How do I set up site-to-site VPN between a QuWAN and Fortinet® device?


Last modified date: 2025-06-30

Applicable Products

  • QuWAN Orchestrator
  • QuRouter 2.4.0 or later versions
  • Fortinet ® FortiGate® device

Details

This tutorial guides you through establishing a site-to-site VPN connection between a QNAP router that has been added to a QuWAN network and a Fortinet ® FortiGate® device. By configuring VPN settings on both devices, you can create a secure and reliable connection between two networks, enabling data transfer and remote access. This guide provides step-by-step instructions for configuring, verifying, and managing the VPN connection to ensure proper network integration and security.

Important
  • QuWAN site-to-site VPN only supports IKEv2.
  • The QuWAN-connected router and Fortinet ® FortiGate® device must be configured with identical settings to ensure proper VPN operation.
  • Your QNAP device must be added to QuWAN Orchestrator before configuring the site-to-site VPN. Refer to the QuWAN and QuWAN Orchestrator Help for adding your device: Configuration | QuWAN and QuWAN Orchestrator Help (qnap.com)
Warning

Implementing a site-to-site VPN introduces additional complexity to your network. Ensure you understand the security implications before enabling it.

Procedure

Configure the FortiGate® IPSec VPN settings


Configure the following settings on your FortiGate® device to establish an IPsec site-to-site VPN tunnel with your QuWAN-connected router. Define the authentication method, encryption algorithms, and key exchange settings to ensure a secure connection. Enable options like NAT traversal and dead peer detection to maintain tunnel stability and compatibility with QuWAN’s VPN framework. The following settings below are based on the FortiProxy 1.1.0 Online Help for a FortiGate® 300C device.

  1. Log in to the FortiGate® user interface.
  2. Go to VPN > IPSec > Tunnels.
  3. Click Create New.
  4. Configure the IPSec VPN settings.

    General Settings

    SettingUser Action
    NameEnter a unique name for the VPN tunnel.
    Comments (Optional)Add a description for the tunnel.
    Enable IPsec Interface ModeSelect to enable IPsec for the VPN tunnel.

    Network Settings

    SettingUser Action
    IP VersionSelect IPv4 as the protocol version.
    Remote GatewayChoose Static IP Address if the remote peer has a fixed IP.
    IP AddressEnter the remote peer's IP address.
    InterfaceSelect the network interface for the VPN tunnel.
    Mode Config (Optional)Enable to assign IP addresses to VPN clients.
    NAT TraversalEnable NAT Traversal if a NAT device is between the peers.
    Keepalive FrequencySet how often keepalive packets are sent.
    Dead Peer DetectionEnable dead peer detection to detect and remove unresponsive VPN peers.

    Authentication Settings

    SettingUser Action
    MethodSelect Pre-shared Key for authentication.
    Pre-shared KeyCopy the pre-shared key from the route-based VPN connection configuration window in QuWAN Orchestrator and paste it in the pre-shared key field.
    IKE VersionSelect 2 for the IKE version.
    ModeSelect Main (ID Protection) for secure identity handling.

    Phase 1 Proposal Settings

    Note
    Ensure that both devices have matching encryption and authentication settings.
    SettingUser Action
    EncryptionSelect encryption algorithm AES256.
    AuthenticationSelect SHA256 for authentication.
    Diffie-Hellman GroupsSelect key exchange groups such as 2, 5, 14, 15, 16, 19, 20, or 21.
    Key Lifetime (seconds)Set how long the encryption key remains valid (default: 86400 seconds).
    Local IDEnter a local ID if required.
    If you are using a Dynamic DNS (DDNS) service for a route-based IPsec VPN connection, you must set the local ID in FQDN format.

    XAUTH Settings

    SettingUser Action
    TypeSelect Disabled unless extended authentication is needed.

    Phase 2 Selectors

    SettingUser Action
    Local AddressDefine the local network (default: 0.0.0.0/0).
    Remote AddressDefine the remote network (default: 0.0.0.0/0).

    Phase 2 Settings

    SettingUser Action
    NameKeep the same name as Phase 1 or modify it if needed.
    Comments (Optional)Add a description.
    Local AddressSelect Subnet and configure the local network range.
    Remote AddressSelect Subnet and configure the remote network range.
  5. Click OK.

The FortiGate® device creates the IPSec VPN tunnel.

Create a route-based VPN connection in QuWAN Orchestrator

To connect a QuWAN-connected router to a FortiGate® device, you must configure a route-based VPN. This method establishes an encrypted tunnel that directs traffic between the two networks based on routing policies. Unlike policy-based VPNs, route-based VPNs support dynamic routing and multiple subnets, ensuring precise traffic control and efficient data exchange between the connected sites.

Before configuring a route-based VPN connection in QuWAN Orchestrator, ensure proper configuration on the peer device. This refers to the device at the other end of the VPN tunnel, such as another router or firewall.

Note
Ensure the settings (e.g., pre-shared key, encryption) configured on the peer device exactly match those you plan to use in QuWAN Orchestrator. Refer to the peer device's documentation for specific configuration steps.
  1. Log in to QuWAN Orchestrator.
  2. Go to QuWAN Topology > Route-Based VPN.
  3. Click Create New Connection.
    The Create New Connection window appears.
  4. Specify a connection name between 1 and 64 characters.
  5. Select Tunnel Mode as the IPSec mode.
  6. Select a hub to route traffic and central management.
  7. Select the WAN interface port.
  8. Specify the public IP address or hostname of the remote gateway device.
  9. Click Test Connection to test the remote gateway connection.
  10. Specify a pre-shared key.
    Note
    Ensure the pre-shared key on the remote device is identical to the one configured in QuWAN Orchestrator.
  11. Optional: Click Advanced Settings to reveal additional configuration options for route-based VPN connections.
  12. Configure the Internet Key Exchange (IKE) settings:
    1. Select the IKE version.
    2. Select the authentication algorithm.
    3. Select a suitable encryption method.
    4. Select a Diffie-Hellman (DH) group.
      Note
      DH groups define the cryptographic strength to securely establish a private key during initial communication.
    5. Define the IKE Security Association (SA) duration to reduce cryptographic risks associated with key exposure.
    6. Optional: Specify the local ID (domain name) for remote site authentication.
    7. Provide the local ID only if DDNS is configured for the route-based VPN connection.
  13. Configure the Encapsulating Security Payload (ESP) settings:
    1. Select the authentication algorithm.
    2. Select a suitable encryption method.
    3. Select Enable Perfect Forward Secrecy (PFS) to generate a new DH key.
    4. Select a DH group.
    5. Define the ESP SA duration.
    6. Optional: Select Enable Dead Peer Detection (DPD) to identify and respond to peer device outages.
    7. Specify the DPD timeout value in seconds.
  14. Optional: Select Enable NAT mode to ensure that the VPN connection functions properly even when NAT devices are present in the network.
    1. Specify the local tunnel IP address to facilitate NAT traversal.
  15. Optional: Configure the site subnet settings:
    1. Under Site Subnets, click Add Subnet.
    2. Specify a site subnet.
    3. Specify a description.
    4. Click .
  16. Click Create.
    QuWAN Orchestrator creates the route-based VPN connection.
  17. Identify the FortiGate® route-based VPN connection in the QuWAN Topology/Route-based VPN page.
  18. Click  to enable the route-based VPN connection.

QuWAN Orchestrator establishes the site-to-site VPN connection between the QNAP router and the Fortinet® FortiGate® device.

Further Reading

 


Was this article helpful?

Thank you for your feedback.

Please tell us how this article can be improved:

If you want to provide additional feedback, please include it below.

Teknik Özellik sSçin

      Daha fazla göster Daha az

      Diğer ülkelerde/bölgelerde bu site:

      open menu
      back to top