beautypg.com

Adding an encrypt policy – Fortinet FortiGate 50A User Manual

Page 195

background image

IPSec VPN

Configuring encrypt policies

FortiGate-50A Installation and Configuration Guide

195

4

Enter the Address Name, IP Address, and NetMask for a single computer or for an
entire subnetwork on an internal interface of the remote VPN peer.

5

Select OK to save the destination address.

Adding an encrypt policy

To add an encrypt policy

1

Go to Firewall > Policy.

2

Select the Int->Ext policy list.

3

Select New to add a new policy.

4

Set Source to the source address.

5

Set Destination to the destination address.

6

Set Service to control the services allowed over the VPN connection.
You can select ANY to allow all supported services over the VPN connection or select
a specific service or service group to limit the services allowed over the VPN
connection.

7

Set Action to ENCRYPT.

8

Configure the ENCRYPT parameters.

For information about configuring the remaining policy settings, see

“Adding firewall

policies” on page 140

.

9

Select OK to save the encrypt policy.

VPN Tunnel

Select an Auto Key tunnel for this encrypt policy.

Allow inbound Select Allow inbound to enable inbound users to connect to the source

address.

Allow outbound Select Allow outbound to enable outbound users to connect to the

destination address.

Inbound NAT

The FortiGate unit translates the source address of incoming packets to the

IP address of the FortiGate interface connected to the source address

network. Typically, this is an internal interface of the FortiGate unit.
Inbound NAT makes it impossible for local hosts to see the IP addresses of

remote hosts (hosts located on the network behind the remote VPN

gateway).

Outbound NAT The FortiGate unit translates the source address of outgoing packets to the

IP address of the FortiGate interface connected to the destination address

network. Typically, this is an external interface of the FortiGate unit.
Outbound NAT makes it impossible for remote hosts to see the IP

addresses of local hosts (hosts located on the network behind the local VPN

gateway).
If Outbound NAT is implemented, it is subject to these limitations:
Configure Outbound NAT only at one end of the tunnel.
The end that does not implement Outbound NAT requires an internal to

external policy that specifies the remote external interface as the

Destination (usually a public IP address).
The tunnel, and the traffic within the tunnel, can only be initiated at the end

that implements Outbound NAT.