Set up IPsec VPN between FortiGate and Mikrotik using IKEv2

Created by NHC IT Support, Modified on Wed, 8 Jan at 8:58 AM by NHC IT Support

Network diagram:

 

tp.jpg

 

Configuration FortiGate:

Create IPsec phases and tunnels.

  • Navigate to VPN -> IPsec Tunnels, select Create New, and set the Template Type to Custom.
  • Then, follow the detailed reference guide below.

fgt4.jpg

 

fgt3.png


fgt2.png

fgt1.png

 

RouterOS Configuration using Winbox:

  • All configuration is done in the IP -> IPsec section using Winbox.
  • First, create the IPsec Profile, where the IKE proposal is defined.

001_ipsec_profile-1.png

 

  • In the next step, create a new IPsec Proposal for phase 2 encryption.
  • No Auth. Algorithms are needed since used AES-256-GCM as the encryption algorithm, which already includes the authentication.

002_ipsec_proposal-1.png

 

  • For the peer configuration, set the name, IP address, IPsec profile, and Exchange Mode to IKEv2.

 

003_ipsec_peer.png

 

  • To set the authentication method using a pre-shared key, add a new IPsec Identity.

004_ipsec_identity.png

 

  • Next, define which networks will communicate with each other through the VPN tunnel.

 

005_ipsec_policies_1-1.png

 

  • In the final step, select the IPsec Proposal named FortiGate to apply the correct encryption for phase 2 / ESP.

 

005_ipsec_policies_2.png

 

Monitoring the status of the IPsec Tunnel on FortiGate and Mikrotik:

 

FortiGate:

 

monitoring.png

 

Mikrotik:

 

monitoring-2.png

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article