12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

VPN IPSEC<br />

Auto Key<br />

Mode<br />

Authentication<br />

Method<br />

Pre-shared Key<br />

Certificate Name<br />

Peer Options<br />

Accept any<br />

peer ID<br />

Accept this<br />

peer ID<br />

Select Main or Aggressive:<br />

• In Main mode, the phase 1 parameters are exchanged in multiple<br />

rounds with encrypted authentication information.<br />

• In Aggressive mode, the phase 1 parameters are exchanged in<br />

single message with authentication information that is not<br />

encrypted.<br />

When the remote VPN peer has a dynamic IP address and is<br />

authenticated by a pre-shared key, you must select aggressive mode<br />

if there is more than one dialup phase1 configuration for the<br />

interface IP address.<br />

When the remote VPN peer has a dynamic IP address and is<br />

authenticated by a certificate, you must select aggressive mode if<br />

there is more than one phase 1 configuration for the interface IP<br />

address and these phase 1 configurations use different proposals.<br />

Peer Options settings may require a particular mode. See Peer<br />

Options, below.<br />

Select Preshared Key or RSA Signature.<br />

If Pre-shared Key is selected, type the pre-shared key that the<br />

<strong>FortiGate</strong> unit will use to authenticate itself to the remote peer or<br />

dialup client during phase 1 negotiations. You must define the same<br />

value at the remote peer or client. The key must contain at least 6<br />

printable characters and should only be known by network<br />

administrators. For optimum protection against currently known<br />

attacks, the key should consist of a minimum of 16 randomly chosen<br />

alphanumeric characters.<br />

If RSA Signature is selected, select the name of the server certificate<br />

that the <strong>FortiGate</strong> unit will use to authenticate itself to the remote<br />

peer or dialup client during phase 1 negotiations. To obtain and load<br />

the required server certificate, see the <strong>FortiGate</strong> Certificate<br />

Management User <strong>Guide</strong>.<br />

One or more of the following options are available to authenticate<br />

VPN peers or clients, depending on the Remote Gateway and<br />

Authentication Method settings.<br />

Accept the local ID of any remote VPN peer or client. The <strong>FortiGate</strong><br />

unit does not check identifiers (local IDs). Mode can be set to<br />

Aggressive or Main.<br />

You can use this option with RSA Signature authentication. But, for<br />

highest security, you should configure a PKI user/group for the peer<br />

and set Peer Options to Accept this peer certificate only.<br />

Authenticate remote peers based on a particular identifier. Enter the<br />

identifier in the field. The remote peer must be configured with the<br />

same identifier. This option is available only if the remote peer has a<br />

dynamic IP address.<br />

If the remote peer is a <strong>FortiGate</strong> unit, the identifier must be specified<br />

in the Local ID field of the phase 1 configuration. For FortiClient<br />

dialup clients, select Config in the Policy section of the Advanced<br />

Settings for the connection and specify the identifier in the Local ID<br />

field.<br />

Accept peer ID<br />

in dialup group<br />

Authenticate multiple <strong>FortiGate</strong> or FortiClient dialup clients that use<br />

unique identifiers and unique pre-shared keys (or unique pre-shared<br />

keys only) through the same VPN tunnel.<br />

You must create a dialup user group for authentication purposes.<br />

See “User groups” on page 386. Select the group from the list<br />

adjacent to the Accept peer ID in dialup group option.<br />

To configure <strong>FortiGate</strong> dialup clients, refer to the <strong>FortiGate</strong> IPSec<br />

VPN User <strong>Guide</strong>. To configure FortiClient dialup clients, refer to the<br />

Authenticating FortiClient Dialup Clients Technical Note.<br />

Mode must be set to Aggressive when the dialup clients use unique<br />

identifiers and unique pre-shared keys. If the dialup clients use<br />

unique pre-shared keys only, you can set Mode to Main if there is<br />

only one dialup phase 1 configuration for this interface IP address.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 347

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!