Created on
08-02-2024
06:36 AM
Edited on
09-08-2025
05:44 AM
By
Jean-Philippe_P
Description | This article provides a step-by-step guide on configuring an aggregate IPsec tunnel interface using the GUI on FortiGate. |
Scope | FortiGate. |
Solution |
Configuring an aggregate IPsec tunnel involves combining multiple IPsec tunnels into a single logical interface, which distributes traffic across the member tunnels for improved performance and redundancy. This describes the necessary steps to set up an aggregate IPsec tunnel for both WAN interfaces on this site to the same remote site.
In the diagram below, there are two WAN interfaces on this FortiGate and multiple IPsec tunnels to a single site from both WAN interfaces to a single remote gateway.
To configure an aggregate IPsec tunnel interface:
It is possible to assign a descriptive name, and there will be four options for the algorithm.
Both tunnels are pointing toward the same remote gateway. If it is desired to add both tunnels to the aggregate interface, it will be necessary to remove all the references to the IPsec tunnels and to enable the ‘set aggregate-member’ in the IPsec phase1 setting in the CLI; by default, it is disabled. Once enabled, it will be available to add.
Once both IPsec tunnels are available, it is possible to add them to the Aggregate interface as shown below.
Once both IPsec tunnels are added to the aggregate interface, they will be referenced under the aggregate interface as shown below.
It will be necessary then to configure a firewall policy for this new aggregate interface from the internal interface to the aggregate tunnel interface, as shown below.
By following these steps, it is possible to successfully configure an aggregate IPsec tunnel using the FortiGate GUI, enhancing the redundancy and performance of the VPN connections.
Note:
This issue can be resolved by deleting the relevant static route and firewall policy, as when using an aggregate interface, the static route and firewall policy will be created on the aggregate interface, not on the standalone IPsec interface.
Note: Starting from FortiOS 7.0 (the FortiOS version
Working scenario (v6.2/64): when aggregate 'tun_to_slc_ag2' is DOWN.
NON-working scenario (v7.0 and above): the failed aggregate tunnel 'tun_to_slc_ag2' remains installed in the routing table.
Workaround: The aggregate tunnel can be added to the SD-WAN zone, and then a performance SLA should be configured over the aggregate tunnel to a remote server. Once the remote server is no longer reachable over the SD-WAN, the rule that forwards traffic over the aggregate tunnel will fail, and FortiGate to stop using the affected (down) aggregate tunnel.
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.