Solved

How to configure a VPN with a Fortigate 60b Firewall

Posted on 2011-03-04
4
1,589 Views
Last Modified: 2012-08-13
How do I configure a Fortigate 60b Firewall VPN.  I would like to use the VPN so that I can access network drivers and do remote desktop connections.

0
Comment
Question by:dman19691
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
piwowarc earned 500 total points
ID: 35042937
There are few types of VPN you can choose to do the job for you.

IPSEC - very secure but may be problematic for remote users (client app needed)

http://docs.fortinet.com/fgt/archives/3.0/techdocs/FortiGate_IPSec_VPN_User_Guide_01-30005-0065-20081015.pdf

SSL - very secure and usually easy to set up for remote users (SSL widely used in www) (client app needed)

http://docs.fortinet.com/fgt/archives/3.0/techdocs/FortiGate_SSL_VPN_User_Guide_01-30004-0348-20070405.pdf

PPTP - less secure than both of the above, oldest. Very low CPU usage of firewall (less consuming crypting algorithm so many remote users) (almost every flavour of linux/unix/mac/windows has pptp client build in)

http://docs.fortinet.com/fgt/archives/3.0/techdocs/FortiGate_PPTP_VPN_User_Guide_01-30004-0349-20070201.pdf


Of coures if you need to set up Site to Site VPN not client you don't have as many options.

HTH

Chris
0
 
LVL 5

Expert Comment

by:piwowarc
ID: 35042942
Just for clarification

By means of problematic to set up i meant potential troubles with NAT on remote users side.

SSL seems best choice

HTH

Chris

0
 
LVL 69

Expert Comment

by:Qlemo
ID: 35349251
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Asa 5520 Configuration 3 75
ASA Deny No Connection PSH ACK, Traffic is dropped 10 85
Firewall port opening 2 67
Palo Alto Networks: Packet Trace Simulator? 2 42
In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question