Cybersecurity Forum

This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.

rmock_FTNT
Staff
Staff

FortiOS to PANOS Site-to-Site VPN

Manny Fernandez 

In this article, I am using "WAY OLD" PAN OS.  Mostly because I no longer own an updated PAN box.  I am going to be installing a VM in a couple of weeks and will be doing some compare and contrast articles and some PAN VM to Fortigate VMs performance comparison so stay tuned, this could get interesting.

In PAN, rather than creating a VPN in one section, as in the Fortigate, it is broken down into pieces similar to Cisco.  Cisco creates separate phase I and phase II sections and then a crypto map and an access list, etc. In the case of PAN, you need to set up what I like to call "the ingredients" for the VPN and then create the VPN "dish" itself. If you understand IPSec it's not that bad.

PANOS Configuration

2019-11-16_18-31-13.png

The graphic above was part of a deliverable I created for a customer a while back when I was running service for a reseller and installing PAN, Fortigate and plenty of Cisco ASAs.  It give you a good overview of what each "ingredient" does.

Phase I

Most of these sections will be under Network and then on the left, you will see the options to configure the next few sections.

In this section, we will configure the Phase I proposals.  As you can see below, we have the IKE Crypto Profile and within it, we can see that we are using AES256 as the encryption scheme, the hashing or Authentication is SHA256 with a Diffie-Hellman (DH) group of 5.

2019-11-15_23-00-02.png

Phase II

In the IPSec Crypto Profile section, you will define your Phase II proposals.  A you can see below, we are using:

  • Encapsulation Security Payload (ESP)
  • AES256 for the encryption scheme.
  • SHA256 for the hash or Authentication
  • DH group5 (Only applicable with PFS)

2019-11-15_23-00-45.png

IKE Gateway

Next we will create the gateway where we will define the remote peer IP, pre-shared key, and the IKE Crypto Profile.

IKE GW.png

Under the IKE Gateway configuration, we will define:

  1. Name the IKE Gateway
  2. Choose the outgoing interface
  3. By choosing the drop-down, you will be able to choose the IP that is assigned to the chosen interface (item 2).
  4. Here you can choose weather the peer will have a static IP or if it will be dynamic.
  5. Define the remote peer IP address.
  6. Enter and validate the Pre-Shared Key.
  7. If you are using Local Identification and Remote Identification, you can define those values here.
  8. Choose the drop down and choose the IKE Crypto Profile we created in the Phase I section.

Create a Zone

Again, you will need to go to Network then Zones then choose the add button.

2019-11-17_08-07-13.png

2019-11-17_07-44-37

Interface Management

If you want to allow ping as an example to the Palo Alto device, you will need to define it under the Interface Mgmt section which is under the Network tab.

2019-11-17_07-48-05.png

2019-11-17_07-48-42.png

Here you can choose what you want to allow in this profile.

Tunnel Interface

We will need to create a Tunnel Interface

2019-11-17_07-44-26.png

  1. Go to the Network tab
  2. Then Interfaces then
  3. Choose Tunnel.

You will need to create a new Tunnel Interface

2019-11-17_07-44-37.png

Click the Add button the bottom left of the screen.

2019-11-17_07-46-00.png

  1. Assign a number not being used already.
  2. Optional – (but recommended) Give it a name.
  3. Choose the virtual router you will use.
  4. Select the Security Zone we created earlier.

You can add the Interface Mgmt profile we created before by clicking the Advanced button under the Tunnel Interface configuration.

2019-11-17_07-49-53 (1).png

Then choose OK

IPSec Tunnel

Finally we put the ingredients together to form the dish (VPN Tunnel).

2019-11-17_07-51-05.png

In the screenshot above, you can see:

  • The Name of the IPSec Tunnel
  • Tunnel Interface choose the drop-down and choose the interface we created above.
  • Auto or Manual Key, I have only used Auto Key
  • Choose the IKE Gateway we created in the previous step.
  • Choose the IPsec Crypto Profile created in the previous few steps.

Next choose the Phase II selectors or the IP addresses you will be presenting in the VPN to the remote peers.  This defines what is interesting traffic.

2019-11-15_23-03-49.png

NOTE: For a true route-based VPN, you can leave this alone and it will default to 0.0.0.0/0/.

Firewall Policies

Now we will create a policy to permit traffic in and out of the tunnel.

2019-11-17_08-13-46.png

You will need to go to Policies tab, then choose Security.  Now click the Add button on the bottom left.

2019-11-17_07-58-04.png

Choose a source zone and choose Source Address as needed.

2019-11-17_07-58-19.png

Now choose the VPN zone we created earlier.

2019-11-17_07-58-35.png

Choose the Application and Service / URL Category as needed.  The Actions tab will tell you what to do with the matching traffic.  In our case, we want to Allow .  Additionally, you can send logs to an external syslog if desired.

Commit

Now that you have finished the configuration for the PAN side, you will need to commit the changes.

2019-11-17_07-51-59.png

FortiOS Configuration

IMHO, the Fortigate is much easier to configure from a number of steps perspective.  Lets get started.

2019-11-16_22-35-59.png

Phase I

Go to VPN and choose IPsec Tunnel then choose Create New

Give it a descriptive name as you will not be able to change after you create it, and choose Custom and Next

2019-11-16_22-36-57.png

Unlike the PANOS where you need to create the Ingredients and then cook, the Fortigate is configured all from the same screen, save for Policies and Routes.

As you can see I have :

  • Chosen a name FGT-to-PAN
  • Told it the Remote Gatewayis configured with a static IP.
  • Added the remote peer IP
  • The outgoing interface.
  • We entered the PSK
  • We configured the Phase I Proposals.
  • DH Group
  • And Key Lifetime,

Phase II

2019-11-16_22-37-30.png

Again, Fortigate's Phase II is configured on the same screen as the previous screenshot.

Tunnel Interface

In the ForiOS, the VPN process above will automatically create the tunnel interface for you

2019-11-17_08-22-51.png

It will use the Interface you chose in the VPN first section to bind the tunnel interface to you.

2019-11-17_08-31-57.png

Here we can define the "PAN Equivalent" of Interface Mgmt profile as well as the Tunnel interface with the tunnel IP.

Policies

We will need to define the policies to permit traffic in and out of the VPN Tunnel we just created.

2019-11-16_22-39-26.png

  1. Descriptive Name
  2. Incoming port(s), where the traffic is coming from.
  3. Destination Interface, in our case, the VPN tunnel we created (FGT-to-PAN).
  4. Source network(s) / IP's
  5. Destination network(s) / IP's
  6. Services you want to allow/deny
  7. Enable the policy

Choose OK.

Now you can create in reverse order simply by right-clicking the policy you just created and choose Clone in Reverse

2019-11-16_22-40-28.png

2019-11-16_22-42-08.png

Conclusion

I have worked on PAN, Fortigate, Cisco, Checkpoint, Sidewinder, NetScreen, Watchguard and probably every single firewall that has ever been on the market….. yes including Border Manager from Novell (Don't laugh).  IMHO, I think the PAN implementation can be simplified substantially. I am sure it gives a level of granularity although that is a matter of opinion either way.

Hope this helps

0 REPLIES 0