Created on
‎11-13-2025
09:42 AM
Edited on
‎11-24-2025
01:11 AM
By
Jean-Philippe_P
| Description | This article describes the steps to configure a set of redundant GRE tunnels between FortiGate and Zscaler. The configuration allows for the forwarding of Internet traffic for inspection. |
| Scope | FortiGate v7.0 and above. |
| Solution | The following steps outline instructions in order to set up a FortiGate with a pair of redundant GRE tunnels to Zscaler. In this example, the FortiGate is equipped with two ISPs on wan1 and wan2, and the objective is to have a GRE tunnel configured for both WAN ports.
config system gre-tunnel
To find out about 'Zscaler Host1' and 'Zscaler Host2', and which tunnel they will be built on, see 'Locating the Hostnames and IP Addresses for ZIA Public Service Edges'.
config system interface
config router static set priority 10 set priority 20
config firewall policy
Make sure that snat-route-change is enabled under global configuration settings. Refer to this article: Technical Tip: Using 'SNAT-route-change' to update existing NAT session after routing change for more information.
config system global To check the status of link-monitor, use the following CLI command:
diagnose sys link-monitor status
Troubleshooting steps:
execute ping-options source <IP_Address_Zscaler-Primary> execute ping x.x.x.x
execute ping-options source <IP_Address_Zscaler-Secondary> execute ping y.y.y.y
execute traceroute-options source <IP_Address_Internal_Interface> execute traceroute 8.8.8.8
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.