أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.
frist
to Configuring the Branch IPsec VPN branch1 and branch 2 settingsGo to VPN > IPsec > Auto Key (IKE).
Select Create branch 1. Set IP Address tothe IP of the HQ FortiGate, Local Interaceto the Internet-facing interface, and enterthe same Pre-shared Key used in the HQbranch 1.
Select Create branch 2, set it to use thenew branch 1, and expand the Advancedoptions.Specify Source address as the Branchsubnet and Destination address as the HQsubnet.
second
Adding Branch addressesfor the local and remoteLAN on the HQ FortiGateunitGo to Firewall Objects > Address >Address.Create a local address. Set Type to Subnet,Subnet/IP Range to the Branch subnet,and Interface to an internal port.
Create a remote LAN address. Set Typeto Subnet, Subnet/IP Range to the HQsubnet, and Interface to the Internet-facinginterface.
thierd
Creating a Branch IPsecsecurity policyGo to Policy > Policy > Policy.Create a new policy. Set Type to VPN andSubtype to IPsec. Configure the policy toallow traffic from the local interface to passthrough the outgoing VPN interface (in theexample, wan1) using the VPN tunnel createdin branch 1.
last
Go to VPN > Monitor > IPSec Monitor toverify the status of the VPN tunnel. It shouldbe up.
A user on either of the office networks shouldbe able to connect to any address on theother office network transparently.From the HQ FortiGate unit go to Log &Report > Traffic Log > Forward Traffic.
From the Branch FortiGate unit go to Log &Report > Traffic Log > Forward Traffic.
i hope to understand my explain