VPN Fortinet IPSec Telefonos 9600 Series
VPN Fortinet IPSec Telefonos 9600 Series
VPN Fortinet IPSec Telefonos 9600 Series
Application Notes for Configuring an VPN Tunnel using IPsec between Fortinet FortiGate Network Security Platforms and Appliances and Avaya 9600 Series IP Phones - Issue 1.1
Abstract
These Application Notes describe the procedures for configuring a Virtual Private Network (VPN) tunnel using Internet Protocol Security (IPsec) between Fortinet FortiGate Network Security Platforms and Appliances and Avaya 9600 Series IP (H.323) Phones. Fortinet offers security platform models to satisfy various deployment requirements from the FortiGate-20 series for small offices to the FortiGate-5000 series for very large enterprises, service providers and carriers. Each FortiGate includes a wide range of security and networking functions. These Application Notes focus on the FortiGate 60C VPN functionality using IPsec. Both the FortiGate 60C and 300C were compliance tested. Information in these Application Notes has been obtained through DevConnect compliance testing and additional technical discussions. Testing was conducted via the DevConnect Program at the Avaya Solution and Interoperability Test Lab.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
1 of 21 FortinetFGT60C
1. Introduction
These Application Notes describe the procedures for configuring a Virtual Private Network (VPN) tunnel using Internet Protocol Security (IPsec) between Fortinet FortiGate Network Security Platforms and Appliances and Avaya 9600 Series IP (H.323) Phones. Fortinet offers security platform models to satisfy various deployment requirements from the FortiGate-20 series for small offices to the FortiGate-5000 series for very large enterprises, service providers and carriers. Each FortiGate includes a wide range of security and networking functions, including: Firewall, VPN, and Traffic Shaping Intrusion Prevention System (IPS) Antivirus/Antispyware/Antimalware Integrated Wireless Controller Application Control Data Loss Prevention (DLP) Vulnerability Management IPv6 Support Web Filtering Anti-spam VoIP Support Layer 2/3 Routing WAN Optimization & Web Caching These Application Notes focus on the FortiGate 60C VPN functionality using IPsec. Both the FortiGate 60C and 300C were compliance tested.
2.3. Support
For Fortinet FortiGate technical support and information, contact Fortinet at: Phone: 1-866-648-4638 Web: http://www.fortinet.com/support/contact_support.html
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
3 of 21 FortinetFGT60C
3. Reference Configuration
The figure below shows the sample configuration used during compliance testing. A corporate office environment was created consisting of Avaya Aura Communication Manager, various Avaya 9600 Series IP Phones, and a Fortinet FortiGate 60C. Additionally, two home office environments were created. Each home office had a home router with NAT enabled and two Avaya 9600 Series IP (H.323) phones. The phones, at the home offices, are used DHCP to obtain their IP address. Initially, the phones are assigned with IP address on the 192.168.1.0/24 network by their local router. When the phones are establish with a VPN tunnel, they are assigned with IP address on the 10.64.28.0/24 network.
Release/Version Avaya Aura Communication Manager 6.0.1 (R016x.00.1.510.1) with Patch 19528 96xx-IPT-H323-R3_1_4-031612 96x1-IPT-H323-R6_2_0_09_02812 v4.0,build0535,120511 (MR3 Patch 7)
4 of 21 FortinetFGT60C
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
5 of 21 FortinetFGT60C
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
6 of 21 FortinetFGT60C
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
7 of 21 FortinetFGT60C
To modify an existing interface, check the checkbox next to the interface and then click Edit.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
8 of 21 FortinetFGT60C
The Edit Interface screen is displayed. Enter an Alias (optional) and the IP/Netmask for the interface. The internal interface used during compliance testing is shown below.
The wan1 interface configuration used during compliance testing is shown below.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
9 of 21 FortinetFGT60C
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
10 of 21 FortinetFGT60C
The Edit User Group screen is displayed. The screen below shows the values used for the ipsecvpn user group.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
11 of 21 FortinetFGT60C
The New User screen is displayed. Enter a User Name and Password. Check the box for Add this user to groups and check the user group created in Section 6.4.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
12 of 21 FortinetFGT60C
The Edit Phase 1 screen is shown below with the configuration used during testing. Select Dialup User for the Remote Gateway and set the Mode to Aggressive. This allows the FortiGate to dynamically add tunnel routes as IPSec connections are made from the VPN phones.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
13 of 21 FortinetFGT60C
Click the Advanced button to view more details. Note, the Enable IPsec Interface Mode checkbox was checked, and XAUTH was set to Enable as Server with the User Group created earlier (i.e. ipsecvpn) selected.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
14 of 21 FortinetFGT60C
Navigate back to VPNIPsecAuto Key (IKE). To view or modify Phase 2 check the appropriate checkbox and click Edit.
The Edit Phase 2 screen is shown below with the configuration used during testing.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
15 of 21 FortinetFGT60C
Confirm the IKE Configuration Method is enabled, which can only be done through the FortiGate command line interface. Use a secure shell client to access the FortiGate. After logging in, use the config, edit, and set commands shown in bold below to set the type and mode-cfg values. The type keyword determines whether the administrator is creating a server or a client. Setting type to dynamic creates a server configuration, otherwise the configuration is a client. The mode-cfg keyword enables the IKE Configuration Method.
config vpn ipsec phase1-interface edit "test-port1" set type dynamic set interface "wan1" set xauthtype auto set mode aggressive set mode-cfg enable set proposal 3des-sha1 aes128-sha1 set authusrgrp "ipsecvpn" set ipv4-start-ip 10.64.28.164 set ipv4-end-ip 10.64.28.173 set ipv4-netmask 255.255.255.0 set dns-mode auto set unity-support disable set psksecret ENC Cw/KXthp0PQlKB+ZxCYrUYLqfYDOKr9+/Zu6fUnA13RBdgn0yXCNxbx+M7IHUMDAm4G6pZlr6XL4XedB/SHThA l7W/2a2YWowLSZz7JuCIMGTNVk next end
Note, the PSK is encrypted in the configuration and can be copied verbatim between FortiGate units. For reference, the Phase 2 configuration is also shown below.
config vpn ipsec phase2-interface edit "test-p2" set keepalive enable set phase1name "test-port1" set proposal 3des-sha1 aes128-sha1 next end
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
16 of 21 FortinetFGT60C
6.7. Policy
Navigate to PolicyPolicyPolicy. The screen below shows the policies defined during compliance testing. The policy for test-port1 references the IPsec tunnel configuration made earlier.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
17 of 21 FortinetFGT60C
To view or modify an existing policy, click on the policy row to high-light it, right-click and then select Edit.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
18 of 21 FortinetFGT60C
The screen below shows the configuration of the internal (DevConnect Network) test-port1 policy. Note that during compliance testing, this tunnel for the IPSec tunnel interface does not require a NAT configuration since it joins the two trusted subnets on either end of the IPSec tunnel. The other policies shown above were configured similarly.
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
19 of 21 FortinetFGT60C
7. Verification Steps
The following steps can be used to verify the configuration: Verify VPN connections are successfully established from the VPN phones. Verify calls placed between all VPN users and corporate users are successful. Verify messages can be left for the VPN phones and that the message waiting indicator on each phone functions correctly.
8. Conclusion
These Application Notes describe the procedures for configuring a Virtual Private Network (VPN) tunnel using Internet Protocol Security (IPsec) between Fortinet FortiGate Security Platforms and Appliances and Avaya 9600 Series IP (H.323) Phones. All compliance test cases passed successfully with the one exception/observation noted in Section 2.2.
9. Additional References
This section references the product documentation relevant to these Application Notes. Avaya product documentation is available at http://support.avaya.com. Fortinet product documentation is available at http://docs.fortinet.com/fgt.html. [1] Administering Avaya Aura Communication Manager, March 2012 [2] ForiGate Desktop Install Guide, March 2009 [3] FortiOS Handbook v3, March 2012 [4] FortiOS CLI Reference, February 2012
MJH; Reviewed: SPOC 10/22/2012 Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved. 20 of 21 FortinetFGT60C
2012
Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by and are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. The information provided in these Application Notes is subject to change without notice. The configurations, technical data, and recommendations provided in these Application Notes are believed to be accurate and dependable, but are presented without express or implied warranty. Users are responsible for their application of any products specified in these Application Notes. Please e-mail any questions or comments pertaining to these Application Notes along with the full title name and filename, located in the lower right corner, directly to the Avaya DevConnect Program at [email protected].
Solution & Interoperability Test Lab Application Notes 2012 Avaya Inc. All Rights Reserved.
21 of 21 FortinetFGT60C