0% found this document useful (0 votes)
20 views7 pages

102-Remote Access IPSec-Tunnel-VPN

Uploaded by

eshensanjula2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views7 pages

102-Remote Access IPSec-Tunnel-VPN

Uploaded by

eshensanjula2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

IPSec Tunnel VPN Lab:

Remote Access VPN


Outside Layer 3 Interface Port1– 192.168.1.1/24
DMZ Layer 3 Interface Port4 – 10.0.4.0/24 & 10.0.5.0/24
Outside Network 172.29.129.0/24
Management IP Address Port1-192.168.100.200/24
DMZ SRV1 IP Address 10.0.4.1/24
DMZ SRV2 IP Address 10.0.5.2/24
Users and Groups HR Group, IT Group and SAL Group
WAN-Client IP Address 172.29.129.24/24
VPN IP Address Range 10.212.134.200 - 10.212.134.210

1 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717


VPN Setup:
To create Remote IPsec VPN tunnel, connect to FW1 go to VPN > IPsec Wizard, & create new
tunnel. In the VPN Setup step, set Template Type to Remote Access, set Remote Device Type to
Client-Based, and FortiClient.

In Incoming Interface: Choose Port WAN of device. In Authentication Method: Choose Pre-
Shared Key. In Pre-Shared Key: Enter key you want to authenticate. In User Group: Choose VPN
group in this case HR Group already create in Active Directory. Click Next to continue.

In Local Interface: Choose Port DMZ-Zone. In Local Address: Choose address range for IPSec
DMZ. In Client Address Range: Enter IP for VPN client. Click Next to continue.

2 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717


Select Client Options to save Password, Auto Connect and Always Up. Click Next to continue.

Click Create to apply the settings.

3 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717


After you create the tunnel, a summary page lists the objects that have been added to the
FortiGate’s configuration.

4 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717


Testing and Verification:
In FortiClient, go to Remote Access and Add a new connection. Set VPN to IPsec VPN. Enter a
Connection Name. Set Remote Gateway to the FortiGate IP address. Set Authentication Method
to Pre-Shared Key and enter the key. Click Save to apply the setting.

On FortiClient, select the VPN, enter the Username and Password, and select Connect.

5 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717


When the connection is established, FortiGate assigns the user an IP address and FortiClient
displays the status of the connection, including the IP address, connection duration, and bytes
sent and received.

Now try to ping DMZ Zone Servers such as 10.0.4.1 and 10.0.5.2 it will work.

6 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717


On FortiGate, go to Dashboard >Network> IPsec. Verify that the tunnel Status is Up. Remote
Gateway shows the FortiClient user’s assigned gateway IP address.

Navigate to Log & Report > Events > VPN Events to verify VPN related logs

7 | P a g e Created by Ahmad Ali E-Mail: [email protected] , WhatsApp: 00966564303717

You might also like