97 Site2Site Custom VPN Lab
97 Site2Site Custom VPN Lab
FW1 IP Schema
Outside Layer 3 Interface Port1– 192.168.1.1/24
Local Subnets 10.0.1.0/24
Remote Subnets 10.0.6.0/24
Inside Layer 3 Interface 10.0.1.254/24
Management IP Address 192.168.100.200/24
PC1 IP Address 10.0.1.1/24
Attacker IP Address 10.0.1.10/24
FW2 IP Schema
Outside Layer 3 Interface Port1– 192.168.3.111/24
Local Network 10.0.6.0/24
Remote Network 10.0.1.0/24
Inside Layer 3 Interface 10.0.6.254/24
Management IP Address 192.168.100.240/24
Remote-PC1 IP Address 10.0.6.1/24
Remote-PC2 IP Address 10.0.6.2/24
VPN Setup:
To create IPsec VPN tunnel, connect to FW1 go to VPN > IPsec Wizard, & create new tunnel. In
the VPN Setup step, set Template Type to Custom and click Next.
Now, In the Authentication section, for Method, select Pre-shared Key and enter the Pre-shared
Key. Set IKE Version to 1, Choose Phase 1 Encryption and Authentication methods.
Go to Policy & Objects > Firewall Policy and click Create New. Enter a policy Name. For Incoming
Interface, select VPN Interface FW1-to-FW4 for Outgoing Interface, Select LAN(port3). the
Source, Destination, Schedule, Service, and set Action to ACCEPT. Click OK.
For Remote Gateway, select Static IP Address. Set IP Address to the public IP address of the
FW1 FortiGate in my case 192.168.1.1. Assigns an interface as the Outgoing Interface. Enable
Local Gateway Click on Primary IP it will automatically put WAN interface IP. Disable NAT
Traversal, leave default Dead Peer Detection to On Demand.
Choose and set Local Address subnet and remote Address Subnet and Phase 2 Encryption and
Authentication methods and Click OK to apply the settings.
Go to Policy & Objects > Firewall Policy and click Create New. Enter a policy Name. For Incoming
Interface, select VPN Interface FW4-to-FW1. For Outgoing Interface AG to SW(AG-1)., select.
Select the Source, Destination, Schedule, Service, and set Action to ACCEPT. Click OK.
Verification:
Try to ping from FW1 PC1 to FW4 Remote-PC2 it will work after VPN established.
Try to ping from FW4 Remote-PC2 to FW1 PC1 it will work after VPN established.
Let’s capture the packets using Wireshark no traffic of ICMP only ESP encrypted.