IPsec VPN with FortiClient

Video Activity

In this video, you will learn how to provide a group of remote users with secure encrypted access to the corporate network using the IPsec VPN Wizard. The tunnel provides group members with encrypted access to the internal network, and forces them through the FortiGate unit for secure Internet access. Visit Fortinet's documentation library at http:...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 35 minutes
Difficulty
Beginner
CEU/CPE
2
Video Description

In this video, you will learn how to provide a group of remote users with secure encrypted access to the corporate network using the IPsec VPN Wizard. The tunnel provides group members with encrypted access to the internal network, and forces them through the FortiGate unit for secure Internet access. Visit Fortinet's documentation library at http://docs.fortinet.com or our video portal at http://video.fortinet.com.

Video Transcription
00:00
In this video, you will learn how to provide a group of remote users with secure encrypted access to the corporate network using the I P SEC VPN wizard.
00:13
The tunnel provides group members with encrypted access to the internal network and forces them through the 40 gate unit. For secure Internet access.
00:29
First, go to a user and device user user definition and create a new local user for the user name. Enter Alice,
00:39
enter a safe password
00:42
at the email address
00:45
and select enable.
00:48
Then go to user and device user user groups and create a user group for remote users.
00:58
Then add the user you created to the group.
01:08
Next, go to policy and Objects, objects, addresses and add a fire will address for the local land.
01:22
Make sure that you include the sub net
01:25
and local interface.
01:38
Go to V P N. I. P. SEC Wizard and create a new I P sec VPN tunnel. Using the Wizard
01:46
named the VPN Connection,
01:48
Select Dial Up 40 client for Windows, Mac OS and Android
01:53
and Quick Next
01:56
said incoming interface to the Internet facing interface set authentication method to pre shared key. The pre shared key is a credential for the VPN and should differ from the user's password.
02:09
Select your I P Sec VPN User group and then click next
02:15
set local interface to the internal interfaces and said local address to the local land. For the client address range, enter an I P Range that will be assigned to VP in users.
02:28
Click Next and for your client options Select Save Password
02:36
40 0 s automatically creates a new firewall object for the VP and tunnel. It also creates a security policy to allow remote users to access the internal network.
02:51
Next, go to Policy and Objects Policy I p. Four and create a security policy to allow remote users to access the Internet securely through the Ford A gate unit.
03:04
Set incoming interface to the tunnel interviewees and said source address toe all
03:09
set outgoing interface to win one and destination address to all
03:15
set service toe and ensure that you enable net
03:34
next open 40 client good a remote access and at a new connection,
03:39
provide a connection name and set type toe i P sec VPN set remote gateway to the 40 Gate I P address
03:49
set authentication method to pre shared key and enter the key
03:53
click. Okay,
03:55
select the new connection and enter the user name and password and click connect.
04:01
Once the connection is established, the 40 gait assigns the user and I p address 40 client displays the connection status, which includes tthe e i. P. Address, duration and bite sent and received.
04:21
Open a browser and ensure that you can successfully reach a server.
04:27
This example displays an example Web server.
04:30
Then on the fourth gate unit, go to VPN monitor i P SEC Monitor
04:36
and verified the status of the tunnel.
04:40
Goto log in. Report traffic. Log forward traffic to view the traffic.
04:46
Select an entry to view more information.
04:57
Thank you for watching. For more information, you can access fortune. It's complete documentation library at doc's dot Fortinet dot com.
Up Next