FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
iskandar_lie
Staff
Staff
Article Id 226388
Description This article describes how to implement Hub and Spoke ADVPN – using IPSec wizard.
Scope

FortiGate v. 7.2.1

Scenario:

      1) HUB and Spoke IPSec  topology.

      2) Spoke client must be able to communicate with another spoke client directly when on demand tunnel is create (ADVPN feature).

      3)BGP is the overlay routing protocol.

Solution

Diagram:

iskandar_lie_0-1665512880153.png

 

Note:

 

FortiGate Hub and Spoke IPSec Wizard is using BGP as overlay protocol and ADVPN feature.

What does this wizard config?

     1) Routing protocol - BGP 

     2) Firewall Policy

     3) IPSec interface address 

     4) Address object

 

Let's start with HUB node:

 

iskandar_lie_1-1665512951338.png

 

Incoming interface – is outgoing physical interface for IPSec interface.

 

iskandar_lie_2-1665512975627.png

 

Tunnel IP is our IPSec interface address ( 10.10.10.1 )

Remote IP/Netmask – is a dummy ip address within the same subnet (10.10.10.254/24)

 

iskandar_lie_3-1665512999099.png

 

Local AS – can be anything, refer to BGP routing protocol (in this case use private AS 65000 and IBGP configuration).

Local Interface – is an interface where local subnet is connected.

Local subnet is meant to be able to communicate via BGP protocol.

Spoke type can be 'range' or 'individual'

For range – refer to https://docs.fortinet.com/document/fortigate/6.0.0/handbook/190962/bgp.

In this case individual is used, where spokeA – 10.10.10.2 and spokeB – 10.10.10.3 are defined.

 

iskandar_lie_4-1665513043795.png

 

This is the last step of creating HUB IPsec. Copy configuration key available for Spoke #1 – SpokeA and Spoke #2 – SpokeB 

 

iskandar_lie_5-1665513089710.png

 

Copy configuration key on notepad.

 

iskandar_lie_6-1665513128712.png

 

Now lets start creating the IPSec on SpokeA. Paste the configuration key that was copied in last step of HUB config, on 'easy configuration key' and select apply. 

 

iskandar_lie_8-1665513215236.png

 

Remote IP Address -- IP address of HUB (192.168.12.2) 

Outgoing interface -- is underlay physical interface for this IPSec (port6)

Pre-shared key -- fill out with the same Pre-shared key as HUB.

 

iskandar_lie_10-1665513411323.png

 

Tunnel IP is IPSec interface address ( 10.10.10.2 )

Remote IP/Netmask – is HUB tunnel ip address. ( 10.10.10.1 )

 

iskandar_lie_11-1665513433187.png

 

Local Interface – is an interface where local subnet is connected. This local subnet is meant to be able to communicate via BGP protocol.

Local subnet is meant to be able to communicate via BGP protocol.

 

iskandar_lie_12-1665513451462.png

 

Last step of SpokeA configuration.

 

iskandar_lie_13-1665513471256.png

 

Since the configuration step on SpokeB will be similar to SpokeA – follow the same step as SpokeA.

On demand tunnel is created whenever the traffic is initiated – when there is no traffic for some period of time, this on demand tunnel will be torn down.

 

iskandar_lie_14-1665513549806.png

 

Conclusion:

 

1) This wizard is suitable for new implementation with 2 spokes and 1 hub.

 

2) This wizard is suitable also for a beginner, it will do everything required to create Hub and Spoke ADVPN, together with BGP routing protocol and firewall policy.  

 

Note: Attached files are config created by this IPSec wizard, and 'routing and IPSec information'.

 

Fortinet Documentation:

https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/853412/ipsec-vpn-wizard-hub-and-spoke-ad...

Contributors