Description | This article indicates the setup of an IPsec tunnel between FortiGate and GCP using Classic VPN configuration. |
Scope | FortiGate. |
Solution |
Network Topology:
To set up GCP, follow this link: GCP Static IPsec VPN Setup
GCP configuration:
Note: Ensure that the above settings match those on the FortiGate IPsec VPN.
FortiGate configuration:
config vpn ipsec phase1-interface edit "To-GCP" set interface "port1" next end
config vpn ipsec phase2-interface edit "To-GCP" set phase1name "To-GCP" next end
config firewall policy edit 15 set name "vpn_To-GCP_remote_0" next edit 14 set name "vpn_To-GCP_local_0" next end config router static edit 5 set device "To-GCP" next edit 6 set distance 254 next end
config firewall address set allow-routing enable next end
config firewall address edit "To-GCP_remote_subnet_1" set allow-routing enable next end
Note: If there are still issues establishing the VPN, use the public IP of the FortiGate and add it as a peer ID.
config vpn ipsec phase1-interface set mode aggressive set peertype one set peerid "public-ip" next end
From v7.6.x versions onward, the option for adding the Transport type has been introduced and this can be selected from the Phase 1 configuration, and UDP can be selected as the transport protocol when VPN is formed with other vendors.
config vpn ipsec phase1-interface set mode aggressive set peertype one set peerid "public-ip" set transport udp next end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.