![Fortinet FortiGate 60R Installation And Configuration Manual Download Page 198](http://html1.mh-extra.com/html/fortinet/fortigate-60r/fortigate-60r_installation-and-configuration-manual_2321841198.webp)
198
Fortinet Inc.
IPSec VPN concentrators
IPSec VPN
To create a VPN concentrator configuration:
1
Configure a tunnel for each spoke. Choose between a manual key tunnel or an
AutoIKE tunnel.
• A manual key tunnel consists of a name for the tunnel, the IP address of the spoke
(client or gateway) at the opposite end of the tunnel, and the encryption and
authentication algorithms to use for the tunnel.
See
“Manual key IPSec VPNs” on page 181
.
• An AutoIKE tunnel consists of phase 1 and phase 2 parameters. The phase 1
parameters include the name of the spoke (client or gateway), designation of how
the spoke receives its IP address (static or dialup), encryption and authentication
algorithms, and the authentication method—either pre-shared keys or PKI
certificates. The phase 2 parameters include the name of the tunnel, selection of
the spoke (client or gateway) configured in phase 1, encryption and authentication
algorithms, and a number of security parameters.
See
“AutoIKE IPSec VPNs” on page 183
.
2
Add a destination addresses for each spoke. The destination address is the address
of the spoke (either a client on the Internet or a network located behind a gateway).
See
“Adding a source address” on page 195
.
3
Add the concentrator configuration. This step groups the tunnels together on the
FortiGate unit. The tunnels link the hub to the spokes. The tunnels are added as part
of the AutoIKE phase 2 configuration or the manual key configuration.
See
“Adding a VPN concentrator” on page 199
.
4
Add an encrypt policy for each spoke. Encrypt policies control the direction of traffic
through the hub and allow inbound and outbound VPN connections between the hub
and the spokes. The encrypt policy for each spoke must include the tunnel name of
the spoke. The source address must be Internal_All. Use the following configuration
for the encrypt policies:
See
“Adding an encrypt policy” on page 195
.
5
Arrange the policies in the following order:
• encrypt policies
• default non-encrypt policy (Internal_All -> External_All)
Note:
Add the concentrator configuration to the central FortiGate unit (the hub) after adding the
tunnels for all spokes.
Source
Internal_All
Destination
The VPN spoke address.
Action
ENCRYPT
VPN Tunnel
The VPN spoke tunnel name.
Allow inbound
Select allow inbound.
Allow outbound
Select allow outbound
Inbound NAT
Select inbound NAT if required.
Outbound NAT
Select outbound NAT if required.
Summary of Contents for FortiGate 60R
Page 12: ...Contents 12 Fortinet Inc...
Page 26: ...26 Fortinet Inc Customer service and technical support Introduction...
Page 42: ...42 Fortinet Inc Next steps Getting started...
Page 138: ...138 Fortinet Inc Customizing replacement messages System configuration...
Page 228: ...228 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS...
Page 242: ...242 Fortinet Inc Exempt URL list Web filtering...
Page 256: ...256 Fortinet Inc Configuring alert email Logging and reporting...
Page 260: ...260 Fortinet Inc Glossary...
Page 270: ...270 Fortinet Inc Index...