This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.
A colleague wanted to test VPNs to multiple platforms. I set up a Checkpoint 1450, PAN 200, and an ASA 5515. This box is running the following:
To begin, I needed to configure the Internet side of the Checkpoint Firewall.
Logs & Monitoring
tab on the top.Tools
on the left column.By choosing VPN
on the top tab, then VPN Sites
you can see I have no VPNs defined. You can click the Add
link in the top/middle section of the screen.
Here we can see the Remote Site
configuration screen that shows the main section of the VPN connection.
Apply
Note: This is extremely strange when you are used to using other firewalls on the market. Checkpoint is known for its Encryption Domain
that is not necessarily configured in this VPN or in the Communities if using the Centralized Management solution.
Next we configure the Phase I and Phase II proposals. If you want to add multiple Encryptions schemes as an example, you can choose additional ones and they will be added to the top (see below)
AES 128
AES 256
To set up the Phase II selectors for the Local
side, go to VPN
then Advanced
. You will see the first red square that shows the local encryption domain is defined manually
which you will need to select.
Once selected, you can add separate networks or single IP addresses, however it will NOT let you add a group. This can be problematic depending on the number of networks you have behind the checkpoint.
You will need to create rules
(in Checkpoint = Policies in FTNT).
On the top section, you see the Link'd sections in regular English. By selecting each of those sections on the top, you can modify the Source
/ Destination
/ Application
/ Service
.
You will also need to create a no-nat
rule under Access Policy
then NAT
. You can create a new rule.
Here we can see that when LOCA-LANs
(a group containing local-lan1
and local-lan2
)
Note: Yes I know I spelled the group name incorrect. Just lazy to go back and fix it after getting the screenshots.
Hope this helps
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.