Fortinet FortiGate Route-Based BOVPN Integration Guide

This integration guide describes how to configure a route-based Branch Office VPN (BOVPN) tunnel between a WatchGuard Firebox and a Fortinet FortiGate 60E.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Firebox with Fireware v12.11 or higher
  • Fortinet FortiGate 60E with FortiOS v7.4.7 or higher

Integration Topology

This diagram shows the topology for a route-based BOVPN connection between a Firebox and a Fortinet FortiGate 60E.

Diagram of WatchGuard Firebox and Fortinet topology

Before You Begin

Before you begin these procedures, make sure that:

  • If you want to use a cloud-managed Firebox, you have a WatchGuard Cloud account and have added the Firebox to WatchGuard Cloud as a cloud-managed device. You also have configured an external network with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • If you want to use a locally-managed Firebox, you have configured an external interface with the external (public) IP address of the Firebox and at least one internal network on the Firebox.
  • You have configured the external interface (wan2) and the internal interfaces (internal2 and internal4) on the FortiGate 60E. For more information about how to configure interfaces, go to the Fortinet User Guide.

Configure the Firebox

You can configure your Firebox for a route-based BOVPN from WatchGuard Cloud for a cloud-managed Firebox or Fireware Web UI for a locally-managed Firebox.

Configure the FortiGate 60E

To configure the FortiGate, complete these steps:

  1. Configure an IPSec VPN Tunnel
  2. Configure a BOVPN Policy
  3. Configure a BOVPN Route

Configure an IPSec VPN Tunnel

To configure an IPSec VPN tunnel, from the FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>. The default IP address is 192.168.1.99.
  2. Select VPN > IPsec Tunnels.
    The list of existing tunnels appears.
  3. Screenshot of the IPsec Tunnels page in the FortiGate Web UI

  4. Click Create New > IPsec Tunnel.
    The VPN Creation Wizard page opens.
  5. Screenshot of the IPsec Wizard page in the FortiGate Web UI

  6. In the Name text box, type a name for the IPSec VPN tunnel. In our example, we type To WG.
  7. To continue without a template, for Template Type, select Custom.
  8. Click Next.
    The New VPN Tunnel page opens.
  9. Screenshot of the New VPN Tunnel page in the FortiGate Web UI

  10. In the Network section:
    1. For IP Version, select IPv4.
    2. From the Remote Gateway drop-down list, select Static IP Address.
    3. In the IP Address text box, type the public IP address of the Firebox. In our example, the IP address is 203.0.113.2.
    4. From the Interface drop-down list, select wan2. Keep the default values for all other settings in the Network section.
  11. In the Authentication section:
    1. From the Method drop-down list, select Pre-Shared Key.
    2. In the Pre-shared Key text box, type the pre-shared key.
    3. In the IKE section, for Version, select 2.
  12. In the Phase 1 Proposal section:
    1. Remove all proposals except AES256 for encryption and SHA256 for authentication.
    2. For Diffie-Hellman Group, select 14. Clear all other check boxes.
  13. Keep the default values for all other Phase 1 settings.
  14. In the Phase 2 Selectors > New Phase 2 section, click Advanced.
    The Phase 2 Proposal settings appear.
  15. Screenshot of the New VPN Tunnel page with Phase 2 Proposal settings in the FortiGate Web UI

  16. Remove all proposals except AES256 for encryption and SHA256 for authentication.
  17. Select the Enable Replay Detection check box.
  18. Select the Enable Perfect Forward Secrecy (PFS) check box.
  19. For the Diffie-Hellman Groups, select 14. Clear all other check boxes.
  20. Keep the default values for all other Phase 2 settings.
  21. Click OK.
    The tunnel you added appears in the list of existing tunnels.
  22. Screenshot of the IPsec Tunnels page with new tunnel in the FortiGate Web UI

Configure a BOVPN Policy

To configure a BOVPN policy, from FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
  2. Select Policy & Objects > Addresses.
    The Address page opens.
  3. Screenshot of the Addresses page in the FortiGate Web UI

  4. Click Create New.
    The New Address page opens.
  5. Screenshot of the New Address page in the FortiGate Web UI

  6. In the Name text box, type a name for the subnet behind the Firebox. In this example, we type WG_INT.
  7. From the Type drop-down list, select Subnet.
  8. In the IP/Netmask text box, type the IP address of the subnet behind the Firebox. In this example, we type 192.168.10.0/24.
  9. Keep the default values for all other settings.
  10. Click OK.
  11. To add more subnets in the policy, repeat Steps 3-8.
  12. Screenshot of the Addresses page in the FortiGate Web UI with new addresses

  13. From the navigation menu, select Policy & Objects > Firewall Policy.
    The list of firewall policies opens.
  14. The default outgoing interface is wan1. In this example, we need to modify the outgoing interface to wan2.

    Screenshot of the Firewall Policy page in the FortiGate Web UI

  15. Click Create New.
    The Create New Policy page opens.
  16. Screenshot of the Create New Policy page in the FortiGate Web UI

  17. In the Name text box, type a name for this policy. In this example, we type Policy to WG 2.
  18. From the Incoming Interface drop-down list, select internal4.
  19. From the Outgoing Interface drop-down list, select To WG.
  20. From the Source drop-down list, select FG_INT.
  21. From the Destination drop-down list, select the address name you typed in Step 4. In this example, we select WG_INT.
  22. From the Schedule drop-down list, select Always.
  23. From the Service list, select All.
  24. For Action, select Accept.
  25. In the Firewall/Network Options section, disable NAT.
  26. Keep the default values for all other settings.
  27. Click OK.
    The policy you created appears in the list of policies.
  28. To create another policy with To WG as the incoming interface and Internal4 as the outgoing interface, repeat Steps 11-22.
  29. Screenshot of the Edit Policy page in the FortiGate Web UI

  30. To create another policy with Internal2 as the incoming interface and To WG as the outgoing interface, repeat Steps 11-22.
  31. Screenshot of the Edit Policy page for another policy in the FortiGate Web UI

  32. To create another policy with To WG as the incoming interface and Internal2 as the outgoing interface, repeat Steps 11-22.

    Screenshot of the Edit Policy page for another policy in the FortiGate Web UI

  33. All the policies you created appear in the list of policies.

    Screenshot of the Firewall Policies list with all the new policies

Configure a BOVPN Route

If you have not configured a gateway for the wan2 interface, you must add a route manually.

To configure a route, from the FortiGate 60E Web UI:

  1. Log in to the FortiGate 60E Web UI at: https://<IP address of FortiGate 60E>.
  2. From the navigation menu, select Network > Static Routes.
    The list of static routes opens.
  3. Screenshot of the Static Routes page in the FortiGate Web UI

  4. Click Create New.
    The New Static Route page opens.
  5. Screenshot of the New Static Route page in the FortiGate Web UI

  6. For Destination, select Subnet, then type the subnet of the VPN remote tunnel. In this example, we type 192.168.10.0/24.
  7. From the Interface drop-down list, select To WG.
  8. Keep the default values for all other settings.
  9. Click OK.
  10. To create another route for another subnet, repeat Steps 3-7.
  11. Click OK.
    The route you created appears in the list of existing routes.
  12. Screenshot of the Static Routes page in the FortiGate Web UI with the new routes shown in the list

Test the Integration