Fortigate SSL VPN 52
Fortigate SSL VPN 52
Fortigate SSL VPN 52
VPN
VERSION 5.2.4
FORTINET DOCUMENT LIBRARY
http://docs.fortinet.com
FORTINET VIDEO GUIDE
http://video.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
CUSTOMER SERVICE & SUPPORT
https://support.fortinet.com
http://cookbook.fortinet.com/how-to-work-with-fortinet-support/
FORTIGATE COOKBOOK
http://cookbook.fortinet.com
FORTINET TRAINING SERVICES
http://www.fortinet.com/training
FORTIGUARD CENTER
http://www.fortiguard.com
FEEDBACK
Email: techdocs@fortinet.com
01-520-112804-20140807
TABLE OF CONTENTS
Change Log 7
Overview 8
Introduction to SSL VPN 9
SSL VPN modes of operation 10
Web-only mode 10
Tunnel mode 11
Port forwarding mode 12
Application support 12
Antivirus and firewall host compatibility 12
Traveling and security 13
Host check 14
Cache cleaning 14
SSL VPN and IPv6 14
Basic configuration 15
User accounts and groups 15
Authentication 16
MAC host check 16
IP addresses for users 17
DHCP relay of IP address 17
Authentication of remote users 17
Configuring SSL VPN web portals 20
SSL connection configuration 20
Portal configuration 21
Personal bookmarks 24
SSL VPN Realms 24
Tunnel mode and split tunneling 25
Configuring encryption key algorithms 26
Additional configuration options 27
Routing in tunnel mode 27
Changing the port number for web portal connections 27
SSL offloading 28
Host check 28
Replacing the host check error message 28
Creating a custom host check list 29
Windows OS check 29
Configuring cache cleaning 30
Configuring virtual desktop 31
Configuring client OS Check 32
Adding WINS and DNS services for clients 32
Setting the idle timeout setting 33
SSL VPN logs 33
Monitoring active SSL VPN sessions 33
Importing and using a CA-signed SSL certificate 34
The SSL VPN client 35
FortiClient 35
Tunnel mode client configuration 35
The SSL VPN web portal 37
Connecting to the FortiGate unit 37
Web portal overview 37
Portal configuration 39
Portal settings 41
Portal widgets 42
Applications available in the web portal 43
Using the My Bookmarks widget 44
Adding bookmarks 44
Using the Connection Tool 45
Tunnel-mode features 49
Using the SSL VPN virtual desktop 50
Using FortiClient 51
Setup examples 52
Secure Internet browsing 52
Creating an SSL VPN IP pool and SSL VPN web portal 53
Creating the SSL VPN user and user group 53
Creating a static route for the remote SSL VPN user 53
Creating security policies 54
Configuring authentication rules 54
Results 55
Split Tunnel 55
Creating a firewall address for the head office server 55
Creating the SSL VPN user and user group 56
Results 57
Multiple user groups with different access permissions 58
General configuration steps 58
Creating the firewall addresses 58
Creating the tunnel client range addresses 59
Creating the web portals 59
Creating the user accounts and user groups 60
Creating the security policies 60
Configuring authentication rules 61
Create the static route to tunnel mode clients 62
Troubleshooting 64
Sending tunnel statistics to FortiAnalyzer 66
Change Log
Fixed web-mode policy description error in Multiple user groups with different access
2015-08-21
permissions on page 58.
2013-09-16 Added RFCs 2246, 4346, 5246, 6101, and 6176 for SSL and TLS support.
This document provides a general introduction to SSL VPN technology, explains the features available with SSL
VPN and gives guidelines to decide what features you need to use, and how the FortiGate unit is configured to
implement the features.
Introduction to SSL VPN provides useful general information about VPN and SSL, how the FortiGate unit
implements them, and gives guidance on how to choose between SSL and IPsec.
Basic configuration explains how to configure the FortiGate unit and the web portal. Along with these
configuration details, this chapter also explains how to grant unique access permissions, how to configure the
SSL encryption key algorithm, and describes the SSL VPN OS Patch Check feature that allows a client with a
specific OS patch to access SSL VPN services.
The SSL VPN client provides an overview of the FortiClient software required for tunnel mode, where to obtain
the software, how to install it, and the configuration information required for remote users to connect to the
internal network.
The SSL VPN web portal provides an overview of the SSL VPN web portal, with explanations of how to use and
configure the web portal features.
Setup examples explores several configuration scenarios with step-by-step instructions. While the information
provided is enough to set up the described SSL VPN configurations, these scenarios are not the only possible SSL
VPN setups.
As organizations have grown and become more complex, secure remote access to network resources has
become critical for day-to-day operations. In addition, businesses are expected to provide clients with efficient,
convenient services including knowledge bases and customer portals. Employees traveling across the country or
around the world require timely and comprehensive access to network resources. As a result of the growing need
for providing remote/mobile clients with easy, cost-effective and secure access to a multitude of resources, the
concept of a Virtual Private Network (VPN) was developed.
SSL VPNs establish connectivity using SSL, which functions at Levels 4 - 5 (Transport and Session layers).
Information is encapsulated at Levels 6 - 7 (Presentation and Application layers), and SSL VPNs communicate at
the highest levels in the OSI model. SSL is not strictly a Virtual Private Network (VPN) technology that allows
clients to connect to remote networks in a secure way. A VPN is a secure logical network created from physically
separate networks. VPNs use encryption and other security methods to ensure that only authorized users can
access the network. VPNs also ensure that the data transmitted between computers cannot be intercepted by
unauthorized users. When data is encoded and transmitted over the Internet, the data is said to be sent through a
“VPN tunnel”. A VPN tunnel is a non-application oriented tunnel that allows the users and networks to exchange a
wide range of traffic regardless of application or protocol.
The advantages of a VPN over an actual physical private network are two-fold. Rather than utilizing expensive
leased lines or other infrastructure, you use the relatively inexpensive, high-bandwidth Internet. Perhaps more
important though is the universal availability of the Internet. In most areas, access to the Internet is readily
obtainable without any special arrangements or long wait times.
SSL (Secure Sockets Layer) as HTTPS is supported by most web browsers for exchanging sensitive information
securely between a web server and a client. SSL establishes an encrypted link, ensuring that all data passed
between the web server and the browser remains private and secure. SSL protection is initiated automatically
when a user (client) connects to a web server that is SSL-enabled. Once the successful connection is established,
the browser encrypts all the information before it leaves the computer. When the information reaches its
destination, it is decrypted using a secret (private) key. Any data sent back is first encrypted, and is decrypted
when it reaches the client.
Version RFC
When a remote client connects to the FortiGate unit, the FortiGate unit authenticates the user based on
username, password, and authentication domain. A successful login determines the access rights of remote
users according to user group. The user group settings specify whether the connection will operate in web-only
mode or tunnel mode.
Web-only mode
Web-only mode provides remote users with a fast and efficient way to access server applications from any thin
client computer equipped with a web browser. Web-only mode offers true clientless network access using any
web browser that has built-in SSL encryption and the Sun Java runtime environment.
Support for SSL VPN web-only mode is built into FortiOS. The feature comprises of an SSL daemon running on
the FortiGate unit, and a web portal, which provides users with access to network services and resources
including HTTP/HTTPS, Telnet, FTP, SMB/CIFS, VNC, RDP, and SSH.
In web-only mode, the FortiGate unit acts as a secure HTTP/HTTPS gateway and authenticates remote users as
members of a user group. After successful authentication, the FortiGate unit redirects the web browser to the
web portal home page and the user can access the server applications behind the FortiGate unit.
When the FortiGate unit provides services in web-only mode, a secure connection between the remote client and
the FortiGate unit is established through the SSL VPN security in the FortiGate unit and the SSL security in the
web browser. After the connection has been established, the FortiGate unit provides access to selected services
and network resources through a web portal.
FortiGate SSL VPN web portals have a 1- or 2-column page layout and portal functionality is provided through
small applets called widgets. Widget windows can be moved or minimized. The controls within each widget
depend on its function. There are predefined web portals and the administrator can create additional portals.
Configuring the FortiGate unit involves selecting the appropriate web portal configuration in the user group
settings. These configuration settings determine which server applications can be accessed. SSL encryption is
used to ensure traffic confidentiality.
The following table lists the operating systems and web browsers supported by SSL VPN web-only mode.
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
Tunnel mode
Tunnel mode offers remote users the freedom to connect to the internal network using the traditional means of
web-based access from laptop computers, as well as from airport kiosks, hotel business centers, and Internet
cafés. If the applications on the client computers used by your user community vary greatly, you can deploy a
dedicated SSL VPN client to any remote client through its web browser. The SSL VPN client encrypts all traffic
from the remote client computer and sends it to the FortiGate unit through an SSL VPN tunnel over the HTTPS
link between the web browser and the FortiGate unit. Another option is split tunneling, which ensures that only
the traffic for the private network is sent to the SSL VPN gateway. Internet traffic is sent through the usual
unencrypted route. This conserves bandwidth and alleviates bottlenecks.
In tunnel mode, remote clients connect to the FortiGate unit and the web portal login page using Microsoft
Internet Explorer, Firefox, Mac OS, or Linux. The FortiGate unit acts as a secure HTTP/HTTPS gateway and
authenticates remote users as members of a user group. After successful authentication, the FortiGate unit
redirects the web browser to the web portal home page dictated by the user group authentication settings. If the
user does not have the SSL VPN client installed, they will be prompted to download the SSL VPN client (an
ActiveX or Java plugin) and install it using controls provided through the web portal. SSL VPN tunnel mode can
also be initiated from a standalone application on Windows, Mac OS X, and Linux (see below).
Remote clients in tunnel mode cannot connect to the web portal using Chrome as it is
not supported. Refer to the Release Notes for more information.
SSL VPN Tunnel client standalone installer (build 2300) supported operating systems
Microsoft Windows • 8.1 (32-bit & 64-bit), 8 (32-bit & 64-bit), 7 (32-bit & 64-bit), and XP SP3 in
.exe and .msi formats
When the user initiates a VPN connection with the FortiGate unit through the SSL VPN client, the FortiGate unit
establishes a tunnel with the client and assigns the client a virtual IP address from a range of reserved addresses.
The client uses the assigned IP address as its source address for the duration of the connection. After the tunnel
has been established, the user can access the network behind the FortiGate unit.
Configuring the FortiGate unit to establish a tunnel with remote clients involves enabling the feature through SSL
VPN configuration settings and selecting the appropriate web portal configuration for tunnel-mode access in the
user group settings. The security policy and protection profiles on the FortiGate unit ensure that inbound traffic is
screened and processed securely.
The user account used to install the SSL VPN client on the remote computer must
have administrator privileges.
If you are using Windows Vista, you must disable UAC (User Account Control) before
installing the SSL VPN tunnel client. IE7 in Windows Vista runs in Protected Mode by
default. To install SSL VPN client ActiveX, you need to launch IE7 by using 'Run as
administrator' (right-click the IE7 icon and select 'Run as administrator').
For information about client operating system requirements, see the Release Notes for your FortiGate firmware.
For information on configuring tunnel mode, see Basic configuration on page 15.
While tunnel mode provides a Layer 3 tunnel that users can run any application over, the user needs to install the
tunnel client, and have the required administrative rights to do so. In some situations, this may not be desirable,
yet the simple web mode does not provide enough flexibility for application support (for example, if you wish to
use an email client that communicates with a POP3 server). The port forward mode, or proxy mode, provides this
middle ground between web mode and tunnel mode.
SSL VPN port forwarding listens on local ports on the user’s computer. When it receives data from a client
application, the port forward module encrypts and sends the data to the FortiGate unit, which then forwards the
traffic to the application server.
The port forward module is implemented with a Java applet, which is downloaded and runs on the user’s
computer. The applet provides the up-to-date status information such as addressing and bytes sent and received.
On the user end, the user logs into the FortiGate SSL VPN portal, and selects a port forward bookmark configured
for a specific application. The bookmark defines the server address and port as well as which port to listen to on
the user’s computer.
The user must configure the application on the PC to point to the local proxy instead of
the application server. For information on this configuration change, see the
application documentation.
This mode only supports client/server applications that are using a static TCP port. It
will not support client/server applications using dynamic ports or traffic over UDP.
For information on configuring a port forward tunnel, see Basic configuration on page 15.
Application support
With Citrix application servers, the server downloads an ICA configuration file to the user’s PC. The client
application uses this information to connect to the Citrix server. The FortiGate unit will read this file and append a
SOCKS entry to set the SOCKS proxy to ‘localhost’. The Citrix client will then be able to connect to the SSL VPN
port forward module to provide the connection. When configuring the port forwarding module, a selection is
available for Citrix servers.
For Windows Remote Desktop Connections, when selecting the RDP option, the tunnel will launch the RDP client
and connect to the local loopback address after the port forward module has been initiated.
Because SSL VPN provides a means for “on-the-go” users to dial in to the network while away from the office, you
need to ensure that wherever and however they choose to dial in is secure, and not potentially compromising the
corporate network.
When setting up the portal, you can include two options to ensure corporate data is safe; a host check for
antivirus software, and a cache cleaner.
Host check
You can enable a host integrity checker to scan the remote client. The integrity checker probes the remote client
computer to verify that it is safe before access is granted. Security attributes recorded on the client computer (for
example, in the Windows registry, in specific files, or held in memory due to running processes) are examined and
uploaded to the FortiGate unit. For more information, see Basic configuration on page 15.
Host Check is applicable for both SSLVPN Web Mode and SSLVPN Tunnel mode.
Cache cleaning
You can enable a cache cleaner to remove any sensitive data that would otherwise remain on the remote
computer after the session ends. For example, all cache entries, browser history, cookies, encrypted information
related to user authentication, and any temporary data generated during the session are removed from the
remote computer. If the client’s browser cannot install and run the cache cleaner, the user is not allowed to
access the SSL-VPN portal. For more information, see Basic configuration on page 15.
FortiOS supports SSL VPN with IPv6 addressing, and is available for all the java applets (Telnet, VNC, RDP, and
so on). IPv6 configurations for security policies and addressing include:
Configuring SSL VPN involves a number of configurations within FortiOS that you need to complete to make it all
come together. This chapter describes the components required, and how and where to configure them to set up
the FortiGate unit as an SSL VPN server. The configurations and steps are high level, to show you the procedures
needed, and where to locate the options in FortiOS. For real-world examples, see Setup examples on page 52.
There are three or four key steps to configuring an SSL VPN tunnel. The first three in the points below are
mandatory, while the others are optional. This chapter outlines these key steps as well as additional
configurations for tighter security and monitoring.
l Create user accounts and user groups for the remote clients.
(User accounts and groups on page 15)
l Create a web portal to define user access to network resources.
(Configuring SSL VPN web portals on page 20)
l Configure the security policies.
(Configuring security policies on page 1)
l For tunnel-mode operation, add routing to ensure that client tunnel-mode packets reach the SSL VPN interface.
(Routing in tunnel mode on page 27)
l Setup logging of SSL VPN activities.
(SSL VPN logs on page 33)
This section contains the following information:
The first step for an SSL VPN tunnel is to add the users and user groups that will access the tunnel. You may
already have users defined for other authentication-based security policies.
The user group is associated with the web portal that the user sees after logging in. You can use one policy for
multiple groups, or multiple policies to handle differences between the groups such as access to different
services, or different schedules.
l In the web-based manager, go to User & Device > User > User Definition, and select Create New.
l In the CLI, use the commands in config user local.
All users accessing the SSL tunnel must be in a firewall user group. User names can be up to 64 characters long.
l In the web-based manager, go to User & Device > User > User Groups and select Create New.
l In the CLI, use the commands in config user group.
Authentication
Remote users must be authenticated before they can request services and/or access network resources through
the web portal. The authentication process can use a password defined on the FortiGate unit or optionally use
established external authentication mechanisms such as RADIUS or LDAP.
To authenticate users, you can use a plain text password on the local FortiGate unit, forward authentication
requests to an external RADIUS, LDAP or TACACS+ server, or utilize PKI certificates.
For information about how to create RADIUS, LDAP, TACACS+ or PKI user accounts and certificates, see the
Authentication Guide.
FortiOS supports LDAP password renewal notification and updates through SSL VPN.
Configuration is enabled using the CLI commands:
MAC addresses can be tied to specific portals and can be either the entire MAC address or a subset of the
address. MAC host checking is configured in the CLI using the folowing commands:
conf vpn ssl web portal
edit portal
set mac-addr-check enable
set mac-addr-action allow
config mac-addr-check-rule
edit "rule1"
set mac-addr-list 01:01:01:01:01:01 08:00:27:d4:06:5d
set mac-addr-mask 48
end
end
1. Go to Policy & Objects > Objects > Addresses and select Create New.
2. Enter a Name, for example, SSL_VPN_tunnel_range.
3. Select a Type of IP Range.
4. In the Subnet/IP Range field, enter the starting and ending IP addresses that you want to assign to SSL VPN
clients, for example 10.254.254.[80-100].
5. In Interface, select Any.
6. Select OK.
If your SSL VPN tunnel range is for example 10.254.254.80 - 10.254.254.100, you could enter
config firewall address
edit SSL_tunnel_users
set type iprange
set end-ip 10.254.254.100
set start-ip 10.254.254.80
end
an LDAP server or using more secure options. FortiOS provides a number of options for authentication as well as
security option for those connected users.
The web portal can include bookmarks to connect to internal network resources. A web (HTTP/HTTPS) bookmark
can include login credentials so that the FortiGate unit automatically logs the user into the website. This means
that the user logs into the SSL VPN and then does not have to enter any more credentials to visit preconfigured
web sites.
Both the administrator and the end user can configure bookmarks, including SSO bookmarks. To add bookmarks
as a web portal user, see The SSL VPN web portal on page 37.
For example, to change the authentication timeout to 18 000 seconds, enter the following commands in the CLI:
config vpn ssl settings
set auth-timeout 18000
end
You can also set the idle timeout for the client, to define how long the user does not access the remote resources
before they are logged out. For information see User accounts and groups on page 15.
Go to VPN > SSL > Portals, select a portal, and enable Limit Users to One SSL-VPN Connection at a
Time. It is disabled by default.
For information about obtaining and installing certificates, see the Authentication Guide.
You can select the Require Client Certificate option so that clients must authenticate using certificates. The
client browser must have a local certificate installed, and the FortiGate unit must have the corresponding CA
certificate installed.
When the remote client initiates a connection, the FortiGate unit prompts the client browser for its client-side
certificate as part of the authentication process.
If your SSL VPN clients require strong authentication, the FortiGate unit must offer a CA certificate that the client
browser has installed.
In the FortiGate unit SSL VPN settings, you can select which certificate the FortiGate offers to authenticate itself.
By default, the FortiGate unit offers its factory installed (Fortinet_CA_SSLProxy) certificate from Fortinet to
remote clients when they connect. If you leave the default setting, a warning appears that recommends you
purchase a certificate for your domain and upload it for use.
FortiOS will check the server certificate to verify that the certificate is valid. Only valid
server certificates should be used.
FortiOS allows you to import, generate, and use ECDSA certificates defined by the Suite B cryptography set. To
generate ECDSA certificates, use the following command in the CLI:
exec vpn certificate local generate ec <certificate-name_str> <elliptic-curve-name>
<subject_str> [<optional_information>]
The SSL VPN portal enables remote users to access internal network resources through a secure channel using a
web browser. FortiGate administrators can configure login privileges for system users as well as the network
resources that are available to the users.
FortiOS supports LDAP password renewal notification and updates through SSL VPN.
Configuration is enabled using the CLI commands:
This step in the configuration of the SSL VPN tunnel sets up the infrastructure; the addressing, encryption, and
certificates needed to make the initial connection to the FortiGate unit. This step is also where you configure
what the remote user sees with a successful connection. The portal view defines the resources available to the
remote users and the functionality they have on the network.
Listen on Interface(s) Define the interface which the FortiGate will use to listen for SSL VPN
tunnel requests. This is generally your external interface.
Restrict Access Restrict accessibility to either Allow access from any host or to Limit
access to specific hosts as desired. If selecting the latter, you must
specify the hosts.
Select the signed server certificate to use for authentication. If you leave
the default setting (Fortinet_CA_SSLProxy), the FortiGate unit offers its
Server Certificate built-in certificate from Fortinet to remote clients when they connect. A
warning appears that recommends you purchase a certificate for your
domain and upload it for use.
Require Client Certificate Select to use group certificates for authenticating remote clients. When the
remote client initiates a connection, the FortiGate unit prompts the client
for its client-side certificate as part of the authentication process.
Type the period of time (in seconds) that the connection can remain
inactive before the user must log in again. The range is from 10 to 28800
Idle Logout seconds. Setting the value to 0 will disable the idle connection timeout.
This setting applies to the SSL VPN session. The interface does not time
out when web application sessions or tunnels are up.
Address Range Select Specify custom IP ranges to select the range or subnet firewall
addresses that represent IP address ranges reserved for tunnel-mode SSL
VPN clients.
Enter up to two DNS servers (IPv4 or IPv6) to be provided for the use of
DNS Server
clients.
Specify WINS Servers Enable to access options for entering up to two WINS servers (IPv4 or IPv6)
to be provided for the use of clients.
Portal configuration
The portal configuration determines what the remote user sees when they log in to the portal. Both the system
administrator and the user have the ability to customize the SSL VPN portal.
To view the portals settings page, go to VPN > SSL > Portals.
l full-access
l tunnel-access
l web-access
Each portal type includes similar configuration options. Select between the different portals by double-clicking
one of the default portals in the list. You can also create a custom portal by selecting the Create New option at
the top.
If your web portal provides tunnel mode access, you need to configure the
Enable Tunnel Mode Tunnel Mode widget. These settings determine how tunnel mode clients
are assigned IPv4 addresses.
Enable Split Tunneling Select so that the VPN carries only the traffic for the networks behind the
FortiGate unit. The user’s other traffic follows its normal route.
If you enable split tunneling, you are required to set the Routing
Address, which is the address that your corporate network is using. Traffic
intended for the Routing Address will not be split from the tunnel.
Enable IPv6 Tunnel Mode If your web portal provides tunnel mode access, you need to configure the
Tunnel Mode widget. These settings determine how tunnel mode clients
are assigned IPv6 addresses.
Select so that the VPN carries only the traffic for the networks behind the
FortiGate unit. The user’s other traffic follows its normal route. This applies
only to IPv6 tunnels.
Enable IPv6 Split Tunneling
If you enable split tunneling, you are required to set the Routing
Address, which is the address that your corporate network is using. Traffic
intended for the Routing Address will not be split from the tunnel.
Source IPv6 Pools Select an IPv6 Pool for users to acquire an IP address when connecting to
the portal. There is always a default pool available if you do not create your
own.
Save Password - When enabled, if the user selects this option, their
password is stored on the user’s computer and will automatically populate
each time they connect to the VPN.
Client Options
Auto Connect - When enabled, if the user selects this option, when the
FortiClient application is launched, for example after a reboot or system
startup, FortiClient will automatically attempt to connect to the VPN tunnel.
Always Up (Keep Alive) - When enabled, if the user selects this option,
the FortiClient connection will not shut down. When not selected, during
periods of inactivity, FortiClient will attempt to stay connected every three
minutes for a maximum of 10 minutes.
Portal Message This is a text header that appears on the top of the web portal.
Select one column or two column layouts for the widgets that appear on the
Page Layout
web portal page.
Include Status Information Select to display the Status Information widget on the portal page. The
Status Information widget displays the login name of the user, the
amount of time the user has been logged in, and the inbound and
outbound traffic statistics.
Select to display the Connection Tool widget on the portal page. Use the
Connection Tool widget to connect to a internal network resource without
Include Connection Tool
adding a bookmark to the bookmark list. You select the type of resource
and specify the URL or IP address of the host computer.
Include FortiClient Select to include the FortiClient Download option in the web portal. This
Download is enabled by default.
If a remote user is using a web browser to connects to the SSL VPN in web
Prompt Mobile Users to
mode, they are prompted to download the FortiClient application. The
Download FortiClient
remote user can accept or reject the notification. If the user accepts, they
Application
are redirected to the FortiClient web site.
Include Login History Select to include user login history on the web portal.
Limite Users to One SSL- You can set the SSL VPN tunnel such that each user can only log into the
VPN Connection at a Time tunnel one time concurrently per user per login. That is, once logged into
the portal, they cannot go to another system and log in with the same
credentials again. This option is disabled by default.
If your network configuration does not contain a default SSL VPN portal, you might
receive the error message “Input value is invalid” when you attempt to access VPN >
SSL > Portals.
Adding bookmarks
A web bookmark can include login credentials to automatically log the SSL VPN user into the website. When the
administrator configures bookmarks, the website credentials must be the same as the user’s SSL VPN
credentials. Users configuring their own bookmarks can specify alternative credentials for the website.
1. On the VPN > SSL > Portals page, ensure Enable User Bookmarks is enabled.
2. Select Create New and enter the following information:
Category Select a category, or group, to include the bookmark. If this is the first
bookmark added, you will be prompted to add a category. Otherwise,
select Create from the drop-down list.
Type Select the type of link from the drop-down list. Telnet, VNC, and RDP
require a browser plugin. FTP and Samba replace the bookmarks page with
an HTML file-browser.
Single Sign-On Enable if you wish to use Single Sign-On (SSO) for any links that require
authentication.
When including a link using SSO, be sure to use the entire URL. For
example, http://10.10.1.0/login, rather than just the IP address.
3. Select OK.
For more configuration options, see Configuring SSL VPN web portals on page 20.
Personal bookmarks
The administrator has be ability to view bookmarks the remote client has added to their SSL VPN login in the
bookmarks widget. This enables the administrator to monitor and, if needed, remove unwanted bookmarks that
do not meet with corporate policy.
To view and maintain remote client bookmarks, go to VPN > SSL > Personal Bookmarks.
For more information about available bookmark applications, see Applications available in the web portal on page
43
In order to create a custom login page using the web-based manager, this feature must be enabled using
Feature Select.
Before you begin, copy the default login page text to a separate text file for safe-
keeping. Afterward, if needed, you can restore the text to the original version.
1. Configure a custom SSL VPN login by going to VPN > SSL > Realms and selecting Create New. Users access
different portals depending on the URL they enter.
2. The first option in the custom login page is to enter the path of the custom URL.
This path is appended to the address of the FortiGate unit interface to which SSL VPN users connect. The actual
path for the custom login page appears beside the URL path field.
3. You can also limit the number of users that can access the custom login at any given time.
4. You can use HTML code to customize the appearance of the login page.
5. After adding the custom login, you must associate it with the users that will access the custom login. Do this by
going to VPN > SSL > Settings and adding a rule to the Authentication/Portal Mapping section.
6. Under Authentication/Portal Mapping, click Create New and select the user group(s) and the associated
Realm.
edit <url-path> Enter the URL path to access the SSL-VPN login No
page. default.
Do not include “http://”.
No
login-page <content_str> Enter replacement HTML for SSL-VPN login page.
default.
When you enable split tunneling, you are required to set the Routing Address, which is the address that your
corporate network is using. Traffic intended for the Routing Address will not be split from the tunnel.
CLI Syntax:
config vpn ssl web portal
edit "full-access"
set tunnel-mode enable
set web-mode enable
set mac-addr-check enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set split-tunneling-routing-address "Internal_subnet"
Port forwarding
Port forwarding provides a method of connecting to application servers without configuring a tunnel mode
connection, and requiring the installation of a tunnel mode client. Set up the portal as described at Configuring
SSL VPN web portals on page 20. To configure the application, create a bookmark with the Type field set to Port
Forward.
Ensure that Port Forward is enabled in the Applications list.
The FortiGate unit supports a range of cryptographic cipher suites to match the capabilities of various web
browsers. The web browser and the FortiGate unit negotiate a cipher suite before any information (for example, a
user name and password) is transmitted over the SSL link. You can only configure encryption key algorithms for
SSL VPN in the CLI.
Variable Description
high Use a ciper suite grather than 128 bits; AES or 3DES.
Note that the algorithm <cipher_suite> syntax is only available when the sslvpn-enable attribute is
set to enable.
Beyond the basics of setting up the SSL VPN, you can configure a number of other options that can help to
ensure your internal network is secure and can limit the possibility of attacks and viruses entering the network
from an outside source.
1. Go to Router > Static > Static Routes and select Create New.
For low-end FortiGate units, go to System > Network > Routing and select Create New.
2. Enter the Destination IP/Mask of the tunnel IP address that you assigned to the users of the web portal.
3. Select the SSL VPN virtual interface for the Device.
4. Select OK.
where <FortiGate_IP_address> is the IP address of the FortiGate interface that accepts connections from
remote users.
1. If Current VDOM appears at the bottom left of the screen, select Global from the list of VDOMs.
2. Go to VPN > SSL > Settings.
3. Type an unused port number in the Listen on Port field and select Apply.
This is a global setting. For example, to set the SSL VPN port to 10443, enter:
config vpn ssl settings
SSL offloading
To configure SSL offloading, which allows or denies client renegotiation, you must use the CLI. This helps to
resolve the issues that affect all SSL and TLS servers that support renegotiation, identified by the Common
Vulnerabilities and Exposures system in CVE-2009-3555. The SSL offloading renegotiation feature is considered
a workaround until the IETF permanently resolves the issue.
The CLI command is ssl-client-renegotiation and is found under the config firewall vip
syntax.
Host check
When you enable AV, FW, or AV-FW host checking in the web portal Security Control settings, each client is
checked for security software that is recognized by the Windows Security Center. As an alternative, you can
create a custom host check that looks for security software selected from the Host Check list. For more
information, see Additional configuration options on page 27.
The Host Check list includes default entries for many security software products.
Host integrity checking is only possible with client computers running Microsoft
Windows platforms.
To configure the full-access portal to check for AV and firewall software on client Windows computers, you would
enter the following:
config vpn ssl web portal
edit full-access
set host-check av-fw
end
To configure the full-access portal to perform a custom host check for FortiClient Host Security AV and firewall
software, you would enter the following:
config vpn ssl web portal
edit full-access
set host-check custom
set host-check-policy FortiClient-AV FortiClient-FW
end
1. Navigate to System > Config > Replacement Messages and select Extended View in the upper right corner.
2. Scroll down to SSL VPN and select Hostcheck Error Message.
3. Edit the text in the right-hand column below and select Save.
If you are unhappy with the new message, you can restore the message to its default by selecting Restore
Default instead of Save.
Configure the host check error message using the following command.
config system replacemsg sslvpn hostcheck-error
To obtain the exact versioning, in Windows, right-click on the .EXE file of the application and select Properties,
then select the Version tab.
Host Check is applicable for both SSLVPN Web Mode and SSLVPN Tunnel mode.
Windows OS check
The Windows patch check enables you to define the minimum Windows version and patch level allowed when
connecting to the SSL VPN portal. When the user attempts to connect to the web portal, FortiOS performs a
query on the version of Windows the user has installed. If it does not match the minimum requirement, the
connection is denied. The Windows patch check is configured in the CLI.
The following example shows you how to add an OS check to the ‘g1portal’ web portal. This OS check accepts all
Windows XP users and Windows 2000 users running patch level 3.
To specify the acceptable patch level, you set the latest-patch-level and the tolerance. The lowest
acceptable patch level is latest-patch-level minus tolerance. In this case, latest-patch-level is
3 and tolerance is 1, so 2 is the lowest acceptable patch level.
config vpn ssl web portal
edit g1portal
set os-check enable
config os-check-list windows-2000
set action check-up-to-date
set latest-patch-level 3
set tolerance 1
end
l KeyName: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile
l ValueName: EnableFirewall
In FortiOS, use the registry-value-check feature to define the Windows Firewall software by entering the following
in the CLI:
config vpn ssl web host-check-software
edit "Microsoft-Windows-Firewall"
config check-item-list
edit 1
set target
"HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\Firew
allPolicy\\StandardProfile:EnableFirewall==1"
set type registry
next
edit 2
set target
"HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\Firew
allPolicy\\PublicProfile:EnableFirewall==1"
set type registry
next
edit 3
set target
"HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\Firew
allPolicy\\DomainProfile:EnableFirewall==1"
set type registry
next
end
set type fw
next
set host-check custom
set host-check-policy Microsoft-Windows-Firewall
The cache cleaner is effective only if the session terminates normally. The cache is not
cleaned if the session ends due to a malfunction, such as a power failure.
When the user starts an SSL VPN session that has virtual desktop enabled, the virtual desktop replaces the user’s
normal desktop. When the virtual desktop exits, the user’s normal desktop is restored.
Virtual desktop requires the Fortinet cache cleaner plugin. If the plugin is not present, it automatically downloads
to the client computer.
To enable virtual desktop on the full-access portal and apply the application control list ‘List1’, for example, you
would enter:
config vpn ssl web portal
edit full-access
set virtual-desktop enable
set virtual-desktop-app-list List1
end
If you want to add ‘BannedApp’ to ‘List1’, a list of blocked applications, you would enter:
config vpn ssl web virtual-desktop-app-list
edit "List1"
set action block
config apps
edit "BannedApp"
set md5s "06321103A343B04DF9283B80D1E00F6B"
end
end
To configure OS Check:
DNS servers provide the IP addresses that browsers need to access web sites. For Internet sites, you can specify
the DNS server that your FortiGate unit uses. If SSL VPN users will access intranet sites using URLs, you need to
provide them access to the intranet’s DNS server. You specify a primary and a secondary DNS server.
A WINS server provides IP addresses for named servers in a Windows domain. If SSL VPN users will access a
Windows network, you need to provide them access to the domain WINS server. You specify a primary and a
secondary WINS server.
end
3. Select Apply.
In event log entries, look for the sub-types “sslvpn-session” and “sslvpn-user”.
For information about how to interpret log messages, see the FortiGate Log Message Reference.
To view the list of active SSL VPN sessions, go to VPN > Monitor > SSL-VPN Monitor.
When a tunnel-mode user is connected, the Description field displays the IP address that the FortiGate unit
assigned to the remote host.
If required, you can end a session/connection by selecting its checkbox and then clicking the Delete icon.
The remote client connects to the SSL VPN tunnel in various ways, depending on the VPN configuration.
l Web mode requires nothing more than a web browser. Microsoft Internet Explorer, Firefox, and Apple Safari
browsers are supported. For detailed information about supported browsers, see Web-only mode on page 10.
l Tunnel mode establishes a connection to the remote protected network that any application can use. If the client
computer runs Microsoft Windows, they can download the tunnel mode client from the web portal Tunnel Mode
widget. After installing the client, they can start and stop tunnel operation from the Tunnel Mode widget, or open
the tunnel mode client as a standalone application. The tunnel mode client is available on the Start menu at
All Programs > FortiClient > FortiClient SSL VPN .
If the client computer runs Linux or Mac OS X, the user needs to download the tunnel mode client application from
the Fortinet Support web site. See the Release Notes for your FortiOS firmware for the specific operating system
versions that are supported. On Linux and Mac OS X platforms, tunnel mode operation cannot be initiated from the
web portal Tunnel Mode widget. The remote user must use the standalone tunnel client application.
l The virtual desktop application creates a virtual desktop on a user's PC and monitors the data read/write activity of
the web browser running inside the virtual desktop. When the application starts, it presents a ‘virtual desktop’ to the
user. The user starts the web browser from within the virtual desktop and connects to the SSL VPN web portal. The
browser file/directory operation is redirected to a new location, and the data is encrypted before it is written to the
local disk. When the virtual desktop application exits normally, all the data written to the disk is removed. If the
session terminates abnormally (power loss, system failure, etc.), the data left behind is encrypted and unusable to
the user. The next time you start the virtual desktop, the encrypted data is removed.
FortiClient
Remote users can use the FortiClient software to initiate an SSL VPN tunnel to connect to the internal network.
FortiClient uses local port TCP 1024 to initiate an SSL encrypted connection to the FortiGate unit, on port TCP
443. When connecting using FortiClient, the FortiGate unit authenticates the FortiClient SSL VPN request based
on the user group options. The FortiGate unit establishes a tunnel with the client and assigns a virtual IP address
to the client PC. Once the tunnel has been established, the user can access the network behind the FortiGate
unit.
FortiClient software is available for download at www.forticlient.com and is available for Windows, Mac OS X,
Apple iOS, and Android.
The FortiClient SSL VPN tunnel client requires basic configuration by the remote user to connect to the SSL VPN
tunnel. When distributing the FortiClient software, provide the following information for the remote user to enter
once the client software has been started. Once entered, they can select Connect to begin an SSL VPN session.
Connection Name If you have pre-configured the connection settings, select the connection
from the list and then select Connect. Otherwise, enter the settings in the
fields below.
Enter the IP address or FQDN of the FortiGate unit that hosts the SSL
Remote Gateway
VPN.
Use this field if the SSL VPN requires a certificate for authentication.
Client Certificate
Select the required certificate from the drop-down list. The certificate must
be installed in the Internet Explorer certificate store.
This chapter explains how to use and configure the web portal features. This chapter is written for end users as
well as administrators.
You can connect to the FortiGate unit using a web browser. The URL of the FortiGate interface may vary from
one installation to the next. If required, ask your FortiGate administrator for the URL of the FortiGate unit, and
obtain a user name and password. You can connect to the web portal using an Android phone, iPhone, or iPad.
The FortiGate unit will display the content of the portal to fit the device’s screen.
In addition, if you will be using a personal or group security (X.509) certificate to connect to the FortiGate unit,
your web browser may prompt you for the name of the certificate. Your FortiGate administrator can tell you which
certificate to select.
1. Using the web browser on your computer, browse to the URL of the FortiGate unit (for example,
https://<FortiGate_IP_address>:443/remote/login). The FortiGate unit may offer you a self-signed
security certificate. If you are prompted to proceed, select Yes.
A second message may be displayed to inform you that the FortiGate certificate distinguished name differs from
the original request. This message is displayed because the FortiGate unit is attempting to redirect your web
browser connection. You can ignore the message.
2. When you are prompted for your user name and password:
l In the Name field, type your user name.
l In the Password field, type your password.
3. Select Login.
The FortiGate unit will redirect your web browser to the FortiGate SSL VPN web portal home page automatically.
After you log in, you see a web portal page like the following:
l Session Information displays the elapsed time since login and the volume of HTTP and HTTPS traffic, both
inbound and outbound.
l Tunnel Mode connects and disconnects the tunnel mode SSL connection to the FortiGate unit. While the tunnel is
active, the widget displays the amount of data that is sent and received. For more information, see Web portal
overview on page 37.
Tunnel mode requires a downloadable client application. If your computer is running Microsoft Windows, the
Tunnel Mode widget provides a download link if you need to install the client on your computer. If you are using
Macintosh or Linux, you can obtain and install an appropriate client application from the Fortinet Support site.
l Connection Tool enables you to connect to network resources without using or creating a bookmark.
l Remote Desktop provides access to preconfigured remote desktop environments.
l FortiClient Download provides access to the FortiClient tunnel application for various operating systems.
l My Bookmarks provides links to network resources. You can use the administrator-defined bookmarks and you
can add your own bookmarks. See Web portal overview on page 37.
Depending on the web portal configuration and user group settings, some widgets might not be present. For
example, the predefined web-access portal contains only the Session Information and Bookmarks widgets.
While using the web portal, you can select the Help button to get information to assist you in using the portal
features. This information displays in a separate browser window.
When you have finished using the web portal, select the Logout button in the top right corner of the portal
window.
After making any changes to the web portal configuration, be sure to select Apply.
Portal configuration
The SSL VPN Service portal enables users to access network resources through a secure channel using a web
browser. Fortinet administrators can configure log in privileges for system users and which network resources are
available to the users.
The portal configuration determines what the user sees when they log in to the portal. Both the system
administrator and the user have the ability to customize the SSL VPN portal.
l full-access: Includes all widgets available to the user - Session Information, Tunnel Mode, Connection Tool,
FortiClient Download, Remote Desktop, and My Bookmarks.
l tunnel-access: Includes Session Information and Tunnel Mode widgets.
l web-access: Includes Session Information and My Bookmarks widgets.
You can also create your own web portal to meet your corporate requirements.
l Portal settings
l Portal widgets
Portal page
Edit Select a portal from the list to enable the Edit option, and modify the portal
configuration.
To view the location of the referenced object, select the number in Ref.
column.
To view more information about how the object is used, select one of:
Ref. View the list page for these objects – automatically redirects you to the
list page where the object is referenced at.
Edit this object – modifies settings within that particular setting that the
object is referenced with.
View the details for this object – similar to the log viewer table, contains
information about what settings are configured within that particular setting
that the object is referenced with.
Provides general, virtual desktop and security control settings for the SSL
VPN Service portal page. This window appears when you select Settings.
Edit Settings window This window also appears whenever you select Create New and are
automatically redirected to the Portal Settings page. For more information,
see Portal settings on page 41.
Settings Select to edit the settings for the SSL VPN web portal. See Portal
configuration on page 39.
The widgets that will appear on the SSL VPN Service page. You can add
Widgets widgets from the Add Widgets drop-down list. For more information, see
Portal widgets on page 42.
Displays basic information of the current session of the logged in user. For
Session Information
more information, see Session Information on page 43.
Bookmarks Displays configured bookmarks, allows for the addition of new bookmarks
and editing of existing bookmarks. For more information, see Bookmarks
on page 43.
Tunnel Mode Displays tunnel information and actions in user mode. The administrator
can configure a split-tunneling option. For more information, see Tunnel
Mode on page 43.
Portal settings
A web portal defines SSL VPN user access to network resources. The portal configuration determines what SSL
VPN users see when they log in to the unit. Both the Fortinet administrator and the SSL VPN user have the ability
to customize the web portal settings. Portal settings are configured in VPN > SSL > Portals.
The Settings Window provides settings for configuring general, virtual desktop and security console options for
your web portal.
The virtual desktop options, available for Windows XP and Windows Vista client PCs, are configured to
completely isolate the SSL VPN session from the client computer’s desktop environment. All data is encrypted,
including cached user credentials, browser history, cookies, temporary files, and user files created during the
session. When the SSL VPN session ends normally, the files are deleted. If the session ends unexpectedly, any
files that may remain will be encrypted.
Virtual desktop requires the Fortinet host check plugin. If the plugin is not present, it is automatically downloaded
to the client computer.
Security control options provide cache cleaning and host checking to the clients of your web portal. Cache
cleaning clears information from the client browser cache just before the SSL VPN session ends. The cache
cleaner is effective only if the session terminates normally. The cache is not cleaned if the session ends
unexpectedly.
Host checking enforces the client’s use of antivirus or firewall software. Each client is checked for security
software that is recognized by the Windows Security Center. As an alternative, you can create a custom host
check that looks for specific security software selected from the Host Check list. For more information, see Basic
configuration on page 15.
General tab
Applications Select the server applications or network services clients can use.
Enter the caption that appears at the top of the web portal home
Portal Message
page when the user logs in.
Theme Select the color scheme for the web portal home page.
Select the one or two page column format for the web portal home
Page Layout
page.
Redirect URL Enter the URL that the web portal displays when the web portal
home page is displayed.
Allow clipboard contents Select to allow users access to the clipboard contents when they
to be shared with regular are using the regular desktop.
desktop
Allow network share Select to allow users to have access to network resources.
access
Allow printing Select to allow users to print from the virtual desktop.
Quit the virtual desktop Select to have the virtual desktop close and log the user out of the
and logout session when current session whenever the browser is closed.
browser is closed
Application Control List Select a virtual desktop application list from the drop-down list.
Host Check Select any host checking that is required before the user can log
into the portal. Host checks will verify if the user has the required
antivirus software or applications. If the user does not, the log in
will be denied.
Enter how often to recheck the host for updates and changes in
Interval
seconds.
Portal widgets
Portal widgets are widgets hold the content the user logging into the portal will see.
Session Information
The Session Information widget displays the login name of the user, the amount of time the user has been
logged in and the inbound and outbound traffic statistics.
Bookmarks
Bookmarks are used as links to specific resources on the network. When a bookmark is selected from a bookmark
list, a pop-up window appears with the requested web page. Telnet, VNC, and RDP all pop up a window that
requires a browser plug-in. FTP and Samba replace the bookmarks page with an HTML file-browser.
A web bookmark can include login credentials to automatically log the SSL VPN user into the web site. When the
administrator configures bookmarks, the web site credentials must be the same as the user’s SSL VPN
credentials. Users configuring their own bookmarks can specify alternative credentials for the web site.
Connection Tool
Use the Connection Tool widget to connect to a network resource without adding a bookmark to the bookmark
list. You select the type of resource and specify the URL or IP address of the host computer.
Tunnel Mode
If your web portal provides tunnel mode access, you need to configure the Tunnel Mode widget. These settings
determine how tunnel mode clients are assigned IP addresses. You can also enable a split tunneling
configuration so that the VPN carries only the traffic for the networks behind the unit. The user’s other traffic
follows its normal route.
l Citrix makes use of SOCKS so that the Citrix client can connect to the SSL VPN port forward module to provide the
connection.
l FTP (File Transfer Protocol) enables you to transfer files between your computer and a remote host.
l HTTP/HTTPS accesses web pages.
l Port Forward provides the middle ground between web mode and tunnel mode. When the SSL VPN receives data
from a client application, the data is encrypted and sent to the FortiGate unit, which then forwards the traffic to the
application server.
l RDP/RDP Native (Remote Desktop Protocol), similar to VNC, enables you to remotely control a computer running
Microsoft Terminal Services.
l SMB/CIFS implements the Server Message Block (SMB) protocol to support file sharing between your computer
and a remote server host.
l SSH (Secure Shell) enables you to exchange data between two computers using a secure channel.
l TELNET (Teletype Network emulation) enables you to use your computer as a virtual text-only terminal to log in to a
remote host.
l VNC (Virtual Network Computing) enables you to remotely control another computer, for example, accessing your
work computer from your home computer.
Some server applications may prompt you for a user name and password. You must have a user account created
by the server administrator so that you can log in.
The My Bookmarks widget shows both administrator-configured and user-configured bookmarks. Administrator
bookmarks cannot be altered but you can add, edit or delete user bookmarks.
My Bookmarks widget
The FortiGate unit forwards client requests to servers on the Internet or internal network. To use the web-portal
applications, you add the URL, IP address, or name of the server application to the My Bookmarks list. For more
information, see Adding bookmarks on page 44.
If you want to access a web server or telnet server without first adding a bookmark to
the My Bookmarks list, use the Connection Tool instead. For more information, see
Using the My Bookmarks widget on page 44.
Adding bookmarks
You can add frequently used connections as bookmarks. Afterward, select any hyperlink from the Bookmarks list
to initiate a session.
To add a bookmark
1. In the Bookmarks widget, select Add.
2. Enter the following information:
Type Select the abbreviated name of the server application or network service
from the drop-down list.
Location Enter the IP address or FQDN of the server application or network service.
For RDP connections, you can append some parameters to control screen
size and keyboard layout. See Using the My Bookmarks widget on page 44.
Description Optionally enter a short description. The description displays when you
pause the mouse pointer over the hyperlink.
Automatic — Use your SSL VPN credentials or an alternate set. See the
SSO Credentials field.
SSO fields
SSO Credentials SSL VPN Login — Use your SSL VPN login credentials.
Field Name Enter the field name, as it appears in the HTML form.
The Connection Tool widget enables a user to connect to a resource when it isn’t a bookmark. In the FortiGate,
ensure that the desired application or protocol (to which you want remote users to connect) is enabled in the
Applications list of the General settings, by selecting the Settings button in the portal configuration window.
You can connect to any type of server without adding a bookmark to the My Bookmarks list. The fields in the
Connection Tool enable you to specify the type of server and the URL or IP address of the host computer.
When you use the Connection Tool, the FortiGate unit may offer you its self-signed
security certificate. Select Yes to proceed. A second message may be displayed to
inform you of a host name mismatch. This message is displayed because the
FortiGate unit is attempting to redirect your web browser connection. Select Yes to
proceed.
3. Select Go.
A login window opens.
4. Enter your user name and password and then select Login.
You must have a user account on the remote host to log in.
5. Manipulate the files in any of the following ways:
l To download a file, select the file link in the Name column.
l To access a subdirectory (Type is Folder), select the link in the Name column.
l To create a subdirectory in the current directory, select New directory.
l To delete a file or subdirectory from the current directory, select its Delete icon.
l To rename a file in the current directory, select its Rename icon.
l To upload a file to the current directory from your client computer, select Upload.
l When the current directory is a subdirectory, you can select Up to access the parent directory.
6. To end the FTP session, select Logout.
RDP options
When you specify the RDP server address, you can also specify other options for your remote desktop session.
Example: -g 800x600
Authentication -u <user name>
-p <password>
Use these options to send your -d <domain>
authentication credentials with the
connection request, instead of entering
them after the connection is established.
-m <locale>
ar Arabic it Italian
da Danish ja Japanese
Locale/Keyboard de German lt Lithuanian
de-ch Swiss German lv Latvian
Use this option if the remote computer en-gb British English mk Macedonian
might not use the same keyboard layout en-uk UK English no Norwegian
as your computer. Select the locale code en-us US English pl Polish
that matches your computer. es Spanish pt Portuguese
fi Finnish pt-br Brazilian
fr French ru Portuguese
fr-be Belgian French sl Russian
fr-ca Canadian French sv Slovenian
fr-ch Swiss French tk Sudanese
hr Croatian tr Turkmen
hu Hungarian Turkish
Tunnel-mode features
For Windows users, the web portal Tunnel Mode widget provides controls for your tunnel mode connection and
also provides status and statistics about its operation. You can also control and monitor tunnel mode operation
from the standalone client application.
Connect Initiate a session and establish an SSL VPN tunnel with the FortiGate unit.
Disconnect End the session and close the tunnel to the FortiGate unit.
Link Status Up — an SSL VPN tunnel with the FortiGate unit has been established.
Bytes Sent The number of bytes of data transmitted from the client to the FortiGate
unit since the tunnel was established.
The number of bytes of data received by the client from the FortiGate unit
Bytes Received
since the tunnel was established.
The virtual desktop feature is available for Windows only. When you start an SSL VPN session, the virtual desktop
replaces your normal desktop. When the virtual desktop exits, your regular desktop is restored. Virtual desktop
information is encrypted so that no information from it remains available after your session ends.
To use the SSL VPN virtual desktop, simply log in to an SSL VPN that requires the use of the virtual desktop. Wait
for the virtual desktop to initialize and replace your desktop with the SSL VPN desktop, which has a Fortinet SSL
VPN logo as wallpaper. Your web browser will open to the web portal page.
You can use the virtual desktop just as you use your regular desktop, subject to the limitations that virtual desktop
application control imposes. If it is enabled in the web portal virtual desktop settings, you can switch between the
virtual desktop and your regular desktop. Right-click the SSL VPN Virtual Desktop icon in the taskbar and
select Switch Desktop.
To see the web portal virtual desktop settings, right-click the SSL VPN Virtual Desktop icon in the taskbar and
select Virtual Desktop Option.
When you have finished working with the virtual desktop, right-click the SSL VPN Virtual Desktop icon in the
taskbar and select Exit. Select Yes to confirm. The virtual desktop closes and your regular desktop is restored.
Using FortiClient
Remote users can use FortiClient Endpoint Security to initiate an SSL VPN tunnel to connect to the internal
network. FortiClient uses local port TCP 1024 to initiate an SSL encrypted connection to the FortiGate unit, on
port TCP 10443. When connecting using FortiClient, the FortiGate unit authenticates the FortiClient SSL VPN
request based on the user group options. the FortiGate unit establishes a tunnel with the client and assigns a
virtual IP address to the client PC. Once the tunnel has been established, the user can access the network behind
the FortiGate unit.
For information on configuring the FortiGate unit for SSL VPN connectivity, see Basic configuration on page 15.
For details on configuring FortiClient for SSL VPN connections, see the FortiClient documentation.
The examples in this chapter demonstrate the basic configurations needed for common connections to the SSL
VPN tunnel and portals, applying the steps outlined in Basic configuration on page 15.
This example sets up an SSL VPN tunnel that provides remote users the ability to access the Internet while
traveling, and ensures that they are not subject to malware and other dangers, by using the corporate firewall to
filter all of their Internet traffic. Essentially, the remote user will connect to the corporate FortiGate unit to surf the
Internet.
ser
NU
L VP
S
00
S
.1 in
.2
ote
12 g
34
.2 Lo
10 ser
m
Re
U
ot
s l .ro wsing
s ro
b
n1
wa .136
0. 120
.2
172
Fo
rt
iG
at
e
U
ni
t
Using SSL VPN and FortiClient SSL VPN software, you create a means to use the corporate FortiGate to browse
the Internet safely.
Password password
3. Select OK.
4. Go to User & Device > User > User Groups and select Create New to add twhite to a group called SSL
VPN:
Name SSL VPN
Type Firewall
1. Go to Router > Static > Static Routes and select Create New to add the static route.
For low-end FortiGate units, go to System > Network > Routing and select Create New.
Device ssl.root
The Destination IP/Mask matches the network address of the remote SSL VPN user.
2. Select OK.
1. Go to Policy & Objects > Policy > IPv4 and select Create New.
2. Add an SSL VPN security policy as below, and click OK.
3. Select Create New to add a security policy that allows remote SSL VPN users to connect to the Internet:
Schedule always
Service ALL
Action ACCEPT
4. Select OK.
Users/Groups Tunnel
Portal tunnel-access
Results
Using the FortiClient SSLVPN application, access the VPN using the address
https://172.20.120.136:443/ and log in as twhite. Once connected, you can browse the Internet.
From the FortiGate web-based manager, go to VPN > Monitor > SSL-VPN Monitor to view the list of users
connected using SSL VPN. The Subsession entry indicates the split tunnel which redirects to the Internet.
Split Tunnel
In this configuration, remote users are able to securely access the head office internal network through the head
office firewall, yet browse the Internet without going through the head office FortiGate. Split tunneling is enabled
by default for SSL VPN on FortiGate units.
The solution below describes how to configure FortiGate SSL VPN split tunneling using the FortiClient SSL VPN
software, available from the Fortinet Support site.
Without split tunneling, all communication from remote SSL VPN users to the head office internal network and to
the Internet uses an SSL VPN tunnel between the user’s PC and the head office FortiGate unit. Connections to
the Internet are routed back out the head office FortiGate unit to the Internet. Replies come back into the head
office FortiGate unit before being routed back through the SSL VPN tunnel to the remote user.
In short, enabling split tunneling protects the head office from potentially harmful access and external threats that
may occur as a result of the end user's indiscretion while browsing the Internet. By contrast, disabling split
tunneling protects the end user by forcing all their Internet traffic to pass through the FortiGate firewall.
Category Address
Type Subnet
Interface Internal
2. Select OK.
3. Select OK.
1. Go to User & Device > User > User Definition, select Create New and add the user:
Password password
2. Select OK.
3. Go to User & Device > User > User Groups and select Create New to add the new user to the SSL VPN user
group:
Name Tunnel
Type Firewall
1. Go to Router > Static > Static Routes and select Create New
2. For low-end FortiGate units, go to System > Network > Routing and select Create New:
Device ssl.root
3. Select OK.
1. Go to Policy & Objects > Policy > IPv4 and select Create New.
2. Complete the following:
3. Select OK.
4. Add a security policy that allows remote SSL VPN users to connect to the Internet.
5. Select Create New.
6. Complete the following and select OK:
Schedule always
Service ALL
Action ACCEPT
Users/Groups Tunnel
Portal tunnel-access
Results
Using the FortiClient SSL VPN application on the remote PC, connect to the VPN using the address
https://172.20.120.136:443/ and log in with the twhite user account. Once connected, you can
connect to the head office server or browse to web sites on the Internet.
From the web-based manager, go to VPN > Monitor > SSL-VPN Monitor to view the list of users connected
using SSL VPN. The Subsession entry indicates the split tunnel which redirects SSL VPN sessions to the
Internet.
You might need to provide access to several user groups with different access permissions. Consider the
following example topology in which users on the Internet have controlled access to servers and workstations on
private networks behind a FortiGate unit.
Name Subnet_1
Type Subnet
Subnet/IP Range 10.11.101.0/24
Interface port2
Name Subnet_2
Type Subnet
Subnet/IP Range 10.11.201.0/24
Interface port3
Name Tunnel_group1
Type IP Range
Subnet/IP Range 10.11.254.1-10.11.254.50
Interface Any
Name Tunnel_group2
Type IP Range
Subnet/IP Range 10.11.254.51-10.11.254.100
Interface Any
Go to User & Device > User > User Definition and create user1 and user2 with password authentication.
After you create the users, create the SSL VPN user groups.
Name Group1
Type Firewall
3. From the Available list, select User1 and move it to the Members list by selecting the right arrow button.
4. Select OK.
5. Repeat steps 2 through 4 to create Group2, assigned to Portal2, with User2 as its only member.
l An SSL VPN policy enables clients to authenticate and permits a web-mode connection to the destination network.
In this example, there are two destination networks, so there will be two SSL VPN policies. The authentication
ensures that only authorized users can access the destination network.
l A tunnel-mode policy is a regular ACCEPT security policy that enables traffic to flow between the SSL VPN tunnel
interface and the protected network. Tunnel-mode policies are required if you want to provide tunnel-mode
connections for your clients. In this example, there are two destination networks, so there will be two tunnel-mode
policies.
1. Go to Policy & Objects > Policy > IPv4 and select Create New.
2. Enter the following information and click OK:
Service All
3. Select Create New.
4. Enter the following information:
Service All
5. Click OK.
Users/Groups Group1
Portal Portal1
Users/Groups Group2
Portal Portal2
1. Go to Policy & Objects > Policy > IPv4 and select Create New.
2. Enter the following information, and select OK:
Service All
Action ACCEPT
3. Select Create New.
4. Enter the following information, and select OK:
Service All
Action ACCEPT
For low-end FortiGate units, go to System > Network > Routing and select Create New.
2. Enter the following information and select OK.
This IP address range covers both ranges that you assigned to SSL VPN
tunnel-mode users. See Creating the tunnel client range addresses on
page 59.
Device Select the SSL VPN virtual interface, ssl.root for example.
In this example, the IP Pools field on the VPN > SSL > Settings page is not used
because each web portal specifies its own tunnel IP address range.
This section contains tips to help you with some common challenges of SSL VPNs.
This command enables debugging of SSL VPN with a debug level of -1. The -1 debug level produces detailed
results.
This output verifies that SSL VPN debugging is enabled with a debug level of -1, and shows what filters are in
place. The output above indicates that debug output is disabled, so debug messages are not displayed. The
output also indicates that debugging has not been enabled for any software systems.
To view the debug messages, log into the SSL VPN portal. The CLI displays debug output similar to the
following:
FGT60C3G10002814 # [282:root]SSL state:before/accept initialization (172.20.120.12)
[282:root]SSL state:SSLv3 read client hello A (172.20.120.12)
[282:root]SSL state:SSLv3 write server hello A (172.20.120.12)
[282:root]SSL state:SSLv3 write change cipher spec A (172.20.120.12)
[282:root]SSL state:SSLv3 write finished B (172.20.120.12)
[282:root]SSL state:SSLv3 flush data (172.20.120.12)
[282:root]SSL state:SSLv3 read finished A:system lib(172.20.120.12)
[282:root]SSL state:SSLv3 read finished A (172.20.120.12)
[282:root]SSL state:SSL negotiation finished successfully (172.20.120.12)
[282:root]SSL established: DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
The following is a list of potential issues. The suggestions below are not exhaustive, and may not reflect your
network topology.
l Ensure that you are using the correct port number in the URL.
When you attempt to connect using FortiClient or in Web mode, you are returned to the login
page, or you receive the following error message: “Unable to logon to the server. Your user
name or password may not be configured properly for this connection. (-12).”
l Ensure that cookies are enabled in your browser.
l If you are using a remote authentication server, ensure that the FortiGate is able to communicate with it.
l Access to the web portal or tunnel will fail if Internet Explorer has the privacy Internet Options set to High. If set to
High, Internet Explorer will block cookies that do not have a compact privacy policy, and that use personally
identifiable information without your explicit consent.
You can connect remotely to the VPN tunnel but are unable to access the network resources.
Go to Policy & Objects > Policy > IPv4 and examine the policy allowing VPN access to the local network. If
the destination address is set to all, create a firewall address for the internal network. Change the destination
address and attempt to connect remotely again.
To allow VPN tunnel-stats to be sent to FortiAnalyzer, configure the FortiGate unit as follows using the CLI:
config system settings
set vpn-stats-log ipsec ssl
set vpn-stats-period 300
end