FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
fwilliams
Staff
Staff
Article Id 240955
Description

This article describes how to configure more than one IPSec site-2-site VPN tunnel with the same set of IP pairs (same local-gw & remote-gw).

Scope FortiGate v6.4, v7.2.
Solution

Topology:

fwilliams_0-1672056624501.png

 

Every IPSec site-2-site tunnel required a source and destination IP, this marks the beginning and the ending of the tunneling (packet protection: encryption/decryption and authentication), before and after the tunneling the packets are just plane or clear text packets.

 

This pair of IPs serves as the tunnel identification and therefore not possible, by default, to have more than one IPsec tunnel associated with a pair of IPs (one as the source and the other as the destination of the tunnel, depending on traffic direction).

However, it is now possible to achieve multiple IPSec tunnels on FortiGate with the help of IKEv2 and additional capabilities introduced to FortiOS (network-overlay & network-id).

 

Configuration:

The two tunnels used in this demonstration have the same remote-gw and local-gw (primary IP of port1 in this case), what FortiOS use to differentiate these two site-2-site VPN tunnels is the network-id (vpn Site100 = network-id 100 and vpn Site200 = network-id 200), remote IP or remote-gw is same.

 

# config vpn ipsec phase1-interface

    edit "Site100"

        set interface "port1"

        set ike-version 2

        set peertype any

        set net-device disable

        set proposal des-sha1

        set network-overlay enable  <-----

        set network-id 100 <-----

        set remote-gw 200.200.200.200 << same remote gateway as Site200

        set psksecret xxxxxxx

    next

    edit "Site200"

        set interface "port1"

        set ike-version 2

        set peertype any

        set net-device disable

        set proposal des-sha1

        set network-overlay enable<-----

        set network-id 200  <-----

        set remote-gw 200.200.200.200 <----- Same remote gateway as Site100.

        set psksecret xxxxxxx

    next

end

 

fwilliams_1-1672056703681.png

 

 

Verification:

 

# diagnose vpn tunnel list and PING to IP addresses behind Site200 (2.2.2.2 & 2.2.2.22) showed this is working fine.

 

fwilliams_2-1672056737230.png

 

fwilliams_3-1672056746576.png

 

fwilliams_4-1672056755533.png
Contributors