Three key points:
1) Branch (Fortigate 60c with FortiOS 5.2)
2) Headquarters (Fortigate 100d with FortiOS 5.2)
3) Third-party office (unknown device)
1) Branch and Headquarters are linked through an IPsec Tunnel ("Branch-To-Headquarters Tunnel") that works fine. Branch hosts are able to communicate with Headquarters hosts.
2) Headquarters and Third-party office are linked through an IPsec Tunnel ("Headquarters-To-3rdParty
Tunnel") that works fine. Headquarters hosts are able to communicate with Third-party office hosts.
Now, I need that Branch hosts are able to communicate with Third-party office hosts through the existing tunnels, so, I have done the following:
1) Create a static route on Branch, to route all traffic to 3rd party hosts trough "Branch-To-Headquarters Tunnel"
2) I confirmed that the requests are being received, accepted on the Headquarters firewall.
However, I don't get a reply back from 3rd party.
I'm suspecting about two possible causes:
1) traffic is not being routed from Headquarters to 3rd party (I don't think so, since I only have one static route that works when communicating from Headquarters through 3rd party)
2) There's something related to NAT that is not working as expected (for instance: 3rd party is waiting from requests from Headquarters' subnet, but requests are being received from Branch's subnet). If that's the case...how can I instruct Fortigate to "treat requests originating from Branch Office, as if they were originated in Headquarters" so the 3rd party firewall would accept them?
Please refer to the attached image for clarification.
Any help on this?