03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Redundant VPN configurations Creating a backup IPsec interface<br />

Source Interface/Zone Internal<br />

Source Address Name All<br />

Destination Interface/Zone Site_2_B<br />

Destination Address Name All<br />

Schedule Always<br />

Service Any<br />

Action ACCEPT<br />

Creating a backup IPsec interface<br />

You can configure a route-based VPN that acts as a backup facility to another VPN. It is<br />

used only while your main VPN is out of service. This is desirable when the redundant<br />

VPN uses a more expensive facility.<br />

You can configure a backup IPsec interface only in the CLI. The backup feature works<br />

only on interfaces with static addresses that have dead peer detection enabled. The<br />

monitor-phase1 option creates a backup VPN for the specified phase 1 configuration.<br />

In the following example, backup_vpn is a backup for main_vpn.<br />

config vpn <strong>ipsec</strong> phase1-interface<br />

edit main_vpn<br />

set dpd on<br />

set interface port1<br />

set nattraversal enable<br />

set psksecret "hard-to-guess"<br />

set remote-gw 192.168.10.8<br />

set type static<br />

end<br />

edit backup_vpn<br />

set dpd on<br />

set interface port2<br />

set monitor-phase1 main_vpn<br />

set nattraversal enable<br />

set psksecret "hard-to-guess"<br />

set remote-gw 192.168.10.8<br />

set type static<br />

end<br />

FortiOS Handbook v3: IPsec VPNs<br />

01-434-112804-20120111 173<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!