in 192.168.1.99 -> 192.168.2.99: icmp: echo request
6.681701 Dia_VPN_2 out 192.168.1.99 -> 192.168.2.99: icmp: echo request
6.682741 Dia_VPN_2 in 192.168.2.99 -> 192.168.1.99: icmp: echo reply
6.682749 Dia_VPN_1 out 192.168.2.99 -> 192.168.1.99: icmp: echo reply