IPsec Tunnels
The data path between a userʼs computer and a private network through a VPN is referred to as a tunnel. Like a physical tunnel, the data path is accessible only at both ends. Encapsulation makes this possible. IPsec packets pass from one end of the tunnel to the other and contain data packets that are exchanged between the local user and the remote private network. Encryption of the data packets ensures that any third-party who intercepts the IPsec packets can not access the data.
In FortiProxy, you can create a VPN tunnel between a FortiProxy unit in the branch office and a FortiProxy unit on the office private network.
To view a list of IPsec tunnels, go to VPN > IPsec Tunnels. After you create an IPsec VPN tunnel, it appears in the VPN tunnel list.
Hover over the leftmost edge of the column heading to display the Configure Table icon, which you can use to select the columns to display or to reset all the columns to their default settings. You can also drag column headings to change their order.
The following options are available:
Create New > IPsec Tunnel |
Run the IPsec Wizard and create an IPsec tunnel. See IPsec Wizard. |
Edit |
Edit an IPsec tunnel. See Edit an IPsec tunnel. |
Delete |
Delete the selected IPsec tunnel. |
Search |
Enter a search term to find in the list. |
Tunnel |
The name of the IPsec tunnel. |
Interface Binding |
Select the name of the interface through which remote peers connect to the FortiProxy unit. |
Status |
The status is Active or Inactive. |
Ref. |
Displays the number of times the object is referenced to other objects. To view the location of the referenced object, select the number in Ref.; the Object Usage window opens and displays the various locations of the referenced object. |
Aggregate Weight |
The aggregate weight. |
Comments |
An optional description of the IPsec tunnel. |
IKE Version |
The default IKE version is 1. |
Mode |
The mode is Aggressive or Main (ID Protection):
|
Phase 2 Selectors |
The name of phase 2. |