Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
1mm
Contributor

IPSec Between Fortigate and Mikrotik

Hello,

 

I have fortigate installed in Azure and Mikrotik on our On-prem datacenter. I would like to configure IPSec over GRE VPN between them. Phase 1 is establishing without problem, but Phase 2 doesn't go up. 

I use this article: 

https://docs.fortinet.com/document/fortigate/6.2.15/cookbook/799752/gre-over-ipsec

 

Here is Azure fortigate configuration: 

config vpn ipsec phase1-interface
edit "gre-tunnel1"
set interface "port1"
set peertype any
set net-device disable
set proposal aes256-sha512
set dhgrp 14
set remote-gw 178.54.*.*
set psksecret ******

 

config vpn ipsec phase2-interface
edit "gre-tunnel1"
set phase1name "gre-tunnel1"
set proposal aes256-sha512
set dhgrp 14
set protocol 47
set keylifeseconds 28800

 

edit "gre-tunnel1"
set vdom "root"
set ip 10.225.252.1 255.255.255.255
set type tunnel
set remote-ip 10.225.252.2 255.255.255.252
set snmp-index 7
set interface "port1"

 

config system gre-tunnel
edit "gre-to-rem"
set interface "gre-tunnel1"
set remote-gw 10.225.252.2
set local-gw 10.225.252.1

 

edit 3
set uuid 935c31dc-1ee9-51ee-bfbd-5952d3420438
set srcintf "gre-tunnel1"
set dstintf "gre-tunnel1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"

edit 4
set name "Permit-from-Azure"
set uuid 0ed3dc98-1eea-51ee-3e91-26273c7326e3
set srcintf "port2"
set dstintf "gre-to-rem"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"

edit 5
set name "Permit-to-Azure"
set uuid 20ee78de-1eea-51ee-7e88-e77467246117
set srcintf "gre-to-rem"
set dstintf "port2"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"

 

 

Here is mikrotik side:

/ip ipsec profile
add dh-group=modp2048 enc-algorithm=aes-256 hash-algorithm=sha512 lifetime=8h name=azure-test-profile
/ip ipsec peer
add address=20.8.*.*/32 local-address=178.54.*.* name=azure-test-peer profile=azure-test-profile
/ip ipsec proposal
add auth-algorithms=sha512 enc-algorithms=aes-256-cbc lifetime=8h name=azure-test-proporsal pfs-group=modp2048
/ip ipsec identity
add generate-policy=port-strict peer=azure-test-peer secret=kN#n2biOQi7P93xC6MmPaO%P4O
/ip ipsec policy
add dst-address=20.8.*.*/32 peer=azure-test-peer proposal=azure-test-proporsal protocol=gre src-address=178.54.*.*/32

 

/interface gre

name="azure-test" mtu=auto actual-mtu=1476 local-address=178.54.*.* remote-address=20.8.*.* dscp=inherit clamp-tcp-mss=yes dont-fragment=no allow-fast-path=no

 

/ip address 
10.225.252.2/30 10.225.252.0 azure-test

 

 

Do I need to add anything or change?

 

1 Solution
1mm
Contributor

18 REPLIES 18
1mm

Hello, I can't even Ping IP address of tunnels. Not sure why...

On fortigate side I must to set IP address with 32 mask, but how I should set to mikrotik side?

I mean this one:

set type tunnel

set ip 10.225.252.1 255.255.255.255
set remote-ip 10.225.252.2 255.255.255.252

elsantas
New Contributor III

Hi,

Have configured NAT from Mikrotik side??? Also I can imagine that from Fortigate side there are policies that allows traffic from IPsec tunnel through the desired networks.

 

EDIT: Sorry just saw on the original post that there are indeed policies that allows traffic.

==============================

Not all those who wander are lost

==============================
==============================Not all those who wander are lost==============================
1mm

I tried to do NoNAT Policy on mikrotikm but the same

elsantas
New Contributor III

The NAT policy is mandatory. Sorry if I misguided you with this information above.
Have you tried the steps that I mentioned on my above post, to clear the connections from mikrotik???
I had many cases with IPsec tunnels established and no packets go through it and always been solved with the clearance of mikrotik's connections

==============================

Not all those who wander are lost

==============================
==============================Not all those who wander are lost==============================
1mm

I tried to kill sessions, but the same...

What kind of NAT rule do I need to add on Mikrotik?

chain=srcnat action=accept src-address=172.16.48.0/24 dst-address=10.225.2.0/24

 

1mm
Contributor

I tried to do reconfiguration as showed in this article:

https://docs.fortinet.com/document/fortigate/7.4.0/administration-guide/250464/cisco-gre-over-ipsec-...

 

Now Tunnel is up, also I see Inbound\outbound traffic counters are increasing, but there are no any network access between this 2 devices....

I don't know what I can do now...

saneeshpv_FTNT

Hi,

 

When you say there is no network access between devices (your tunnel is up), it is bit confusing. Could you please clarify between which device you are having network access problem ? Please provide the logs for better understanding and analysis.

 

Regards,

 

 

rtichkule
Staff
Staff

Hello,

 

If you're experiencing IPSec VPN connectivity issues between a FortiGate firewall and a MikroTik router, you can follow below steps for initial troubleshooting

 

Check the VPN configuration on both the FortiGate and the MikroTik devices. Check that the authentication mechanisms, encryption algorithms, and pre-shared keys (PSKs) are the same on both ends. 

 

Check that the firewall policies on both devices allow the IPSec VPN traffic. Check that the policies allow traffic from the VPN tunnel's source and destination IP addresses and ports.

ensure there are no connectivity issues between fortigate and microtik device.

 

Enable NAT traversal (NAT-T) on both ends if the FortiGate or MikroTik device is behind a NAT (Network Address Translation) device. NAT-T encapsulates VPN traffic within UDP packets, allowing it to transit over NAT devices.

 

Check the settings for the Phase 1 and Phase 2 proposals on both devices. Check that the encryption, authentication, and hashing algorithms on both ends are compatible and configured correctly.

 

To gather relevant VPN logs, enable debug logging on both the FortiGate and MikroTik devices. Examine the logs for any error messages or signs of connectivity or negotiation difficulties. This information can assist in determining the root cause of the problem.

 

You can refer below document as well for the deugging

https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-IPSEC-Tunnel-debugging-IKE/ta-p/1900...

 

https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-IPsec-VPNs-tunnels/ta-p/195955

 

BR

1mm
Contributor

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors