<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.silbonetworks.com/index.php?action=history&amp;feed=atom&amp;title=IPsec_VPN_between_SILBO_and_Fortigate_firewall</id>
	<title>IPsec VPN between SILBO and Fortigate firewall - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.silbonetworks.com/index.php?action=history&amp;feed=atom&amp;title=IPsec_VPN_between_SILBO_and_Fortigate_firewall"/>
	<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=IPsec_VPN_between_SILBO_and_Fortigate_firewall&amp;action=history"/>
	<updated>2026-04-04T00:34:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.1</generator>
	<entry>
		<id>https://wiki.silbonetworks.com/index.php?title=IPsec_VPN_between_SILBO_and_Fortigate_firewall&amp;diff=323&amp;oldid=prev</id>
		<title>Wikisysop: Created page with &quot;&#039;&#039;&#039;Prerequisite:&#039;&#039;&#039;  * FortiGate firewall * SILBO Router or gateway * Static Public IP on wired internet connection * SIM card with active internet    Note: This document is prepared using FortiGate FW v7.0.13 &amp; SILBO 1.16_1.13 FW version.  FortiGate VPN setup  Create a new IPSec tunnel via VPN -&gt; IPSec Tunnels -&gt; (+) Create New  624x624px   IPsec Wizard will open, then follow below steps:  * Give a name to IPsec VPN to Identif...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.silbonetworks.com/index.php?title=IPsec_VPN_between_SILBO_and_Fortigate_firewall&amp;diff=323&amp;oldid=prev"/>
		<updated>2024-07-31T07:07:44Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Prerequisite:&amp;#039;&amp;#039;&amp;#039;  * FortiGate firewall * SILBO Router or gateway * Static Public IP on wired internet connection * SIM card with active internet    Note: This document is prepared using FortiGate FW v7.0.13 &amp;amp; SILBO 1.16_1.13 FW version.  FortiGate VPN setup  Create a new IPSec tunnel via VPN -&amp;gt; IPSec Tunnels -&amp;gt; (+) Create New  &lt;a href=&quot;/index.php/File:FortiGate_VPN_Setup.png&quot; title=&quot;File:FortiGate VPN Setup.png&quot;&gt;frameless|624x624px&lt;/a&gt;   IPsec Wizard will open, then follow below steps:  * Give a name to IPsec VPN to Identif...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Prerequisite:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* FortiGate firewall&lt;br /&gt;
* SILBO Router or gateway&lt;br /&gt;
* Static Public IP on wired internet connection&lt;br /&gt;
* SIM card with active internet  &lt;br /&gt;
&lt;br /&gt;
Note: This document is prepared using FortiGate FW v7.0.13 &amp;amp; SILBO 1.16_1.13 FW version.&lt;br /&gt;
&lt;br /&gt;
FortiGate VPN setup&lt;br /&gt;
&lt;br /&gt;
Create a new IPSec tunnel via VPN -&amp;gt; IPSec Tunnels -&amp;gt; (+) Create New&lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN Setup.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPsec Wizard will open, then follow below steps:&lt;br /&gt;
&lt;br /&gt;
* Give a name to IPsec VPN to Identify&lt;br /&gt;
* Select “Site to Site” and select remote device as “Cisco”&lt;br /&gt;
&lt;br /&gt;
* Select “No NAT between sites” Option&lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN setup Wizard.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
* WAN IP address of a SILBO Router/gateway (As we do not have fix WAN IP, we provided a LAN IP and that will be removed later during ????????)&lt;br /&gt;
* Select Outgoing Interface to the one that FortiGate will be using to communicate with Remote Device that is WAN interface.&lt;br /&gt;
* Choose a pre-shared key and make sure you will configure in SILBO device and click next. &lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN setup Wizard 1.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
* Select Internal (FortiGate’s LAN) interface that you wish to use in IPsec.&lt;br /&gt;
* Local Subnets field will populate automatically.&lt;br /&gt;
* Put SILBO LAN subnet in Remote Subnets field and click on next.&lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN setup Wizard 2.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Verify all the configurations as shown &lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN setup Wizard 3.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In case you wish to add more tunnels you can do.&lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN setup Wizard 4.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once configuration is saved it should show as below.&lt;br /&gt;
&lt;br /&gt;
[[File:FortiGate VPN setup Wizard Final.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now convert the tunnel to custom as shown below.&lt;br /&gt;
&lt;br /&gt;
[[File:Converting tunnel to custom.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
Once saved it should move to custom VPN as shown below.&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate Firewall Custom VPN.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
Start editing configuration further as shown in below images.&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate Firewall Configuration further.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate Firewall VPN Configuration.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate Firewall VPN Configuration 1.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate Firewall VPN Configuration 2.png|frameless|596x596px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Configuring SILBO Router/gateway:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Login to router using default IP 192.168.10.1 and default credentials admin/admin.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
[[File:Log In.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once login we can see the FW version.&lt;br /&gt;
&lt;br /&gt;
[[File:Firmware Version Dashboard.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Change the IP address to required IP, in this testing we are using 192.168.11.1 IP address.&lt;br /&gt;
&lt;br /&gt;
To do that Navigate to Settings&amp;gt;&amp;gt;Network from 192.168.10.1 to 192.168.11.1 and save / update.&lt;br /&gt;
&lt;br /&gt;
Upon IP changed configure VPN.&lt;br /&gt;
&lt;br /&gt;
Navigate to &amp;gt;&amp;gt; Settings&amp;gt;&amp;gt;VPN&amp;gt;&amp;gt; IPsec&amp;gt;&amp;gt; and do as per below images&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate firewall VPN config.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate Firewall VPN Configuration Dashboard.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once all the configuration is correctly configured and clicked on save button device will show VPN configuration &amp;gt;&amp;gt; General settings.&lt;br /&gt;
&lt;br /&gt;
Save and then navigate to VPN&amp;gt;&amp;gt;Ipsec setting page and click on update.&lt;br /&gt;
&lt;br /&gt;
In some time IPsec will come up and it can be seen as established as shown below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:VPN IPSEC changes RC44.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
Also in FortiGate it can be seen as below.&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate status.png|frameless|624x624px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To Ping server LAN, navigate to features&amp;gt;&amp;gt;Others and give LAN IP and ping.&lt;br /&gt;
&lt;br /&gt;
If the ping is not working then check the firewall side settings whether the ping is allowed or not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Fortigate VPN Others Options.png|frameless|624x624px]]&lt;/div&gt;</summary>
		<author><name>Wikisysop</name></author>
	</entry>
</feed>