03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Dynamic DNS over VPN concepts Dynamic DNS configuration<br />

The route is configured on the dynamic address VPN peer trying to access the static<br />

address FortiGate unit.<br />

To configure dynamic gateway routing - CLI<br />

config router static<br />

edit 5<br />

set dst 0.0.0.0 0.0.0.0<br />

set dynamic-gateway enable<br />

set device wan2<br />

next<br />

end<br />

For more information on DDNS, see the System Administration guide.<br />

Dynamic DNS over VPN<br />

IPsec VPN expects an IP address for each end of the VPN tunnel. All configuration and<br />

communication with that tunnel depends on the IP addresses as reference points.<br />

However, when the interface the tunnel is on has DDNS enabled there is no set IP<br />

address. The remote end of the VPN tunnel now needs another way to reference your end<br />

of the VPN tunnel. This is accomplished using Local ID.<br />

A FortiGate unit that has a domain name and a dynamic IP address can initiate VPN<br />

connections anytime—the remote peer can reply to the local FortiGate unit using the<br />

source IP address that was sent in the packet header because it is current. Without doing<br />

a DNS lookup first, the remote peer runs the risk of the dynamic IP changing before it<br />

attempts to connect. To avoid this, the remote peer must perform a DNS lookup for the<br />

domain name of to be sure of the dynamic IP address before initiating the connection.<br />

Remote Gateway<br />

When configuring the Phase 1 entry for a VPN tunnel, the Remote Gateway determines<br />

the addressing method the remote end of the tunnel uses as one of Static IP Address,<br />

Dialup User, or Dynamic DNS. There are different fields for each option.<br />

When you select the Dynamic DNS VPN type there is a related field called Dynamic DNS.<br />

The Dynamic DNS field is asking for the FQDN of the remote end of the tunnel. It uses<br />

this information to look up the IP address of the remote end of the tunnel through the<br />

DDNS server associated with that domain name.<br />

Local ID (peer ID)<br />

The Local ID or peer ID can be used to uniquely identify one end of a VPN tunnel. This<br />

enables a more secure connection. Also if you have multiple VPN tunnels negotiating, this<br />

ensures the proper remote and local ends connect. When you configure it on your end, it<br />

is your Local ID. When the remote end connects to you, they see it as your peer ID.<br />

If you are debugging a VPN connection, the Local ID is part of the VPN negotiations. You<br />

can use it to help troubleshoot connection problems.<br />

To configure your Local ID<br />

1 Go to VPN > IPsec > Auto Key (IKE).<br />

2 Select Create New Phase 1 or edit an existing Phase 1 entry.<br />

3 Select Advanced.<br />

4 In the P1 Proposal section, enter your Local ID.<br />

5 Select OK.<br />

IPsec VPNs for FortiOS 4.0 MR3<br />

102 01-434-112804-20120111<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!