Created on 06-16-2009 12:54 PM Edited on 07-06-2022 09:36 AM By Anonymous
Description
Scope
FortiOS 4.0 MR1, route based (interface mode) IPSec VPN
FortiOS 4.0 MR1 Patch 1 for NAT dialers
Configuration Method - Cisco VPN client (the version used in this article is 4.8.02.00100)
Solution
Mode: Aggressive
Ipsec interface mode: Enable
Proposal: AES128, SHA1
DH Group: 2
XAUTH: Enable as Server, and select the user group created in step 2
Peer Options: can be any if this tunnel is the only dialup tunnel defined and all dialup vpn users connect to this tunnel. Otherwise use accept a specified peer ID or peer ID in dialup group. If accept peer ID in dialup group, the tunnel preshared key will be the password of the local users in the dialup group.
From CLI, edit the phase1 interface
config vpn ipsec phase1-interface
edit "dialup1"
set mode-cfg enable
set ipv4-start-ip 192.168.233.1 >>>> the first ip in the range which FGT will assign to the ipsec client
set ipv4-end-ip 192.168.233.254 >>>> the last ip in the range which FGT will assign to the ipsec client
set ipv4-netmask 255.255.255.0 >>>> subnet mask
set ipv4-dns-server1 10.5.1.1 >>>> optional DNS info passed to the client
set ipv4-wins-server1 10.5.1.1 >>>>optional WINS info passed to the client
set ipv4-split-include "10.5.x.x" >>>>optional dst address/address group name if split tunneling is desired
end
After all, the dialup phase1 will look like below from CLI:
diagnose vpn ike filter dst-addr4 <client's public ip>diag debug app ike -1
Related Articles
Technical Note : Supporting Multiple Cisco VPN Communities with FortiGate
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.