In this example, you allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient.

Enter a Name for the tunnel and select the Site to Site – Cisco template. TCP/443. TCP/8001. Syslog, OFTP, Registration, Quarantine, Log & ReportAPI communications (FortiOS REST API, used for Wireless Analytics)Syslog, OFTP, Registration, Quarantine, Log & ReportManagement, Firmware, SMS, FTM, Licensing, Policy OverrideWhile a proxy is configured, FortiGate uses the following URLs to access the FortiGuard Distribution Network (FDN):Syslog, OFTP, Registration, Quarantine, Log & ReportAPI communications (FortiOS REST API, used for Wireless Analytics)Syslog, OFTP, Registration, Quarantine, Log & ReportManagement, Firmware, SMS, FTM, Licensing, Policy OverrideWhile a proxy is configured, FortiGate uses the following URLs to access the FortiGuard Distribution Network (FDN):

Configuring the FortiGate using the IPsec VPN Wizard On the FortiGate, go to VPN > IPsec > Wizard. Anything sourced from the FortiGate going over the VPN will use this IP address. Compliance and Security Fabric. In this scenario, you must assign an IP address to the virtual IPSEC VPN interface. TCP/703, UDP/703. The remote user Internet traffic is also routed through the FortiGate (split tunneling will not be enabled).

Remote IPsec VPN access: UDP/IKE 500, ESP (IP 50), NAT-T 4500: Remote SSL VPN access: …
The ability to handle this protocol must be built into the router’s NAT "engine" - which is true of most present-generation routers. This causes the peer to think it is behind a NAT device, and it will use UDP encapsulation for IPsec, even if no NAT is present.

See also the related article "Closing TCP 113" which describes making your FortiGate unit completely invisible to … Optionally, you can create a user that uses two factor authentication, and an user LDAP user. Set Remote Gateway to the IP address of the outside interface on the Cisco ASA. On some FortiGate units, such as the FortiGate 94D, you cannot ping over the IPsec tunnel without first setting a source-IP. When operating in the default configuration, FortiGate units do not accept TCP or UDP connections on any port except the default internal interface, which accepts HTTPS connections on TCP port 443. Additionally, you can force IPsec to use NAT traversal.
ETH Layer 0x8890, 0x8891, and 0x8893. If this option is set to Forced, the FortiGate uses a port value of zero when constructing the NAT discovery hash for the peer. Remote IPsec VPN access.

Remote SSL VPN access.

The remote user Internet traffic is also routed through the FortiGate (split tunneling will not be enabled).Optionally, you can create a user that uses two factor authentication, and an user LDAP user. The remote user Internet traffic is also routed through the FortiGate (split tunneling will not be enabled).Optionally, you can create a user that uses two factor authentication, and an user LDAP user.In this example, you allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient. HA Synchronization.

In this example, you allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient. HA Heartbeat.

TCP/8013 (by default; this port can be customized) FortiGate. SSO Mobility Agent, FSSO. UDP/IKE 500, ESP (IP 50), NAT-T 4500.