11.03.2015 Views

FortiGate IPSec VPN User Guide - FirewallShop.com

FortiGate IPSec VPN User Guide - FirewallShop.com

FortiGate IPSec VPN User Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Gateway-to-gateway configurations<br />

Configuration example<br />

To define the phase 2 parameters<br />

1 Go to <strong>VPN</strong> > IPSEC > Auto Key.<br />

2 Select Create Phase 2, enter the following information and select OK:<br />

Name<br />

Phase 1<br />

Enter a name for the phase 2 configuration (for<br />

example, FG2toFG1_phase2).<br />

Select the gateway that you defined previously (for<br />

example, FG2toFG1_Tunnel).<br />

To define the IP address of the network behind <strong>FortiGate</strong>_2<br />

1 Go to Firewall > Address.<br />

2 Select Create New, enter the following information, and select OK:<br />

Address Name<br />

Enter an address name (for example, HR_Network).<br />

Subnet/IP Range 192.168.22.0/24<br />

This is the IP address of the private network behind<br />

<strong>FortiGate</strong>_2.<br />

To define the IP address of the network behind <strong>FortiGate</strong>_1<br />

1 Go to Firewall > Address.<br />

2 Select Create New, enter the following information, and select OK:<br />

Address Name<br />

Subnet/IP Range<br />

Enter an address name (for example,<br />

Finance_Network).<br />

Enter the IP address of the private network behind<br />

<strong>FortiGate</strong>_1 (for example, 192.168.12.0/24).<br />

To define the firewall policy for a policy-based <strong>VPN</strong><br />

1 Go to Firewall > Policy.<br />

2 Select Create New, enter the following information, and select OK:<br />

Source Interface/Zone Port 2<br />

Source Address Name HR_Network<br />

Destination Interface/Zone Port 1<br />

Destination Address Name Finance_Network<br />

Schedule<br />

As required.<br />

Service<br />

As required.<br />

Action<br />

IPSEC<br />

<strong>VPN</strong> Tunnel<br />

FG2toFG1_Tunnel<br />

Allow Inbound<br />

Enable<br />

Allow Outbound<br />

Enable<br />

Inbound NAT<br />

Disable<br />

3 Place the policy in the policy list above any other policies having similar source<br />

and destination addresses.<br />

<strong>FortiGate</strong> <strong>IPSec</strong> <strong>VPN</strong> Version 3.0 <strong>User</strong> <strong>Guide</strong><br />

01-30005-0065-20070716 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!