FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Not applicable
Article Id 195458
Article
Introduction

This article describes how to configure an IPSec VPN on a FortiGate unit to work with the VPN feature of a Linksys BEFVP41 Router.

Components
  • FortiGate unit with FortiOS v3.0 firmware
  • Linksys BEFVP41 Router
Network Diagram
Configure FortiGate VPN Phase 1

To configure using the Web-based Manager:

  1. Go to VPN > IPSec > Auto-Key and select Phase1.
  2. Enter the following:

  3. NameVPN name: 4Linksys
    Remote GatewayDialup User
    Local InterfaceSelect the interface that connects to the Internet. For example, WAN1.
    ModeAggressive
    Authentication MethodPreshared Key
    Pre-shared KeyEnter the same preshared key as configured on the Linksys router.

  4. Select Advanced and enter the following:

  5. Enable IPSec Interface ModeClear this check box
    P1 Proposal1 - 3DES SHA1
    2 - 3DES MD5
    DH Group2
    Nat-traversalEnable
    Dead Peer DetectionEnable

  6. Select OK.

To configure using the CLI:

config vpn ipsec phase1
  edit "4Linksys"
    set type dynamic
    set interface "wan1"
    set dpd enable
    set nattraversal enable
    set dhgrp 2
    set proposal 3des-sha1 3des-md5
    set mode aggressive
    set psksecret ENC XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
  end
Configure FortiGate VPN Phase 2

To configure using the Web-based Manager:

  1. Go to VPN > IPSec > Auto-Key and select Phase 2.
  2. Enter the following:

  3. NameA name for the VPN Phase 2 configuration: 4Linksys_p2
    Phase 1Phase 1 configuration name: 4Linksys

  4. Select Advanced and enter the following:

  5. P2 Proposal1 - 3DES SHA1
    2 - 3DES MD5
    Enable Replay DetectionEnable
    DH Group2

  6. Select OK.

To configure using the CLI:

config vpn ipsec phase2
  edit "4Linksys_p2"
    set dhgrp 2
    set pfs enable
    set phase1name "4Linksys"
    set proposal 3des-sha1 3des-md5
    set replay enable
  end
Configure FortiGate Firewall Addresses

Create firewall addresses for the private networks at either end of the VPN. "LocalLAN" is the network behind the FortiGate unit and "Linksys_net" is the network behind the Linksys router.

To configure using the Web-based Manager:

  1. Go to Firewall > Address and select Create New.
  2. Enter the following:

  3. Address NameLocalLAN
    TypeSubnet/IP Range
    Subnet/IP Range10.166.0.0 255.255.255.0

  4. Select OK.

Repeat the preceding steps for the address "Linkys_net": "192.168.1.0 255.255.255.0".

To configure using the CLI:

config firewall address
  edit "LocalLAN"
    set subnet 10.166.0.0 255.255.255.0
  next
  edit "Linkys_net"
    set subnet 192.168.1.0 255.255.255.0
  end
Configure FortiGate Firewall Policy

The firewall policy allows hosts behind the Linksys router to initiate communication with hosts on the network behind the FortiGate unit.

To configure using the Web-based Manager:

  1. Go to Firewall > Policy and select Create New.
  2. Enter the following:

  3. Source Interface/ZoneThe interface that connects to the local network: internal
    Source AddressThe firewall address of the local network: LocalLAN
    Destination Interface/ZoneThe interface connected to the remote network: WAN1
    Destination Address The firewall address of the remote network: Linksys_net
    ScheduleAlways
    ServiceANY
    ActionIPSEC
    VPN Tunnel4Linksys
  4. Select OK.

To configure using the CLI:

config firewall policy
  edit 3
    set srcintf internal
    set dstintf wan1
    set srcaddr LocalLAN
    set dstaddr Linksys_net
    set action ipsec
    set vpntunnel 4Linksys
    set inbound enable
    set schedule "always"
    set service "ANY"
  end
Configure Linksys Router

To configure the Linksys router

  1. Log on to the the Linksys router's web-based utility.
  2. Select the VPN tab and enter the following information:

  3. Select Tunnel Entry:Select an unused tunnel entry
    VPN Tunnel:Enabled
    Tunnel Name:Enter a name
    Local Secure GroupSelect Subnet
    IP192.168.1.0
    Mask255.255.255.0
    Remote Security GatewaySelect IP Address
    IP AddressThe public IP address of the FortiGate unit. In this example, the address of the WAN1 network interface.
    Encryption3DES
    AuthenticationSHA
    Key ManagementSelect Auto (IKE)
    PFSEnabled
    Pre-shared KeyEnter the same preshared key as you entered in the FortiGate unit VPN phase 1 configuration.
    Key Lifetime3600 seconds

  4. Select Save Settings.
  5. Select Advanced Setting and enter the following information:

  6. Phase 1 Operation ModeSelect Aggressive mode
    Phase 1 ProposalEncryption: 3DES
    Authentication: SHA
    Group: 1024-bit
    Key Lifetime: 3600 seconds
    Phase 2 ProposalEncryption: 3DES
    Authentication: SHA
    PFS: ON
    Group: 1024-bit
    Key Lifetime: 3600 seconds

  7. Select Save Settings.

Related Articles

List of articles about Fortigate IPSec VPN interoperability