Laboratorio 11
Laboratorio 11
Laboratorio 11
2. Click VPN > IPsec Tunnels, and then click Create New > IPsec Tunnel.
Field Value
Name ToRemote
4. Click Next.
Field Value
Interface port1
Field Value
Pre-shared fortinet
Key
Version 1
Mode Aggressive
Peer ID Remote-
FortiGate
Setting a peer ID is
useful when the
FortiGate acting as
the dial-up server
has multiple dial-up
tunnels, and you
want dial-up clients
to connect to a
specific tunnel.
Field Value
9. Click OK.
You do not
need to add a
static route
because it is a
dial-up VPN.
FortiGate
dynamically
adds or
removes
appropriate
routes to each
dial-up peer,
each time the
peer VPN is
trying to
connect.
Even though
you could have
configured 10.0
.2.0/24 as
the Remote
Address instea
d of 0.0.0.0/0,
it is more
convenient to
use the latter
for scalability
purposes. That
is, when you
have multiple
remote peers,
each with
different remote
subnets,
using 0.0.0.0/
0 as the remote
subnet results
in the dial-up
server
accepting any
subnet during
the tunnel
negotiation.
This allows
multiple remote
peers to use
the same
phase 2
selector
configuration.
This exercise
has only one
remote peer
(Remote-
FortiGate).
Local-FortiGate
then learns
about the
remote
subnet 10.0.2.
0/24 when
Remote-
FortiGate
connects to the
tunnel.
However, if
there are more
remote peers
with different
remote
subnets, you
do not need to
change the
existing dial-up
server
configuration
for the
additional
remote peers to
be able to
connect.
Field Value
Name Remote_out
Incoming port3
Interface
Outgoing ToRemote
Interface
Source HQ_SUBNET
Destination BRANCH_SUBNET
Schedule always
Service ALL
Action ACCEPT
5. Click OK.
Field Value
Name Remote_in
Incoming ToRemote
Interface
Outgoing port3
Field Value
Interface
Source BRANCH_SUBNET
Destination HQ_SUBNET
Schedule always
Service ALL
Action ACCEPT
9. Click OK.
2. Click VPN > IPsec Tunnels, and then click Create New > IPsec Tunnel.
Field Value
Name ToLocal
Field Value
Remote Static IP
Gateway Address
IP Address 10.200.1.1
Interface port4
Field Value
Version 1
Mode Aggressive
Field Value
Local ID Remote-FortiGate
The local ID should
be the same as the
peer ID that you
configured on
Local-FortiGate,
which is acting as
the dial-up server.
Field Value
Destination Subnet
10.0.1.0/24
Interface ToLocal
4. Click OK.
Field Value
Name Local_out
Field Value
Incoming port6
Interface
Outgoing ToLocal
Interface
Source BRANCH_SUBNET
Destination HQ_SUBNET
Schedule always
Service ALL
Action ACCEPT
5. Click OK.
Field Value
Name Local_in
Incoming ToLocal
Interface
Outgoing port6
Interface
Source HQ_SUBNET
Destination BRANCH_SUBNET
Schedule always
Service ALL
Action ACCEPT
8. In the Firewall/Network Options section, disable NAT.
9. Click OK.
3. Right-click the VPN, and then click Bring Up > All Phase 2 Selectors to bring up
the tunnel.
The Name column of the VPN now contains a green up arrow, which indicates that the
tunnel is up. If required, click the refresh button in the upper-right corner to refresh the
widget information.
4. On the Remote-Client VM, open a terminal window, and then enter the following
command to ping the Local-Client VM:
ping 10.0.1.10
6. In the upper-right corner, click the refresh button multiple times to refresh the
widget information.
You will notice that the counters in the Incoming Data and Outgoing Data columns
increase over time. This indicates that the traffic between 10.0.1.10 and 10.0.2.10 is
being encrypted successfully and routed through the tunnel.
7. On the Local-FortiGate GUI, click Dashboard > Network > Static & Dynamic
Routing.
8. Find the static route that was dynamically added to the FortiGate.
10. Notice the address listed in the Gateway IP column for that route.
11. On the Remote-Client VM, press Ctrl+C to stop the ping.
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
2. In the upper-right corner, click admin, and then click Configuration > Revisions.
3. Click + to expand the list.
4. Select the configuration with the comment local-ipsec-vpn, and then click Revert.
5. Click OK to reboot.
2. Click VPN > IPsec Tunnels, and then click Create New > IPsec Tunnel.
Field Value
Name ToRemote
4. Click Next.
Field Value
Remote Static IP
Gateway Address
IP Address 10.200.3.1
Interface port1
Field Value
Version 1
Mode Aggressive
Field Value
9. Click OK.
Field Value
Destination Subnet
10.0.2.0/24
Interface ToRemote
4. Click OK.
Name Remote_out
Incoming port3
Interface
Outgoing ToRemote
Interface
Source HQ_SUBNET
Destination BRANCH_SUBNET
Schedule always
Service ALL
Action ACCEPT
5. Click OK.
6. Right-click the Remote_out policy, and then click Create reverse policy.
You will see the new reverse policy. By default, the policy is disabled.
7. Select the new policy, and then click Edit.
Field Value
Incoming ToRemote
Interface
Outgoing port3
Interface
Source BRANCH_SUBNET
Destination HQ_SUBNET
Schedule always
Service ALL
Action ACCEPT
3. Right-click the VPN, and then click Bring Up > All Phase 2 Selectors.
4. In the upper-right corner, click the refresh button to refresh the widget information.
The Name column of the VPN now contains a green up arrow, which indicates that the
tunnel is up.
5. On the Remote-Client VM, open a terminal window, and then enter the following
command to ping the Local-Client VM:
ping 10.0.1.10
7. In the upper-right corner, click the refresh button multiple times to refresh the
widget information.
You will notice that the counters in the Incoming Data and Outgoing Data columns
increase over time. This indicates that the traffic between 10.0.1.10 and 10.0.2.10 is
being encrypted successfully and routed through the tunnel.