Chapter 4- VPN
4-1 IPSEC VPN
Learning Objectives
- Configure an IPSEC VPN
- Configure a site-to-site VPN

Device | IP address | Access |
WebTerm2 | 192.168.0.2/24 | – |
VPC | DHCP Client | – |
Ethernet Switch1-2 | – | – |
FortiGate | Port 1: DHCP Client
Port 2: 192.168.0.1/24 DHCP Server (192.168.0.10-192.168.0.20) |
ICMP
HTTP HTTPS |
Windows | DHCP Client | – |
Before you begin the configuration, please remember with VPC’s and Web terms this is how we edit their IP settings for static and or DHCP Addressing:
Before dragging in your web terms or other devices remember to always choose GNS3VM:


- Set a DHCP server on interface port2 (Range of IP address should be: 192.168.0.20- 192.168.0.30, DNS: 4.2.2.4)



2. Go to User & Authentication> User Group> Create New:
- Name: VPN_GRP_A0ID
- TYPE: Firewall


3. Go to User & Authentication > User Definition> Create a User:




4. Assign User Group to your profile


5. Go to VPN> IPSEC Wizard
Step 1
- Select Name: A0ID- VPN(A0ID is a student ID)
- Template Type: Remote Access
- Remote Type Device: FortiClient

Step 2
- Incoming Interface: Port1
- Pre-shared Key: <Select a key like a password>
- User Group: VPN_GRP_A0ID

Step 3
- Local Interface: Port 2
- Local Address: Add your local range of IP address (192.168.0.0/24)
- Client Range: 172.16.0.1- 172.16.0.10
- Subnet Mask: 255.255.255.0
- Disable Split Tunneling


6. On Windows machine, Download FortiClient from https://www.forticlient.com/downloads Install the FortiClient and configure IPSEC as set in the previous steps. Your remote Gateway IP should be the Port1 IP address.





10- You should be to ping from windows to VPC.

Site-to-Site VPN ( IPSEC VPN)

To Validate Firewalls Licenses, We are going to connect them to the Internet.

Device | IP address | Access |
Fortigate1 | 10.10.10.1/24 | ICMP-HTTP-HTTPS |
Fortigate2 | 10.10.10.2/24 | ICMP-HTTP-HTTPS |
WebTerm1 | 192.168.20.2/24 | – |
WebTerm2 | 192.168.10.2/24 | – |
Step1
On the FG1, go to VPN > IPsec Wizard and select Site to Site – FortiGate.
Step2
1.Select Site2Site/ FortiGate /No Nat
2. Enter Remote IP: 10.10.10.2/24 outgoing interface: port3

Step3
3. Local Interface: port2 IP: 192.168.20.0/24, Remote subnet: 192.168.10.0/24

Through the wizard, FortiGate creates two policies and two static routes in the firewall.
Step4
On the FG2, go to VPN > IPsec Wizard and select Site-to-Site – FortiGate.
Step 5
Do the same configuration for FG2 (remote IP is 10.10.10.1/24 and local IP is 192.168.10.0/24)

Step 6

Step 7

Then, Go to your IPSec Tunnels and double click on Inactive.
On the next windows, right click on the tunnel > Bring UP> All Phase 2 selectors. Then, your tunnel should be up!


Step 8
Go to Logs & Reports > Event> VPN Event and verify your configuration.

You should be able to ping from WebTerm1 to WebTerm2.
