Start installing
Local-FortiGate $ config vpn ipsec phase1-interface
Local-FortiGate (phase1-interface) $ edit "test_all_4_2"
Local-FortiGate (test_all_4_2) $ set interface "port2"
Local-FortiGate (test_all_4_2) $ set ike-version 2
Local-FortiGate (test_all_4_2) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_4_2) $ set proposal aes256-sha256
Local-FortiGate (test_all_4_2) $ set keylife 28800
Local-FortiGate (test_all_4_2) $ set peertype any
Local-FortiGate (test_all_4_2) $ set remote-gw 10.200.4.1
Local-FortiGate (test_all_4_2) $ set dpd-retryinterval 5
Local-FortiGate (test_all_4_2) $ set add-gw-route enable
Local-FortiGate (test_all_4_2) $ set psksecret *********************
Local-FortiGate (test_all_4_2) $ next
Local-FortiGate (phase1-interface) $ end
Local-FortiGate $ config system interface
Local-FortiGate (interface) $ edit "test_all_4_2"
Local-FortiGate (test_all_4_2) $ set vdom "root"
Local-FortiGate (test_all_4_2) $ set type tunnel
Local-FortiGate (test_all_4_2) $ set snmp-index 110
Local-FortiGate (test_all_4_2) $ set interface "port2"
Local-FortiGate (test_all_4_2) $ next
Local-FortiGate (interface) $ end
Local-FortiGate $ config vpn ipsec phase1-interface
Local-FortiGate (phase1-interface) $ edit "test_all_4_1"
Local-FortiGate (test_all_4_1) $ set interface "port2"
Local-FortiGate (test_all_4_1) $ set ike-version 2
Local-FortiGate (test_all_4_1) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_4_1) $ set proposal aes256-sha256
Local-FortiGate (test_all_4_1) $ set keylife 28800
Local-FortiGate (test_all_4_1) $ set peertype any
Local-FortiGate (test_all_4_1) $ set remote-gw 10.200.3.1
Local-FortiGate (test_all_4_1) $ set dpd-retryinterval 5
Local-FortiGate (test_all_4_1) $ set add-gw-route enable
Local-FortiGate (test_all_4_1) $ set psksecret *********************
Local-FortiGate (test_all_4_1) $ next
Local-FortiGate (phase1-interface) $ end
Local-FortiGate $ config system interface
Local-FortiGate (interface) $ edit "test_all_4_1"
Local-FortiGate (test_all_4_1) $ set vdom "root"
Local-FortiGate (test_all_4_1) $ set type tunnel
Local-FortiGate (test_all_4_1) $ set snmp-index 111
Local-FortiGate (test_all_4_1) $ set interface "port2"
Local-FortiGate (test_all_4_1) $ next
Local-FortiGate (interface) $ end
Local-FortiGate $ config vpn ipsec phase1-interface
Local-FortiGate (phase1-interface) $ edit "test_all_3_2"
Local-FortiGate (test_all_3_2) $ set interface "port1"
Local-FortiGate (test_all_3_2) $ set ike-version 2
Local-FortiGate (test_all_3_2) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_3_2) $ set proposal aes256-sha256
Local-FortiGate (test_all_3_2) $ set keylife 28800
Local-FortiGate (test_all_3_2) $ set peertype any
Local-FortiGate (test_all_3_2) $ set remote-gw 10.200.4.1
Local-FortiGate (test_all_3_2) $ set dpd-retryinterval 5
Local-FortiGate (test_all_3_2) $ set add-gw-route enable
Local-FortiGate (test_all_3_2) $ set psksecret *********************
Local-FortiGate (test_all_3_2) $ next
Local-FortiGate (phase1-interface) $ end
Local-FortiGate $ config system interface
Local-FortiGate (interface) $ edit "test_all_3_2"
Local-FortiGate (test_all_3_2) $ set vdom "root"
Local-FortiGate (test_all_3_2) $ set type tunnel
Local-FortiGate (test_all_3_2) $ set snmp-index 112
Local-FortiGate (test_all_3_2) $ set interface "port1"
Local-FortiGate (test_all_3_2) $ next
Local-FortiGate (interface) $ end
Local-FortiGate $ config vpn ipsec phase1-interface
Local-FortiGate (phase1-interface) $ edit "test_all_3_1"
Local-FortiGate (test_all_3_1) $ set interface "port1"
Local-FortiGate (test_all_3_1) $ set ike-version 2
Local-FortiGate (test_all_3_1) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_3_1) $ set proposal aes256-sha256
Local-FortiGate (test_all_3_1) $ set keylife 28800
Local-FortiGate (test_all_3_1) $ set peertype any
Local-FortiGate (test_all_3_1) $ set remote-gw 10.200.3.1
Local-FortiGate (test_all_3_1) $ set dpd-retryinterval 5
Local-FortiGate (test_all_3_1) $ set add-gw-route enable
Local-FortiGate (test_all_3_1) $ set psksecret *********************
Local-FortiGate (test_all_3_1) $ next
Local-FortiGate (phase1-interface) $ end
Local-FortiGate $ config system interface
Local-FortiGate (interface) $ edit "test_all_3_1"
Local-FortiGate (test_all_3_1) $ set vdom "root"
Local-FortiGate (test_all_3_1) $ set type tunnel
Local-FortiGate (test_all_3_1) $ set snmp-index 113
Local-FortiGate (test_all_3_1) $ set interface "port1"
Local-FortiGate (test_all_3_1) $ next
Local-FortiGate (interface) $ end
Local-FortiGate $ config system zone
Local-FortiGate (zone) $ edit "vpnmgr_test_all_mesh"
Local-FortiGate (vpnmgr_test_all_mesh) $ set interface "test_all_4_2" "test_all_4_1" "test_all_3_2" "test_all_3_1"
Local-FortiGate (vpnmgr_test_all_mesh) $ next
Local-FortiGate (zone) $ end
Local-FortiGate $ config vpn ipsec phase2-interface
Local-FortiGate (phase2-interface) $ edit "test_all_3_1_0"
Local-FortiGate (test_all_3_1_0) $ set phase1name "test_all_3_1"
Local-FortiGate (test_all_3_1_0) $ set proposal aes128gcm
Local-FortiGate (test_all_3_1_0) $ set keepalive enable
Local-FortiGate (test_all_3_1_0) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_3_1_0) $ set keylifeseconds 1800
Local-FortiGate (test_all_3_1_0) $ next
Local-FortiGate (phase2-interface) $ end
Local-FortiGate $ config vpn ipsec phase2-interface
Local-FortiGate (phase2-interface) $ edit "test_all_3_2_0"
Local-FortiGate (test_all_3_2_0) $ set phase1name "test_all_3_2"
Local-FortiGate (test_all_3_2_0) $ set proposal aes128gcm
Local-FortiGate (test_all_3_2_0) $ set keepalive enable
Local-FortiGate (test_all_3_2_0) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_3_2_0) $ set keylifeseconds 1800
Local-FortiGate (test_all_3_2_0) $ next
Local-FortiGate (phase2-interface) $ end
Local-FortiGate $ config vpn ipsec phase2-interface
Local-FortiGate (phase2-interface) $ edit "test_all_4_1_0"
Local-FortiGate (test_all_4_1_0) $ set phase1name "test_all_4_1"
Local-FortiGate (test_all_4_1_0) $ set proposal aes128gcm
Local-FortiGate (test_all_4_1_0) $ set keepalive enable
Local-FortiGate (test_all_4_1_0) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_4_1_0) $ set keylifeseconds 1800
Local-FortiGate (test_all_4_1_0) $ next
Local-FortiGate (phase2-interface) $ end
Local-FortiGate $ config vpn ipsec phase2-interface
Local-FortiGate (phase2-interface) $ edit "test_all_4_2_0"
Local-FortiGate (test_all_4_2_0) $ set phase1name "test_all_4_2"
Local-FortiGate (test_all_4_2_0) $ set proposal aes128gcm
Local-FortiGate (test_all_4_2_0) $ set keepalive enable
Local-FortiGate (test_all_4_2_0) $ set comments "[created by FMG VPN Manager]"
Local-FortiGate (test_all_4_2_0) $ set keylifeseconds 1800
Local-FortiGate (test_all_4_2_0) $ next
Local-FortiGate (phase2-interface) $ end
Local-FortiGate $ config router static
Local-FortiGate (static) $ edit 1072741825
Local-FortiGate (1072741825) $ set dst 10.0.2.0 255.255.255.0
Local-FortiGate (1072741825) $ set priority 1
Local-FortiGate (1072741825) $ set device "test_all_4_2"
Local-FortiGate (1072741825) $ next
Local-FortiGate (static) $ end
Local-FortiGate $ config router static
Local-FortiGate (static) $ edit 1072741826
Local-FortiGate (1072741826) $ set dst 10.0.2.0 255.255.255.0
Local-FortiGate (1072741826) $ set priority 1
Local-FortiGate (1072741826) $ set device "test_all_4_1"
Local-FortiGate (1072741826) $ next
Local-FortiGate (static) $ end
Local-FortiGate $ config router static
Local-FortiGate (static) $ edit 1072741827
Local-FortiGate (1072741827) $ set dst 10.0.2.0 255.255.255.0
Local-FortiGate (1072741827) $ set priority 1
Local-FortiGate (1072741827) $ set device "test_all_3_2"
Local-FortiGate (1072741827) $ next
Local-FortiGate (static) $ end
Local-FortiGate $ config router static
Local-FortiGate (static) $ edit 1072741828
Local-FortiGate (1072741828) $ set dst 10.0.2.0 255.255.255.0
Local-FortiGate (1072741828) $ set priority 1
Local-FortiGate (1072741828) $ set device "test_all_3_1"
Local-FortiGate (1072741828) $ next
Local-FortiGate (static) $ end
---> generating verification report
<--- done generating verification report
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.