FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
nkorea
Staff
Staff
Article Id 269288
Description This article describes how to load-balance the traffic over Dual IPSEC tunnels using IPSEC Aggregate between FortiGate and AWS VPC with Static Routing.
Scope

 Diagram:

 

nkorea_0-1692315597082.png

 

 

  •  The LAN network of the FortiGate is 192.168.1.0/24 and VPC subnet is 10.0.0.0/16.
  • The private subnet on the AWS Side is 10.0.2.0/24.
  • Both Tunnel-1 and Tunnel-2 are up at the same time.
Solution

 

nkorea_1-1692315685878.png

 

  • Make sure that the Route table has route via the IPSEC Tunnel as shown below towards the FortiGate:

 

nkorea_2-1692315685882.png

 

  • IPSEC tunnel status is showing up on both ends as shown below:

 

nkorea_3-1692315685888.png

 

 

nkorea_4-1692315685890.png

 

 

  • Traffic getting load balanced as shown in the below debugs:

 

HomeGate # diagnose debug flow  filter addr 10.0.2.184

HomeGate # diagnose debug console timestamp enable

HomeGate # diagnose debug flow trace start 100

HomeGate # diagnose debug flow filter proto  1

HomeGate # diagnose debug enable

HomeGate # 2023-08-17 09:27:29 id=65308 trace_id=1 func=print_pkt_detail line=5799 msg="vd-root:0 received a packet(proto=1, 192.168.1.1

:11->10.0.2.184:2048) tun_id=0.0.0.0 from local. type=8, code=0, id=11, seq=0."

2023-08-17 09:27:29 id=65308 trace_id=1 func=init_ip_session_common line=5984 msg="allocate a new session-0028a592, tun_id=0.0.0.0"

2023-08-17 09:27:29 id=65308 trace_id=1 func=ipsecdev_hard_start_xmit line=669 msg="enter IPSec interface IPSEC_AWS, tun_id=0.0.0.0"

2023-08-17 09:27:29 id=65308 trace_id=1 func=_do_ipsecdev_hard_start_xmit line=229 msg="output to IPSec tunnel AWS2, tun_id=54.71.220.19

9, vrf 0"

2023-08-17 09:27:29 id=65308 trace_id=1 func=esp_output4 line=896 msg="IPsec encrypt/auth"

2023-08-17 09:27:29 id=65308 trace_id=1 func=ipsec_output_finish line=629 msg="send to 75.155.187.1 via intf-wan1"

2023-08-17 09:27:29 id=65308 trace_id=2 func=print_pkt_detail line=5799 msg="vd-root:0 received a packet(proto=1, 10.0.2.184:11->192.168

.1.1:0) tun_id=54.71.220.199 from IPSEC_AWS. type=0, code=0, id=11, seq=0."

2023-08-17 09:27:29 id=65308 trace_id=2 func=resolve_ip_tuple_fast line=5887 msg="Find an existing session, id-0028a592, reply direction

"

2023-08-17 09:27:29 id=65308 trace_id=2 func=vf_ip_route_input_common line=2605 msg="find a route: flag=80000000 gw-192.168.1.1 via root

"

2023-08-17 09:27:30 id=65308 trace_id=3 func=print_pkt_detail line=5799 msg="vd-root:0 received a packet(proto=1, 192.168.1.1:11->10.0.2

.184:2048) tun_id=0.0.0.0 from local. type=8, code=0, id=11, seq=1."

2023-08-17 09:27:30 id=65308 trace_id=3 func=resolve_ip_tuple_fast line=5887 msg="Find an existing session, id-0028a592, original direct

ion"

2023-08-17 09:27:30 id=65308 trace_id=3 func=ipsecdev_hard_start_xmit line=669 msg="enter IPSec interface IPSEC_AWS, tun_id=0.0.0.0"

2023-08-17 09:27:30 id=65308 trace_id=3 func=_do_ipsecdev_hard_start_xmit line=229 msg="output to IPSec tunnel AWS1, tun_id=34.209.168.1

30, vrf 0"

2023-08-17 09:27:30 id=65308 trace_id=3 func=esp_output4 line=896 msg="IPsec encrypt/auth"

2023-08-17 09:27:30 id=65308 trace_id=3 func=ipsec_output_finish line=629 msg="send to 75.155.187.1 via intf-wan1"

2023-08-17 09:27:30 id=65308 trace_id=4 func=print_pkt_detail line=5799 msg="vd-root:0 received a packet(proto=1, 10.0.2.184:11->192.168

.1.1:0) tun_id=54.71.220.199 from IPSEC_AWS. type=0, code=0, id=11, seq=1."

2023-08-17 09:27:30 id=65308 trace_id=4 func=resolve_ip_tuple_fast line=5887 msg="Find an existing session, id-0028a592, reply direction

 

nkorea_5-1692315685892.png

 

Contributors