12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VPN IPSEC<br />

Auto Key<br />

Auto Key<br />

Two VPN peers (or a <strong>FortiGate</strong> dialup server and a VPN client) can be configured<br />

to generate unique Internet Key Exchange (IKE) keys automatically during the<br />

IPSec phase 1 and phase 2 exchanges.<br />

To configure the <strong>FortiGate</strong> unit to generate unique keys automatically in phase 1<br />

and phase 2, go to VPN > IPSEC > Auto Key (IKE).<br />

When you define phase 2 parameters, you can choose any set of phase 1<br />

parameters to set up a secure connection for the tunnel and authenticate the<br />

remote peer.<br />

Auto Key configuration applies to both tunnel-mode and interface-mode VPNs.<br />

Figure 222:Auto Key list<br />

Edit<br />

Delete<br />

Create Phase 1 Create a new phase 1 tunnel configuration. See “Creating a new<br />

phase 1 configuration” on page 345.<br />

Create Phase 2 Create a new phase 2 configuration. See “Creating a new phase 2<br />

configuration” on page 350.<br />

Phase 1<br />

The names of existing phase 1 tunnel configurations.<br />

Phase 2<br />

The names of existing phase 2 configurations.<br />

Interface Binding The names of the local interfaces to which IPSec tunnels are<br />

bound. These can be physical, aggregate, VLAN, inter-VDOM link<br />

or wireless interfaces.<br />

Delete and Edit icons Delete or edit a phase 1 configuration.<br />

Creating a new phase 1 configuration<br />

In phase 1, two VPN peers (or a <strong>FortiGate</strong> dialup server and a VPN client)<br />

authenticate each other and exchange keys to establish a secure <strong>com</strong>munication<br />

channel between them. The basic phase 1 settings associate IPSec phase 1<br />

parameters with a remote gateway and determine:<br />

• whether the various phase 1 parameters will be exchanged in multiple rounds<br />

with encrypted authentication information (main mode) or in a single message<br />

with authentication information that is not encrypted (aggressive mode)<br />

• whether a pre-shared key or digital certificates will be used to authenticate the<br />

identities of the two VPN peers (or a VPN server and its client)<br />

• whether a special identifier, certificate distinguished name, or group name will<br />

be used to identify the remote VPN peer or client when a connection attempt is<br />

made<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 345

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!