
This platform has an ASA 5510 Security Plus license. SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03 Hardware: ASA5510, 256 MB RAM, CPU Pentium 4 Celeron 1600 MHzĮncryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0) System image file is "disk0:/asa804-k8.bin" Pl find the ASA configuration for your reference and do the needful.Details as below: last screenshot shows the status of the VPN.WE tried to establish the vpn between ASA and fortrinet firewall but not possible and as per fortrinet team confirmation that ASA not received any vpn infromation from Fortinat & fortinet side configuration is fine.Once configuration completed, please check the status of the tunnel by generating VPN interesting traffic or click the Bring up the tunnel on fortigate.Phase 1 and Phase 2 proposal must be matched.Site-to-site VPN tunnel on Fortigate Firewall. On Firewall - Add route for remote office pointing towards outside interface.On firewall - Access rule - configure the rule to permit local subnet and remote subnet.On Advanced Tab, it is recommend to have similiar SA lifetime, and remove any other settings, enter the pre-shared key ( sometime, it is missing from this list).On IPSEC Proposal,Include only below policies and remove other proposal from the ASA.On IKE policy, Include only below policies and remove other proposal from the ASA.please ensure Local and remote subnets are matching on both locations.After running the IPSEC-wizard, please validate the configuration of the IPSEC.Site-to-site VPN tunnel via the Adaptive Security Device Manager (ASDM) This section describes how to (after configuration) of Fortigate 3810 that runs the software Version 5.2.Cisco 5505 Series ASA that runs software Version 9.3.The information in this document is based on these software and hardware versions:
