Fortinet fortigate-200a Betriebsanweisung
282
01-28006-0092-20041105
Fortinet Inc.
Manual key IPSec VPN
VPN
Manual key IPSec VPN
To use Manual key IPSec VPNs, both ends of the VPN tunnel must be configured with
matching encryption and authentication algorithms and with matching authentication
and encryption keys and complementary security parameter index (SPI) settings.
matching encryption and authentication algorithms and with matching authentication
and encryption keys and complementary security parameter index (SPI) settings.
To configure manual key VPN
1
Add the a manual key configuration to both VPN peers.
See
See
2
Both configurations must be identical except for the local and remote SPIs.
See
See
3
Add the firewall configuration required for the VPN.
See
See
Adding firewall policies for IPSec VPN tunnels
Firewall policies for IPSec VPN control all VPN traffic passing through the FortiGate
unit. You add firewall policies for IPSec VPN in the same way as you add normal
firewall policies. See
unit. You add firewall policies for IPSec VPN in the same way as you add normal
firewall policies. See
for information about firewall policies.
You can also use firewall policies for IPSec VPN to apply protection profiles to VPN
traffic, to log IPSec VPN traffic, and to apply advanced features to IPSec VPN traffic
such as traffic shaping and differentiated services.
traffic, to log IPSec VPN traffic, and to apply advanced features to IPSec VPN traffic
such as traffic shaping and differentiated services.
Adding a firewall policy for an IPSec VPN involves creating an internal-> external
policy, setting the policy action to ENCRYPT, and selecting the VPN tunnel that is to
use the policy.
policy, setting the policy action to ENCRYPT, and selecting the VPN tunnel that is to
use the policy.
Setting the encryption policy direction
Only one firewall policy is required to enable two-way traffic. The Interface/Zone
Source setting must correspond to an interface that is connected to a network or
device behind the FortiGate unit, and the Interface/Zone Destination setting must
correspond to an interface that is connected to the Internet, a remote network, a
remote VPN peer, or a remote VPN client.
Source setting must correspond to an interface that is connected to a network or
device behind the FortiGate unit, and the Interface/Zone Destination setting must
correspond to an interface that is connected to the Internet, a remote network, a
remote VPN peer, or a remote VPN client.
Setting the source address for encrypted traffic
The source address is typically an IP address or a range of IP addresses behind the
FortiGate unit. The source address controls the IP addresses that remote VPN peers
and/or clients can access. To add a source address, see
FortiGate unit. The source address controls the IP addresses that remote VPN peers
and/or clients can access. To add a source address, see