03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hardware offloading and acceleration IPsec offloading configuration examples<br />

IPsec offloading configuration examples<br />

The following examples configure two FortiASIC NP2 accelerated VPNs, one<br />

route-based, the other policy based. In both cases, the network topology is as shown in<br />

Figure 36.<br />

Figure 36: Hardware accelerated IPsec VPN topology<br />

Protected network<br />

ASM-FB4 4<br />

Port 1<br />

1.1.1.0/2444<br />

ASM-FB4<br />

Port 2 (IPsec)<br />

3.3.3.1/24<br />

FortiGate_1<br />

Fo Fo Fo Fo Fo Fo Fo Fort rt rt rt rt rtiiiG tiG<br />

iGaa 1111<br />

ASM-FB4<br />

Port 2 (IPsec)<br />

3.3.3.2/24<br />

FortiGate_2<br />

Fo Fooort rt rt rtt rtiG iG iG iG iG iG tee_22222<br />

AASM-FB4<br />

Port 1<br />

22 2.2.2.0/24<br />

Protected network<br />

Accelerated route-based VPN configuration<br />

This example uses the accelerated ports on FortiGate-ASM-FB4 modules in each<br />

FortiGate unit. These accelerated ports on the modules are paired interfaces that have<br />

their own network processor (NPU) to offload work from the FortiGate unit CPU. Beyond<br />

this fact, the example is normal VPN example.<br />

Configuring the FortiGate units require the same basic steps:<br />

Configure VPN Phase 1<br />

Configure VPN Phase 2<br />

Create security policies to allow traffic to flow<br />

Create a static route to allow traffic to flow<br />

When both FortiGates are have the VPN tunnel configured, test to ensure it is working<br />

properly.<br />

To configure FortiGate_1<br />

1 Go to VPN > IPsec > Auto Key (IKE) and select Create Phase 1.<br />

2 Configure Phase 1 settings (name FGT_1_IPsec), plus<br />

Select Advanced.<br />

Select Enable IPsec Interface Mode.<br />

In Local Gateway IP, select Specify and enter the VPN IP address 3.3.3.1, which is<br />

the IP address of FortiGate_1’s FortiGate-ASM-FB4 module on port 2.<br />

3 Select OK.<br />

4 Select Create Phase 2 and configure Phase 2 settings, including<br />

Select Enable replay detection.<br />

set enc-offload-antireplay to enable using the config system npu CLI<br />

command.<br />

FortiOS Handbook v3: IPsec VPNs<br />

01-434-112804-20120111 231<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!