FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
wcruvinel
Staff
Staff
Article Id 340691
Description This article describes how to set up an IPsec VPN between FortiGate and Mikrotik using IKEv2.
Scope Applicable to all FortiGate versions and Mikrotik RouterOS 7.6 and beyond 
Solution

Network diagram:

 

tp.jpg

 

Configuration FortiGate:

Create IPsec phases and tunnels.

  • Navigate to VPN -> IPsec Tunnels, select Create New, and set the Template Type to Custom.
  • Then, follow the detailed reference guide below.

fgt4.jpg

 

fgt3.png


fgt2.png

fgt1.png

 

RouterOS Configuration using Winbox:

  • All configuration is done in the IP -> IPsec section using Winbox.
  • First, create the IPsec Profile, where the IKE proposal is defined.

001_ipsec_profile-1.png

 

  • In the next step, create a new IPsec Proposal for phase 2 encryption.
  • No Auth. Algorithms are needed since used AES-256-GCM as the encryption algorithm, which already includes the authentication.

002_ipsec_proposal-1.png

 

  • For the peer configuration, set the name, IP address, IPsec profile, and Exchange Mode to IKEv2.

 

003_ipsec_peer.png

 

  • To set the authentication method using a pre-shared key, add a new IPsec Identity.

004_ipsec_identity.png

 

  • Next, define which networks will communicate with each other through the VPN tunnel.

 

005_ipsec_policies_1-1.png

 

  • In the final step, select the IPsec Proposal named FortiGate to apply the correct encryption for phase 2 / ESP.

 

005_ipsec_policies_2.png

 

Monitoring the status of the IPsec Tunnel on FortiGate and Mikrotik:

 

FortiGate:

 

monitoring.png

 

Mikrotik:

monitoring-2.png

monitoring-2.png

 

Test the remote end connectivity.

The IPsec site-to-site VPN is confirmed to be up; however, traffic must be initiated to verify whether it is functioning correctly.

 

To test connectivity from the MikroTik LAN side:

  1. Navigate to MikroTik → Tools → Ping
  2. Configure the following parameters:
    • Ping to: 192.168.100.1 (FortiGate LAN IP)
    • Interface: bridge1
    • Packet count: 5
  3. Select Start.

 

ping.png

If it is configured correctly, an ICMP response will be received. Otherwise, a timeout will occur.

In this case, an ICMP response is received, indicating that the tunnel is up and operational.