PIXNET Logo登入

里歐's 布拉格

跳到主文

生活543

部落格全站分類:不設分類

  • 相簿
  • 部落格
  • 留言
  • 名片
  • 9月 10 週五 201012:01
  • Example Fortigate Route-Base IP-Sec Site to Site VPN






Fotigate-A
Fotigate-B


System Interface


config system interface
    edit "internal"
        set vdom "root"
        set ip 192.168.101.252 255.255.255.0
        set allowaccess ping https telnet
        set type physical
    next
    edit "wan1"
        set vdom "root"
        set ip 61.61.61.241 255.255.255.0
        set allowaccess ping https
        set type physical
    next
end

config system interface
    edit "internal"
        set vdom "root"
        set ip 192.168.4.254 255.255.255.0
        set allowaccess ping https ssh snmp
        set type physical
    next
    edit "external"
        set vdom "root"
        set ip 59.59.59.25 255.255.255.0
        set allowaccess ping https ssh snmp
        set type physical
    next
end


Phase1


config vpn ipsec phase1-interface
    edit "Taichung"
        set interface "wan1"
        set dpd enable
        set nattraversal enable
        set dhgrp 2
        set proposal 3des-sha1 3des-md5
        set remote-gw 59.59.59.25
        set psksecret startravel.com
    next
end
config vpn ipsec phase1-interface
    edit "Contracts_IDC"
        set interface "external"
        set dpd enable
        set nattraversal enable
        set dhgrp 2
        set proposal 3des-sha1 3des-md5
        set remote-gw 61.61.61.241
        set psksecret startravel.com
    next
end


Phase2


config vpn ipsec phase2-interface
    edit "Link_To_Taichung"
        set dhgrp 2
        set keepalive enable
        set pfs enable
        set phase1name "Taichung"
        set proposal 3des-sha1 3des-md5
    next
end
config vpn ipsec phase2-interface
    edit "Contracts_IDC_P2"
        set dhgrp 2
        set keepalive enable
        set pfs enable
        set phase1name "Contracts_IDC"
        set proposal 3des-sha1 3des-md5
    next
end


Firewall Policy


config firewall policy
    edit 1
        set srcintf "internal"
        set dstintf "wan1"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
        set nat enable
    next
    edit 201
        set srcintf "Taichung"
        set dstintf "internal"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
    edit 202
        set srcintf "internal"
        set dstintf "Taichung"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
end
config firewall policy
    edit 1
        set srcintf "internal"
        set dstintf "external"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
        set nat enable
    next
    edit 101
        set srcintf "Contracts_IDC"
        set dstintf "internal"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
    edit 102
        set srcintf "internal"
        set dstintf "Contracts_IDC"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
end


Static Route


config router static
    edit 1
        set device "wan1"
        set gateway 61.61.61.254
    next
    edit 102
        set device "Taichung"
        set dst 192.168.4.0 255.255.255.0
    next
end
config router static
    edit 1
        set device "external"
        set gateway 59.59.59.254
    next
    edit 101
        set device "Contracts_IDC"
        set dst 192.168.101.0 255.255.255.0
    next
end


(繼續閱讀...)
文章標籤

里歐 發表在 痞客邦 留言(0) 人氣(617)

  • 個人分類:FortiGate
▲top
  • 9月 07 週二 201016:59
  • Example Fortigate IPSec VPN Gateway-to-Gateway Configuration

Fortigate IPSec VPN Gateway-to-Gateway.jpg
Example Fortigate IPSec VPN Gateway-to-Gateway Configuration
The following example demonstrates how to set up a basic gateway-to-gateway IPSec VPN that uses preshared keys to authenticate the two VPN peers.
Example gateway-to-gateway configuration 
(繼續閱讀...)
文章標籤

里歐 發表在 痞客邦 留言(0) 人氣(717)

  • 個人分類:FortiGate
▲top
  • 7月 28 週三 201014:57
  • [Forti] Fortigate Site to Site IPSec VPN

**************************Fortigate-3600 2.80,build489,051027*****************************
config vpn ipsec phase1
    edit "Kaohs"
        set dpd enable
        set nattraversal enable
        set proposal des-sha1
        set keylife 28800
        set remotegw 219.81.1.1
        set psksecret 123456
    next
end
config vpn ipsec phase2
    edit "Link_To_Kaohs"
        set keepalive enable
        set pfs enable
        set phase1name "Kaohs"
        set proposal des-sha1
        set replay enable
    next
end
config firewall policy
    edit 170
        set srcintf "WWW"
        set dstintf "TFN_Ext"
        set srcaddr "WWW_All"
        set dstaddr "Kaohs_VPN_All"
        set action encrypt
        set schedule "always"
        set service "any"
        set inbound enable
        set outbound enable
        set vpntunnel "Link_To_Kaohs"
    next
***************************Fortigate-60B 3.00-b0750(MR7 Patch 7)****************************
config vpn ipsec phase1
    edit "To_IDC"
        set interface "external"
        set dpd enable
        set nattraversal enable
        set proposal des-sha1
        set keylife 28800
        set remote-gw 61.31.1.1
        set psksecret 123456
    next
end
config vpn ipsec phase2
    edit "Link_To_IDC"
        set dst-addr-type name
        set keepalive enable
        set pfs enable
        set phase1name "To_IDC"
        set proposal des-sha1
        set replay enable
        set src-addr-type name
        set dst-name "VPN_All_Group"
        set src-name "Kaohs_VPN_All"
    next
end
config firewall policy
    edit 1
        set srcintf "internal"
        set dstintf "external"
            set srcaddr "Kaohs_VPN_All"
            set dstaddr "VPN_All_Group"
        set action ipsec
        set schedule "always"
            set service "ANY"
        set inbound enable
        set outbound enable
        set vpntunnel "To_IDC"
    next
(繼續閱讀...)
文章標籤

里歐 發表在 痞客邦 留言(0) 人氣(539)

  • 個人分類:FortiGate
▲top
1

自訂側欄

自訂側欄

個人資訊

里歐
暱稱:
里歐
分類:
不設分類
好友:
累積中
地區:

熱門文章

  • (10,647)[Linux][CentOS]設定 yum mirror 為台灣地區
  • (2,654)使用 PsExec 執行遠端電腦 cmd 安裝 EventLog to Syslog (evtsys)
  • (2,635)VMware Workstation增加虛擬磁碟容量方法
  • (2,555)[Cacti] Cacti 錯誤訊息及排除方法
  • (2,547)[Linux] 調整時區、系統時間、BIOS時間、同步系統時間 For Redhat
  • (1,344)Solaris 環境變數設定
  • (1,097)如何將AD由win server 2003 升級至win server 2008
  • (989)[Linux] Configuring the Softflowd NetFlow Exporter
  • (290)Enterasys A2 Switch Restore Configuration to factory defaults (Reset Password)
  • (284)正常移轉 FSMO 五大角色

文章分類

  • Mikrotik (0)
  • 理財 (0)
  • Cacti (1)
  • XenServer (1)
  • VMware (1)
  • 旅遊 & 飲食 (1)
  • Network (1)
  • Cisco (12)
  • Windows (6)
  • MySQL (7)
  • Solaris (18)
  • Symantec (6)
  • 文章 (3)
  • Acronis (0)
  • FortiGate (3)
  • Linux (48)
  • Microsoft (5)
  • 未分類文章 (1)

最新文章

  • Installation vsftpd-3.0.2 with xinetd on CentOS 6 .4 x86_64
  • MPLS QoS Example
  • 手動設定windows ntp client (w32tm & reg)
  • Installation Memcached On CentOS 6.3
  • Installation vsFTPd on CentOS
  • Solaris Command
  • Windows 2008 R2找KMS Server做產品啟動時,出現0xC004F074錯誤
  • Windows Update Server IP
  • CactiEZ 0.6 upgrade to Cacti 0.8.7i
  • Windows 2003 Server 關閉不必要的服務

最新留言

  • [19/04/17] Srini 於文章「手動設定windows ntp clie...」留言:
    There are few examples here fo...
  • [12/07/17] 羅嚴克拉姆 於文章「使用 PsExec 執行遠端電腦 cmd...」發表了一則私密留言

動態訂閱

文章精選

文章搜尋

誰來我家

參觀人氣

  • 本日人氣:
  • 累積人氣: