VPN Site-to-site with Overlapping Subnets in Fortigate
Thanks to: https://docs.fortinet.com/ Site-to-site VPN with overlapping subnets This is a sample configuration of IPsec VPN to allow transparent communication between two overlapping networks that are located behind different FortiGates using a route-based tunnel with source and destination NAT. In the following topology, both FortiGates (HQ and Branch) use 192.168.1.0/24 as their internal network, but both networks need to be able to communicate to each other through the IPsec tunnel. New virtual subnets of equal size must be configured and used for all communication between the two overlapping subnets. The devices on both local networks do not need to change their IP addresses. However, the devices and users must use the new subnet range of the remote network to communicate across the tunnel. Configuring the HQ FortiGate To configure IPsec VPN: Go to VPN > IPsec Wizard and select the Custom template. Enter the name VPN-to-Branch and click Next . For the IP Address