Guide: IPsec HQ ↔ BO
(Working Configuration)
IPsec Site-to-Site VPN –
FortiGate HQ ↔ BO
(Working Guide)
Author: Lorenzo Meli
Topology:
HQ LAN: 10.10.10.0/24 (DC), 192.168.100.0/24 (Client)
BO LAN: 192.168.199.0/24
HQ WAN: 192.168.125.250
BO WAN: 192.168.125.251
1. Verify Interfaces
HQ
WAN: 192.168.125.250
LAN (VLAN02): 10.10.10.1
LAN (VLAN01): 192.168.100.254
BO
WAN: 192.168.125.251
LAN: 192.168.199.254
, 2. Phase 1 – Manual IPsec Setup (on
both firewalls)
HQ → BO
VPN → IPsec → Create New → Custom
Setting Value
Name HQ-BO-P1
Remote Gateway 192.168.125.251
Interface WAN
IKE Version 1
Mode Aggressive
Pre-Shared Key (your PSK)
Local ID HQ
Peer ID BO
Encryption AES-256
Authentication SHA-512
DH Group 15
Lifetime 86400
BO → HQ (reverse values)
Setting Value
Remote Gateway 192.168.125.250
IKE Version 1
Mode Aggressive
Local ID BO
Peer ID HQ
Encryption AES-256
Authentication SHA-512
DH Group 15
3. Phase 2 – Create Two Selectors
(Required!)
HQ Phase 2 selectors
1 HQ-P2-DC
(Working Configuration)
IPsec Site-to-Site VPN –
FortiGate HQ ↔ BO
(Working Guide)
Author: Lorenzo Meli
Topology:
HQ LAN: 10.10.10.0/24 (DC), 192.168.100.0/24 (Client)
BO LAN: 192.168.199.0/24
HQ WAN: 192.168.125.250
BO WAN: 192.168.125.251
1. Verify Interfaces
HQ
WAN: 192.168.125.250
LAN (VLAN02): 10.10.10.1
LAN (VLAN01): 192.168.100.254
BO
WAN: 192.168.125.251
LAN: 192.168.199.254
, 2. Phase 1 – Manual IPsec Setup (on
both firewalls)
HQ → BO
VPN → IPsec → Create New → Custom
Setting Value
Name HQ-BO-P1
Remote Gateway 192.168.125.251
Interface WAN
IKE Version 1
Mode Aggressive
Pre-Shared Key (your PSK)
Local ID HQ
Peer ID BO
Encryption AES-256
Authentication SHA-512
DH Group 15
Lifetime 86400
BO → HQ (reverse values)
Setting Value
Remote Gateway 192.168.125.250
IKE Version 1
Mode Aggressive
Local ID BO
Peer ID HQ
Encryption AES-256
Authentication SHA-512
DH Group 15
3. Phase 2 – Create Two Selectors
(Required!)
HQ Phase 2 selectors
1 HQ-P2-DC