
232
Fortinet Inc.
Redundant IPSec VPNs
IPSec VPN
Configure the two FortiGate units with symmetrical settings for their connections to the
Internet. For example, if the remote FortiGate unit has two external interfaces grouped
within one zone, then the local FortiGate unit should have two external interfaces
grouped within one zone.
Similarly, if the remote FortiGate has two external interfaces in separate zones, then
the local FortiGate unit should have two external interfaces in separate zones.
Configuration is made simpler if all external interfaces are grouped within a single
zone, rather than multiple zones. However, this may not always be possible due to
security considerations or other reasons.
After you have defined the Internet connections for both FortiGate units, you can
proceed to configure the VPN tunnel.
To configure IPSec redundancy:
1
Add the phase 1 parameters for up to three VPN connections.
Enter identical values for each VPN connection, with the exception of the Gateway
Name and IP Address. Make sure that the remote VPN peer (Remote Gateway) has a
static IP address.
See
“Adding a phase 1 configuration for an AutoIKE VPN” on page 213
.
2
Add the phase 2 parameters (VPN tunnel) for up to three VPN connections.
• If the Internet connections are in the same zone, add one VPN tunnel and add the
remote gateways to it. You can add up to three remote gateways.
• If the Internet connections are in separate zones or assigned to unique interfaces,
add a VPN tunnel for each remote gateway entered.
See
“Adding a phase 2 configuration for an AutoIKE VPN” on page 217
.
3
Add the source and destination addresses.
See
“Adding a source address” on page 225
.
See
“Adding a destination address” on page 225
.
4
Add encrypt policies for up to three VPN connections.
• If the VPN connections are in the same zone, add one outgoing encrypt policy; for
example an Internal
->
External policy. Add the AutoIKE key tunnel to this policy.
• If the VPN connections are in different zones, add a separate outgoing encrypt
policy for each connection; for example, an Internal
->
External and an Internal
-
>
DMZ policy. The source and destination of both policies must be the same. Add a
different AutoIKE key tunnel to each policy.
See
“Adding an encrypt policy” on page 225
.
Summary of Contents for FortiGate 400
Page 13: ...Contents FortiGate 400 Installation and Configuration Guide 13 Glossary 295 Index 299 ...
Page 14: ...Contents 14 Fortinet Inc ...
Page 44: ...44 Fortinet Inc Next steps Getting started ...
Page 74: ...74 Fortinet Inc Transparent mode configuration examples Transparent mode installation ...
Page 148: ...148 Fortinet Inc Providing DHCP services to your internal network Network configuration ...
Page 168: ...168 Fortinet Inc Customizing replacement messages System configuration ...
Page 200: ...200 Fortinet Inc Content profiles Firewall configuration ...
Page 258: ...258 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS ...
Page 294: ...294 Fortinet Inc Configuring alert email Logging and reporting ...
Page 298: ...298 Fortinet Inc Glossary ...
Page 308: ...308 Fortinet Inc Index ...