Fortinet FortiGate Policy-Based BOVPN Integration Guide

This integration guide describes how to configure a policy-based Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Fortinet FortiGate 60E. This integration establishes two separate subnets under each firewall device. We require dedicated one-to-one connectivity between paired subnets, not one-to-many access.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Firebox with Fireware v12.11 or higher
  • Fortinet FortiGate 60E with FortiOS v7.4.7 or higher

Integration Topology

This diagram shows the topology for a BOVPN connection between a Firebox and a Fortinet FortiGate 60E.

WatchGuard Firebox and Fortinet topology diagram

Before You Begin

Before you begin these procedures, make sure that:

  • If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and two different internal subnets on the Firebox
  • If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and two different internal interfaces on the Firebox.
  • You have configured the external interface (wan1) and the internal interfaces (internal2 and internal4) on the FortiGate 60E. For more information about how to configure interfaces, go to the Fortinet User Guide.

Configure the Firebox

You can configure your Firebox for a policy-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure the FortiGate 60E

To configure FortiGate 60E, follow these steps:

  1. Enable Policy-Based VPN
  2. Configure an IPSec VPN Tunnel
  3. Configure a BOVPN Policy
  4. Configure a BOVPN Route (Optional)

Enable Policy-Based VPN

To enable policy-based VPN, from the FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>. The default IP address is 192.168.1.99.
  2. From the navigation menu, select System > Feature Visibility.
    The Feature Visibility page opens.
  3. Screenshot of the Feature Visibility page with the Policy-Based IPsec VPN setting in the FortiGate Web UI

  4. In the Additional Features list, enable Policy-Based IPsec VPN.
  5. Click Apply.

Configure an IPSec VPN Tunnel

To configure an IPSec VPN tunnel, from the FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
  2. Select VPN > IPsec Tunnels.
    The list of existing tunnels appears.
  3. Screenshot of the IPsec Tunnels page in the FortiGate Web UI

  4. Click Create New > IPsec Tunnel.The VPN Creation Wizard page opens.
  5. Screenshot of the IPsec Wizard page in the FortiGate Web UI

  6. In the Name text box, type a name for the IPSec VPN tunnel. In this example, we type To WG.
  7. To continue without a template, for Template Type, select Custom.
  8. Click Next.
    The New VPN Tunnel page opens.
  9. Screenshot of the New VPN Tunnel page in the FortiGate Web UI

  10. Clear the Enable IPsec Interface Mode check box.
  11. In the Network section:
    1. From the Remote Gateway drop-down list, select Static IP Address.
    2. In the IP Address text box, type the public IP address of the Firebox. In our example, the IP address is 203.0.113.2.
    3. From the Interface drop-down list, select wan1. Leave the default value for all other settings in the Network section.
  12. In the Authentication section:
    1. From the Method drop-down list, select Pre-Shared Key.
    2. In the Pre-Shared Key text box, type the pre-shared key.
    3. In the IKE section, for Version, select 2.
  13. In the Phase 1 Proposal section:
    1. Remove all proposals except AES256 for encryption and SHA256 for authentication.
    2. For Diffie-Hellman Group, select 14. Clear all other check boxes.
  14. Keep the default values for all other Phase 1 settings.
  15. In the Phase 2 Selectors > New Phase 2 section:
    1. From the Local Address drop-down list, select Subnet.
    2. Type the local IP segment. This IP address is the internal network that the VPN protects.
    3. From the Remote Address drop-down list, select Subnet.
    4. Type the remote IP segment. This IP address is the internal network that the VPN protects.
  16. Click Advanced.
    The Phase 2 Proposal settings appear.
  17. Screenshot of the New VPN Tunnel page with Phase 2 Proposal settings in the FortiGate Web UI

  18. Remove all proposals except AES256 for encryption and SHA256 for authentication.
  19. Select the Enable Replay Detection check box.
  20. Select the Enable Perfect Forward Secrecy (PFS) check box.
  21. For Diffie-Hellman Group, select 14and clear all other check boxes.
  22. Leave the default value for all other Phase 2 settings.
  23. Click OK.
    The tunnel you added appears in the list of existing tunnels.
  24. Screenshot of the IPsec Tunnels page with new tunnel in the FortiGate Web UI

  25. To edit the IPSec tunnel you added, select the tunnel and click Edit.
    The Edit VPN Tunnel page opens.
  26. Screenshot of the Edit VPN Tunnel page with new tunnel in the FortiGate Web UI

  27. In the Phase 2 Selectors section, click Add.
  28. To create a new Phase 2 for another subnet, repeat Steps 14–18.
  29. Screenshot of the Edit VPN Tunnel page with Phase 2 settings in the FortiGate Web UI

  30. Click OK.
  31. Screenshot of the IPsec Tunnels page with edited tunnel in the FortiGate Web UI

Configure a BOVPN Policy

To configure a BOVPN policy, from FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
  2. Select Policy & Objects > Addresses.
    The Address page opens.
  3. Screenshot of the Addresses page in the FortiGate Web UI

  4. Click Create New.
    The New Address page opens.
  5. Screenshot of the New Address page in the FortiGate Web UI

  6. In the Name text box, type a name for the subnet behind the Firebox. In this example, we type WG_INT.
  7. From the Type drop-down list, select Subnet.
  8. In the IP/Netmask text box, type the IP address of the subnet behind the Firebox. In this example, we type 192.168.10.0/24.
  9. Keep the default values for all other settings.
  10. Click OK.
  11. To add more subnets in the policy, repeat Steps 3–8.
  12. Screenshot of the Addresses page in the FortiGate Web UI with new addresses

  13. From the navigation menu, select Policy & Objects > Firewall Policy.
    The list of firewall policies opens.
  14. Screenshot of the Firewall Policy page in the FortiGate Web UI

  15. Click Create New.
    The Create New Policy page opens.
  16. Screenshot of the Create New Policy page in the FortiGate Web UI

  17. In the Name textbook, type a name for this policy. In this example, we type Policy to WG.
  18. From the Incoming Interface drop-down list, select internal2.
  19. From the Outgoing Interface drop-down list, select wan1.
  20. From the Source drop-down list, select FG_INT.
  21. From the Destination drop-down list, select the address name you typed in Step 4. In this example, we select WG_INT.
  22. From the Schedule drop-down list, select Always.
  23. From the Service drop-down list, select All.
  24. For Action, select IPsec.
  25. From the VPN Tunnel drop-down list, select the VPN Tunnel you created inConfigure an IPSec VPN Tunnel. In this example, we select To WG.
  26. Enable Allow Traffic to Be Initiated From the Remote Site.
  27. Keep the default values for all other settings.
  28. Click OK.
    The policy you created appears in the list of policies.
  29. Screenshot of the Firewall Policy page in the FortiGate Web UI with new policy

  30. To create another policy for another subnet, repeat Steps 11–23.
  31. Screenshot of the Create New Polict page in the FortiGate Web UI with a new policy for a different subnet

Configure a BOVPN Route (Optional)

If you have not configured a gateway for the wan1 interface, you must add a route manually.

To configure a route, from the FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>
  2. From the navigation menu, select Network > Static Routes.
    The list of static routes opens.
  3. Screenshot of the Static Routes page in the FortiGate Web UI

  4. Click Create New.
    The Edit Static Route page opens.
  5. Screenshot of the Edit Static Route page in the FortiGate Web UI

  6. In the Destination > Subnet text box, type 0.0.0.0/0.0.0.0.
  7. In the Gateway Address text box, type the IP address for your wan1 gateway.
  8. From the Interface drop-down list, select wan1.
  9. Keep the default values for all other settings.
  10. Click OK.

Test the Integration