Thứ Hai, 26 tháng 9, 2016

Site-to-site IPsec VPN with two FortiGates

Kết quả hình ảnh cho Fortigate OS 5.4.1
Site-to-site IPsec VPN with two FortiGates 5.4.x
3 users rated this
In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsecVPN. The VPN will be created on both FortiGates by using the VPN Wizard’s Site to Site – FortiGate template.
In this example, one office will be referred to as HQ and the other will be referred to as Branch.
Find this recipe for other FortiOS versions
5.2 | 5.4
1. Configuring the HQ IPsec VPN
On the HQ FortiGate, go to VPN > IPsec Wizard.
Select the Site to Site template, and selectFortiGate.
In the Authenticationstep, set IP Address to the IP of the Branch FortiGate (in the example,172.20.120.135). After you enter the gateway, an available interface will be assigned as the Outgoing Interface. If you wish to use a different interface, select it from the drop-down menu.
Set a secure Pre-shared Key.
In the Policy & Routing step, set the Local Interface. TheLocal Subnets will be added automatically. SetRemote Subnets to the Branch FortiGate’s localsubnet (in the example, 5.5.5.5/24).
A summary page shows the configuration created by the wizard, including firewall addresses, firewall address groups, astatic route, and security policies.
2. Configuring the Branch IPsec VPN
On the Branch FortiGate, go to VPN > IPsec Wizard.
Select the Site to Site template, and selectFortiGate.
In the Authenticationstep, set IP Address to the IP of the HQ FortiGate (in the example, 172.20.121.92). After you enter the gateway, an available interface will be assigned as the Outgoing Interface. If you wish to use a different interface, select Change.
Set the same Pre-shared Key that was used for HQ’s VPN.
In the Policy & Routing step, set the Local Interface. TheLocal Subnets will be added automatically. SetRemote Subnets to the HQ FortiGate’s local subnet (in the example, 10.10.10.1/24).
A summary page shows the configuration created by the wizard, including firewall addresses, firewall address groups, a static route, and security policies.
3. Results
On either FortiGate, go toMonitor > IPsec Monitorto verify the status of the VPN tunnel. Right-click under Status and selectBring Up.

A user on either of the office networks should be able to connect to any address on the other office network transparently.
If you need to generate traffic to test the connection, ping the Branch FortiGate’sinternal interface from the HQ’s internal network.
http://cookbook.fortinet.com/


0 nhận xét:

Đăng nhận xét