How can I configure a main mode VPN between a SonicWall and Fortinet firewall?
10/14/2021 385 People found this article helpful 491,439 Views
Description
When configuring a Site-to-Site VPN tunnel in SonicOS Enhanced firmware using Main Mode with the SonicWall appliances (Site A) and Fortinet Firewall (Site B) must have routable Static WAN IP address.
Network Setup
Resolution
Resolution for SonicOS 6.5
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Creating Address Objects for VPN subnets
- Login to the SonicWall management Interface.
- Click Manage in the top navigation menu.
- Navigate to Objects | Address Objects.
- Click Address objects Tab.
- Click Add Configure the Address Objects as mentioned in the figure above, click Add and click close when finished.
Configuring a VPN policy on Site A SonicWall
- Click Manage in the top navigation menu.
- Navigate to VPN | Base Settings page.
- Click Add button. The VPN Policy window is displayed.
- Click General tab.
- Click Network tab.
- Under Local Networks, select a local network from Choose local network from list: and select the address object X0 Subnet (LAN Primary Subnet).
- Under Destination Networks, select Choose destination network from list: and select the address object Remote network (Site B network).
- Click Proposals tab.
- Click Advanced tab.
- Select Enable Keep Alive to use heartbeat messages between peers on this VPN tunnel. If one end of the tunnel fails, using Keepalives will allow for the automatic.
- Renegotiation of the tunnel once both sides become available again without having to wait for the proposed Life Time to expire.
- Select Enable Windows Networking (NetBIOS) Broadcast to allow access to remote network resources by browsing the Windows® Network Neighborhood.
- To manage the local SonicWall through the VPN tunnel, select HTTP, HTTPS, or both from Management via this SA. Select HTTP, HTTPS, or both in the User login via this SA to allow users to login using the SA.
- If you wish to use a router on the LAN for traffic entering this tunnel destined for an unknown subnet, for example, if you configured the other side to Use this VPN Tunnel as default route for all Internet traffic, you should enter the IP address of your router into the Default LAN Gateway (optional) field.
- Select an interface or zone from the VPN Policy bound to menu. A Zone WAN is the preferred selection if you are using WAN Load Balancing and you wish to allow the VPN to use either WAN interface.
- Click OK.
Configuring a VPN policy on Site B Fortinet Firewall
- Fortinet Interfaces with LAN and WAN.
Deployment Steps on Fortinet Firewall
- Creating Address Objects for Local Subnets and VPN subnets.
- Configuring a VPN policy Phase 1 and Phase 2.
- Creating Static Route for the destination Network.
- Create a policy to allow traffic through VPN Tunnel.
Creating Address Objects for Local Subnets and VPN subnets:
- Login to the Fortinet Management Interface.
- Navigate to Firewall Objects | Addresses, on the right and click on Create New button.
- Configure the Address Objects as mentioned in the figure below for Local Subnet and Remote Subnet, click OK .
Configuring a VPN policy Phase 1 and Phase 2
- Navigate to VPN | IPSec VPN | Auto key IKE, on the right and click on Create Phase 1.
- Configure Phase 1 VPN as below.
- Name: SW-FT (Choose the Name for the VPN)
- Remote Gateway: Static
- IP Address: 1.1.1.1 (SonicWall WAN IP Address)
- Local Interface: Port3 WAN (Through which port we are connecting)
- Mode: Main Mode (as we selected on SonicWall)
- Authentication Method: Preshared Key (as we selected on SonicWall)
- Preshared Key: test@123 (Same as SonicWall)
- Peer Option: IKE Version 1
- Local Gateway IP: 3.3.3.3 which is the WAN IP of the Fortinet.
- P1 Proposal: Encryption-DES, Authentication-SHA1 (Same as SonicWall)
- DH Group: Group 2 (Same as SonicWall)
- Key life: 28800 (Same as SonicWall)
- Click OK .
Now Create Phase 2 and configure as below
- Name: SW-FT (Choose any name for the Phase 2).
- Click on Advanced to configure the P2 Proposals.
- Encryption-DES, Authentication-SHA1
- Key Life: 28800 Seconds.
- Auto key Keep Alive: Enabled.
- Quick Mode Selector:
- Source Address: Select LAN Subnet which we had created an address object.
- Destination Address: Select Remote Subnet which we had created an address object.
- Click OK .
Creating Static Route for the destination Network.
- Navigate to Router | Static Route and Create New.
- Destination IP/Mask: 192.168.168.0/255.255.255.0 (SonicWall Local Subnet).
- Device: Select the VPN that is SW-FT in our case.
- Distance: 10.
- Click OK .
Create a policy to allow traffic through VPN Tunnel
- Navigate to Policy | Create New Policy.
- We need to create 2 policies for inbound and outbound.
Policy 1 INBOUND
- Incoming Interface- Port2 LAN and Outgoing Interface SW-FT (VPN).
- Source Address- LAN Subnets.
- Destination Address- Remote Subnets.
- Services- ALL
- Action- ACCEPT.
- Click OK .
Policy 2 OUTBOUND
- Incoming Interface- SW-FT (VPN) and Outgoing Interface- Port2 LAN.
- Source Address- Remote Subnets.
- Destination Address- LAN Subnets.
- Services- ALL.
- Action- ACCEPT.
- Click OK .
How to Test this Scenario
- Check the tunnel is UP on both the devices and try to ping addresses from Site A to Site B or Vice Versa.
- Tunnel is UP on SonicWall.
- Windows XP PC behind SonicWall which is 192.168.168.144 able to ping Windows XP PC which is behind Fortinet 10.1.1.4.
- Tunnel is UP on Fortinet.
- Windows XP PC behind Fortinet which is 10.1.1.4 able to ping Windows XP PC which is behind SonicWall 192.168.168.144.
Resolution for SonicOS 6.2 and Below
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Creating Address Objects for VPN subnets
- Login to the SonicWall management Interface.
- Navigate to Network | Address Objects, scroll down to the bottom of the page and click ADD.
- Configure the Address Objects as mentioned in the figure above, click Add and click close when finished.
Configuring a VPN policy on Site A SonicWall
- Navigate to VPN | Settings page and Click Add. The VPN Policy window is displayed.
- Click General tab.
- Click Network tab.
- Under Local Networks, select a local network from Choose local network from list: and select the address object X0 Subnet (LAN Primary Subnet).
- Under Destination Networks, select Choose destination network from list: and select the address object Remote network (Site B network).
- Click the Proposals tab.
- Click Advanced tab.
- Select Enable Keep Alive to use heartbeat messages between peers on this VPN tunnel. If one end of the tunnel fails, using Keepalives will allow for the automatic.
- Renegotiation of the tunnel once both sides become available again without having to wait for the proposed Life Time to expire.
- Select Enable Windows Networking (NetBIOS) Broadcast to allow access to remote network resources by browsing the Windows® Network Neighborhood.
- To manage the local SonicWall through the VPN tunnel, select HTTP, HTTPS, or both from Management via this SA. Select HTTP, HTTPS, or both in the User login via this SA to allow users to login using the SA.
- If you wish to use a router on the LAN for traffic entering this tunnel destined for an unknown subnet, for example, if you configured the other side to Use this VPN Tunnel as default route for all Internet traffic, you should enter the IP address of your router into the Default LAN Gateway (optional) field.
- Select an interface or zone from the VPN Policy bound to menu. A Zone WAN is the preferred selection if you are using WAN Load Balancing and you wish to allow the VPN to use either WAN interface.
- Click OK.
Configuring a VPN policy on Site B Fortinet Firewall
- Fortinet Interfaces with LAN and WAN.
Deployment Steps on Fortinet Firewall
- Creating Address Objects for Local Subnets and VPN subnets.
- Configuring a VPN policy Phase 1 and Phase 2.
- Creating Static Route for the destination Network.
- Create a policy to allow traffic through VPN Tunnel.
Creating Address Objects for Local Subnets and VPN subnets:
- Login to the Fortinet management Interface.
- Navigate to Firewall Objects | Addresses, on the right and click on Create New button.
- Configure Address Objects as mentioned in the figure below for Local Subnet and Remote Subnet, click OK .
Configuring a VPN policy Phase 1 and Phase 2.
- Navigate to VPN | IPSec VPN | Auto key IKE, on the right and click Create Phase 1.
- Configure Phase 1 VPN as below.
- Name: SW-FT (Choose the Name for the VPN)
- Remote Gateway: Static
- IP Address: 1.1.1.1 (SonicWall WAN IP Address)
- Local Interface: Port3 WAN (Through which port we are connecting)
- Mode: Main Mode (as we selected on SonicWall)
- Authentication Method: Preshared Key (as we selected on SonicWall)
- Preshared Key: test@123 (Same as SonicWall)
- Peer Option: IKE Version 1
- Local Gateway IP: 3.3.3.3 which is the WAN IP of the Fortinet.
- P1 Proposal: Encryption-DES, Authentication-SHA1 (Same as SonicWall)
- DH Group: Group 2 (Same as SonicWall)
- Key life: 28800 (Same as SonicWall)
- Click OK .
Now Create Phase 2 and configure as below
- Name: SW-FT (Choose any name for the Phase 2).
- Click on Advanced to configure the P2 Proposals.
- Encryption-DES, Authentication-SHA1
- Key Life: 28800 Seconds.
- Auto key Keep Alive: Enabled.
- Quick Mode Selector:
- Source Address: Select LAN Subnet which we had created an address object.
- Destination Address: Select Remote Subnet which we had created an address object.
- Click OK .
Creating Static Route for the destination Network
- Navigate to Router | Static Route and Create New.
- Destination IP/Mask: 192.168.168.0/255.255.255.0 (SonicWall Local Subnet).
- Device: Select the VPN that is SW-FT in our case.
- Distance: 10.
- Click OK.
Create a policy to allow traffic through VPN Tunnel.
- Navigate to Policy | Create New Policy.
- We need to create 2 policies for inbound and outbound.
Policy 1 INBOUND
- Incoming Interface- Port2 LAN and Outgoing Interface SW-FT (VPN).
- Source Address- LAN Subnets.
- Destination Address- Remote Subnets.
- Services- ALL.
- Action- ACCEPT.
- Click OK .
Policy 2 OUTBOUND
- Incoming Interface- SW-FT (VPN) and Outgoing Interface- Port2 LAN.
- Source Address- Remote Subnets.
- Destination Address- LAN Subnets.
- Services- ALL.
- Action- ACCEPT.
- Click OK .
How to Test this Scenario
- Check the tunnel is UP on both the devices and try to ping addresses from Site A to Site B or Vice Versa.
- Tunnel is UP on SonicWall.
- Windows XP PC behind SonicWall which is 192.168.168.144 able to ping Windows XP PC which is behind Fortinet 10.1.1.4.
- Tunnel is UP on Fortinet.
- Windows XP PC behind Fortinet which is 10.1.1.4 able to ping Windows XP PC which is behind SonicWall 192.168.168.144.
Related Articles
Categories