12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Overview of IPSec interface mode<br />

VPN IPSEC<br />

You can create the equivalent of a tunnel-mode concentrator in any of the<br />

following ways:<br />

• Define a firewall policy between each pair of IPSec interfaces that you want to<br />

concentrate. For dialup, the same interface can be both source and<br />

destination. This can be<strong>com</strong>e tedious if you have many site-to-site<br />

connections.<br />

• Put all the IPSec interfaces into a zone and then define a single zone-to-zone<br />

policy.<br />

• Put all the IPSec interfaces in a zone and enable intra-zone traffic. There must<br />

be more than one IPSec interface.<br />

For more information and an example, see the <strong>FortiGate</strong> IPSec VPN User <strong>Guide</strong>.<br />

When IP traffic that originates from behind a local <strong>FortiGate</strong> unit reaches an<br />

outbound <strong>FortiGate</strong> interface that acts as the local end of an IPSec tunnel (that is,<br />

IPSec interface mode is enabled on the interface), the tunnel encapsulates the<br />

traffic and forwards it through the physical interface to which the IPSec virtual<br />

interface is bound. When encapsulated traffic from a remote VPN peer or client<br />

reaches a local <strong>FortiGate</strong> physical interface, the <strong>FortiGate</strong> unit determines if an<br />

IPSec virtual interface is associated with the physical interface through selectors<br />

in the traffic. If the traffic matches predefined selectors, it is decapsulated and<br />

forwarded to the IPSec virtual interface.<br />

In the outbound direction, the <strong>FortiGate</strong> unit performs a route lookup to find the<br />

interface through which it must forward traffic to reach the next hop router. If the<br />

<strong>FortiGate</strong> unit finds a route through a virtual interface that is bound to a specific<br />

VPN tunnel, the traffic is encrypted and sent through the VPN tunnel. In the<br />

inbound direction, the <strong>FortiGate</strong> unit identifies a VPN tunnel using the destination<br />

IP address and the Security Parameter Index (SPI) in the ESP datagram to match<br />

a phase 2 Security Association (SA). If a matching SA is found, the datagram is<br />

decrypted and the associated IP traffic is redirected through the IPSec virtual<br />

interface.<br />

The firewall policy associated with a specific path is responsible for controlling all<br />

IP traffic passing between the source and destination addresses. If required, you<br />

can configure more than one firewall policy to regulate the flow of traffic going into<br />

and/or emerging from a route-based VPN tunnel. Two firewall policies are needed<br />

to support bidirectional traffic through a route-based IPSec tunnel: one to control<br />

traffic in the outbound direction, and the other to control traffic in the inbound<br />

direction.<br />

Route-based VPNs help to simplify the implementation of VPN tunnel redundancy.<br />

You can configure a route for the same IP traffic using different route metrics. You<br />

can also configure the exchange of dynamic (RIP, OSPF, or BGP) routing<br />

information through VPN tunnels. If the primary VPN connection fails or the<br />

priority of a route changes through dynamic routing, an alternative route will be<br />

selected to forward traffic using the redundant connection.<br />

A simple way to provide failover redundancy is to create a backup IPSec interface.<br />

You can do this in the CLI. Refer to the <strong>FortiGate</strong> CLI Reference. See the<br />

monitor-phase1 keyword of the ipsec vpn phase1-interface <strong>com</strong>mand.<br />

An example configuration is provided.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

344 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!