FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
iskandar_lie
Staff
Staff
Article Id 254538

Description

 

This article describes how important a static route gateway address is for IPsec point-to-point / site-to-site connections.

 

Scope

 

FortiOS 6.4.x, 7.2.x.

 

Solution

 

1) FortiOS 6.4.x.

a) There is no ip address assigned to the IPsec interface:

 

6.4.x no IP static.PNG

 

# show system interface to_FGT2

# config system interface

edit "to_FGT2"

set vdom "root"

set type tunnel

set snmp-index 11

set interface "port3"

next

end

 

This is how the routing table looks: 

 

Routing table for VRF=0
Routing entry for 0.0.0.0/0
Known via "static", distance 10, metric 0, best
* directly connected, to_FGT2 distance 0

 

b) An IP address is assigned to the IPsec interface:

 

6.4.x with IP static.PNG

 

# show system interface to_FGT2

# config system interface

edit "to_FGT2"

set vdom "root"

set ip 172.18.1.1 255.255.255.255

set allowaccess ping https ssh snmp http fgfm

set type tunnel

set remote-ip 172.18.1.2 255.255.255.252    <- Will be assigned as a gateway address

set snmp-index 11

set interface "port3"

next

end

 

This is how the routing table looks:

 

Routing table for VRF=0
Routing entry for 0.0.0.0/0
Known via "static", distance 10, metric 0, best
* 172.18.1.2, via to_FGT2 distance 0 <- though the ip address of 172.18.1.2 does not exist, the IPsec traffic works fine. 

 

2) FortiOS 7.2.x.

 

7.2.x no IP static.PNG

 

For FortiOS 7.2.x, the gateway address will stay blank regardless of whether any IP address is assigned to the IPsec interface.

 

This is how the routing table looks:

 

Routing table for VRF=0
Routing entry for 0.0.0.0/0
Known via "static", distance 10, metric 0, best
* via to_FGT1 tunnel 10.1.2.2 vrf 0     --> this tunnel information is added as of 7.0.1 

 

See the following document for more instructions:

https://docs.fortinet.com/document/fortigate/7.0.0/new-features/649094/dedicated-tunnel-id-for-ipsec...

 

In conclusion, IPSec point-to-point / site-to-site connections do not require gateway addresses to be assigned on the static route.