Hello,
Goatria of trying to solve a problem:
I’m trying to create a VPN between a Fortigate and a Mikrotik
My topology is
FG:
Port WAN: xxx.xx.165.210
Port LAN: 10.2.16.0/23
–
MK:
Port WAN (pppoe): xxx.xx.253.250
Port LAN: 10.3.5.0/24
In fortigate I have already configured the Static Router and Firewall Policy
This is the VPN configuration
Network:
Remote Gateway : Static IP Address (177.94.253.250) , Interface : wan1 , NAT: no
Authentication:
Authentication Method : Pre-shared Key
IKE Version : 1 , Mode : Main (ID protection)
Phase 1 Proposal:
Algorithms: AES128-SHA256
Diffie-Hellman Group : 2
XAUTH:
Type : Disabled
Phase 2 Selectors:
Name Local Address Remote Address
vpn-mikrotik 10.2.16.0/255.255.254.0 10.3.5.0/255.255.255.0
Encryption: AES128-SHA256
Enable Perfect Forward Secrecy (PFS): no
On Mikrotik I already configured the PPPoE client and did NAT for port 3 with masquerade
This is the VPN configuration
/ip ipsec profile> print
Flags: * - default
0 * name="default" hash-algorithm=sha1 enc-algorithm=aes-128,3des dh-group=modp2048,modp1024 lifetime=1d proposal-check=obey nat-traversal=yes dpd-interval=2m
dpd-maximum-failures=5
1 name="vpn-fortigate-profile1" hash-algorithm=sha256 enc-algorithm=aes-128 dh-group=modp1024 lifetime=1d proposal-check=obey nat-traversal=no dpd-interval=5s
dpd-maximum-failures=5
/ip ipsec proposal> print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=30m pfs-group=modp1024
1 name="vpn-fortigate-proposal1" auth-algorithms=sha256 enc-algorithms=aes-128-cbc lifetime=1h pfs-group=none
/ip ipsec peer> print
Flags: X - disabled, D - dynamic, R - responder
0 name="vpn-fortigate-peer1" address=xxx.xx.165.210/32 profile=vpn-fortigate-profile1 exchange-mode=main send-initial-contact=yes
/ip ipsec identity> print
Flags: D - dynamic, X - disabled
0 peer=vpn-fortigate-peer1 auth-method=pre-shared-key secret="123456789" generate-policy=no
/ip ipsec policy> print
Flags: T - template, B - backup, X - disabled, D - dynamic, I - invalid, A - active, * - default
# PEER TUNNEL SRC-ADDRESS DST-ADDRESS PROTOCOL ACTION LEVEL PH2-COUNT
0 T * ::/0 ::/0 all
1 vpn-fortig... yes 10.3.5.0/24 10.2.16.0/23 all encrypt require 0
Imagens
FG



MK







Thanks if anyone can help












