Fortinet FortiGate Route-Based BOVPN Integration Guide
This integration guide describes how to configure a route-based Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Fortinet FortiGate 60E.
Contents
Integration Summary
The hardware and software used in this guide include:
- Firebox with Fireware v12.11 or higher
- Fortinet FortiGate 60E with FortiOS v7.4.7 or higher
Integration Topology
This diagram shows the topology for a route-based BOVPN connection between a Firebox and a Fortinet FortiGate 60E.
Before You Begin
Before you begin these procedures, make sure that:
- If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
- If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
- You have configured the external interface (wan2) and the internal interfaces (internal2 and internal4) on the FortiGate 60E. For more information about how to configure interfaces, go to the Fortinet User Guide.
Configure the Firebox
You can configure your Firebox for a route-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.
- Log in to WatchGuard Cloud.
If you log in with a Service Provider account, you must select a Subscriber account from the Account Manager. - From the navigation menu, select Configure > VPNs.
- Click Add BOVPN.
The Add BOVPN page opens. - In the Name text box, type a descriptive name for the BOVPN. In this example, we type route-based vpn.
- From the VPN Connection Type drop down-list, select Route-Based IPSec to Locally-Managed Firebox / Third-Party.
- From the Address Family drop down-list, select IPv4 Addresses.
- In the Endpoint A section, select your cloud-managed Firebox.
- In the Endpoint B section, in the Endpoint Name text box, type a name to identify the remote VPN endpoint. In our example, we type Fortinet.
- Click Next.
The VPN Gateways settings page opens. - For your cloud-managed Firebox:
- Select External.
- In the IP or Domain Name or User on Domain text box, select an IP address, domain name, or user on domain that resolves to the Firebox external network IP address.
- For the remote VPN endpoint, in the IP or Domain Name or User on Domain text box, type the IP address of your FortiGate 60E interface.
- To encrypt and decrypt the data that goes through the VPN tunnel, in the Pre-Shared Key text box, type a shared secret. This pre-shared key matches the pre-shared key you will configure for the IKE Gateway on the FortiGate 60E.
- Click Next.
The Traffic settings page opens. - From the cloud-managed Firebox section, select the internal networks that you want to be accessible through the VPN tunnel.
- For the Fortinet endpoint, click Add Network Resource.
- In the Network Resource text box, type the IP address of the private network protected by the Fortinet firewall.
- Click Add.
- To add additional subnets for the Fortinet endpoint, repeat Steps 15-17.
- Keep the default values for all other settings.
- Click Next.
The Security settings page opens. - Keep the default values for all authentication settings.
- Click Add.
- Click Finish.
- Log in to Fireware Web UI at: https://<your Firebox IP address>:8080.
- Select VPN > BOVPN Virtual Interfaces.
The BOVPN Virtual Interfaces configuration page opens. - Click Add.
The Add page opens. - In the Interface Name text box, type a name for this BOVPN virtual interface. In this example, we type BovpnVif.1.
- From Remote Endpoint Type drop-down list, select Cloud VPN or Third-Party Gateway.
- From the Gateway Address Family drop-down list, select IPv4 Addresses.
- In the Credential Method section, select Use Pre-Shared Key and in the adjacent text box, type the pre-shared key.
- In the Gateway Endpoint section, click Add.
The Gateway Endpoint Settings dialog box opens. - For Interface, select Physical, and from the adjacent drop-down list, select the interface that has the external (public) IP address of the Firebox.
- From the Interface IP Address drop-down list, select Primary Interface IPv4 Address.
- For Specify the Gateway ID for Tunnel Authentication, select By IP Address.
- In the adjacent text box, type the primary IP address of the external Firebox interface. In this example, we type 203.0.113.2.
- Select the Remote Gateway tab.
The Remote Gateway page opens. - For Specify the Remote Gateway IP Address for a Tunnel, select Static IP Address.
- In the adjacent text box, type the IP address of the FortiGate 60E WAN interface. In this example, we type 198.51.100.2.
- For Specify the Remote Gateway ID for Tunnel Authentication, select By IP Address.
- In the adjacent text box, type the IP address of the FortiGate 60E WAN interface. In this example, we type 198.51.100.2.
- Click OK.
The gateway endpoint you added appears in the Gateway Endpoint section. - In the Gateway Endpoint section, select the Start Phase 1 Tunnel When It Is Inactive check box.
- Select the Add This Tunnel to the BOVPN-Allow Policies check box.
- Select the VPN Routes tab.
The VPN Routes page opens. - Click Add.
The VPN Route Settings dialog box opens. - From the Choose Type drop-down list, select Network IPv4.
- In the Route To text box, type the network IP address of a route that will use this virtual interface. In this example, we type 10.0.10.0.
- Click OK.
The VPN route settings are added. - To add another VPN Route to another subnet, repeat Steps 21-25.
- Select the Phase 1 Settings tab.
The Phase 1 Settings page opens. - From the Version drop-down list, select IKEv2.
- Keep the default values for all other Phase 1 settings.
- Keep the default values for all Phase 2 settings.
- Click Save.
The BOVPN virtual interface you added appears on the BOVPN Virtual Interfaces page.
For more information about BOVPN virtual interface configuration on a locally-managed Firebox, go to BOVPN Virtual Interfaces in Help Center.
Configure the FortiGate 60E
To configure the FortiGate, complete these steps:
Configure an IPSec VPN Tunnel
To configure an IPSec VPN tunnel, from the FortiGate 60E Web UI:
- Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>. The default IP address is 192.168.1.99.
- Select VPN > IPsec Tunnels.
The list of existing tunnels appears. - Click Create New > IPsec Tunnel.
The VPN Creation Wizard page opens. - In the Name text box, type a name for the IPSec VPN tunnel. In our example, we type To WG.
- To continue without a template, for Template Type, select Custom.
- Click Next.
The New VPN Tunnel page opens. - In the Network section:
- For IP Version, select IPv4.
- From the Remote Gateway drop-down list, select Static IP Address.
- In the IP Address text box, type the public IP address of the Firebox. In our example, the IP address is 203.0.113.2.
- From the Interface drop-down list, select wan2. Keep the default values for all other settings in the Network section.
- In the Authentication section:
- From the Method drop-down list, select Pre-Shared Key.
- In the Pre-shared Key text box, type the pre-shared key.
- In the IKE section, for Version, select 2.
- In the Phase 1 Proposal section:
- Remove all proposals except AES256 for encryption and SHA256 for authentication.
- For Diffie-Hellman Group, select 14. Clear all other check boxes.
- Keep the default values for all other Phase 1 settings.
- In the Phase 2 Selectors > New Phase 2 section, click Advanced.
The Phase 2 Proposal settings appear. - Remove all proposals except AES256 for encryption and SHA256 for authentication.
- Select the Enable Replay Detection check box.
- Select the Enable Perfect Forward Secrecy (PFS) check box.
- For the Diffie-Hellman Groups, select 14. Clear all other check boxes.
- Keep the default values for all other Phase 2 settings.
- Click OK.
The tunnel you added appears in the list of existing tunnels.
Configure a BOVPN Policy
To configure a BOVPN policy, from FortiGate 60E Web UI:
- Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
- Select Policy & Objects > Addresses.
The Address page opens. - Click Create New.
The New Address page opens. - In the Name text box, type a name for the subnet behind the Firebox. In this example, we type WG_INT.
- From the Type drop-down list, select Subnet.
- In the IP/Netmask text box, type the IP address of the subnet behind the Firebox. In this example, we type 192.168.10.0/24.
- Keep the default values for all other settings.
- Click OK.
- To add more subnets in the policy, repeat Steps 3-8.
- From the navigation menu, select Policy & Objects > Firewall Policy.
The list of firewall policies opens. - Click Create New.
The Create New Policy page opens. - In the Name text box, type a name for this policy. In this example, we type Policy to WG 2.
- From the Incoming Interface drop-down list, select internal4.
- From the Outgoing Interface drop-down list, select To WG.
- From the Source drop-down list, select FG_INT.
- From the Destination drop-down list, select the address name you typed in Step 4. In this example, we select WG_INT.
- From the Schedule drop-down list, select Always.
- From the Service list, select All.
- For Action, select Accept.
- In the Firewall/Network Options section, disable NAT.
- Keep the default values for all other settings.
- Click OK.
The policy you created appears in the list of policies. - To create another policy with To WG as the incoming interface and Internal4 as the outgoing interface, repeat Steps 11-22.
- To create another policy with Internal2 as the incoming interface and To WG as the outgoing interface, repeat Steps 11-22.
- To create another policy with To WG as the incoming interface and Internal2 as the outgoing interface, repeat Steps 11-22.

- All the policies you created appear in the list of policies.

The default outgoing interface is wan1. In this example, we need to modify the outgoing interface to wan2.
Configure a BOVPN Route
If you have not configured a gateway for the wan2 interface, you must add a route manually.
To configure a route, from the FortiGate 60E Web UI:
- Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
- From the navigation menu, select Network > Static Routes.
The list of static routes opens. - Click Create New.
The New Static Route page opens. - For Destination, select Subnet, then type the subnet of the VPN remote tunnel. In this example, we type 192.168.10.0/24.
- From the Interface drop-down list, select To WG.
- Keep the default values for all other settings.
- Click OK.
- To create another route for another subnet, repeat Steps 3-7.
- Click OK.
The route you created appears in the list of existing routes.
Test the Integration
- Log in to WatchGuard Cloud.
If you log in with a Service Provider account, you must select a Subscriber account from the Account Manager. - Select the cloud-managed Firebox.
- Select Monitor > Live Status > VPN.
The VPN page opens. - Click the BOVPN you configured.
- Verify that the two VPN tunnels are active.
- Log in to Fireware Web UI at: https://<your Firebox IP address>:8080.
- Select System Status > VPN Statistics.
The VPN Statistics page opens. - Select the Branch Office VPN tab.
The Branch Office VPN page opens. - In the Tunnels section, verify that the two VPN tunnels are active.
- Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
- Select Dashboard > Network > IPsec.
The IPSec page opens. - Verify that the two VPN tunnels you configured are active.
- Verify that Host 1 (behind the Firebox) and Host 2 (behind the FortiGate 60E) can ping each other.