in this video, you're going to learn how to set up an I p. Sec VPN using the new VPN wizard in 40 West 5.2
using I p sac VPN. You could provide remote IOS users with secure encrypted access to an internal network and route their Internet traffic through the Ford A gate so it abides by your security and firewall policies. This example uses IOS, but you can adapt it for any VPN capable device.
First, go to user and device user definition to create a user with a password,
then go to user and device user groups. Create a user group for IOS users and add the user that you created.
Next go to Policy and Objects addresses to define the internal network address that remote users can access.
Create a local network address,
setting the sub Net I P Range
and setting the interface to any
now. Go to V P N i. P. SEC wizard to create the VPN tunnel,
name your VPN connection and select dial up IOS native and then next
set the incoming interface to the Internet facing interface.
Enter appreciated Key
and select the IOS User Group from the list. Select next.
Set the local interface to the internal land interface and select a local address that you created.
Enter an I P Range to be assigned to VPN users.
This will create an address range that could be used in firewall policies and a policy that grants VP and users access to the internal network.
Next, you'll need to go to Policy and Objects Policy I p. V. Four to create a firewall policy allowing remote users to access the Internet securely through the Ford A gate unit.
Set the incoming interface to the VPN interface
and the outgoing interface to your Internet facing interface.
Configure the rest as normal
and ensure that Nat is enabled
on the IOS device. Go to settings VPN and select Add VPN configuration.
Enter the VP and address user account and password. In there relevant fields
enter the pre shared key in the secret field.
On the 40 gate unit, you can go to V P N i. P. Sac Monitor To view the status of the VP and tunnel
remote user traffic is logged in log and report traffic. Log forward traffic filter the source interface. Call him for the VPN interface to see VPN users accessing the internal network.
Thank you for watching. If you need further details, you can visit docks dot Fortinet dot com at any time to access Fort Nets Complete Documentation Library.