IPSEC enabled interface security

Author
James_G
Silver Member
  • Total Posts : 93
  • Scores: 4
  • Reward points: 0
  • Joined: 2016/02/28 02:55:47
  • Status: offline
2019/11/07 02:31:22 (permalink)
0

IPSEC enabled interface security

Am i correct in thinking that IPSEC site to site VPN configurations were the remote gateway is specified as a static IP, the tunnel will only be able to be brought up if the remote gateway is indeed on that IP?
 
What I am asking is can I depend on the fixed IP of the gateways being a 'factor' in 2 factor security. The other factor obviously is the pre-shared keys.
 
Thanks.
#1

2 Replies Related Threads

    James_G
    Silver Member
    • Total Posts : 93
    • Scores: 4
    • Reward points: 0
    • Joined: 2016/02/28 02:55:47
    • Status: offline
    Re: IPSEC enabled interface security 2019/11/07 09:25:59 (permalink)
    0
    Answered my own question - IPSEC main mode uses the fixed remote IP to respond, thus can be a factor
     
    :)
    #2
    sw2090
    Gold Member
    • Total Posts : 468
    • Scores: 23
    • Reward points: 0
    • Joined: 2017/06/14 01:27:25
    • Location: Regensburg
    • Status: offline
    Re: IPSEC enabled interface security 2019/11/08 02:52:21 (permalink)
    0
    well the Fortigate does also support entering a FQDN as remote gw of an IPSec Tunnel.
    I did that once using some dyndns fqdn since I have no static ip on that site and it works util today.
    post edited by sw2090 - 2019/11/08 02:53:53
    #3
    Jump to:
    © 2019 APG vNext Commercial Version 5.5