Hi Fortinet Community,
I'm setting up a network with three FortiGates and need help configuring IPsec VPNs and inter-site communication. Here's the setup:
HQ FortiGate: NAT mode, connected to ISP via L3 link
Branch1 FortiGate: Transparent mode
Factory FortiGate: Transparent mode
All sites are connected over Layer 2 links
DHCP for both branches comes from HQ
HQ | NAT mode FortiGate | 10.10.10.0/24 (LAN) |
Branch1 | Transparent FortiGate | 192.168.100.0/24 (via DHCP) |
Factory | Transparent FortiGate | 192.168.101.0/24 (via DHCP) |
HQ Server1: 192.168.100.1 (needs to be accessed by Branch1 PCs)
HQ Server2: 192.168.101.1 (needs to be accessed by Factory PCs)
All branch PCs should also have access to HQ LAN (10.10.10.0/24)
How to configure IPsec VPN tunnels:
Between HQ and Branch1
Between HQ and Factory
Note: Branch1 and Factory are using transparent mode FortiGates
How to allow the following communications:
Branch1 PCs → HQ Server1 (192.168.100.1)
Factory PCs → HQ Server2 (192.168.101.1)
Both branch networks → HQ LAN (10.10.10.0/24)
Best practices for routing, policies, interface assignment (since two devices are in transparent mode), and any VLAN or zone suggestions for easier policy control. FortiGate
Hello,
A combination of the below 2 KB articles should work.
For FGT operating in NAT mode
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-VPN-Site-to-Site-between/...
For FGT operating in Transparent mode:
https://community.fortinet.com/t5/FortiGate/Technical-Note-IPSec-VPN-between-FortiGate-in-Transparen...
Hope this helps!
User | Count |
---|---|
2588 | |
1380 | |
796 | |
658 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.