Defining VPN security policies
Defining VPN security policies This section explains how to specify the source and destination IP addresses of traffic transmitted through an IPsec VPN, and how to define appropriate security policies....
View ArticleIPSec Gateway-to-gateway
Gateway-to-gateway This section explains how to set up a basic gateway-to-gateway (site-to-site) IPsec VPN. The following topics are included in this section: Configuration overview Gateway-to-gateway...
View ArticleIPSec Hub-and-spoke configurations
Hub-and-spoke configurations This section describes how to set up hub-and-spoke IPsec VPNs. The following topics are included in this section: Configuration overview Configure the hub Configure the...
View ArticleIPSec Dynamic DNS configuration
Dynamic DNS configuration This section describes how to configure a site-to-site VPN, in which one FortiGate unit has a static IP address and the other FortiGate unit has a domain name and a dynamic IP...
View ArticleFortiClient dialup-client configuration
FortiClient dialup-client configuration The FortiClient Endpoint Security application is an IPsec VPN client with antivirus, antispam and firewall capabilities. This section explains how to configure...
View ArticleVideo Requests Wanted
I am looking for video requests. Time looks like it may be getting more available so I should be able to start pumping out videos again that run through the various tasks you guys are running into...
View ArticleFortiGate dialup-client configurations
FortiGate dialup-client configurations This section explains how to set up a FortiGate dialup-client IPsec VPN. In a FortiGate dialup-client configuration, a FortiGate unit with a static IP address...
View ArticleSupporting IKE Mode Config clients
Supporting IKE Mode Config clients IKE Mode Config is an alternative to DHCP over IPsec. A FortiGate unit can be configured as either an IKE Mode Config server or client. This chapter contains the...
View ArticleIPSec Internet-browsing configuration
Internet-browsing configuration This section explains how to support secure web browsing performed by dialup VPN clients, and/or hosts behind a remote VPN peer. Remote users can access the private...
View ArticleRedundant VPN configurations
Redundant VPN configurations This section discusses the options for supporting redundant and partially redundant IPsec VPNs, using routebased approaches. The following topics are included in this...
View ArticleTransparent mode VPNs
Transparent mode VPNs This section describes transparent VPN configurations, in which two FortiGate units create a VPN tunnel between two separate private networks transparently. The following topics...
View ArticleIPv6 IPsec VPNs
IPv6 IPsec VPNs This chapter describes how to configure your FortiGate unit’s IPv6 IPsec VPN functionality. By default IPv6 configurations to not appear on the Web-based Manager. You need to enable the...
View ArticleL2TP and IPsec (Microsoft VPN)
L2TP and IPsec (Microsoft VPN) This section describes how to set up a VPN that is compatible with the Microsoft Windows native VPN, which is Layer 2 Tunneling Protocol (L2TP) with IPsec encryption. The...
View ArticleGRE over IPsec (Cisco VPN)
GRE over IPsec (Cisco VPN) This section describes how to configure a FortiGate VPN that is compatible with Cisco-style VPNs that use GRE in an IPsec tunnel. The following topics are included in this...
View ArticleProtecting OSPF with IPsec
Protecting OSPF with IPsec For enhanced security, OSPF dynamic routing can be carried over IPsec VPN links. The following topics are included in this section: Configuration overview This chapter shows...
View ArticleBGP over dynamic IPsec
BGP over dynamic IPsec The following example shows how to create a dynamic IPsec VPN tunnel that allows BGP. Configuring IPsec on FortiGate 1 Go to Policy & Objects > Addresses and select create...
View ArticleIPsec Auto-Discovery VPN (ADVPN)
IPsec Auto-Discovery VPN (ADVPN) Consider a company that wants to provide direct secure (IPsec) connections between all of its offices in New York, Chicago, Greenwich, London, Paris, Frankfurt, Tokyo,...
View ArticleIPSec Logging and monitoring
Logging and monitoring This section provides some general logging and monitoring procedures for VPNs. The following topics are included in this section: Monitoring VPN connections VPN event logs...
View ArticleIPSec Troubleshooting
Troubleshooting This section contains tips to help you with some common challenges of IPsec VPNs. A VPN connection has multiple stages that can be confirmed to ensure the connection is working...
View ArticleFortiGate Firewall Components
FortiGate Firewall Components The FortiGate firewall is made up of a number of different components that are used to build an impressive list of features that have flexibility of scope and granularity...
View Article