Created on
ā08-24-2024
06:11 AM
Edited on
ā08-21-2025
03:51 AM
By
Anthony_E
Description | This article describes how to configure an IPsec VPN between two FortiGate devices where traffic coming from SITE-B which should be NATed. The traffic from SITE-B must be NATed because SITE-B and SITE-C use the same subnet, and it is desired to avoid conflicts when connecting to a server at SITE-A. |
Scope | FortiGate. |
Solution |
To configure the IPsec VPN between SITE-B and SITE-A, where the traffic from SITE-B is NATed, follow these steps:
Site A subnet: 192.168.10.0/24. Actual Site B subnet: 192.168.20.0/24, which will be NATed to 172.16.20.0/24.
In this scenario, the Phase 2 configuration on Site B will be: Local Address: 172.16.20.0/24. Remote Address: 192.168.10.0/24.
And the phase 2 configuration on site A will be: Local Address: 192.168.10.0/24. Remote Address: 172.16.20.0/24.
Diagram Example: Scenario:
Traffic Flow:
Related article: Technical Tip: How to configure an IPsec tunnel with Overlapping Subnets using VIPs |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.