12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Auto Key<br />

VPN IPSEC<br />

P2 Proposal<br />

Encryption<br />

Authentication<br />

Enable replay<br />

detection<br />

Enable perfect<br />

forward secrecy<br />

(PFS)<br />

DH Group<br />

Keylife<br />

Autokey Keep Alive<br />

DHCP-IPSec<br />

Select the encryption and authentication algorithms that will be<br />

proposed to the remote VPN peer. You can specify up to three<br />

proposals. To establish a VPN connection, the remote peer must<br />

be configured to use at least one of the proposals that you specify.<br />

Initially there are two proposals. To specify only one proposal, use<br />

the minus button to remove the second proposal. To specify a third<br />

proposal, use the plus button beside the second proposal.<br />

It is invalid to set both Encryption and Authentication to NULL.<br />

You can select any of the following symmetric-key algorithms:<br />

• NULL-Do not use an encryption algorithm.<br />

• DES-Digital Encryption Standard, a 64-bit block algorithm that<br />

uses a 56-bit key.<br />

• 3DES-Triple-DES, in which plain text is encrypted three times<br />

by three keys.<br />

• AES128-A 128-bit block algorithm that uses a 128-bit key.<br />

• AES192-A 128-bit block algorithm that uses a 192-bit key.<br />

• AES256-A 128-bit block algorithm that uses a 256-bit key.<br />

You can select either of the following message digests to check the<br />

authenticity of messages during an encrypted session:<br />

• NULL-Do not use a message digest.<br />

• MD5-Message Digest 5, the hash algorithm developed by RSA<br />

Data Security.<br />

• SHA1-Secure Hash Algorithm 1, which produces a 160-bit<br />

message digest.<br />

Optionally enable or disable replay detection. Replay attacks occur<br />

when an unauthorized party intercepts a series of IPSec packets<br />

and replays them back into the tunnel.<br />

Enable or disable PFS. Perfect forward secrecy (PFS) improves<br />

security by forcing a new Diffie-Hellman exchange whenever<br />

keylife expires.<br />

Select one Diffie-Hellman group (1, 2, or 5). The remote peer or<br />

dialup client must be configured to use the same group.<br />

Select the method for determining when the phase 2 key expires:<br />

Seconds, KBytes, or Both. If you select both, the key expires when<br />

either the time has passed or the number of KB have been<br />

processed. The range is from 120 to 172800 seconds, or from<br />

5120 to 2147483648 KB.<br />

Enable the option if you want the tunnel to remain active when no<br />

data is being processed.<br />

Select Enable if the <strong>FortiGate</strong> unit acts as a dialup server and<br />

<strong>FortiGate</strong> DHCP relay will be used to assign VIP addresses to<br />

FortiClient dialup clients. The DHCP relay parameters must be<br />

configured separately. For more information, see “System DHCP”<br />

on page 129.<br />

If the <strong>FortiGate</strong> unit acts as a dialup server and you manually<br />

assigned FortiClient dialup clients VIP addresses that match the<br />

network behind the dialup server, select Enable to cause the<br />

<strong>FortiGate</strong> unit to act as a proxy for the dialup clients.<br />

This is available only for tunnel mode phase 2 configurations<br />

associated with a dialup phase 1 configuration.<br />

Note: You can enable VPN users to browse the Internet through the <strong>FortiGate</strong> unit. See<br />

“Internet browsing configuration” on page 353.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

352 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!