FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
epinheiro
Staff
Staff
Article Id 281924
Description

This article is a sample configuration of IPsec VPN authenticating a remote Palo Alto peer with a pre-shared key.

 

Topology:

 

2023-10-30 19_33_35-Novo(a) Documento do Microsoft Word - Word.jpg

Scope FortiGate, Palo Alto.
Solution
  • Go to: VPN -> IPSec Tunnels, and select 'Create New '-> IPSec Tunnel.

 

2023-10-30 19_35_44-Novo(a) Documento do Microsoft Word - Word.jpg

 

2023-10-30 19_36_44-Novo(a) Documento do Microsoft Word - Word.jpg

 

Note:

The wizard shows all available options so that it is possible to speed up the process, but the Custom option will be used for a better understanding of each step for the IPSec tunnel creation:

 

2023-10-30 19_37_47-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Set the tunnel name (After creation, the tunnel name cannot be modified).

 

2023-10-30 19_37_47-Novo(a) Documento do Microsoft Word - Word.jpg

 

The process is straightforward. Using only one screen, it will be possible to configure Phase 1 and Phase 2.

 

Note:

This is just a sample and it is necessary to adjust the tunnel configuration according to the requirements of the network.

 

  • Phase I Configuration:

 

2023-10-30 19_39_56-Novo(a) Documento do Microsoft Word - Word.jpg

 

2023-10-30 19_40_50-Novo(a) Documento do Microsoft Word - Word.jpg2023-10-30 19_42_12-Novo(a) Documento do Microsoft Word - Word.jpg

 

  •  Phase II Configuration:

 

2023-10-30 19_43_06-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Checking the tunnel:

 

2023-10-30 19_44_23-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Create the static route pointing to the Palo Alto LAN:

 

2023-10-30 19_45_22-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Create the firewall policy allowing outbound and inbound traffic:

 

2023-10-30 19_46_10-Novo(a) Documento do Microsoft Word - Word.jpg

 

Note:

All parameters are configured on FortiGate, it is also necessary to configure on the Palo Alto firewall for Phase 1 and Phase 2.

On Palo Alto, it is necessary to access more options on different screens to create the IPSec tunnel.

 

  • For Phase 1 Proposal, access the IKE Crypto Profile':

 

palo phase1.jpg

 

  • Then, configure the IKE gateway:

 

2023-10-30 19_50_34-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • On 'Advanced Options', set the Phase 1 Proposal on 'Ike Crypto Profile':

 

ike gateway palo alto.jpg

 

  • For Phase 2 Proposal, access 'IPSec Crypto Profile':

 

palo phase2.png

 

  • Create a tunnel interface on the following path: Network -> Interfaces -> Tunnel.

 

It is necessary to set an ID for the tunnel.

 

2023-10-30 19_52_46-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Then create the IPSec tunnel on the following path: Network -> IPSec tunnel.

 

It is necessary to select the tunnel interface with the ID  just created, in this case, 'tunnel.1'. Also, select the Phase 2 Proposal on 'IPSec Crypto Profile':

 

palo ipsec tunnel.jpg

 

  • Set the phase 2 selectors on 'Proxy IDs':

 

2023-10-30 19_55_42-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Create the static route pointing to the FortiGate LAN on Network -> Virtual Router -> Default -> Static Route.

 

2023-10-30 19_56_21-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Create the Security Policy allowing outbound and inbound traffic on Policies -> Security.

 

2023-10-30 19_57_47-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Validating the IPSec tunnel on FortiGate:

 

2023-10-30 19_59_02-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Validating the IPSec tunnel on Palo Alto:

 

2023-10-30 19_59_40-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • Ping Test:

 

2023-10-30 20_00_09-Novo(a) Documento do Microsoft Word - Word.jpg

 

  • On the FortiGate, to check the 'IPSec Monitor', go to Dashboard -> Network -> IPSec.

 

2023-10-30 20_00_57-Novo(a) Documento do Microsoft Word - Word.jpg

 

Special notes within the IKE Gateway General Configuration:

  1. In certain scenarios, when establishing an IPsec tunnel between FortiGate and Palo Alto, even if using non-cloud firewalls, it may be necessary to configure the Local Identification with a Palo Alto IP and Peer Identification with a FortiGate IP.
    Example Scenario I: FortiGate wan1 (Public IP x.x.x.x) ===== [Internet] ===== (Public IP y.y.y.y) Palo Alto.

  2. Sometimes, FortiGate can happen to be behind an ISP with a Local IP (for example wan1 192.168.100.10) (often when Bridge Mode cannot be set on the ISP Router). In this scenario, the Peer Identification that Palo Alto will observe on its IPsec logs will be FortiGate Local IP 192.168.100.10, meaning this IP must be configured as Peer Identification. This applies even if the Tunnel has an IP assigned to it.
    Example Scenario II: FortiGate wan1 (192.168.100.10) ===== ISP Router (Public IP x.x.x.x) ===== [Internet] ===== (Public IP y.y.y.y) Palo Alto.

  3. In Palo Alto Virtual Machine deployments, for instance, in an Azure cloud environment: it is often mandatory for the Local identification and Peer identification, within the IKE Gateway, to be configured with an IP address. Otherwise, the IPsec phase 1 negotiation will fail. 

 

Note:
On FortiGate Phase 2 settings. If the named subnet is a Group Subnet, the tunnel will not go up.
For FortiGate to another third-party device. The standard config used is 'Subnet'.

Configure Phase 2 of FortiGate remote and local IP as 'Subnet'.

If there are multiple subnets, add and specify each subnet in Phase 2.