12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VPN IPSEC<br />

Auto Key<br />

Enable IPSec<br />

Interface Mode<br />

Local Gateway IP<br />

Create a virtual interface for the local end of the VPN tunnel.<br />

This is not available in Transparent mode.<br />

If you selected Enable IPSec Interface Mode, you need to specify an<br />

IP address for the local end of the VPN tunnel. Select one of the<br />

following:<br />

• Main Interface IP - the <strong>FortiGate</strong> unit obtains the IP address of the<br />

interface from System > Network > Interface settings (see<br />

“Interface” on page 79)<br />

• Specify - specify an IP address. The IP address is assigned to the<br />

interface selected in the phase 1 Local Interface field (see “Local<br />

Interface” on page 346).<br />

You cannot configure Interface mode in a Transparent mode VDOM.<br />

P1 Proposal Select the encryption and authentication algorithms used to generate<br />

keys for protecting negotiations.<br />

Add or delete encryption and authentication algorithms as required.<br />

Select a minimum of one and a maximum of three <strong>com</strong>binations. The<br />

remote peer or client must be configured to use at least one of the<br />

proposals that you define.<br />

You can select any of the following symmetric-key algorithms:<br />

• DES-Digital Encryption Standard, a 64-bit block algorithm that<br />

uses a 56-bit key.<br />

• 3DES-Triple-DES, in which plain text is encrypted three times by<br />

three keys.<br />

• AES128-A 128-bit block algorithm that uses a 128-bit key.<br />

• AES192-A 128-bit block algorithm that uses a 192-bit key.<br />

• AES256-A 128-bit block algorithm that uses a 256-bit key.<br />

You can select either of the following message digests to check the<br />

authenticity of messages during phase 1 negotiations:<br />

• MD5-Message Digest 5, the hash algorithm developed by RSA<br />

Data Security.<br />

• SHA1-Secure Hash Algorithm 1, which produces a 160-bit<br />

message digest.<br />

To specify a third <strong>com</strong>bination, use the Add button beside the fields<br />

for the second <strong>com</strong>bination.<br />

DH Group Select one or more Diffie-Hellman groups from DH group 1, 2, and 5.<br />

When using aggressive mode, DH groups cannot be negotiated.<br />

• If both VPN peers (or a VPN server and its client) have static IP<br />

addresses and use aggressive mode, select a single DH group.<br />

The setting on the <strong>FortiGate</strong> unit must be identical to the setting<br />

on the remote peer or dialup client.<br />

• When the remote VPN peer or client has a dynamic IP address<br />

and uses aggressive mode, select up to three DH groups on the<br />

<strong>FortiGate</strong> unit and one DH group on the remote peer or dialup<br />

client. The setting on the remote peer or client must be identical to<br />

one of the selections on the <strong>FortiGate</strong> unit.<br />

• If the VPN peer or client employs main mode, you can select<br />

multiple DH groups. At least one of the settings on the remote<br />

peer or client must be identical to the selections on the <strong>FortiGate</strong><br />

unit.<br />

Keylife<br />

Type the length of time (in seconds) until the IKE encryption key<br />

expires. When the key expires, a new key is generated without<br />

interrupting service. The keylife can be from 120 to 172800 seconds.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!