FortiGate Site to Site IPsec Aggregate Tunnel

Поделиться
HTML-код
  • Опубликовано: 14 май 2023
  • In this tutorial, we will be demonstrating and explaining how to configure on FortiGate, a site-to-site IPsec VPN aggregate tunnel between to locations.
    If you have any questions or need further assistance, please feel free to leave a comment below. Don’t forget to subscribe to our channel for more helpful tutorials.
  • НаукаНаука

Комментарии • 15

  • @goba05
    @goba05 3 месяца назад

    great job thank you!

  • @prigipas20
    @prigipas20 Год назад +2

    In both sites you have disabled wan2. What will happen if you disable at first site the wan1 and at second site the wan2? Will you have still connectivity?

    • @verifine-academy
      @verifine-academy  Год назад +3

      No, there will be no connectivity. This is because in the lab setup that was used in this tutorial, there was no end to end connectivity between wan1 and wan2 at different sites. If you want to have connectivity after disabling wan1 at one site and wan2 at the other site, then the remaining wan interfaces should have end to end connectivity. Thanks for watching.

  • @phutapongsuanyim
    @phutapongsuanyim 4 месяца назад

    Why you created static route for black hole interface ?

    • @verifine-academy
      @verifine-academy  4 месяца назад

      a blackhole route is required to drop traffic intended to go through the VPN tunnel silently when the tunnel is down. this prevents the FortiGate from using any existing route such as a default route to send the traffic. the traffic will be dropped anyway, but the session will be kept in the route cache for period of time (default is 1 minute). thus, even when the tunnel it up again, traffic will continue to use a different outgoing interface instead of the VPN tunnel until the session-TTL expires.

  • @thetpaingtun3563
    @thetpaingtun3563 8 месяцев назад

    Hi bro,
    Did IPSec failover is working with different devices? like HQ as PA firewall and branch as Fotigate? Is is work like in this video bro.

    • @verifine-academy
      @verifine-academy  4 месяца назад

      No, this is a feature for FortiGate firewalls

  • @lavenderfly1955
    @lavenderfly1955 7 месяцев назад

    Also, I have one tunnel up and one down at a time and it flaps between tunnels, now one is up and the other is down and then vice-versa.

    • @verifine-academy
      @verifine-academy  4 месяца назад

      make sure the underlay network for each VPN tunnel is independent of the other; that is, one should not be depending on the other to route traffic

  • @lavenderfly1955
    @lavenderfly1955 7 месяцев назад

    Not working properly when Branch is a dial up user.

  • @smile841102
    @smile841102 6 месяцев назад +1

    what's the difference between SDwan VPN and ipsec aggregate?

    • @muhammadmuhsinbaharuddin9554
      @muhammadmuhsinbaharuddin9554 6 месяцев назад +1

      I would like to know the difference too.
      @verifine please elaborate on this. thank you

    • @YuvalGrimblat
      @YuvalGrimblat 4 месяца назад

      I have the same question. Very interesting.

    • @verifine-academy
      @verifine-academy  4 месяца назад

      Aggregate IPsec tunnel is just about redundancy. However, SDWAN gives you the ability to granularly set which links should pass which traffic based on the link quality (like jitter, packet loss, and delay). Also, you can even decide how much volume of traffic should pass on a particular link.

    • @YuvalGrimblat
      @YuvalGrimblat 4 месяца назад

      @@verifine-academy is it OK to config SD-WAN on customer side (2 WAN Lines which each one of them has 2 IPsec tunnels to Different Edge Datacenter FortiGate FW) and Aggregate IPsec on the Datacenter side (1 WAN Line with 2 IPsec tunnels to the branch)?