Description |
This article describes how to configure an IPsec VPN tunnel to connect branch offices 1 and 2 via a connection between them. |
Scope | FortiGate v6.0 and later. |
Solution |
Diagram:
Note: In real setup the WAN IP address would be a public IP address, but for the purposes of this setup, we'll use a private IP address.
Prerequisite: The tunnel between the HO and Branch_1 offices, as well as the HO and Branch_2 offices, should be completed and operational:
Pre-test:
Routing table:
For HO:
For Branch_1:
For Branch_2:
Head Office Configuration:
HO-Branch_1 Tunnel
As shown below, the tunnel named Branch2_Branch1 tunnel:
The local address is the Branch_2 LAN address:
The remote address is the Branch_1 LAN address:
HO-Branch_2 Tunnel:
As shown below, the tunnel named Branch2_Branch1 tunnel:
The local address is the Branch_1 LAN address:
The remote address is the Branch_1 LAN address.
config firewall policy edit 5 set name "Branch1_Branch2_Policy" set uuid c15a296c-5699-51ee-d95d-208a9c58d8e3 set srcintf "HO-Branch1" set dstintf "HO-Branch_2" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all
config firewall policy edit 6 set name "Branch2_Branch1_policy" set uuid f9a920e8-5699-51ee-2a7a-e2d9337d8b23 set srcintf "HO-Branch_2" set dstintf "HO-Branch1" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all
Branch_1 Configuration:
Outbound policy:
config firewall policy edit 1 set name "vpn_Branch_1-HO_local_0" set uuid 1e1c3fd2-5695-51ee-f2b5-683fa4c37c06 set srcintf "port2" set dstintf "Branch_1-HO" set action accept set srcaddr "Branch2_address" set dstaddr "Branch_1-HO_remote" "Branch2_address" set schedule "always" set service "ALL"
Inbound policy:
config firewall policy edit 2 set name "vpn_Branch_1-HO_remote_0" set uuid 1e6c6476-5695-51ee-4604-caa0a91184ce set srcintf "Branch_1-HO" set dstintf "port2" set action accept set srcaddr "Branch_1-HO_remote" "Branch2_address" set dstaddr "Branch_1-HO_local" set schedule "always" set service "ALL"
Branch_2 Configuration:
Outbound policy:
config firewall policy edit 1 set name "vpn_Branch_2-HO_local_0" set uuid 8cce06e0-5695-51ee-3f67-a61d55a88f28 set srcintf "port2" set dstintf "Branch_2-HO" set action accept set srcaddr "Branch_2-HO_local" set dstaddr "Branch_2-HO_remote" "Branch1_address" set schedule "always" set service "ALL"
Inbound policy:
config firewall policy edit 2 set name "vpn_Branch_2-HO_remote_0" set uuid 8cd587c6-5695-51ee-96a5-949bdb59aa17 set srcintf "Branch_2-HO" set dstintf "port2" set action accept set srcaddr "Branch_2-HO_remote" "Branch1_address" set dstaddr "Branch_2-HO_local" set schedule "always" set service "ALL"
After the changes, test the connectivity between Branch1 <> Branch2.
Related article: Technical Tip: How to configure VPN Site to Site between FortiGates (Using VPN Setup Wizard) |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.