Created on
09-10-2025
12:05 AM
Edited on
09-10-2025
12:07 AM
By
Jean-Philippe_P
Description | This article describes how to create an IPsec Aggregate using FortiManager. |
Scope | FortiManager, FortiGate, VPN. |
Solution |
IPsec Aggregate allows grouping multiple IPsec VPN tunnels into a single logical interface for load balancing and redundancy.
There are three methods to set up IPsec Aggregate using FortiManager:
Note: The following steps show the configuration required for setting up an IPsec aggregate. Other IPsec configuration details for phase1/phase2 are not covered in this article.
Option 1: Use IPsec Template.
Option 2: Create Tunnels on Device Database.
Note: Script can also be used to add the config to either the Device Database or directly to the FortiGate. Refer to the document: Scripts.
Option 3: Using CLI Template.
config vpn ipsec phase1-interface edit "<TUNNEL_1>" set interface "<INTERFACE>" set proposal <Algo - for example: aes256-sha256> set remote-gw <REMOTE_GW> set psksecret <PSK> set aggregate-member enable next edit "<TUNNEL_2>" set interface "<INTERFACE>" set proposal <Algo - for example: aes256-sha256> set remote-gw <REMOTE_GW> set psksecret <PSK> set aggregate-member enable next end
config vpn ipsec phase2-interface edit "<TUNNEL_1>" set phase1name "<TUNNEL_1>" set proposal <Algo - for example: aes256-sha256> set auto-negotiate enable next edit "<TUNNEL_2>" set phase1name "<TUNNEL_2>" set proposal <Algo - for example: aes256-sha256> set auto-negotiate enable next end
config system ipsec-aggregate edit "<IPSEC_AGG_NAME>" set member "<TUNNEL_1>" "<TUNNEL_2>" next end
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.