FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Jean-Philippe_P
Moderator
Moderator
Article Id 254038
Description This article describes how to set up Ipsec VPN between two FortiGates using VPN Setup wizard and custom profile.
Scope FortiGate VM.
Solution

FortiGateVM to FortiGateVM – with the default profile.

 

This is going to be a brief introduction to setting up an IPsec-VPN connection between two FortiGates using the default profile. This profile differs from the custom profile by providing a guided setup with limited customization as well as subnet groups, static routes, and firewall policies are created automatically, thus providing a quick and easy setup of VPN connections.

 

JeanPhilippe_P_0-1682505253485.png

 

 

FortiGate-VM SiteA

FortiGate-VM SiteB

Remote IP address

10.10.10.82

10.10.10.80

Outgoing Port

Port10

Port10

Local Subnet-Port

192.168.80.0/24-Port1

192.168.82.0/24-Port1

Remote Subnet

192.168.82.0/24

192.168.80.0/24

Pre-shared Key

Test123

Test123

 

Create your VPN-Tunnel.

 

Configuring VPN between two FortiGates using the default Remote device type for Site to Site VPN. Select Name and NAT configuration.


VPN -> IPsec Wizard.

 

JeanPhilippe_P_1-1682505253500.jpeg

 

Enter the Remote IP address and the outgoing Interface as well as a Pre-shared key. 

 

JeanPhilippe_P_2-1682505253543.png

Select the local interface and subnets wanted to be connected as well as the remote subnet.

 
JeanPhilippe_P_0-1682509307334.png

 

Press Create and the VPN should be set up automatically.

 

JeanPhilippe_P_1-1682509343083.png

 

Static routes, remote address groups as well as Firewall rules are created automatically.
Network -> Static Routes.

 
JeanPhilippe_P_2-1682509392266.png

 

Policy & Objects -> Addresses.

 
JeanPhilippe_P_3-1682509429840.png
 

JeanPhilippe_P_5-1682509511018.png

 

Policy & Objects -> Firewall Policy.

 

JeanPhilippe_P_6-1682509539121.png

 

Monitor the VPN-Tunnel.

 

To check the VPN tunnel health, it is necessary to add a new Dashboard-Widget called IPsec.


Dashboard -> Status -> Add Widget.

 
JeanPhilippe_P_7-1682509620960.png

 

Now, it is possible to check Phase 1 and Phase 2 status.

 
JeanPhilippe_P_8-1682509666726.png

 

Then test the connection with a simple ping. Phase 2 should be brought up automatically, provided Phase 1 has been brought up properly.

 

JeanPhilippe_P_9-1682509666694.png

 

FortiGateVM to FortiGateVM – with a custom profile.

 

This profile provides an extensive set of customization options for phase 1 and phase 2 encryption, NAT traversal, and others. Especially, it will be necessary to create subnet groups, static routes, and firewall policies manually.

 

JeanPhilippe_P_12-1682505381876.png

 

 

FortiGate-VM SiteB

FortiGate-VM SiteC

Remote IP address

10.10.10.81

10.10.10.82

Outgoing Port

Port10

Port10

Local Subnet-Port

192.168.82.0/24-Port1

192.168.81.0/24-Port1

Remote Subnet

192.168.81.0/24

192.168.82.0/24

Phase 1

Pre-shared Key

Test123

Test123

IKE-Version

2

2

Encryption/Authentication

DES/SHA512

DES/SHA512

Diffie-Hellman Group

14

14

Key-Lifetime (seconds)

86400

86400

Phase 2

Encryption/Authentication

DES/SHA512

DES/SHA512

Diffie-Hellman Group

14

14

Key-Lifetime (seconds)

43200

43200

 

Create the VPN-Tunnel.

 

Configuring VPN between two FortiGates using the custom VPN. Select a Name.

 

VPN -> IPsec Wizard.

 

JeanPhilippe_P_13-1682505381750.png

 

Enter the Remote Gateways IP Address and the outgoing interface.

 

JeanPhilippe_P_14-1682505381684.png

 

Enter the agreed Pre-shared Key as well as IKE-Version.

 

JeanPhilippe_P_15-1682505381709.png

 

For Phase 1 select the agreed Encryption and Authentication as well as the Diffie-Hellman Group and the Key Lifetime.

 

JeanPhilippe_P_16-1682505381692.png

 

For Phase 2 enter the Local and Remote Address space.

 

JeanPhilippe_P_17-1682505381671.png

 

In the Advanced options, select again the agreed Encryption and Authentication method as well as the Diffie-Hellman Group and the Key Lifetime.

 

JeanPhilippe_P_18-1682505381832.png

 

In the next step, add new Address Objects under Policy & Objects -> Addresses -> Create New -> Address.

 

JeanPhilippe_P_19-1682505381872.png

 

For the local subnet:

 

JeanPhilippe_P_20-1682505381821.png

 

and for the remote subnet:

 

JeanPhilippe_P_21-1682505381841.png

 

It is also possible to add Address Groups if it is wanted to add them to the Firewall Policies instead of the direct Subnets.

 

JeanPhilippe_P_22-1682505381870.png

 

JeanPhilippe_P_23-1682505381844.png

 

Add a static route for the remote subnet pointing to the VPN-Tunnel Interface.


Network -> Static Routes -> Create New.

 

JeanPhilippe_P_10-1682510053665.png

 

Add another static Route this time pointing to the Blackhole interface.

 

JeanPhilippe_P_25-1682505381826.png

 

The last step is to add Firewall Policies to allow the VPN traffic to pass through.
Add a New Policies Policy & Objects -> Firewall Policy -> Create New.

 

JeanPhilippe_P_26-1682505381852.png

 

First for the traffic going to the VPN Tunnel from the Port of your Subnet. No NAT is required.

 

JeanPhilippe_P_11-1682510153881.png

 

Then for the traffic coming from the VPN Tunnel going to the Port of your destination Subnet. No NAT is required.

 

JeanPhilippe_P_12-1682510189347.png

 

Monitor the VPN-Tunnel.

 

To check the VPN tunnel health, it is necessary to add a new Dashboard-Widget called IPsec.


Dashboard -> Status -> Add Widget.

 

JeanPhilippe_P_13-1682510255213.png

 

Now, it is possible to check Phase 1 and Phase 2 status.

 

JeanPhilippe_P_14-1682510308586.png

 

Then test the connection with a simple ping. Phase 2 should be brought up automatically, provided Phase 1 has been brought up properly.

 

JeanPhilippe_P_15-1682510308587.png