Skip to main content

VPN Site-to-Site configuration with Fortigate

Prerequisites

Ensure the following conditions are met before starting:

  • VPN Site-to-Site has been created on FPT Cloud Portal.
  • Fortigate is installed, enabled, and licensed on the customer side.
  • Fortigate has been configured with LAN and WAN IP addresses.

Step 1: Configure VPN Site-to-Site on FPT Cloud Portal

Access https://console.fptcloud.com/ and create the VPN Site-to-Site.

Create a Customer Gateway:

  • Remote private network: LAN subnet range for peering with Fortigate
  • Remote IP public: Public IP of the Fortigate firewall

Customer Gateway

Create a VPN Connection:

note

Save the Pre-shared key value — you will need it when configuring Fortigate.

A VPN connection has three main sections:

  • General Information — basic connection details
  • Remote VPN Information — encryption and customer-side configuration
  • Dead Peer Detection — automatic retry settings

Section 1: General Information

General Information

Section 2: Remote VPN Information

Remote VPN Information

When selecting the provider Fortigate, the system automatically fills in the IKE and IPsec settings:

IKE:

ParameterValue
Encryption algorithmaes-256
Authorization algorithmsha256
IKE versionikev2
Lifetime unitsseconds
Lifetime value28800
DH GroupGROUP_14
Phase 1 negotiation modemain

IPsec:

ParameterValue
Encapsulation modetunnel
Encryption algorithmaes-256
Authorization algorithmsha256
Lifetime unitsseconds
Lifetime value3600
Perfect Forward Secrecy (PFS)GROUP_14
Transform protocolesp

Section 3: Dead Peer Detection

Dead Peer Detection

Enter the Delay and Max failures values, then click Create VPN Connection.

Step 2: Configure IPsec on Fortigate

  1. Log in to the Fortigate web interface.

Fortigate login

  1. Select IPsec Wizard.

IPsec Wizard

  1. Go to IPsec Tunnels:
    • Enter the FPT Cloud IP address from Step 1.
    • Select the WAN interface (if multiple WAN interfaces exist, specify the one to use).

IPsec Tunnel config

Check the connection status on FPT Smart Cloud Portal.

Connection status

  1. Enable Local Gateway and select Primary IP.

Local Gateway

  1. Set the Method to Pre-shared Key and enter the same key as in Step 1.

Pre-shared key

note

If the customer setup is behind NAT, configure as shown below and contact L3-FPT Smart Cloud for support.

NAT config

  1. Configure Phase 1.

Phase 1

If NAT is not used, ensure that NAT mode is disabled.

  1. Configure Phase 2. Set the Local IP to the customer network range.

Phase 2

Step 3: Configure firewall and routing on Fortigate

Set the firewall to Allow All for both incoming and outgoing traffic.

From FPT Cloud to Fortigate:

FPT to Fortigate

From Fortigate to FPT Cloud:

Fortigate to FPT

Connection successfully established:

Connection established

Configure routing with the Destination set to the FPT Cloud network (e.g., 172.30.205.0/255.255.255.0) and Interface set to the IPsec tunnel created earlier.

Routing config

You can now open a terminal to test network connectivity using ping.