Hi, I've a corporate laptop that uses Forticlient to establish a VPN connection to corporate resources.
When working at home, when this corporate laptop is connected through the ISP router, there's no problem connecting to the VPN server. Now, I'm setting up my own OpenBSD 7.7 amd64 router/firewall. Using simple NAT rules, other systems can connect fine to the Internet, also the corporate laptop can connect fine for everything except the VPN resources. When I try to connect the VPN, Forticlient 2.7.8.1140 returns: "a network error prevented updates from being downloaded". I asked in the community Fortinet forum about this and was told by a power user that: (https://community.fortinet.com/t5/Support-Forum/How-to-configure-home-router-firewall-to-allow-Forticlient/m-p/411072) """ No special rule needed, except need to open the outgoing connection to the remote SSL VPN server IP:port (usually TCP 443 or 10443). NAT is fully supported. """ Here's my router/firewall configuration: # uname -a OpenBSD futro2.Home 7.7 GENERIC.MP#625 amd64 # sysctl -a | grep forwarding net.inet.ip.forwarding=1 net.inet.ip.mforwarding=0 net.inet6.ip6.forwarding=0 net.inet6.ip6.mforwarding=0 # dhcpd -f Multiple interfaces match the same subnet: em0 ure0 Multiple interfaces match the same shared network: em0 ure0 Listening on ure0 (192.168.1.253). Can't listen on re0 - dhcpd.conf has no subnet declaration for 17.7.7.7. Can't listen on em1 - it has no IP address. Listening on em0 (192.168.1.252). DHCPREQUEST for 192.168.1.7 from cc:....... via ure0 DHCPACK on 192.168.1.7 to cc:....... via ure0 DHCPREQUEST for 192.168.1.12 from 38:........... via ure0 DHCPACK on 192.168.1.12 to 38:.......... via ure0 DHCPINFORM from 192.168.1.12 DHCPACK to 192.168.1.12 (38:...........) via ure0 DHCPINFORM from 192.168.1.12 DHCPACK to 192.168.1.12 (38:............) via ure0 The corporate laptop receives 192.168.1.12 IP. # pfctl -s rules match in all scrub (no-df random-id max-mss 1440) match out on egress inet from ! (egress:network) to any nat-to (egress:0) round-robin block drop in quick on egress from <martians> to any block return out quick on egress from any to <martians> pass out all flags S/SA pass quick on ure0 all flags S/SA block drop in quick on ! egress inet from 17.7.7.0/24 to any block drop in quick inet from 177.7.7..7 to any block drop in quick on ! re0 inet from 17.7.7.0/24 to any pass inet proto icmp all anchor "ftp-proxy/*" all pass in quick inet proto tcp from any to any port = 21 flags S/SA divert-to 127.0.0.1 port 8021 anchor "relayd/*" all pass out on re0 inet from 192.168.1.0 to any flags S/SA nat-to (re0) round-robin pass in log on egress proto tcp from any to (egress) port = 22 flags S/SA pass in on ure0 proto tcp from any to any port = 80 flags S/SA pass in on ure0 proto tcp from any to any port = 443 flags S/SA pass in log on ure0 inet proto tcp from 192.168.1.0 to any port = 5901 flags S/SA pass in quick on ure0 inet proto tcp from 192.168.1.0 to any port = 22104 flags S/SA pass in quick on ure0 inet proto udp from any port = 67 to any port = 68 pass in quick on ure0 proto tcp from any to any port = 853 flags S/SA pass in quick on ure0 proto udp from any to any port = 53 pass in quick on re0 proto tcp from any to any port = 853 flags S/SA pass in quick on re0 proto udp from any to any port = 53 block return in on ! lo0 proto tcp from any to any port 6000:6010 It seems that 'pfctl -s nat' is no longer available. Can you please tell me what am I missing or doing wrong? Thanks, Luís Mendes

