12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VPN IPSEC<br />

Overview of IPSec interface mode<br />

VPN IPSEC<br />

This section provides information about policy-based (tunnel-mode) and routebased<br />

(interface mode) Internet Protocol Security (IPSec) VPN options available<br />

through the web-based manager. <strong>FortiGate</strong> units implement the Encapsulated<br />

Security Payload (ESP) protocol. The encrypted packets look like ordinary<br />

packets that can be routed through any IP network. Internet Key Exchange (IKE)<br />

is performed automatically based on pre-shared keys or X.509 digital certificates.<br />

As an option, you can specify manual keys. Interface mode is supported in<br />

NAT/Route mode only. It creates a virtual interface for the local end of a VPN<br />

tunnel.<br />

Note: For information about how to configure an IPSec VPN, see the <strong>FortiGate</strong> IPSec VPN<br />

User <strong>Guide</strong>.<br />

This section describes:<br />

• Overview of IPSec interface mode<br />

• Auto Key<br />

• Manual Key<br />

• Concentrator<br />

• Monitor<br />

Overview of IPSec interface mode<br />

When you define a route-based (interface mode) IPSec tunnel, a virtual IPSec<br />

interface is created automatically. This is a subinterface of the <strong>FortiGate</strong> local<br />

interface you selected in the IPSec phase 1 parameters. The local interface can<br />

be a physical, aggregate, VLAN, inter-VDOM link or wireless interface.<br />

An IPSec virtual interface is considered to be up when it can establish a phase 1<br />

connection with a VPN peer or client. However, the virtual IPSec interface cannot<br />

be used to send traffic through a tunnel until it is bound to a phase 2 definition.<br />

Virtual IPSec interface bindings are shown on the System > Network > Interface<br />

page. The names of all tunnels bound to physical interfaces are displayed under<br />

their associated physical interface names in the Name column. For more<br />

information about the Interface page, see “Interface” on page 79.<br />

Note: You can bind a virtual IPSec interface to a zone.<br />

After an IPSec virtual interface has been bound to a tunnel, traffic can be routed to<br />

the interface using specific metrics for both static routes and policy routes. In<br />

addition, you can create a firewall policy having the virtual IPSec interface as the<br />

source or destination interface.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 343

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!