FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
salemneaz
Staff
Staff
Article Id 379233
Description This article provides the necessary configuration using the VPN Template from the GUI to route traffic to the internet through the site-to-site tunnel.
Scope FortiOS 7.6.x.
Solution

FortiOS 7.6 provides a new option in the GUI which configures the necessary setting required to route traffic to the internet through the site-to-site VPN tunnel.

 

The step-by-step example is given below.

 

Configure the site-to-site VPN tunnel.

 

From the Firewall GUI, go to VPN -> VPN Tunnels -> Create New -> select IPsec Tunnel from template, name the tunnel, and select Begin.

 

1.jpg

 

At this step, select the Authentication method -> Pre-shared Key -> IKE Version, and Transport type.

In the example, 'Pre-shared Key' has been selected with 'IKE' Version 2 and Transport mode is 'Auto'.

 

2.jpg

 

At this step, the Remote site device parameters are configured. In the example, the remote site is Accessible and static over a remote IP address, so this option is being used and the remote device is not Behind NAT or dynamic. The option to Route this device's internet traffic through the remote site can be enabled.

 

3.jpg

 

Once the option Route this device's internet traffic through the remote site is enabled, the option for Remote site subnets that can access VPN does not appear since the destination is the internet.

 

4.jpg

 

Hover the mouse over the Information icon. It will display the message given at the screen shot below.

 

5.jpg

 

The Outgoing Interface and the Local subnet is configured at this stage.

 

7.jpg

 

The Local Gateway needs to be configured since the local traffic will be routed over the VPN tunnel.

 

For the final steps, review the configuration and then submit.

 

8.jpg

 

The Tunnel is created and shows at the GUI.

 

12.jpg

 

On the Remote FortiGate, select the following configuration options shown in the screenshot. In the Remote Firewall Internet Traffic is routing through, this device should remain disabled, since the other Firewall's internet traffic will be traversing through this Firewall and not the other way around.

 

10.jpg

 

Enable the option Allow remote site's internet traffic through this device  This will configure a Firewall policy automatically to route the remote Firewall traffic through this device and through the specified Shared WAN. At this example we used Port 2.

 

11.jpg

 

After, select Next, review the configuration template, and complete the setup.

 

13.jpg

 

Three Firewall Policies got generated automatically after completion of the configuration.

One Policy is for traffic coming from the Remote site and the other is for traffic going to the remote site, and the third policy is for the internet traffic.

 

14.jpg

 

Note that the Policy that is configured for Internet Traffic is all, as the remote IP address as the destination address and NAT is enabled.

 

Related article for troubleshooting IPsec tunnel:

Troubleshooting Tip: IPsec VPN tunnels.