Configuration overview
In a gateway-to-gateway configuration, two FortiGate units create a VPN tunnel between two separate private networks. All traffic between the two networks is encrypted and protected by FortiGate security policies.
Figure 120: Example gateway-to-gateway configuration
General configuration steps
The FortiGate units at both ends of the tunnel must be operating in NAT mode and have static public IP addresses.
When a FortiGate unit receives a connection request from a remote VPN peer, it uses IPsec
phase 1 parameters to establish a secure connection and authenticate
that VPN peer. Then, if the security policy permits the connection, the
FortiGate unit establishes the tunnel using IPsec phase 2 parameters and
applies the IPsec security policy. Key management, authentication, and
security services are negotiated dynamically through the IKE protocol.
To support these functions, the following general configuration steps must be performed by both FortiGate units:
•
|
Define the phase 1 parameters that the FortiGate unit needs to authenticate the remote peer and establish a secure connection.
|
•
|
Define the phase 2 parameters that the FortiGate unit needs to create a VPN tunnel with the remote peer.
|
•
|
Create security policies to control the permitted services and permitted direction of traffic between the IP source and destination addresses.
The basic phase 2 settings
associate IPsec phase 2 parameters with the phase 1 configuration and
specify the remote end point of the VPN tunnel. Before you define the
phase 2 parameters, you need to reserve a name for the tunnel. See “Phase 2 configuration”.
Define an IPsec security policy to permit communications between the source and destination addresses.
|
No comments:
Post a Comment