PCNSE
NSE
StrongSwan
PCNSE
NSE
StrongSwan
ip route 192.168.158.16 255.255.255.240 g0/01st off you don' t need the above. The router will will encrypt and sent the traffic over the tunnel for the ACL #110, that static route would actually by-pass your crypto-map Next I built what I think you would deploy on the FGT, you would need to set the port-numbername but this is what you need to do for the basic VPN config vpn ipsec phase1-interface edit " tocisco-remote1" set type dynamic set interface " port1" set proposal 3des-md5 set psksecret vietnam next end config vpn ipsec phase2-interface edit " tocisco-p1" set phase1name " tocisco-remote" set proposal 3des-md5 set dst-subnet 192.168.52.0 255.255.255.0 set src-subnet 192.168.158.16 255.255.255.240 next end And finally you will need fwpolices and static route since we used interface mode in this example; route edit 100 set comment " VPN back to office " set device " tocisco-remote" set dst 192.168.52.0 255.255.255.0 next fwpolicy & address config firewall address edit LAN set subnet 192.168.158.30 255.255.255.240 next edit cisconet01 set subnet 192.168.52.0 255.255.255.0 next policy config firewall policy edit 0 set srcintf " port1" set dstintf " tocisco-remote" set srcaddr " LAN" set dstaddr " cisconet01" set action accept set schedule " always" set service " ANY" set comments " allow your local lan out to the cisco remote network" next edit 0 set dstintf " port1" set srcintf " tocisco-remote" set dstaddr " LAN" set srcaddr " cisconet01" set action accept set schedule " always" set service " ANY" set comments " allow the cisco remote network back to your lan" next I hope the above helps, but it' s quite simple. Just use a single proposal between your cisco and match pfs and that should be all that you need. And lastly, make sure the PSK identified are exact.
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1113 | |
759 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.