IPsec Tunnel Between FortiGate Firewall and Cisco Router
IPsec Tunnel Between FortiGate Firewall and Cisco Router
IPsec Tunnel Between FortiGate Firewall and Cisco Router
Phase-1
crypto isakmp policy 2 Step_2: Internet Security Association
and Key Management Protocol
hash md5
Configured Protocol configured
authentication pre-share
group 2
crypto isakmp key Admin@123 address 172.16.1.1 Step_3: Isakmp Key
configured
Phase-2
crypto ipsec transform-set Cisco_to_Fortinet esp-des esp-md5-hmac
mode tunnel
Step_4: Setting up IPsec
tunnel mode and
transform set to “esp-des
esp-md5-hmac”
crypto map Cisco_to_Fortinet 2 ipsec-isakmp
set peer 172.16.1.1
set transform-set Cisco_to_Fortinet Step_5: Mapping the
match address vpn-traffic tunnel and setting up the
peer with the ACL and
IPsec
DHCP pool configured for
ip dhcp pool LAN
Local LAN
network 10.1.1.0 255.255.255.0
default-router 10.1.1.254
interface GigabitEthernet0/0
ip address 172.16.1.2 255.255.255.252
duplex auto
speed auto
Step_6 : Configuring the
media-type rj45 interface and enabling it to
do tunnelling
crypto map Cisco_to_Fortinet
Note: This document has been made on the basis of a Virtual Machine using Eve-Ng
emulator environment. I would request to please follow the official vendor document
before doing it in a Real-world environment as the scenario may differ in the Real world.