


If you are using Local Identification and Remote Identification, you can define those values here.Here you can choose weather the peer will have a static IP or if it will be dynamic.

By choosing the drop-down, you will be able to choose the IP that is assigned to the chosen interface (item 2).Under the IKE Gateway configuration, we will define: Next we will create the gateway where we will define the remote peer IP, pre-shared key, and the IKE Crypto Profile. In the IPSec Crypto Profile section, you will define your Phase II proposals. As you can see below, we have the IKE Crypto Profile and within it, we can see that we are using AES256 as the encryption scheme, the hashing or Authentication is SHA256 with a Diffie-Hellman (DH) group of 5. In this section, we will configure the Phase I proposals. Most of these sections will be under Network and then on the left, you will see the options to configure the next few sections. It give you a good overview of what each "ingredient" does. The graphic above was part of a deliverable I created for a customer a while back when I was running service for a reseller and installing PAN, Fortigate and plenty of Cisco ASAs. If you understand IPSec it's not that bad. In the case of PAN, you need to set up what I like to call "the ingredients" for the VPN and then create the VPN "dish" itself. Cisco creates separate phase I and phase II sections and then a crypto map and an access list, etc. In PAN, rather than creating a VPN in one section, as in the Fortigate, it is broken down into pieces similar to Cisco. I am going to be installing a VM in a couple of weeks and will be doing some compare and contrast articles and some PAN VM to Fortigate VMs performance comparison so stay tuned, this could get interesting. Mostly because I no longer own an updated PAN box. In this article, I am using "WAY OLD" PAN OS.
