03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FortiOS Handbook<br />

Transparent mode VPNs<br />

This section describes transparent VPN configurations, in which two FortiGate units<br />

create a VPN tunnel between two separate private networks transparently.<br />

The following topics are included in this section:<br />

Configuration overview<br />

Configuration overview<br />

Configure the VPN peers<br />

In transparent mode, all interfaces of the FortiGate unit except the management interface<br />

(which by default is assigned IP address 10.10.10.1/255.255.255.0) are invisible at the<br />

network layer. Typically, when a FortiGate unit runs in transparent mode, different network<br />

segments are connected to the FortiGate interfaces. Figure 25 shows the management<br />

station on the same subnet. The management station can connect to the FortiGate unit<br />

directly through the web-based manager.<br />

Figure 25: Management station on internal network<br />

Management<br />

station<br />

FortiGate_1 FortiG<br />

Edge router<br />

Site_1<br />

10.10.10.0/24<br />

10.10.10.1<br />

An edge router typically provides a public connection to the Internet and one interface of<br />

the FortiGate unit is connected to the router. If the FortiGate unit is managed from an<br />

external address (see Figure 26 on page 176), the router must translate (NAT) a routable<br />

address to direct management traffic to the FortiGate management interface.<br />

FortiOS Handbook v3: IPsec VPNs<br />

01-434-112804-20120111 175<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!