Hello team,
I have configured VPN IPSec from PA to FGT but the pahse1 still down.
I have enabled the debug from fortigate's CLI and following the results:
debug commands:
diag debug reset
diag debug console timestamp enable
diag debug application ike -1
diag debug enable
debug output:
ignoring IKEv2 request, no policy configured
The peer from FGT is a public ip configured on WAN interface directly.
Do you have any suggestions?
Thanks for the support
BR
do you have firewall policies for the traffic / routes for the tunnel ?
Hello @funkyliciousm,
i don't have any policies for traffic IKE. I need configure witch type of policy?
In this way?
config firewall policy
edit n
set name "vpn-test"
set srcintf "WAN"
set dstintf "WAN"
set srcaddr "remote peer"
set dstaddr "FGT peer"
set action accept
set schedule always
set service IKE
set logtraffic all
next
end
Thanks
BR
Created on 05-15-2025 03:27 AM Edited on 05-15-2025 03:35 AM
you would need to configure firewall rules with source interface or destination interface, the IPsec tunnel and whatever internal interface you would need to access/be access and could leave source/destination address any and service all.
you could read this documentation on how to create an ipsec tunnel, https://docs.fortinet.com/document/fortigate/7.6.2/administration-guide/913287/basic-site-to-site-vp...
https://docs.fortinet.com/document/fortigate/7.6.2/administration-guide/806643/vpn-security-policies
User | Count |
---|---|
2559 | |
1357 | |
796 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.