190
Fortinet Inc.
Configuring L2TP
PPTP and L2TP VPN
8
Add the following registry value to this key:
Value Name: ProhibitIpSec
Data Type: REG_DWORD
Value: 1
9
Save your changes and restart the computer for the changes to take effect.
You must add the
ProhibitIpSec
registry value to each Windows 2000-based
endpoint computer of an L2TP or IPSec connection to prevent the automatic filter for
L2TP and IPSec traffic from being created. When the
ProhibitIpSec
registry value
is set to 1, your Windows 2000-based computer does not create the automatic filter
that uses CA authentication. Instead, it checks for a local or active directory IPSec
policy.
Connecting to the L2TP VPN
1
Start the dialup connection that you configured in the previous procedure.
2
Enter your L2TP VPN User Name and Password.
3
Select Connect.
4
In the connect window, enter the User Name and Password that you use to connect to
your dialup network connection.
This user name and password is not the same as your VPN user name and password.
Configuring a Windows XP client for L2TP
Use the following procedure to configure a client computer running Windows XP so
that it can connect to a FortiGate L2TP VPN.
Configuring an L2TP VPN dialup connection
1
Go to
Start > Settings
.
2
Select Network and Internet Connections.
3
Select Create a connection to the network of your workplace and select Next.
4
Select Virtual Private Network Connection and select Next.
5
Name the connection and select Next.
6
If the Public Network dialog box appears, choose the appropriate initial connection
and select Next.
7
In the VPN Server Selection dialog, enter the IP address or host name of the
FortiGate unit to connect to and select Next.
8
Select Finish.
Configuring the VPN connection
1
Right-click the icon that you have created.
2
Select
Properties > Security
.
3
Select Typical to configure typical settings.
4
Select Require data encryption.
Summary of Contents for FortiGate FortiGate-50
Page 16: ...16 Fortinet Inc Customer service and technical support Introduction...
Page 32: ...32 Fortinet Inc Next steps Getting started...
Page 40: ...40 Fortinet Inc Completing the configuration NAT Route mode installation...
Page 112: ...112 Fortinet Inc Customizing replacement messages System configuration...
Page 144: ...144 Fortinet Inc Content profiles Firewall configuration...
Page 202: ...202 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS...
Page 216: ...216 Fortinet Inc Exempt URL list Web filtering...
Page 228: ...228 Fortinet Inc Configuring alert email Logging and reporting...
Page 232: ...232 Fortinet Inc Glossary...