IPSec
IPSec set up
WAN Setting Local endpoint
(Site A)
Local endpoint
(Site A)
Remote endpoint
(Site B)
Remote endpoint
(Site B)
WAN Link
1
2
1
2
WAN Type
Routing Mode
Routing Mode
Routing Mode
Routing Mode
WAN Port
Port1
Port2
Port1
Port2
IPv4 Local-
host IP
10.10.10.10
11.11.11.11
20.20.20.20
21.21.21.21
IPv4 Net-
mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
IPv4 Default
Gateway
10.10.10.254
11.11.11.254
20.20.20.254
21.21.21.254
For the details of WAN link setting, see "
Configurations for a WAN link in Routing Mode
link in Bridge Mode: One Static IP
Configurations for a WAN link in Bridge Mode: Multiple Static IP
".
LAN private subnets
Go to
System > Network Setting > LAN Private Subnet
LAN Private Subnet
Local endpoint (Site A)
Remote endpoint (Site B)
IP(s) on Localhost
192.168.10.254
192.168.100.254
Netmask
255.255.255.0
255.255.255.0
LAN Port
Port3
Port3
For the details of LAN private subnet setting, see "
".
Define Auto Routing policies for IKE negotiation
Our goal is two establish IPSec protected VPN based on Tunnel Routing (See "
") through two TR
tunnels, which implies two IPSec SAs being established on the two TR tunnels. Therefore, it requires routing policies
to route the IKE negotiation packets for establishing the two IPSec SAs.
Packets of IKE negotiation are generated by FortiWAN itself (source and destination IP address of the packets is
respectively the Local IP and Remote IP of Phase 1 configuration), therefor the Source and Destination of the Auto
Routing filter for IKE negotiation must be configured with the Local IP and Remote IP (the IP address of WAN port of
two FortiWAN units). Remember that the IPSec SAs are established on the WAN port of both the two FortiWANs.
Go to
Service > Auto Routing
Add two Auto Routing policies on the both endpoints like:
204
FortiWAN Handbook
Fortinet Technologies Inc.