Fortinet black logo

FortiGate NGFW to FortiSASE SPA Hub Conversion Deployment Guide

Tunnel interface configuration

Copy Link
Copy Doc ID b10d503a-c519-11ee-8c42-fa163e15d75b:525700
Download PDF

Tunnel interface configuration

You must assign a static IP address to the tunnel interface. This configuration is required to support BGP peering between the secure private access hub and the FortiSASE security points of presence.

Note

The following settings are only examples. Do not consider them as recommended settings.

To create the tunnel interface using the GUI:
  1. Go to Network > Interfaces.
  2. Under Physical Interface, expand your WAN interface to display your IPsec VPN tunnel interface. Click the tunnel interface and click Edit.
  3. In the Edit Interface dialog, do the following:
    1. Set the IP and Remote IP/Netmask.
    2. For Administrative Access, select PING.
  4. Click OK to save the changes.

To create the tunnel interface using the CLI:
config system interface
    edit "VPN1"
        set vdom "root"
        set ip 10.251.1.254 255.255.255.255
        set allowaccess ping
        set type tunnel
        set remote-ip 10.251.1.253 255.255.255.0
        set interface "port1"
    next
end

Tunnel interface configuration

You must assign a static IP address to the tunnel interface. This configuration is required to support BGP peering between the secure private access hub and the FortiSASE security points of presence.

Note

The following settings are only examples. Do not consider them as recommended settings.

To create the tunnel interface using the GUI:
  1. Go to Network > Interfaces.
  2. Under Physical Interface, expand your WAN interface to display your IPsec VPN tunnel interface. Click the tunnel interface and click Edit.
  3. In the Edit Interface dialog, do the following:
    1. Set the IP and Remote IP/Netmask.
    2. For Administrative Access, select PING.
  4. Click OK to save the changes.

To create the tunnel interface using the CLI:
config system interface
    edit "VPN1"
        set vdom "root"
        set ip 10.251.1.254 255.255.255.255
        set allowaccess ping
        set type tunnel
        set remote-ip 10.251.1.253 255.255.255.0
        set interface "port1"
    next
end