I try to mount a VPN IPSEC tunnel between a cisco 877 and a fortigate FM3000.
The tunnel is UP, from the cisco I can ping the IP of the interface of the fortigate.
From the fortigate I can ping the interface use as public of the cisco.
But impossible to ping from the private network behind the fortigate the private network behind the cisco and vice versa.
I have in the cisco an ACL permit any any and a firewall rule all all in the fortigate.
I don't know what blocks that.
Moreover I see something strange I have virtual-access 1 configured on the cisco and when I traceroute to the ip interface of the fortigate, the packet use this interface and IP to go out... What is virtual-access 1? automatically created with the tunnel?
I try to put a new ACL in the crypto map I can't do it is it normal?
Is it necessary to put the cisco fastethernet0 with behind my server in the tunnel? like the dialer0?
Is it necessary to route the traffic to the tunnel? It is not automatically done?
Could you explain me what is necessary in order to allow communications between private network behind the 2 routers?