12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Auto Key<br />

VPN IPSEC<br />

Local ID<br />

XAuth<br />

Nat-traversal<br />

Keepalive<br />

Frequency<br />

Dead Peer<br />

Detection<br />

If the <strong>FortiGate</strong> unit will act as a VPN client and you are using peer<br />

IDs for authentication purposes, enter the identifier that the <strong>FortiGate</strong><br />

unit will supply to the VPN server during the phase 1 exchange.<br />

If the <strong>FortiGate</strong> unit will act as a VPN client and you are using security<br />

certificates for authentication, select the distinguished name (DN) of<br />

the local server certificate that the <strong>FortiGate</strong> unit will use for<br />

authentication purposes.<br />

If the <strong>FortiGate</strong> unit is a dialup client and will not be sharing a tunnel<br />

with other dialup clients (that is, the tunnel will be dedicated to this<br />

<strong>FortiGate</strong> dialup client), set Mode to Aggressive.<br />

This option is provided to support the authentication of dialup clients.<br />

If the <strong>FortiGate</strong> unit is a dialup client and you select Enable as Client,<br />

type the user name and password that the <strong>FortiGate</strong> unit will need to<br />

authenticate itself to the remote XAuth server.<br />

If Remote Gateway is set to Dialup User and dialup clients will<br />

authenticate as members of a dialup group, the <strong>FortiGate</strong> unit can act<br />

as an XAuth server. To select Enable as Server, you must first create<br />

user groups to identify the dialup clients that need access to the<br />

network behind the <strong>FortiGate</strong> unit. See “Configuring a user group” on<br />

page 389.<br />

You must also configure the <strong>FortiGate</strong> unit to forward authentication<br />

requests to an external RADIUS or LDAP authentication server. For<br />

information about these topics, see “Configuring a RADIUS server”<br />

on page 381 or “Configuring an LDAP server” on page 383.<br />

Select a Server Type setting to determine the type of encryption<br />

method to use between the <strong>FortiGate</strong> unit, the XAuth client and the<br />

external authentication server, and then select the user group from<br />

the User Group list.<br />

Enable this option if a NAT device exists between the local <strong>FortiGate</strong><br />

unit and the VPN peer or client. The local <strong>FortiGate</strong> unit and the VPN<br />

peer or client must have the same NAT traversal setting (both<br />

selected or both cleared) to connect reliably.<br />

If you enabled NAT-traversal, enter a keepalive frequency setting.<br />

The value represents an interval from 0 to 900 seconds.<br />

Enable this option to reestablish VPN tunnels on idle connections and<br />

clean up dead IKE peers if required. You can use this option to be<br />

notified whenever a tunnel goes up or down, or enable the option to<br />

keep the tunnel connection open when no traffic is being generated<br />

inside the tunnel (for example, in scenarios where a dialup client or<br />

dynamic DNS peer connects from an IP address that changes<br />

periodically—traffic may be suspended while the IP address<br />

changes).<br />

When the Dead Peer Detection option is selected, you can use the<br />

config vpn ipsec phase1 (tunnel mode) or config vpn<br />

ipsec phase1-interface (interface mode) CLI <strong>com</strong>mand to<br />

optionally specify a retry count and a retry interval. For more<br />

information, see the <strong>FortiGate</strong> CLI Reference.<br />

Creating a new phase 2 configuration<br />

After IPSec phase 1 negotiations <strong>com</strong>plete successfully, phase 2 begins. The<br />

phase 2 parameters define the algorithms that the <strong>FortiGate</strong> unit may use to<br />

encrypt and transfer data for the remainder of the session. During phase 2, the<br />

specific IPSec security associations needed to implement security services are<br />

selected and a tunnel is established.<br />

The basic phase 2 settings associate IPSec phase 2 parameters with the phase 1<br />

configuration that specifies the remote end point of the VPN tunnel. In most cases,<br />

you need to configure only basic phase 2 settings.<br />

To configure phase 2 settings, go to VPN > IPSEC > Auto Key (IKE) and select<br />

Create Phase 2. For information about how to choose the correct phase 2 settings<br />

for your particular situation, see the <strong>FortiGate</strong> IPSec VPN User <strong>Guide</strong>.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

350 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!