Remote Access VPN with fortigate client configuration.
Used Version: v4.0,build0521,120313 (MR3 Patch 6)
1. Add user.
In this example a simple local user, but as we can see the list of the remote authentication servers, the fortigate has a lot of possibilities.
myfirewall (root) # sh user adgrp FSSO groups ban configure banned IP addresses fortitoken configure FortiToken fsso FSSO agent configuration group user group configuation ldap LDAP server entry configuation local local user configuration peer config peer user peergrp config peer's user group radius radius server entry configuration setting set user authentication setting sms-provider configure SMS provider tacacs+ TACACS+ server entry configuration |
configure a local user.
config user local
edit "Testuser"
set type password
set passwd ENC hv2ySeh6FHck7qhv72pHvnSOVOHQWMllulMy824/8+n0cn9OdxcPvkOGQ7txjU7YNbmQLrCCIF3qspQucSdaM5KIQHACKsPndkC0K8146RohAY8p
next
end
|
2. Add group.
Add the local user to a user group.
config user group
edit "VPN-Group"
set member "Testuser"
next
end
|
3. Add vpn configuration.
config vpn ipsec phase1-interface
edit "FClient"
set type dynamic
set interface "port1"
set xauthtype auto
set mode aggressive
set mode-cfg enable
set proposal 3des-sha1 aes128-sha1
set authusrgrp "VPN-Group"
set ipv4-start-ip 3.3.3.1
set ipv4-end-ip 3.3.3.5
set ipv4-netmask 255.255.255.0
set dns-mode auto
set ipv4-split-include "InternalNetwork"
set psksecret ENC y7LkCPmimuXHJVhw4OgjIZGHFRXiBDVV1BBmRCVFuicaDO0cbfZSznbKo5BnUrqcbeeezKCZXl+/FItng8y30ELOrXjS6x588NzuzC/bhpd1CZ1a
next
end
|
4. Define Firewall policy.
config firewall policy
edit 1
set srcintf "FClient"
set dstintf "port3"
set srcaddr "VPN-Addresses"
set dstaddr "InternalNetwork"
set action accept
set schedule "always"
set service "ANY"
next
edit 2
set srcintf "port3"
set dstintf "FClient"
set srcaddr "InternalNetwork"
set dstaddr "VPN-Addresses"
set action accept
set schedule "always"
set service "ANY"
next
end
|
5. Backroute to client vpn pool.
I would test if it is really required…normally the firewalls (Cisco and Checkpoint) knows it without any explicit route.
config router static
edit 1
set device "port1"
set gateway 10.200.1.254
next
edit 2
set device "FClient"
set dst 3.3.3.0 255.255.255.0
next
end
|
6. Testing RA VPN.
myfirewall (root) # diag vpn tunnel list
list all ipsec tunnel in vd 0
------------------------------------------------------
name=FClient_0 ver=1 serial=5 10.200.1.1:0->10.0.2.10:0 lgwy=static tun=intf mode=dial_inst bound_if=2
parent=FClient index=0
proxyid_num=1 child_num=0 refcnt=7 ilast=3 olast=3
stat: rxp=3 txp=0 rxb=336 txb=0
dpd: mode=active on=1 idle=5000ms retry=3 count=0 seqno=2
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=FClient proto=0 sa=1 ref=2 auto_negotiate=0 serial=1
src: 0:0.0.0.0-255.255.255.255:0
dst: 0:3.3.3.1-3.3.3.1:0
SA: ref=3 options=00000006 type=00 soft=0 mtu=1280 expire=1773 replaywin=1024 seqno=1
life: type=01 bytes=0/0 timeout=1791/1800
dec: spi=18864eeb esp=3des key=24 3661edfbd464a09c33d5a360777cacd6e8a43ed9bc8f7a95
ah=sha1 key=20 e5554e5ade780793440fdd0ab74f1f12e00bab8e
enc: spi=b3372b7b esp=3des key=24 01f2ea46025d33c548518b69bc8624816ad0315ae30f3e68
ah=sha1 key=20 411be79eb3de989523ddd9c1705c9603f17c6518
------------------------------------------------------
name=FClient ver=1 serial=3 0.0.0.0:0->0.0.0.0:0 lgwy=dyn tun=intf mode=dialup bound_if=2
proxyid_num=0 child_num=1 refcnt=5 ilast=887 olast=887
stat: rxp=0 txp=0 rxb=0 txb=0
dpd: mode=active on=0 idle=5000ms retry=3 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
|
Posted on June 19, 2012
0