Fortinet FortiGate FortiGate-50A Administration Manual page 9

Antivirus firewalls
Hide thumbs Also See for FortiGate FortiGate-50A:
Table of Contents

Advertisement

L2TP .............................................................................................................................. 251
Setting up a L2TP-based VPN.................................................................................... 252
Enabling L2TP and specifying an L2TP range............................................................ 252
Configuring a Windows 2000 client for L2TP.............................................................. 253
Configuring a Windows XP client for L2TP ................................................................. 254
Certificates ...................................................................................................................... 256
Viewing the certificate list............................................................................................ 257
Generating a certificate request.................................................................................. 257
Installing a signed certificate ...................................................................................... 259
Enabling VPN access for specific certificate holders ................................................. 260
CLI configuration............................................................................................................. 261
ipsec phase1............................................................................................................... 261
ipsec phase2............................................................................................................... 263
ipsec vip ...................................................................................................................... 264
Authenticating peers with preshared keys ...................................................................... 266
Gateway-to-gateway VPN............................................................................................... 266
Dialup VPN ..................................................................................................................... 267
Dynamic DNS VPN ......................................................................................................... 267
Manual key IPSec VPN................................................................................................... 268
Adding firewall policies for IPSec VPN tunnels............................................................... 268
Setting the encryption policy direction ........................................................................ 268
Setting the source address for encrypted traffic ......................................................... 268
Setting the destination address for encrypted traffic................................................... 269
Adding an IPSec firewall encryption policy ................................................................. 269
Internet browsing through a VPN tunnel ......................................................................... 269
Configuring Internet browsing through a VPN tunnel.................................................. 270
IPSec VPN in Transparent mode.................................................................................... 271
Special rules ............................................................................................................... 271
Hub and spoke VPNs...................................................................................................... 272
Configuring the hub..................................................................................................... 272
Configuring spokes ..................................................................................................... 274
Redundant IPSec VPNs.................................................................................................. 275
Configuring redundant IPSec VPNs............................................................................ 275
Configuring IPSec virtual IP addresses .......................................................................... 276
Troubleshooting .............................................................................................................. 278
IPS ....................................................................................................................... 279
Signature......................................................................................................................... 280
Predefined................................................................................................................... 280
Custom........................................................................................................................ 284
Anomaly .......................................................................................................................... 286
Anomaly CLI configuration.......................................................................................... 289
Configuring IPS logging and alert email.......................................................................... 290
Default fail open setting .................................................................................................. 290
FortiGate-50A Administration Guide
01-28006-0001-20041105
Contents
9

Advertisement

Table of Contents
loading

Table of Contents