In this video, you will learn how to provide a group of remote users with secure encrypted access to the corporate network using the I P SEC VPN wizard.
The tunnel provides group members with encrypted access to the internal network and forces them through the 40 gate unit. For secure Internet access.
First, go to a user and device user user definition and create a new local user for the user name. Enter Alice,
enter a safe password
at the email address
Then go to user and device user user groups and create a user group for remote users.
Then add the user you created to the group.
Next, go to policy and Objects, objects, addresses and add a fire will address for the local land.
Make sure that you include the sub net
and local interface.
Go to V P N. I. P. SEC Wizard and create a new I P sec VPN tunnel. Using the Wizard
named the VPN Connection,
Select Dial Up 40 client for Windows, Mac OS and Android
said incoming interface to the Internet facing interface set authentication method to pre shared key. The pre shared key is a credential for the VPN and should differ from the user's password.
Select your I P Sec VPN User group and then click next
set local interface to the internal interfaces and said local address to the local land. For the client address range, enter an I P Range that will be assigned to VP in users.
Click Next and for your client options Select Save Password
40 0 s automatically creates a new firewall object for the VP and tunnel. It also creates a security policy to allow remote users to access the internal network.
Next, go to Policy and Objects Policy I p. Four and create a security policy to allow remote users to access the Internet securely through the Ford A gate unit.
Set incoming interface to the tunnel interviewees and said source address toe all
set outgoing interface to win one and destination address to all
set service toe and ensure that you enable net
next open 40 client good a remote access and at a new connection,
provide a connection name and set type toe i P sec VPN set remote gateway to the 40 Gate I P address
set authentication method to pre shared key and enter the key
select the new connection and enter the user name and password and click connect.
Once the connection is established, the 40 gait assigns the user and I p address 40 client displays the connection status, which includes tthe e i. P. Address, duration and bite sent and received.
Open a browser and ensure that you can successfully reach a server.
This example displays an example Web server.
Then on the fourth gate unit, go to VPN monitor i P SEC Monitor
and verified the status of the tunnel.
Goto log in. Report traffic. Log forward traffic to view the traffic.
Select an entry to view more information.
Thank you for watching. For more information, you can access fortune. It's complete documentation library at doc's dot Fortinet dot com.