Created on 06-23-2022 10:51 AM Edited on 06-23-2022 10:54 AM By Anonymous
Description
This article describes how to configure the IPSEC+VIP scenario on FortiExtender.
Scope
For FortiExtender version v7.2.0 build0113,FortiGate version V7.2.0 build1157.
FortiExtender Port4 is directly connected to port9 interface on FortiGate.
Solution
Use IPSEC+VIP, where a remote user does not need to know the actual IP address for local servers, the user can visit local servers with virtual IP address, and the admin can make any changes on local servers like changing IP address, migrating servers, but not affect remote users to visit local servers through IPSEC VPN.
1) Create VPN Tunnels on the FortiExtender side, with source subnet 10.10.10.0/24 and destination subnet 192.168.10.0/24.
2) Create VPN tunnels on the FortiGate side, with source subnet 192.168.10.0/24 and destination subnet 10.10.10.0/24.
3) Verify VPN Tunnels is set up successfully and status is ON on both FortiExtender and FortiGate.
4) On FortiExtender, create 'FireWall Vip', 'Extip':10.10.10.1, 'Mappedip': 192.168.200.100(Server IP address), then create firewall policy with DNAT enabled, and the source interface is the same with firewall VIP external interface.
5) The firewall policy for VPN and VIP on FortiExtender looks like:
6) The networking address on FortiExtender looks like:
7) On FortiExtender GUI, Networking -> Routing, edit the Policy Routes for VPN, change the source to lan and save.
8 ) Now Clients behind FortiGate(192.168.10.0/24) can visit the server(192.168.200.100) behind FortiExtender with IP address 10.10.10.1, all traffic with destination address 10.10.10.1 will be forwarded to server 192.168.200.100.
CLI Config:
FortiExtender:
# config network address
edit lan
set type ipmask
set subnet 192.168.200.0/24
next
edit vpn-a_local_subnet_1
set type ipmask
set subnet 10.10.10.0/24
next
edit vpn-a_remote_subnet_1
set type ipmask
set subnet 192.168.10.0/24
next
end
# config vpn ipsec
config phase1-interface
edit vpn-a
set ike-version 2
set keylife 86400
set proposal aes128-sha256 aes256-sha256 3des-sha256 aes128-sha1 aes256-sha1 3des-sha1
set dhgrp 14 5
set interface port4
set type static
set remote-gw 172.30.241.99
set authmethod psk
set psksecret ******
set localid
set peerid
set add-gw-route disable
set dev-id-notification disable
next
end
config phase2-interface
edit vpn-a_p2_1
set phase1name vpn-a
set proposal aes128-sha1 aes256-sha1 3des-sha1 aes128-sha256 aes256-sha256 3des-sha256
set pfs enable
set dhgrp 14 5
set keylife-type seconds
set keylifeseconds 43200
set encapsulation tunnel-mode
set protocol 0
set src-addr-type name
set src-name vpn-a_local_subnet_1
set src-port 0
set dst-addr-type name
set dst-name vpn-a_remote_subnet_1
set dst-port 0
next
end
end
# config firewall vip
edit vip-1
set comment
set extip 10.10.10.1
set mappedip 192.168.200.100
set extintf vpn-a
set portforward disable
next
end
# config firewall policy
edit vpn_vpn-a_local
set srcintf any
set dstintf vpn-a
set srcaddr vpn-a_local_subnet_1
set dnat disable
set dstaddr vpn-a_remote_subnet_1
set action accept
set status enable
set service ALL
set nat disable
next
edit vpn_vpn-a_remote
set srcintf vpn-a
set dstintf any
set srcaddr vpn-a_remote_subnet_1
set dnat disable
set dstaddr vpn-a_local_subnet_1
set action accept
set status enable
set service ALL
set nat disable
next
edit Rule-vip
set srcintf vpn-a
set dstintf any
set srcaddr all
set dnat enable
set vip vip-1
set action accept
set status enable
set service ALL
set nat disable
next
edit all-nat
set srcintf any
set dstintf any
set srcaddr lan
set dnat disable
set dstaddr all
set action accept
set status enable
set service ALL
set nat enable
next
end
# config router policy
edit vpn_vpn-a_remote
set input-device
set srcaddr lan
set dstaddr vpn-a_remote_subnet_1
set service ALL
set target target.vpn-a
set status enable
set comment
next
end
FortiGate:
# config firewall address
edit "vpn-a_local_subnet_1"
set uuid a0615410-f272-51ec-7960-04d78ee7bd01
set allow-routing enable
set subnet 192.168.10.0 255.255.255.0
next
edit "vpn-a_remote_subnet_1"
set uuid a0738310-f272-51ec-bfbe-6e0d8a3dfe80
set allow-routing enable
set subnet 10.10.10.0 255.255.255.0
next
end
# config vpn ipsec phase1-interface
edit "vpn-a"
set interface "wan2"
set ike-version 2
set peertype any
set net-device disable
set proposal aes128-sha256 aes256-sha256 aes128gcm-prfsha256 aes256gcm-prfsha384 chacha20poly1305-prfsha256
set comments "VPN: vpn-a (Created by VPN wizard)"
set dhgrp 5 14
set wizard-type static-fortigate
set remote-gw 172.30.241.100
set psksecret ENC DR7FgTqZHG7cYnmifcW/lriO9hl/qiMohOWuJCVUMhVz3wrEMXLG8nBEllVfD2T+R+2wxvGstbRgG6TGM8QhSE6eKjb1ScKqoX+tc4lTtEiHHPvk7VhYP+CHLlTg0VERTXtuCSlWf5AZQ37eAGPXHcxiCMoKp0bwufpWdNcZd9d9cEkv+goh/UqTHpTOHjfEumXYUA==
next
end
# config vpn ipsec phase2-interface
edit "vpn-a"
set phase1name "vpn-a"
set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305
set comments "VPN: vpn-a (Created by VPN wizard)"
set src-addr-type name
set dst-addr-type name
set src-name "vpn-a_local"
set dst-name "vpn-a_remote"
next
end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.