Chapter 10- Cloud Technologies
10-6 Site-to-Site VPN between FortiGate on premise and FortiGate in the AWS
Learning Objectives
- Configure a VPN Wizard in AWS
- Configure site-to-site VPN between FortiGate on premise and AWS
- Identify FortiGate subnets in AWS

On-Premise FortiGate Configuration
Device | Interface | IP address |
FortiGate | Port 1 | DHCP Client |
Port 2 | 192.168.10.1/24 | |
WebTerm | Eth0 | 192.168.10.2/24 |
1- Configure the interfaces of the firewall. Port2 by default is an internal interface and named “LAN” and Port1 is an external interface and named “WAN”.

2- Create a site-to-site VPN from IPSEC Wizard as Figures 10-156 to 10-158.



3- Create a static route to the default gateway.

AWS Configuration
1- Create a FortiGate firewall in AWS and configure the interfaces. You need to do all steps in the previous section(Section 10-5).
2- Create a VPN from IPSEC Wizard as Figures 10-160 to 10-162.



3- Create static routes on FortiGate. We are going to create two static routes as follows:



4-Go to VPN> IPSEC Tunnels and check status of the tunnel.


5- You should be able to ping from WebTerm to Virtual Machine on AWS and vice versa.

