Authenticating peers with preshared keys
Authenticating peers with preshared keys
Gateway-to-gateway VPN
280
If both VPN peers can use the same preshared key to authenticate themselves to
each other, you can enter the preshared key at each peer.
To configure an AutoIKE VPN with preshared keys
1
Add a phase 1 configuration to define the parameters used to authenticate the remote
VPN peer.
Although the remote VPN peer can be either a client or a gateway, this step is often
referred to as "adding a remote gateway."
For a preshared key VPN, set authentication method to Preshared key.
2
Set other phase 1 options as required.
See
"Phase 1" on page
3
Add the phase 2 configuration to define the parameters used to create and maintain
the AutoKey VPN tunnel.
This step is often referred to as "adding a tunnel." See
4
Add the firewall configuration required for the VPN.
See
"Adding firewall policies for IPSec VPN tunnels" on page
Using a peer to peer VPN, users on a network behind a VPN gateway can connect to
another remote network behind a remote VPN gateway. Both VPN gateways or peers
are FortiGate units or other VPN gateways with static IP addresses.
To configure a gateway-to-gateway VPN
1
Add a phase 1 configuration to define the parameters used to authenticate the remote
VPN peer.
2
Set Remote Gateway to static.
3
Set other phase 1 options as required.
See
"Phase 1" on page
4
Add the phase 2 configuration to define the parameters used to create and maintain
the AutoKey VPN tunnel.
See
"Phase 2" on page
5
Add the firewall configuration required for the VPN.
See
"Adding firewall policies for IPSec VPN tunnels" on page
6
Configure remote VPN clients with a matching IPSec VPN configuration.
248.
248.
252.
01-28006-0072-20041105
"Phase 2" on page
252.
282.
282.
Fortinet Inc.
VPN
Need help?
Do you have a question about the FortiGate FortiGate-200A and is the answer not in the manual?
Questions and answers