03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IPsec offloading configuration examples Hardware offloading and acceleration<br />

5 Go to Policy > Policy > Policy.<br />

6 Configure two policies (one for each direction) to apply the Phase 1 IPsec<br />

configuration you configured in step 2 to traffic leaving from or arriving on FortiGate-<br />

ASM-FB4 module port 1.<br />

7 Go to Router > Static > Static Route.<br />

8 Configure a static route to route traffic destined for FortiGate_2’s protected network to<br />

the virtual IPsec interface, FGT_1_IPsec.<br />

To add the static route from the CLI:<br />

config router static<br />

edit 2<br />

set device "FGT_1_IPsec"<br />

set dst 2.2.2.0 255.255.255.0<br />

end<br />

To configure FortiGate_2<br />

1 Go to VPN > IPsec > Auto Key (IKE) and select Create Phase 1.<br />

2 Configure Phase 1 settings (name FGT_2_IPsec), plus<br />

Select Advanced.<br />

Select Enable IPsec Interface Mode.<br />

In Local Gateway IP, select Specify and enter the VPN IP address 3.3.3.2, which is<br />

the IP address of FortiGate_2’s FortiGate-ASM-FB4 module on port 2.<br />

3 Select OK.<br />

4 Select Create Phase 2 and configure Phase 2 settings, including<br />

Select Enable replay detection.<br />

set enc-offload-antireplay to enable using the config system npu CLI<br />

command.<br />

5 Go to Policy > Policy > Policy.<br />

6 Configure two policies (one for each direction) to apply the Phase 1 IPsec<br />

configuration you configured in step 2 to traffic leaving from or arriving on FortiGate-<br />

ASM-FB4 module port 1.<br />

7 Go to Router > Static > Static Route.<br />

8 Configure a static route to route traffic destined for FortiGate_1’s protected network to<br />

the virtual IPsec interface, FGT_2_IPsec.<br />

To add the static route from the CLI:<br />

config router static<br />

edit 2<br />

set device "FGT_2_IPsec"<br />

set dst 1.1.1.0 255.255.255.0<br />

end<br />

To test the VPN<br />

1 Activate the IPsec tunnel by sending traffic between the two protected networks.<br />

2 To verify tunnel activation, go to VPN > Monitor > IPsec Monitor.<br />

IPsec VPNs for FortiOS 4.0 MR3<br />

232 01-434-112804-20120111<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!