FortiGate IPsec ADVPN with SDWAN and Dual ISPs

Поделиться
HTML-код
  • Опубликовано: 24 июл 2024
  • This tutorial teaches how to configure Auto-Discovery IPsec VPN with SDWAN where each location has two ISP connections.
    Contents of this video
    00:00 Introduction
    On the Hub
    00:57 Configure SDWAN Zone
    02:10 Customize VPN Tunnels
    03:16 Configure Firewall Policies
    04:17 Configure VPN Tunnel IP Address
    05:02 Configure iBGP
    On Spoke 1
    06:31 Configure SDWAN Zone
    07:45 Customize VPN Tunnels
    08:30 Configure Firewall Policies
    09:28 Configure VPN Tunnel IP Address
    On Spoke 2
    10:15 Configure SDWAN Zone
    11:15 Customize VPN Tunnels
    11:55 Configure Firewall Policies
    12:40 Configure VPN Tunnel IP Address
    On Spoke 1
    13:19 Configure iBGP
    On Spoke 2
    14:35 Configure iBGP
    On Hub
    15:58 Configure SDWAN Performance SLAs
    17:28 Configure SDWAN Rules
    On Spoke 1
    18:30 Configure SDWAN Performance SLAs
    19:45 Configure SDWAN Rules
    On Spoke 2
    20:47 Configure SDWAN Performance SLAs
    21:48 Configure SDWAN Rules
    On Hub and Spokes
    23:00 Enable ECMP
    For information about the setup in VMware Workstation, go to drive.google.com/file/d/1V2hg...
    In case you are getting the Error '-9999' when changing remote gateway type of an IPsec tunnel, see the following link community.fortinet.com/t5/For...
    If you have any questions or need further assistance, please feel free to leave a comment below. Don’t forget to subscribe to our channel for more helpful tutorials.
  • НаукаНаука

Комментарии • 66

  • @danielweaver7065
    @danielweaver7065 8 месяцев назад +1

    Awesome video, thank you so much for taking the time to put this together!!

  • @stevehille1296
    @stevehille1296 9 месяцев назад

    Excellent run through, thankyou.

  • @ricardosoriano1024
    @ricardosoriano1024 9 месяцев назад

    Thank you very much for the video. Super grateful!!

  • @taukirsyed1769
    @taukirsyed1769 2 месяца назад

    Thanks for the efforts to build this video. Helped me heaps!

  • @ademolaosindero1278
    @ademolaosindero1278 8 месяцев назад

    Best Tutorial Ever... !!!

  • @jonluigimalihan1449
    @jonluigimalihan1449 8 месяцев назад +1

    this is great! hope there will also a tutorial on how to setup a dual hub since it has a point of failure when hub FW goes down

  • @muhammadatif2148
    @muhammadatif2148 10 месяцев назад

    Very informative video

  • @0m0sh
    @0m0sh 4 месяца назад +1

    This was quite informative Sir..Thank you!

  • @kelumidu4116
    @kelumidu4116 Год назад +1

    This is most effective and valuable one thank you

    • @verifine-academy
      @verifine-academy  Год назад

      Glad it was helpful!

    • @kelumidu4116
      @kelumidu4116 Год назад

      @@verifine-academy sir do you have underlay configuration atleast connectivity diagram

    • @verifine-academy
      @verifine-academy  Год назад

      @@kelumidu4116 Check the video description section

  • @neallaw6382
    @neallaw6382 8 месяцев назад

    Great tutorial!

  • @m.imraniqbaal6912
    @m.imraniqbaal6912 Год назад +2

    This was a masterpiece.

  • @hummer-k1k
    @hummer-k1k 5 месяцев назад +1

    Thank you so much! 🙂🙂 Can you please advanced video with like "set additional-path" ... ?

  • @ee07168
    @ee07168 9 месяцев назад +1

    Excellent job keep it up...

  • @sobreewaesulong7256
    @sobreewaesulong7256 6 месяцев назад

    Thanks for your sharing.

  • @josemauricioporrastarazona2219
    @josemauricioporrastarazona2219 2 месяца назад

    Muchas gracias por la información fue muy útil y funcional. Excelente video.

  • @user-is2kn8no1p
    @user-is2kn8no1p 10 месяцев назад +1

    Thanks for the video. Its very informative. I tried in my lab and I could use only one path between the spokes and second path does not come up though both tunnels are up. Could you please suggest?

    • @gyimisgyimis
      @gyimisgyimis 10 месяцев назад

      Are you able to use both paths between a spoke and the hub? Is your ping performance SLA up for both paths?

  • @praneethbashitha7136
    @praneethbashitha7136 2 месяца назад +1

    This is a superb video. Please share the config backup if possible.

  • @Wickerdrummer
    @Wickerdrummer 5 месяцев назад +1

    Very interesting video

  • @kelumidu4116
    @kelumidu4116 Год назад +1

    One small request the ad vpn is involve lot of spokes therefore it easy to manage via fortimanager. if you think more lessons i suggest same setup doing with fortimanager as well

  • @RLD_WAY
    @RLD_WAY 2 месяца назад

    amazing...

  • @shahbazsandhu1031
    @shahbazsandhu1031 9 месяцев назад +1

    Thank you for sharing this fantastic video. Furthermore, I just have the following question:
    1) Why did you change the load-balancing mode to Weight base, and did you make any changes to the WAN links' sides at the same time?
    2) Additionally, you set the ecmp-max-paths to 4. Could you kindly clarify why this was the case, and what the value would be if there were additional spoke sites, such as 4 or 5 ?

    • @verifine-academy
      @verifine-academy  9 месяцев назад

      There are many load-balancing algorithms, and you can choose whichever you want. The advantage of weight-based is that the administrator has the greatest control over how much traffic should traverse each interface. The choice of 4 for the ecmp-max-paths value was arbitrary; the default value is 255. We just wanted to show where to change this setting. The value of ecmp-max-paths should be at least the number of sdwan member interfaces if you want all interfaces to participate in passing traffic.

    • @shahbazsandhu1031
      @shahbazsandhu1031 7 месяцев назад

      I appreciate your reply, buddy.
      What do you think of the following as well?
      1) Planning to disable the current ADVPn configuration and disable the ADVPN tunnels (configured using OSPF and BGP) in order to configure the new ADVPN setup on the current firewalls.
      2) Since I must complete all of my work remotely and maintain a WAN IP connection to every site, there won't be any conflicts with the current setup if I create a new SDWAN zone, add new SDWAN members with the new IP addressing, and set up VPN tunnels and BGP configuration and firewall policies. ( Exactly you refer in the video).
      3) Can I also configure the SDWAN performance SLAs if the above configuration goes well? I'm concerned that moving the SDWAN zones won't prevent me from accessing the firewalls remotely?
      What are your thoughts on this? I know that doing this work remotely isn't the best practise, but it would be great if you could offer any advice.
      Thanks

    • @verifine-academy
      @verifine-academy  7 месяцев назад

      One way to ensure you have remote access to the FortiGate firewalls is to configure Remote Access VPN on the boxes and connect to through that. You also have to ensure that reachability to the firewalls via RA VPN are independent of the SDWAN configurations.

  • @jowhor
    @jowhor 9 месяцев назад +1

    Thanks for the great work. Can you please tell us how you setup the gateways for both WAN links? Are you used Static Routing? Adding those information may helpful for everyone.
    Thanks again.

    • @verifine-academy
      @verifine-academy  9 месяцев назад +1

      Hello. We are using OSPF as the underlay routing protocol. A link on how the lab was set up in VMware Workstation was shared in the description section of this video tutorial. Anyway I will share it with you here again: drive.google.com/file/d/1V2hgiKfvkzgmPL-FSeHglaC_rBnpAkws/view?usp=sharing

    • @jowhor
      @jowhor 9 месяцев назад

      Thanks for your reply. In most case SME are getting small chunks of IP addresses with STATIC ROUTING option. Can you suggest how this solution will fit where ISP provides only static route?
      Appreciate you kind response.

  • @TheKinhoow
    @TheKinhoow 9 месяцев назад +1

    I noticed something, on my Spokes, the HUB network does not appear to be advertised in BGP, but I can ping it and the Firewall is forwarding it to the tunnel, is that the case or did I do something wrong?

    • @verifine-academy
      @verifine-academy  9 месяцев назад

      Kindly watch the video from 14:21 going and see the output of the command "get router info bgp network" executed on Spoke1. The Hub network is also advertised as shown in the output.

  • @sawkaung7965
    @sawkaung7965 9 месяцев назад

    Thank

  • @VishnuK-br7ee
    @VishnuK-br7ee 2 месяца назад

    I have mesh topology. I'm migrating from Paloalto to FortiGate. I need to create two tunnels to AWS/remote sites for redundancy along with BGP. How to give priority to one specific tunnel on BGP ? Can somebody help me I struck since I'm new to FortiGate.

    • @verifine-academy
      @verifine-academy  20 дней назад

      Configure an SDWAN zone and add the two outgoing interfaces as members. Now configure an SDWAN rule using the manual strategy, then prefer on member interface over the other.

  • @ChampionCCC
    @ChampionCCC 9 месяцев назад

    I have tried on Live kit, but I have problems. Is something necessary to enable the Overlay Routing Protocol ? My VPN is UP, I can ping the VPN Interface IP at each end, but not across the VPN, and when I do "get router info bgp summary", it is completely blank

    • @verifine-academy
      @verifine-academy  9 месяцев назад

      BGP ought to be up. Kindly go through the steps in the video and make sure you did not miss any step. Let us know what happens again?

    • @ChampionCCC
      @ChampionCCC 9 месяцев назад +1

      @@verifine-academy Many thanks for your reply. I went through it all again, and I had missed the All / All for the Local / Remote on the Spoke End of the Phase 2 setup

  • @trionotriono8277
    @trionotriono8277 Год назад

    What are the advantages of this system sir? Because I am currently only using aggregate tunnels for the three sites as shown in the diagram.

    • @gyimisgyimis
      @gyimisgyimis 10 месяцев назад +1

      Aggregate tunnels are for redundancy only. But SDWAN does more than that; it intelligently chooses the best link/path based on jitter, latency, or packet loss.

  • @praneethbashitha7136
    @praneethbashitha7136 Месяц назад

    why next-hop self is not configured ?

  • @3mooreVids
    @3mooreVids 9 месяцев назад

    Following your example in this video, when changing the VPN to custom and selecting dialup, it will not allow it to be created for me. I get a -9999:-9999 error every time. What OS version are you running in your example? I'm using 7.2.5 and it will not work. Any ideas?

    • @verifine-academy
      @verifine-academy  9 месяцев назад

      community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-Error-9999-when-changing-remote-gateway-type/ta-p/270240#:~:text=This%20article%20describes%20how%20to,an%20IPsec%20tunnel%20'SiteA'.&text=FortiOS%207.2.,0%20and%20later

    • @TheKinhoow
      @TheKinhoow 9 месяцев назад +1

      If you are using Firmware 7.2 it will cause this problem, from this version onwards it is no longer possible to change Phase1 of IPSec already created, you will have to create another one, so I recommend creating it manually and not in the form of the video.

    • @verifine-academy
      @verifine-academy  9 месяцев назад +1

      Thanks for the information

    • @3mooreVids
      @3mooreVids 8 месяцев назад

      I actually got it to work for me while using the wizard as the video shows with one change - click the Edit on phase one during the verify stage before hitting the final OK. If you edit there, you can make your changes and then when you click OK, it creates without an error.

  • @randybravo2788
    @randybravo2788 9 месяцев назад

    Is there any possible way to get the CLI full config for the Hub and Spokes?

    • @gyimisgyimis
      @gyimisgyimis 9 месяцев назад

      Unfortunately we did not save the CLI configuration before deleting the lab

    • @randybravo2788
      @randybravo2788 9 месяцев назад

      Thanks @@gyimisgyimis

  • @prem3377
    @prem3377 25 дней назад

    Spoke to spoke cross tunnel communication is not happening

  • @pingajay1
    @pingajay1 4 месяца назад

    This works only for Forti OS versions before 7.2

  • @hongquan283
    @hongquan283 10 месяцев назад

    Can I replace BGP with OSPF?

  • @cdfaulk
    @cdfaulk 7 месяцев назад +3

    This is the best tutorial ever BUT you don’t address the issue of asymmetric routing that is reverse path check failed, deny. How do you take care of that. I have done six of these implementations & in each case I had to deploy a method to prevent asymmetric routing. If you know a simpler way to do it, I would love to learn that.

    • @verifine-academy
      @verifine-academy  7 месяцев назад +1

      You can use manual strategy in the SD WAN rules, also do not enable load balancing for this manual strategy. Optionally, you may choose the same ISP interface as the preferred one at both ends (at Hub and Spoke)

    • @GabrielSoares-qx7xh
      @GabrielSoares-qx7xh 2 месяца назад +1

      Under BGP there is a prefareble route map when the SDWAN SLA is matched, you can use that to adjust asymmetric traffic

  • @jaredgaiser3140
    @jaredgaiser3140 2 месяца назад

    Is there a way to add already existing tunnels to SDWAN zones?