Fortinet: IPsec Site-to-Site VPN Setup on FortiGate Firewall

Поделиться
HTML-код
  • Опубликовано: 23 июл 2024
  • Configure multiple IPSec VPN tunnels on FortiGate firewalls to secure work and home network.
    Overview/Topology - 0:00
    Configure FortiGate2 - 00:25
    Configure FortiGate1 - 3:44
  • НаукаНаука

Комментарии • 46

  • @conorpodonoghue
    @conorpodonoghue Год назад +2

    Great tutorial! Not often you see this video tutorials this good - many thanks. And a well named channel: To-the-point Fortinet. I will be coming back for more!

  • @harsha1908
    @harsha1908 Год назад +5

    This was so straightforward and easy to understand. Thanks!

  • @bigkeoni6429
    @bigkeoni6429 2 года назад +2

    Great explanation - thank you!

  • @advegav
    @advegav Год назад +1

    Thanks a lot! It worked as a charm!!!

  • @balla2172
    @balla2172 7 месяцев назад +2

    My god i wish i.had as much knowledge as you

  • @prosperngwenya6499
    @prosperngwenya6499 Год назад

    So So Clear.. Thank you

  • @mahuubao
    @mahuubao Год назад

    Excellent ... well done ...

  • @fernandeselikemgeoffrey3173
    @fernandeselikemgeoffrey3173 Год назад

    Hi, can you help with WAN, LAN and Site to Site VPN configuring on Fortigate 300D....
    Thank you

  • @pineapplerocks
    @pineapplerocks 2 года назад +1

    Broooo! You saved the day!

  • @Salmankhan-wb4xi
    @Salmankhan-wb4xi Год назад +1

    Thanks foe your work..

  • @screamusor
    @screamusor Год назад

    Hello, thanks for your really great video. Why do you use the 'custom' option when setting up the VPN instead of the 'site-to-site' ?

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад

      Some of the other options work well because they do more for you such as creating static routes and firewall policy config. I used custom as the option because then it require manual configuration of routes + policies so that I could show more detail about what's required to configure everything.

  • @judgezee9371
    @judgezee9371 Год назад

    This is great.
    Just a few questions
    Which model is this you are using?
    Have you tested file sharing/transfers?
    setup something like this between 2 locations on USGs. Found that simultaneous file transferring slowed down quite a bit on a 100/100 speed.

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад +1

      The model is FortiGate 61E - I didn't test file sharing while making this video. Here's 2 things to consider when troubleshooting IPsec site-to-site slow down between sites (or at least a couple easy ones to check off quickly):
      1) Test a different protocol -> so try Iperf instead of SMB to isolate if the issue is specific to the USG inspection with SMB (USG is an Ubiquiti device right?)
      2) Do an ISP test without IPsec -> so lets say you run a speed test on a workstation at both sites and you get 100Mbps for both tests -> this does NOT mean that SMB between sites will be the 100Mbps -> often the ISP will give you the best throughput to speedtest servers but when you test between different sites you might see a much lower value. It really depends on how much the ISPs will shape/throttle between each public IP -> you can test this with a forwarding rule on both sites, here's the FortiGate configuration on how to do it: ruclips.net/video/p8MV3da9D8o/видео.html --> or to rule out firewall entirely you can place a laptop directly to each ISP modem for a moment to test (if possible in your environment) -> generally even with this test, the two ISP's will throttle you down significantly from 100Mbps unless maybe you have dedicated lines

    • @judgezee9371
      @judgezee9371 Год назад

      @@tothepointfortinet3823 alright thanks for this. I'll try the above

  • @donmorris1373
    @donmorris1373 Год назад +1

    Great explanation. Is it compulsory to have both FORTIGATE WAN adresses to belong to the same public IP network ? Let's Say that WE have 2 different companies and the was not communicating before and their WAN adresses are not on the same network.

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад

      Hi Don, no they don't need to be on the same network, in my case they were because I am simulating it in my lab. Generally, WAN IP's will be on different networks; so as long as both FortiGate's can route traffic to eachother, then you can set up a tunnel between the two.

  • @techhmaninder
    @techhmaninder Год назад

    Can you make a tutorial video for redundant ipsec tunnel , I am using two ISP in my firewall

  • @netconfig999
    @netconfig999 2 месяца назад

    thanks for sharing this VD

  • @Shubhontube
    @Shubhontube Год назад

    What is selector in fortigate

  • @danohgaming7047
    @danohgaming7047 Год назад

    Hi great video!! I was just wondering how DNS could be set through this ? Do you have any guides or intel on it ? Thanks :)

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад

      A site to site doesn't push config to any type of client so you can't set DNS from the FortiGate in this case. But, you can set a DNS server if you use a remote dial up IPsec tunnel or SSL tunnel

  • @kofiobeng1656
    @kofiobeng1656 2 года назад

    Hi Bro great, have created a tunnel but I can't access HTTP resource on the remote subnet (intranet running on remote LAN)

    • @tothepointfortinet3823
      @tothepointfortinet3823  2 года назад

      Here's some videos that will help to troubleshoot:
      Packet capture: ruclips.net/video/meXTmUXHQoI/видео.html
      IPsec Troubleshooting: ruclips.net/video/91GznQt2kzg/видео.html

  • @victorpenasanchez1167
    @victorpenasanchez1167 7 месяцев назад

    What a great video! I am new with fortinet and I have a question: When setting up WAN interfaces for remote Sites, does these IP addresses have to be in Manual? I ask because if they are on DHCP, would the VPN be lost right?

    • @DJSerpent
      @DJSerpent 12 дней назад

      you should have a static WAN IP for each remote site.

  • @IshtiaqkhanOfficiall
    @IshtiaqkhanOfficiall Год назад +1

    Amazing .

  • @landotbanares1925
    @landotbanares1925 2 года назад +1

    Hi Bro, Pls can you share the setup also Firewall behind the router? thanks

    • @MotoristangOpaw
      @MotoristangOpaw Год назад

      Looking for this too. I need to setup multiple sites behind ISP router

  • @coffeeboyclips1973
    @coffeeboyclips1973 11 дней назад

    Tried this so many times and changed options, my tunnel always shows inactive

  • @techtutorialcentral
    @techtutorialcentral 9 месяцев назад

    Creating address objects is what I'm stuck on and the video says "I've pre created some" man I wish that part was explained. I'm trying to setup a VPN to Azure and I'm not sure which "object" type to use.

    • @tothepointfortinet3823
      @tothepointfortinet3823  9 месяцев назад +1

      Go to Policy & Objects > addresses

    • @techtutorialcentral
      @techtutorialcentral 9 месяцев назад

      @@tothepointfortinet3823 Thanks. I finished setting up my tunnel to Azure today.

  • @ferozsyed2014
    @ferozsyed2014 11 месяцев назад

    does this work with different vendor ? like Fortigate & Sonic or sophos ?

    • @tothepointfortinet3823
      @tothepointfortinet3823  11 месяцев назад

      Yea this will work for other vendor too, just need to match the setting sun sonicwall gui

  • @hali1337
    @hali1337 5 месяцев назад

    And If one Site have dynamic IP wann? Dialup VPN?

    • @tothepointfortinet3823
      @tothepointfortinet3823  5 месяцев назад

      Yes that's one approach. Another could be to specify the FQDN on the side which has a static IP

  • @fdude555
    @fdude555 2 года назад

    Is this an example of a route based vpn or policy based vpn? Have always been confused by the two.

  • @naveenkumar3159
    @naveenkumar3159 2 года назад

    Hi Bro this is naveen from india im watching so many videos regarding vpn but i didn't get the clarity. after creating everything vpn client is not connecting i'm doing the labs in vmware
    please suggest me how to complte

  • @aimn19861
    @aimn19861 2 года назад

    What if both sites are behind NAT?

    • @tothepointfortinet3823
      @tothepointfortinet3823  2 года назад

      This should still work fine, you'd need to lab it to find all caveats, but here's a couple to consider:
      - Port forward both port 500 and 4500 on firewall the FortiGate's are behind
      - enable NATT on both ends

  • @user-eg7fi9js3s
    @user-eg7fi9js3s Год назад +1

    great