Fortinet FortiGate Series Administration Manual page 416

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

Firewall policy examples
416
Outbound NAT
Protection Profile
3 Select OK.
4 Select Create New and enter or select the following settings for Home_User_2:
Interface / Zone
Address
Schedule
Service
Action
VPN Tunnel
Allow Inbound
Allow outbound
Inbound NAT
Outbound NAT
Protection Profile
5 Select OK.
Figure 224: SOHO network topology with FortiGate-100
VPN Tunnel
Home User 1
172.20.100.6
172.30.120.8
Internal
192.168.100.1
Finance Users
192.168.100.10-
192.168.100.20
The proposed network is based around a ForitGate 100A unit. The 15 internal computers
are behind the FortiGate unit. They now access the email and web servers in a DMZ,
which is also behind the FortiGate unit. All home-based employees now access the office
network through the FortiGate unit via VPN tunnels.
no
Select the check mark and select standard_profile
Source: internal
Source:
CompanyA_network
Always
ANY
IPSEC
Home2_Tunnel
yes
yes
yes
no
Select the check mark and select standard_profile
Internet
External
10.10.10.1
FortiGate
100A
Engineering Users
192.168.100.51-
192.168.100.100
Help Desk Users
192.168.100.21-
192.168.100.50
FortiGate Version 4.0 MR1 Administration Guide
Destination: wan1
Destination: All
VPN Tunnel
Home User 2
172.25.106.99
DMZ
Email Server
10.10.10.2
Web Server
10.10.10.3
01-410-89802-20090903
http://docs.fortinet.com/
Firewall Policy
Feedback

Advertisement

Table of Contents
loading

Table of Contents