| Description | This article provides a basic overview of use cases and traffic flow in policy-based and route-based tunnels. |
| Scope | FortiGate. |
| Solution |
In some scenarios, there is a requirement to configure policy-based IPSEC VPNs. If the remote device cannot use a routed virtual tunnel interface or is using a legacy crypto map-based configuration that is bound to a wan interface, the only option is to configure a policy-based VPN.
The issue with policy-based tunnels is dynamic routing can not be used since it is not bound to a virtual tunnel interface.
The Pros and Cons of Policy-based VPNs are mentioned below.
Pros:
Cons:
Route-based IPSEC tunnels:
Traffic Flow in route-based and policy-based IPSEC tunnels.
Traffic flow in the route-based tunnel:
Traffic flow in Policy-based IPSEC tunnels:
Note:
Related documents: Technical Tip: Enable 'Policy-Based IPsec VPN' configuration |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.