FortiGate Site to Site IPsec Aggregate Tunnel

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ม.ค. 2025

ความคิดเห็น • 20

  • @farzumm
    @farzumm 22 วันที่ผ่านมา

    Thanks for Sharing

  • @mehmetdayanikli1415
    @mehmetdayanikli1415 2 หลายเดือนก่อน +1

    thanks for sharing

  • @goba05
    @goba05 9 หลายเดือนก่อน +1

    great job thank you!

  • @prigipas20
    @prigipas20 ปีที่แล้ว +2

    In both sites you have disabled wan2. What will happen if you disable at first site the wan1 and at second site the wan2? Will you have still connectivity?

    • @verifine-academy
      @verifine-academy  ปีที่แล้ว +3

      No, there will be no connectivity. This is because in the lab setup that was used in this tutorial, there was no end to end connectivity between wan1 and wan2 at different sites. If you want to have connectivity after disabling wan1 at one site and wan2 at the other site, then the remaining wan interfaces should have end to end connectivity. Thanks for watching.

  • @jh060284
    @jh060284 5 หลายเดือนก่อน

    Hello, thanks for sharing

  • @phutapongsuanyim
    @phutapongsuanyim 10 หลายเดือนก่อน

    Why you created static route for black hole interface ?

    • @verifine-academy
      @verifine-academy  10 หลายเดือนก่อน

      a blackhole route is required to drop traffic intended to go through the VPN tunnel silently when the tunnel is down. this prevents the FortiGate from using any existing route such as a default route to send the traffic. the traffic will be dropped anyway, but the session will be kept in the route cache for period of time (default is 1 minute). thus, even when the tunnel it up again, traffic will continue to use a different outgoing interface instead of the VPN tunnel until the session-TTL expires.

  • @smile841102
    @smile841102 ปีที่แล้ว +1

    what's the difference between SDwan VPN and ipsec aggregate?

    • @muhammadmuhsinbaharuddin9554
      @muhammadmuhsinbaharuddin9554 ปีที่แล้ว +1

      I would like to know the difference too.
      @verifine please elaborate on this. thank you

    • @YuvalGrimblat
      @YuvalGrimblat 10 หลายเดือนก่อน

      I have the same question. Very interesting.

    • @verifine-academy
      @verifine-academy  10 หลายเดือนก่อน

      Aggregate IPsec tunnel is just about redundancy. However, SDWAN gives you the ability to granularly set which links should pass which traffic based on the link quality (like jitter, packet loss, and delay). Also, you can even decide how much volume of traffic should pass on a particular link.

    • @YuvalGrimblat
      @YuvalGrimblat 10 หลายเดือนก่อน +1

      @@verifine-academy is it OK to config SD-WAN on customer side (2 WAN Lines which each one of them has 2 IPsec tunnels to Different Edge Datacenter FortiGate FW) and Aggregate IPsec on the Datacenter side (1 WAN Line with 2 IPsec tunnels to the branch)?

  • @jh060284
    @jh060284 5 หลายเดือนก่อน

    What's the difference between SDWan and aggregate tunnels?

  • @lavenderfly1955
    @lavenderfly1955 ปีที่แล้ว

    Also, I have one tunnel up and one down at a time and it flaps between tunnels, now one is up and the other is down and then vice-versa.

    • @verifine-academy
      @verifine-academy  10 หลายเดือนก่อน

      make sure the underlay network for each VPN tunnel is independent of the other; that is, one should not be depending on the other to route traffic

  • @thetpaingtun3563
    @thetpaingtun3563 ปีที่แล้ว

    Hi bro,
    Did IPSec failover is working with different devices? like HQ as PA firewall and branch as Fotigate? Is is work like in this video bro.

    • @verifine-academy
      @verifine-academy  10 หลายเดือนก่อน

      No, this is a feature for FortiGate firewalls

  • @lavenderfly1955
    @lavenderfly1955 ปีที่แล้ว

    Not working properly when Branch is a dial up user.

    • @verifine-academy
      @verifine-academy  5 วันที่ผ่านมา

      Aggregate IPsec tunnels are for site-to-site IPsec VPN tunnels.