I may have been mistaken. I just pulled this information from this document which Gregory Lebovitz from Netscreen co-authored back in 2003. On page 46 he talks about using GRE to create a virtual routing interfaces AKA tunnel interface. I have configure route-based VPNs between a Netscreen and FortiGate which interop just fine, which leads me to believe that they are using the same approach to tunnel interfaces.
I have yet to get this to work between an OpenBSD box and a FortiGate/Netscreen. I will look into the gif option to see if this will work. -Chris On 4/7/07, Stephen J. Bevan <[EMAIL PROTECTED]> wrote: > > Chris Jones writes: > > .... Fortigates and Netscreens both use GRE interaces as > > "tunnel interfaces" when creating route-based VPN tunnels. > > FortiGates do not use GRE interface when creating route-based VPN tunnels. > The route-based VPN on a FortiGate creates packets that are identical > to IPsec tunnel mode i.e. IP|ESP|IP. As far as I'm aware, Netscreen do > the same. Are you sure you don't have any Cisco's in your network? > They use GRE for IPsec unless you've got a farily recent version of > IOS that supports the virtual interface approach. > > > > Right now I have a hub-and-spoke VPN network using static routes to > route > > traffic across the VPN. Each spoke endpoint has a static destination > route > > of 10.1.0.0/16 which is sent over GRE interface. The only exception to > the > > hub-and-spoke VPN is my OpenBSD firewall which I have to create VPN > tunnels > > to every spoke network I need access to (quite painfull). On my OpenBSD > box > > I would like to be able to use a single static destination route of > > 10.1.0.0/16 to send this traffic over a GRE interface to get to the rest > of > > the VPN network. > > Since the FortiGate doesn't use GRE for IPsec (unless you configured > it for some reason) then there is no need to use GRE on OpenBSD. Just > define a normal tunnel based IPsec connection (as if the other end was > another OpenBSD box). If you really want an interface so that you can > route over it, then you'd have better luck with a gif interface. In > that case if you can get the tunnel to come up you could run > RIP/OSPF/iBGP on the OpenBSD gif interface and on the FortiGate IPsec > interface and not use static routing at all.