The integrator which we engage was kind enough to send us a Fortigate cookbook to follow however the settings on the cookbook are reference guide only. The settings within the cookbook doesn’t reflect the exact configuration settings configured at Azure’s end.
Like any site to site VPN, we need to create both Phase 1 and Phase 2 options:
Phase 1 settings:
IKE Version: 1
Encryption: AES256; Authentication: SHA1
Encryption: AES256; Authentication: SHA256
DH Group: 2
Keylife: 28800
IKE Version: 1
Encryption: AES256; Authentication: SHA1
Encryption: AES256; Authentication: SHA256
DH Group: 2
Keylife: 28800
Phase 2 settings:
Encryption and Auth settings are the same as Phase 1.
Enable replay detection
Keylife: BOTH 3600 seconds and 102400000 KB
Encryption and Auth settings are the same as Phase 1.
Enable replay detection
Keylife: BOTH 3600 seconds and 102400000 KB
Create two security policies on the Fortigate firewall to enable traffic movements
inside to Azure
Azure to inside
Create static route on the Fortigate so access to the Azure subnet will traverse via VPN instead of default static route to Internet
No comments:
Post a Comment