Created on
06-28-2022
09:48 PM
Edited on
11-24-2025
10:57 PM
By
Jean-Philippe_P
| Description |
This article describes how to set up an IPSEC VPN between FortiGate and Sophos when FortiGate is behind NAT. |
| Scope | FortiGate. |
| Solution |
Example of topology: FortiGate(WAN1) 1.1.1.1<--> SNAT x.x.x.x <-> Internet <-> y.y.y.y Sophos
FortiGate uses 1.1.1.1 as a private IP address and SNAT to x.x.x.x as a public IP. Sophos is using y.y.y.y as a public IP.
Note. The pre-shared key (PSK) and the proposals are the same between FortiGate and Sophos.
FortiGate IPSEC settings 'Phase1':
set interface "wan1" set remote gateway y.y.y.y
Sophos IPSEC settings 'Phase1':
remote x.x.x.x
Troubleshooting on FortiGate.
'Phase1' is up, but the tunnel is not up, and FortiGate IKE debug is shown with the keyword 'INVALID-ID-INFORMATION'.
Set up 1.1.1.1 in the VLAN ID (optional) on the Sophos side to make the IPsec tunnel up.
If phase-1 is not coming up and in the IKE debug 'received notify type AUTHENTICATION_FAILED' error is observed, define the remote-id on the Sophos as shown below.
For example, on the FortiGate, the IKE debug shows the authentication error message: 227000008000040002900002802000000 00002C000000280103040329B4D4 6121160C612117F0000 20230800000001000000F0 B3BC0C5FA2DA4DD29086 431FF119AF9F9F 03859D53D07B68D50 198.168.113.178:4500->xxx.xxx.27.101:4500, len=240, vrf=0, id=2a1dfb733594570c/5fda9b77bb78c8a4: 00000001, oif=3 < --- ifindex=3,vrf=0,len=84.... < --- 78c8a4:00000001 len=80 629590B804EA5BD2BE9A54CA45A3B4CBB0E344601 7D0A327C4A71D7F961C7A |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.