Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Said7
New Contributor II

Fortisase guide - initial setup

Hi guys,

 

Can i get some help here?

 

This is my first experience with FortiSASE. I have 2 sites: 1 in NL & 1 in the USA + Remote users in NL, USA, and Bangkok)

I'm planning to deploy 2 FortiGate in each site in Active Standby setup. Each FortiGate will have 2 internet uplinks.

Would you please advise which deployment guide should I use? When checking the KB, i get lost!

What i understood is that I've to create SPA tunnel to the FortiSASE and deploy BGP for routing. but in the KB there are so many types of deployments!

The sites should be able to communicate with each other in a secure channel.

The users should use the FortiSASE to connect to the internet.

I would like to use the forticlient to access the fortigates via its management interface.

 

I already registered the fortigates/licenses and chose 2 PoPs in Europe and 2 in USA.

 

Thank you in advance.

 

Regards

Said

 

I re

 

 

1 Solution
Said7
New Contributor II

Hello Hatibi,

 

This is a new implementation. i will be installing 2 fortigates at each site in Active Standby with dual uplink.

I don't have experience with fortinet and that makes it a liuttle bit challenging.

 

When checking Fortinet KB, i get lost which deployment guide should i use to allow the sites to reach eachother as well as the internet + have remote users onboarded to reach networks behind those sites.

I only have those 2 sites in 2 different regions, no further spokes.

 

Based on my research, i came to the following conclusion and i hope you can share your thoughts about it:

 

  1. I will be enabling SDWAN on the fortigates in order to use both uplinks.
  2. Configure SPA + BGP towards the fortisase via each uplink.
  3. Configure the SPA in the fortisase portal.
  4. Configure SIA in the fortisase portal and integrate customer Entra ID with Fortisase.

What do you think?

Once again, your support is much appreciated.

 

Regards

Said

View solution in original post

4 REPLIES 4
Hatibi
Staff & Editor
Staff & Editor

You want public/internet traffic for your remote users to go through FortiSASE (Cloud)

In that case you need to implement SIA (Secure internet access).

 

a) SIA for agent-based remote users

 

Overview: https://docs.fortinet.com/document/fortisase/latest/architecture-guide/710519/sia-for-agent-based-re...
Deployment guide: https://docs.fortinet.com/document/fortisase/latest/mature-sia-agent-based-deployment-guide/891466/d...

 

 

If you want users to be able access private applications behind your FortiGate hubs then you need Secure private access.

 

b) SPA using NGFW

 

Overview:https://docs.fortinet.com/document/fortisase/latest/architecture-guide/861490/spa-using-ngfw
Deploment guide: https://docs.fortinet.com/document/fortisase/latest/mature-fortigate-ngfw-to-fortisase-spa-hub-conve...

 

 

You do not need to configure IPSEC between your two FortiGates. Since they will be added in FortiSASE (converted to SPA hub), traffic will be directed by SASE towards them. For example user behind Site 1 can be allowed with appropriate policies to access a private app behind Site 2.

Said7
New Contributor II

Hello Hatibi,

 

Thank you for the prompt response.

Deploying SIA is clear to me. I will need to link FortiSASE to customer Entra ID and push the FortiClient to the users.

 

Regarding SPA, What is the difference between SPA with SDWAN vs SPA with NGFW vs SPA with NGFW and Fabric overlay?

Which one fits my purpose?

I was told by Fortinet SA that traffic between the sites that is directed through FortiSASE will be metered, and additional cost will be applied.

 

Regards

Said

Hatibi
Staff & Editor
Staff & Editor

SPA with SDWAN - this means you already have an existing SDWAN deployment with FortiGate Hub and spokes mesh connection which are normally managed by a FortiManager with SDWAN templates. By integrating with SASE you provide SPA for remote users that need to access an app behind one of the spokes. They may connect directly to that resource through on-demand ADVPN tunnel.

 

SPA using NFGW with Fabric overlay orchestrator - this is the same as "SPA with NGFW" but instead of you making the FortiGate hub configuration manually through cli or GUI, you use a GUI wizard that guides you through the configuration of SDWAN overlay containing IPSEC and BGP settings.

It requires FortiOS 7.2.4 and greater. You can read how it works here: https://docs.fortinet.com/document/fortigate/7.6.3/administration-guide/60223/fabric-overlay-orchest...

 

In your case you only have 2 Hubs. I think the SPA with NFGW will be able to accomplish both SIA and SPA scenarios in a simple manner and no big administration burdens.

I am not aware of the details regarding the charges for the amount of traffic in FortiSase. The scope or sizing information is something i would recommend you discuss in further details with your local Fortinet Sales rep.

Said7
New Contributor II

Hello Hatibi,

 

This is a new implementation. i will be installing 2 fortigates at each site in Active Standby with dual uplink.

I don't have experience with fortinet and that makes it a liuttle bit challenging.

 

When checking Fortinet KB, i get lost which deployment guide should i use to allow the sites to reach eachother as well as the internet + have remote users onboarded to reach networks behind those sites.

I only have those 2 sites in 2 different regions, no further spokes.

 

Based on my research, i came to the following conclusion and i hope you can share your thoughts about it:

 

  1. I will be enabling SDWAN on the fortigates in order to use both uplinks.
  2. Configure SPA + BGP towards the fortisase via each uplink.
  3. Configure the SPA in the fortisase portal.
  4. Configure SIA in the fortisase portal and integrate customer Entra ID with Fortisase.

What do you think?

Once again, your support is much appreciated.

 

Regards

Said

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors