config system global set hostname "Remote_FGT1" set management-vdom "Internet" end config system vdom-link edit "Lan2INet" next end config system interface edit "port14" set vdom "Internet" set ip 172.31.224.178 255.255.254.0 set allowaccess ping https ssh http telnet set type physical next edit "port16" set vdom "LAN" set ip 10.160.0.178 255.255.254.0 set allowaccess ping https ssh http telnet set type physical next edit "Lan2INet0" set vdom "LAN" set ip 192.168.1.1 255.255.255.0 set type vdom-link next edit "Lan2INet1" set vdom "Internet" set ip 192.168.1.2 255.255.255.0 set type vdom-link next end |
config webfilter urlfilter edit 1 config entries edit "eicar.org" set action block next end set name "no_eicar" next end config firewall profile edit "web" config log set log-web-url enable end set http urlfilter set https urlfilter set weburlfiltertable 1 end config firewall policy edit 1 set srcintf "port16" set dstintf "Lan2INet0" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" set profile-status enable set profile "web" next edit 2 set srcintf "Lan2INet0" set dstintf "port16" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" next end config router static edit 1 set device "Lan2INet0" set gateway 192.168.1.2 set weight 50 next end |
config firewall address edit "10.167" set subnet 10.167.0.0 255.255.0.0 next edit "10.160" set subnet 10.160.0.0 255.255.0.0 next end config vpn ipsec phase1-interface edit "to_Central_FGT2" set interface "port14" set local-gw 172.31.224.178 set proposal 3des-sha1 aes128-sha1 set remote-gw 172.31.225.160 set psksecret ENC R2hEH1SzcPJ9R7SIijMcYIy9I89Fm8LRDwYdc5D7XRLiV297lj6OuenHPx8anN4o9EGKJPRha0AcXEWopZi50vM3QD/8z/i1tZS75j54NyVqb8Bt next end config vpn ipsec phase2-interface edit "To_Central_fgt2" set phase1name "to_Central_FGT2" set proposal 3des-sha1 aes128-sha1 set dst-subnet 10.167.0.0 255.255.0.0 set src-subnet 10.160.0.0 255.255.0.0 next end config firewall policy edit 1 set srcintf "Lan2INet1" set dstintf "port14" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" set nat enable next edit 2 set srcintf "Lan2INet1" set dstintf "to_Central_FGT2" set srcaddr "10.160" set dstaddr "10.167" set action accept set schedule "always" set service "ANY" next edit 3 set srcintf "to_Central_FGT2" set dstintf "Lan2INet1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" next end config wanopt peer edit "Central_FGT2" set ip 172.31.225.160 next end config wanopt rule edit 1 set src-ip 10.160.0.0-10.160.255.255 set dst-ip 10.167.0.0-10.167.255.255 set port 1-65535 set proto tcp set peer "Central_FGT2" next end config router static edit 1 set device "port14" set gateway 172.31.225.254 set weight 50 next edit 2 set device "Lan2INet1" set dst 10.160.0.0 255.255.0.0 set gateway 192.168.1.1 set weight 50 next edit 3 set device "to_Central_FGT2" set dst 10.167.0.0 255.255.0.0 set weight 50 next end |
config firewall address edit "10.167" set subnet 10.167.0.0 255.255.0.0 next edit "10.160" set subnet 10.160.0.0 255.255.0.0 next end config vpn ipsec phase1-interface edit "To_remote_FGT1" set interface "switch" set proposal 3des-sha1 aes128-sha1 set remote-gw 172.31.224.178 set psksecret ENC 5Uv6OXDPunbpcId2hQ/aBmB7wU4smkMZmwL/UeY1nZYUedc87qIxUfunh5f9T+6dQyY7KwPObtigQ0yafo2z/UOz9FI0M8zcBg20chgydtHmlwPW next end config vpn ipsec phase2-interface edit "To_Remote_FGT1" set phase1name "To_remote_FGT1" set proposal 3des-sha1 aes128-sha1 set dst-subnet 10.160.0.0 255.255.0.0 set src-subnet 10.167.0.0 255.255.0.0 next end config firewall policy edit 3 set srcintf "port16" set dstintf "To_remote_FGT1" set srcaddr "10.167" set dstaddr "10.160" set action accept set schedule "always" set service "ANY" next edit 4 set srcintf "To_remote_FGT1" set dstintf "port16" set srcaddr "10.160" set dstaddr "10.167" set action accept set schedule "always" set service "ANY" next edit 5 set srcintf "port16" set dstintf "switch" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" set nat enable next end config wanopt settings set host-id "Central_FGT2" end config wanopt peer edit "Remote_FGT1" set ip 172.31.224.178 next end config wanopt rule edit 1 set src-ip 10.167.0.0-10.167.255.255 set dst-ip 10.160.0.0-10.160.255.255 set port 1-65535 set proto tcp set peer "Remote_FGT1" next end config router static edit 1 set device "switch" set gateway 172.31.225.254 next edit 2 set device "To_remote_FGT1" set dst 10.160.0.0 255.255.0.0 next end |
S* 0.0.0.0/0 [10/0] via 192.168.1.2, Lan2INet0, [0/50] C 10.160.0.0/23 is directly connected, port16 C 192.168.1.0/24 is directly connected, Lan2INet0 C 192.168.1.1/32 is directly connected, Lan2INet0 |
S* 0.0.0.0/0 [10/0] via 172.31.225.254, port14, [0/50] S 10.160.0.0/16 [10/0] via 192.168.1.1, Lan2INet1, [0/50] S 10.167.0.0/16 [10/0] is directly connected, to_Central_FGT2, [0/50] C 172.31.224.0/23 is directly connected, port14 C 192.168.1.0/24 is directly connected, Lan2INet1 C 192.168.1.2/32 is directly connected, Lan2INet1 |
S* 0.0.0.0/0 [10/0] via 172.31.225.254, switch S 10.160.0.0/16 [10/0] is directly connected, To_remote_FGT1 C 10.167.0.0/23 is directly connected, port16 C 172.31.224.0/23 is directly connected, switch |
peer name=Central_FGT2 ip=172.31.225.160 vd=3 version=1 tunnels(active/connecting/failover)=10/0/0 sessions=0 n_retries=0 version_valid=true total peers: 1 |
Related Articles
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.