Fotigate-A Fotigate-B
System Interface
config system interface
    edit "internal"
        set vdom "root"
        set ip 192.168.101.252 255.255.255.0
        set allowaccess ping https telnet
        set type physical
    next
    edit "wan1"
        set vdom "root"
        set ip 61.61.61.241 255.255.255.0
        set allowaccess ping https
        set type physical
    next
end
config system interface
    edit "internal"
        set vdom "root"
        set ip 192.168.4.254 255.255.255.0
        set allowaccess ping https ssh snmp
        set type physical
    next
    edit "external"
        set vdom "root"
        set ip 59.59.59.25 255.255.255.0
        set allowaccess ping https ssh snmp
        set type physical
    next
end
Phase1
config vpn ipsec phase1-interface
    edit "Taichung"
        set interface "wan1"
        set dpd enable
        set nattraversal enable
        set dhgrp 2
        set proposal 3des-sha1 3des-md5
        set remote-gw 59.59.59.25
        set psksecret startravel.com
    next
end
config vpn ipsec phase1-interface
    edit "Contracts_IDC"
        set interface "external"
        set dpd enable
        set nattraversal enable
        set dhgrp 2
        set proposal 3des-sha1 3des-md5
        set remote-gw 61.61.61.241
        set psksecret startravel.com
    next
end
Phase2
config vpn ipsec phase2-interface
    edit "Link_To_Taichung"
        set dhgrp 2
        set keepalive enable
        set pfs enable
        set phase1name "Taichung"
        set proposal 3des-sha1 3des-md5
    next
end
config vpn ipsec phase2-interface
    edit "Contracts_IDC_P2"
        set dhgrp 2
        set keepalive enable
        set pfs enable
        set phase1name "Contracts_IDC"
        set proposal 3des-sha1 3des-md5
    next
end
Firewall Policy
config firewall policy
    edit 1
        set srcintf "internal"
        set dstintf "wan1"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
        set nat enable
    next
    edit 201
        set srcintf "Taichung"
        set dstintf "internal"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
    edit 202
        set srcintf "internal"
        set dstintf "Taichung"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
end
config firewall policy
    edit 1
        set srcintf "internal"
        set dstintf "external"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
        set nat enable
    next
    edit 101
        set srcintf "Contracts_IDC"
        set dstintf "internal"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
    edit 102
        set srcintf "internal"
        set dstintf "Contracts_IDC"
            set srcaddr "all"
            set dstaddr "all"
        set action accept
        set schedule "always"
            set service "ANY"
    next
end
Static Route
config router static
    edit 1
        set device "wan1"
        set gateway 61.61.61.254
    next
    edit 102
        set device "Taichung"
        set dst 192.168.4.0 255.255.255.0
    next
end
config router static
    edit 1
        set device "external"
        set gateway 59.59.59.254
    next
    edit 101
        set device "Contracts_IDC"
        set dst 192.168.101.0 255.255.255.0
    next
end

備註:
依照此實際測試結果,當route-base ipsec vpn建立起來時,兩fortigate後面的網段就可相互ping通,但fortigate的internal IP卻無法相互ping通。

arrow
arrow
    全站熱搜
    創作者介紹
    創作者 里歐 的頭像
    里歐

    里歐's 布拉格

    里歐 發表在 痞客邦 留言(0) 人氣()