Vigyata.AI
Is this your channel?

#paloaltofirewalltraining | Day 42 | Configure VPN Ikev2 between Palo Alto and Fortigate

2.2K views· 19 likes· 28:57· Oct 5, 2025

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on Configure Ikev2 with Wireshek Detailed analysis. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video https://youtu.be/8ZnpOhpVvBo Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #paloaltotraining #paloaltovpn #vpn #ike #ipsec

About This Video

Hello friends, welcome back—this is Day 42 of my PCNSS series. In this video I configured a real side-to-side IPsec VPN (IKEv2) between Palo Alto and FortiGate, and I did it in a proper lab setup with two private subnets behind each firewall and an “internet/ISP cloud” in between. My main goal was simple: traffic from Site-1 (192.168.10.0/24) should reach Site-2 (192.168.20.0/24), and vice-versa, exactly like you will see in real-world customer networks. I started from Palo Alto: created the Phase 1 IKE Crypto (key exchange) and Phase 2 IPsec Crypto (data exchange), built the IKE Gateway with peer IP, pre-shared key, and IKEv2, then created the IPsec tunnel with Proxy-ID (interesting traffic) for 10-to-20 subnets. After that I added static routes (default route to ISP + route to remote subnet via tunnel) and security policies in both directions so initiation can happen from either site. Then on FortiGate I used the IPsec Wizard (Custom), selected IKEv2, matched proposals/DH group, set local/remote subnets, created firewall policies for tunnel-to-LAN and LAN-to-tunnel, and added routes. Finally, I verified with continuous ping, checked Phase1/Phase2 status and encaps/decaps, and captured packets on the Palo Alto outside interface to analyze the IKEv2 messages and see ESP traffic once the tunnel comes up.

Frequently Asked Questions

🎬 More from Bikash's Tech