Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
1 REPLY 1
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That's depending on how you want to utilize those two IPsecs (could be one). Like...
1. you want to make one of the as a backup/standby
2. you want to load-balance
3. you wan to routes different destinations at the HQ to different tunnels.
If 1 or 3, you can simply create two IPsecs on both sides. You would specify the outgoing interface at HQ so it wouldn't be a problem when the gateway-ip is the same branch IP.
For 2, if you don't care much how it would be balanced, I suggest "IPsec aggregate" and use the default distribution logic. As long as HQ side has two IPs, it should work as well.
https://docs.fortinet.com/document/fortigate/7.4.5/administration-guide/779544/packet-distribution-a...
Toshi
