ABACAS, APSecure, FortiASIC, FortiAnalyzer, FortiBIOS, FortiBridge, FortiClient, FortiGate, FortiGuard,
FortiGuard-Antispam, FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiManager,
Fortinet, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and
FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-200807185
Contents
FortiOS v3.0 MR7 SSL VPN User Guide
601-30007-0348-20080718
Introduction About FortiGate SSL VPN
Introduction
This section introduces you to FortiGate™ Secure Sockets Layer (SSL) VPN
technology and provides supplementary information about Fort inet™ publications.
The following topics are included in this section:
•About FortiGate SSL VPN
•About this document
•FortiGate documentation
•Related documentation
•Customer service and technical support
About FortiGate SSL VPN
FortiGate SSL VPN technology makes it safe to do business over the Internet. In
addition to encrypting and securing information sent from a web browse r to a web
server, FortiGate SSL VPN can be used to encrypt most Internet-based traffic.
With the FortiGate unit’s built-in SSL VPN capabilities, small home offices,
medium-sized businesses, enterprises, and service providers can ensure the
confidentiality and integrity of data transmitted over the Internet. The FortiGate
unit provides enhanced authentication and restricted access to company network
resources and services.
The two modes of SSL VPN operation, supported in NAT/Route mode only, are:
•web-only mode, for thin remote clients equipped with a web browser only
•tunnel mode, for remote computers that run a variety of client and server
applications
When the FortiGate unit provides services in web -on l y mode , a secure web
connection between the remote client and the FortiGate unit is established using
the SSL VPN security in the FortiGate unit and the SSL security in the web
browser. After the connection has been established, the FortiGate unit provides
access to selected services and network resources through a web portal.
Where users have complete administrative rights over their computers and use a
variety of applications, tunnel mode allows remote clients to access the local
internal network as if they were connected to the network directly. In tunnel mode,
a secure SSL connection is established initially for the FortiGate unit to download
SSL VPN client software (an ActiveX plugin) to the web browser. After the user
installs the SSL VPN client software, they can initiate a VPN tunnel with the
FortiGate unit whenever the SSL connection is open.
When the SSL VPN feature is used, all client traffic is encrypted and sent to the
SSL VPN. This includes both traffic intended for the private network and Internet
traffic that is normally sent unencrypted. Split tunneling ensures that only the
traffic for the private network is sent to the SSL VPN gateway. Internet traffic is
sent through the usual unencrypted route. This conserves ban dwith and alleviates
bottlenecks. The split tunneling feature is not enabled by default.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-200807187
About this documentIntroduction
!
Whether to use web-only or tunnel mode depends on the number and type of
applications installed on the remote computer. Access to any application not
supported through web-only mode can be supported through tunnel mode. For
more information about these modes of operation, see “Configuring a FortiGate
SSL VPN” on page 13.
About this document
This document explains how to configure SSL VPN operation using the webbased manager and contains the following chapters:
•Configuring a FortiGate SSL VPN describes the two modes of operation,
recommends a deployment topology, and provides an overview of the
associated infrastructure dependencies. The high-level steps for configuring
each mode of operation are also included with cross-references to underlying
procedures. This chapter also details the basic administrative tasks needed to
support the two modes of operation, and describes the additional step -by- step
procedures needed to configure each mode.
•Working with the web portal introduces the web portal applications and
explains how to work with them. The chapter also explains how to install the
ActiveX plugin and initiate a VPN tunnel when tunnel mode is enabled.
Document conventions
The following document conventions are used in this guide:
•In the examples, private IP addresses are used for both private and public IP
addresses.
•Notes and Cautions are used to provide important information:
Note: Highlights useful additional information.
Caution: Warns you about commands or procedures that could have unexpected or
undesirable results including loss of data or damage to equipment.
FortiOS v3.0 MR7 SSL VPN User Guide
801-30007-0348-20080718
Introduction FortiGate documentation
Typographic conventions
FortiGate documentation uses the following typographical conventions:
Menu commandsGo to VPN > SSL > Config.
Program outputWelcome!
Variables<group_name>
In the Name field, type admin.
set ips-open enable
end
edit id_integer
set http_retry_count <retry_integer>
set natip <address_ipv4mask>
end
FortiGate SSL VPN User Guide
Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this
service.</H4>
FortiGate documentation
The most up-to-date publications and previous releases of Fortinet product
documentation are available from the Fortinet Technical Documentation web site
at http://docs.forticare.com.
The following FortiGate product documentation is available:
•FortiGate QuickStart Guide
Provides basic information about connecting and installing a FortiGate unit.
•FortiGate Installation Guide
Describes how to install a FortiGate unit. Includes a hardware reference,
default configuration information, installation procedures, connection
procedures, and basic configuration procedures. Choose the guide for your
product model number.
•FortiGate Administration Guide
Provides basic information about how to configure a FortiGate unit, including
how to define FortiGate protection profiles and firewall policies; how to apply
intrusion prevention, antivirus protec tion , we b c onte n t filter ing , an d spam
filtering; and how to configure a VPN.
•FortiGate online help
Provides a context-sensitive and searchable version of the Administration
Guide in HTML format. You can access online help from the web-based
manager as you work.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-200807189
Related documentationIntroduction
•FortiGate CLI Reference
Describes how to use the FortiGate CLI and contains a reference to all
FortiGate CLI commands.
•FortiGate Log Message Reference
Available exclusively from the Fortinet Knowledge Center, the FortiGate Log
Message Reference describes the structure of FortiGate log messages and
provides information about the log messages that are generated by FortiGate
units.
•FortiGate High Availability User Guide
Contains in-depth information about the FortiGate high availability feature and
the FortiGate clustering protocol.
•FortiGate IPS User Guide
Describes how to configure the FortiGate Intrusion Preventio n System settings
and how the FortiGate IPS deals with some common attacks.
•FortiGate IPSec VPN User Guide
Provides step-by-step instructions for configuring IPSec VPNs using the webbased manager.
•FortiGate SSL VPN User Guide
Compares FortiGate IPSec VPN and FortiGate SSL VPN technology, and
describes how to configure web-only mode and tunne l-mode SSL VPN access
for remote users through the web-based manager.
•FortiGate PPTP VPN User Guide
Explains how to configure a PPTP VPN using the web-based manager.
•FortiGate Certificate Management User Guide
Contains procedures for managing digital certificates including generating
certificate requests, installing signed certificates, importing CA root certificates
and certificate revocation lists, and backing up and resto r ing installed
certificates and private keys.
•FortiGate VLANs and VDOMs User Guide
Describes how to configure VLANs and VDOMS in both NAT/Route and
Transparent mode. Includes detailed examples.
Related documentation
Additional information about Fortinet products is available from the following
related documentation.
FortiManager documentation
•FortiManager QuickStart Guide
Explains how to install the FortiManager Console, set up the FortiManager
Server, and configure basic settings.
•FortiManager System Administration Guide
Describes how to use the FortiManager System to manage FortiGate devices.
•FortiManager System online help
Provides a searchable version of the Administration Guide in HTML format.
You can access online help from the FortiManager Console as you work.
FortiOS v3.0 MR7 SSL VPN User Guide
1001-30007-0348-20080718
Introduction Related documentation
FortiClient documentation
•FortiClient Host Security User Guide
Describes how to use FortiClient Host Security software to set up a VPN
connection from your computer to remote networks, scan your computer for
viruses, and restrict access to your computer and applications by setting up
firewall policies.
•FortiClient Host Security online help
Provides information and procedures for using and configuring the FortiClient
software.
FortiMail documentation
•FortiMail Administration Guide
Describes how to install, configure, and manage a FortiMail unit in gateway
mode and server mode, including how to configure th e unit; create pr ofiles and
policies; configure antispam and antivirus filters; create user accounts ; and set
up logging and reporting.
•FortiMail online help
Provides a searchable version of the Administration Guide in HTML format.
You can access online help from the web-based manager as you work.
•FortiMail Web Mail Online Help
Describes how to use the FortiMail web-based email client, including how to
send and receive email; how to add, import, a nd export addresse s; and how to
configure message display preferences.
FortiAnalyzer documentation
•FortiAnalyzer Administration Guide
Describes how to install and configure a FortiAnalyzer unit to collect FortiGate
and FortiMail log files. It also describes how to view FortiGate and FortiMail log
files, generate and view log reports, and use the FortiAnalyzer unit as a NAS
server.
•FortiAnalyzer online help
Provides a searchable version of the Administration Guide in HTML format.
You can access online help from the web-based manager as you work.
Fortinet Tools and Documentation CD
All Fortinet documentation is available from the Fortin et Tools and Documentation
CD shipped with your Fortinet product. The documents on this CD are current at
shipping time. For up-to-date versions of Fortinet documentation see the Fortinet
Technical Docume ntation we b site at http://docs.forticare.com.
Fortinet Knowledge Center
Additional Fortinet technical documentation is available from the Fortinet
Knowledge Center. The knowledge center contains troubleshooting and how-to
articles, FAQs, technical notes, and more. Visit the Fortinet Knowledge Center at
http://kc.forticare.com.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071811
Customer service and technical supportIntroduction
Comments on Fortinet technical documentation
Please send information about any errors or omissions in this document, or any
Fortinet technical documentation, to techdoc@fortinet.com.
Customer service and technical support
Fortinet Technical Support provides services designed to make sure that your
Fortinet systems install quickly, configure easily, and operate reliably in your
network.
Please visit the Fortinet Technical Support web site at http://support.fortinet.com
to learn about the technical support services that Fortinet provides.
FortiOS v3.0 MR7 SSL VPN User Guide
1201-30007-0348-20080718
Configuring a FortiGate SSL VPN Comparison of SSL and IPSec VPN technology
Configuring a FortiGate SSL VPN
This section provides a comparison of SSL and IPSec VPN technology, in addition
to an overview of the two modes of SSL VPN operation. The high-level steps for
configuring each mode are also included with cross-references to underlying
procedures.
The following topics are included in this section:
•Comparison of SSL and IPSec VPN technology
•SSL VPN modes of operation
•Topology
•Configuration overview
•Configuring SSL VPN settings
•Configuring user accounts and SSL VPN user groups
•Configuring firewall policies
•Configuring SSL VPN event-logging
•Monitoring active SSL VPN sessions
•Configuring SSL VPN bookmarks and bookmark groups
•SSL VPN host OS patch check
•Granting unique access permissions for SSL VPN tunnel user groups
•SSL VPN virtual interface (ssl.root)
•SSL VPN dropping connections
Comparison of SSL and IPSec VPN technology
The FortiGate unit supports both SSL and IPSec VPN technologies. Each
combines encryption and VPN gateway functions to create private comm unication
channels over the Internet, which helps to defray physical network costs. Both
enable you to define and deploy network access and firewall policies using a
single management tool. In addition, both support a simple client/user
authentication process (including optional X.509 security certificates). You have
the freedom to use both technologies; however, one may be better suited to the
requirements of your situation.
In general, IPSec VPNs are a good choice for site-to-site connections where
appliance-based firewalls are used to provide network protection, and company
sanctioned client computers are issued to users. SSL VPNs are a good ch oice for
roaming users who depend on a wide variety of thin-client computers to access
enterprise applications and/or company resources from a remote location.
SSL and IPSec VPN tunnels may operate simultaneously on the same FortiGate
unit.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071813
Comparison of SSL and IPSec VPN technologyConfiguring a FortiGate SSL VPN
Legacy versus web-enabled applications
IPSec is well suited to network-based legacy applications tha t are not web-base d.
As a layer 3 technology, IPSec creates a secure tunnel between two host devices.
IP packets are encapsulated by the VPN clie nt and server softwar e running on the
hosts.
SSL is typically used for secure web transactions in order to take advantage of
web-enabled IP applications. After a secure HTTP link has been established
between the web browser and web server, application data is transmitted directly
between selected client and server applications through the tunnel.
Authentication differences
IPSec is a well-established technology with robust features that support many
legacy products such as smart cards and biometrics.
SSL supports sign-on to a web portal front-end, from which a number of different
enterprise applications may be accessed. The Fortinet implementation enables
you to assign a specific port for the web portal and to customize the login page if
desired.
Connectivity considerations
IPSec supports multiple connections to the same VPN tunnel—a number of
remote VPN devices effectively become part of the same network.
SSL forms a connection between two end points such as a remote client and an
enterprise network. Transactions involving three (or more) parties are not
supported because traffic passes between client and server applications only.
Relative ease of use
Although managing IPSec VPNs has become easier, configuring SSL VPNs is
simple in comparison. IPSec protocols may be blocked or restricted by some
companies, hotels, and other public places, whereas the SSL protocol is usually
unrestricted.
Client software requirements
Dedicated IPSec VPN software must be installed on all IPSec VPN peers and
clients and the software has to be configured with compatible settings.
To access server-side applications with SSL VPN, the remote user must have a
web browser (Internet Explorer, Netscape, or Mozilla/Firefox), and if Telnet//RDP
are used, Sun Java runtime environment. Tunnel-mode clie nt computers must
also have ActiveX (IE) or Java Platform (Mozilla/Firefox) enabled.
Access control
IPSec VPNs provide secure network access only. Access to the network
resources on a corporate IPSec VPN can be enabled for specific IPSec peers
and/or clients. The amount of security that can be applied to users is limited.
FortiOS v3.0 MR7 SSL VPN User Guide
1401-30007-0348-20080718
Configuring a FortiGate SSL VPN SSL VPN modes of operation
SSL VPNs provide secure access to certain applications. Web-only mode
provides remote users with access to server applications from any thin client
computer equipped with a web browser. Tunnel-mode provides remote users with
the ability to connect to the internal network from laptop computers as well as
airport kiosks, Internet cafes, and hote ls. Access to SSL VPN applications is
controlled through user groups.
Session failover support
In a FortiGate high availability (HA) cluster with session pickup enabled, session
failover is supported for IPSec VPN tunnels. After an HA failover, IPSec VPN
tunnel sessions will continue with no loss of data.
Session failover is not supported by SSL VPN tunnels, however cookie failover is
supported for communication between the SSL VPN client and the FortiGate unit.
This means that after a failover, the SSL VPN client can re-establish the SSL VPN
session without having to authenticate again. However, all sessions inside the
SSL VPN tunnel with resources behind the FortiGate unit will stop, and will
therefore have to be restarted.
SSL VPN modes of operation
When a remote client connects to the FortiGate unit, the FortiGate unit
authenticates the user based on user name, password, and authentication
domain. A successful login determines the access rights of remote users
according to user group. The user group settings specify whether the connection
will operate in web-only mode (see “Web-only mode” on page 15) or tunnel mode
(see “Tunnel mode” on page 17).
You can enable a client integrity checker to scan the remote client. The integrity
checker probes the remote client computer to verify that it is “safe” before access
is granted. Security attributes recorded on the client computer (for example, in the
Windows registry, in specific files, or held in memory due to running processes)
are examined and uploaded to the FortiGate unit.
You can enable a cache cleaner to remove any sensitive data that would
otherwise remain on the remote computer after the session e nds. For example, all
cache entries, browser history, cookies, encrypted information related to user
authentication, and any temporary data generated during the session are
removed from the remote computer. If the client’s browser cannot install and run
the cache cleaner, the user is not allowed to access the SSL-VPN portal.
Web-only mode
Web-only mode provides remote users with a fast and efficient way to access
server applications from any thin client computer equipped with a web browser.
Web-only mode offers true clientless network access using any web browser that
has built-in SSL encryption and the Sun Java runtime envi ro nm ent .
Support for SSL VPN web-only mode is built into the FortiOS operating system.
The feature comprises an SSL daemon running on the FortiGate unit, and a web
portal, which provides users with access to network ser vice s an d reso ur ce s
including HTTP/HTTPS, telnet, FTP, SMB/CIFS, VNC, RDP and SSH.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071815
SSL VPN modes of operationConfiguring a FortiGate SSL VPN
In web-only mode, the FortiGate unit act s as a se cure HTTP/HT TPS gateway and
authenticates remote users as members of a user group. After successful
authentication, the FortiGate unit redirects the web browser to the web portal
home page and the user can access the server applications behind the FortiGate
unit.
Configuring the FortiGate unit involves selecting web-only-mode access in the
user group settings and enabling the feature through SSL VPN configuration
settings. The user group settings determine which server applications can be
accessed. SSL encryption is used to ensure traffic confidentiality.
Web-only mode client requirements
The remote client computer must be equipped with the following softwa re:
•Microsoft Windows 2000/XP/2003/Vista, Linux, MacOS X, or UNIX operating
system
•Microsoft Internet Explorer 6.0 (or later), Netscape Navigator 7.0 (or later),
Mozilla Foundation/Firefox 1.5 (or later), or Apple Safari 1.3 (or later)
•If Telnet/ or RDP are us ed , Sun Java run tim e env iro nm e nt 1.4 (o r lat er ), with
Java applet access, JavaScript acces s, an d en a ble d co ok ie acc ep tance
Tunnel mode
Note: Web browsers offer different SSL security capabilities. The FortiGate unit offers an
SSL version 2 option through the CLI if required to support older browsers. In addition, the
FortiGate unit supports a range of cipher suites for negotiating SSL communications with a
variety of web browsers. The web browser must at least support a 64-bit cipher length.
Tunnel mode offers remote users the freedom to connect to the internal network
using the traditional means of web-based access from laptop computers, as well
as from airport kiosks, hotel business centers, and Internet cafés. If the
applications on the client computers used by your user community vary greatly,
you can deploy a dedicated SSL VPN client to any remote client through its web
browser. The SSL VPN client encrypts all traffic from the remote client computer
and sends it to the FortiGate unit through an SSL VPN tunnel over the HTTPS link
between the web browser and the FortiGate unit. Also available is split tunneling,
which ensures that only the traffic for the private network is sent to the SSL VPN
gateway. Internet traffic is sent through the usual unencrypted route. This
conserves bandwith and alleviates bottlenecks.
In tunnel mode, remote clients connect to FortiGate unit and the web portal login
page using Microsoft Internet Explorer, Mozilla Foundation/Firefox, MacOS, or
Linux. The FortiGate unit acts as a secure HTTP/HTTPS gateway and
authenticates remote users as members of a user group. After successful
authentication, the FortiGate unit redirects the web browser to the web portal
home page. The user can then download the SSL VPN client (an ActiveX or Java
plugin) and install it using controls provided through the web portal. SSL VPN
tunnel mode can also be initiated from a standalone application on
Windows/MacOS, and Unix.
FortiOS v3.0 MR7 SSL VPN User Guide
1601-30007-0348-20080718
Configuring a FortiGate SSL VPN Topology
When the user initiates a VPN connection with the FortiGate unit throu gh the SSL
VPN client, the FortiGate unit establishes a tunnel with the client and assigns the
client a virtual IP address from a range of rese rved addresses. The clie nt uses the
assigned IP address as its source address for the duration of the connection. Af ter
the tunnel has been established, the user can access the network behind the
FortiGate unit.
Configuring the FortiGate unit to establish a tunnel with remote clients involves
selecting tunnel-mode access in the user group settings and enabling the feature
through SSL VPN configuration settings. The firewall policy and pr otection profiles
on the FortiGate unit ensure that inbound traffic is screened and processed
securely.
Tunnel-mode client requirements
The remote computer must be equipped with the following software:
•Microsoft Windows 2000/XP/2003 or Vista (32 or 64-bit), MacOS X v10.3.9,
v10.4 “Tiger”, v10.5 “Leopard”, or Linux Distributions RedHat/Fedora,
Ubuntu/Debian, or Suse
•Microsoft Internet Explorer 6.0 (or later) with ActiveX enabled, or Mozilla
Foundation/Firefox (1.5 or later) with Java Platform enabled
Topology
Note: The browser requirements only apply if you use the tunnel mode client on Windows
through the browser interface. You do not need a browser if you use the standalone tunnel
client.
Note: The user account used to install the SSL VPN client on the remote computer must
have administrator privileges.
In the most common Internet scenario, the remote client connects to an ISP that
offers connections with dynamically assigned IP addresses. The ISP forwards
packets from the remote client to the Internet, where they are routed to the public
interface of the FortiGate unit.
At the FortiGate unit, you configure user groups and firewall policies to define the
server applications and IP address range or network that remote clients will be
able to access behind the FortiGate unit.
For example, Figure 1 shows a FortiGate gateway (FortiGate_1) to two private
networks, Subnet_1 and Subnet_2.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071817
TopologyConfiguring a FortiGate SSL VPN
Subnet_2
192.168.22.0/24
internal
192.168.22.1
Subnet_1
172.16.10.0/24
HTTP/HTTPS
172.16.10.2
Tel net
172.16.10.3
FTP
172.16.10.4
SMB/CIFS
172.16.10.5
Internet
FortiGate_1
wan1
dmz
172.16.10.1
Remote client
Figure 1: Example SSL VPN configuration
To provide remote clients with access to all of the servers on Subnet_1 from the
Internet, you would configure FortiGate_1 as follows:
•Create an SSL VPN user group and include the remote users in the user
group. When you create the user group, you also specify whether the users
may access the web portal in web-only mode or tunnel mode.
•For tunnel-mode users, define the virtua l IP add re sse s th at the Fo rtiGa te un i t
is to assign to remote clients when they connect.
•Create a firewall destination IP address of 172.16.10.0/24.
•Create a firewall policy to allow the SSL VPN user group members to connect
to Subnet_1 through the VPN. For more information, see “Configuring firewall
policies” on page 45.
If your user community needs access to Subnet_2, you would create a second
firewall destination IP address of 192.168.22.0/24 and create a second
firewall policy that binds the associated remote clients to the Subnet_2 destination
address.
Infrastructure requirements
•The FortiGate unit must be operating in NAT/Route mode and have a static
public IP address.
•The ISP assigns IP addresses to remote clients before they connect to the
FortiGate unit.
•If the remote clients need web-only mode access, see “Web-only mode client
requirements” on page 16.
•If the remote clients need tunnel-mode access, see “Tunnel-mode client
requirements” on page 18.
FortiOS v3.0 MR7 SSL VPN User Guide
1801-30007-0348-20080718
Configuring a FortiGate SSL VPN Configuration overview
Configuration overview
Before you begin, install your choice of HTTP/HTTPS, telnet, SSH, FTP,
SMB/CIFS, VNC, and/or RDP server applications on the internal network. As an
alternative, these services may be accessed remotely through the Internet. All
services must be running. Users must have individual user accounts to access the
servers (these user accounts are not related to FortiGate user accounts or
FortiGate user groups).
To configure FortiGate SSL VPN technology, you should follow these genera l
steps:
1Enable SSL VPN connections and set the basic options needed to support SSL
VPN configurations. See “Configuring SSL VPN settings” on page 36.
2To use X.509 security certificates for authentication purposes, load the signed
server certificate, CA root certificate, and Certificate Revocation List (CRL) onto
the FortiGate unit, and load the personal/group certificates onto the remote
clients. For more information, see theFortiGate Certificate Management User
Guide.
3Create one FortiGate user account for each remote client, a nd assign the users to
SSL VPN type user groups. See “Configuring user accounts and SSL VPN user
groups” on page 42.
4Configure the firewall policy and the remaining para meter s nee de d to suppor t th e
required mode of operation:
•For web-only mode operation, see “Configuring Web-only firewall policies” on
page 46.
•For tunnel-mode operation, see “Configuring tunnel-mode firewall policies” on
page 48.
5Define SSL VPN event-logging parameters. See “Configuring SSL VPN event-
logging” on page 50.
6You can also monitor active SSL VPN sessions. See “Monitoring active SSL VPN
sessions” on page 51.
Configuring the SSL VPN client
There are several configurations of SSL VPN applications available. The SSL
VPN tunnel client application installs a network driver on the client machine that
redirects all network traffic through the SSL VPN tunnel (it is necessary for the
driver to be OS-specific).
SSL VPN web-mode works on all OSs and browsers. The tunnel mode client can
be downloaded and installed from the browser interface on Windows platforms
through ActiveX for IE, or Firefox plug-ins. If you prefer not to initiate the tunnel
mode client function using a browser, standalone SSL VPN tunnel client
applications are available for Windows, Linux, and MacOS (see Tunnel-mode
client requirements for the specific versions that are supported). When a system
configuration must involve more secure disposal of cached data, the SSL VPN
Virtual Desktop should be used. (Windows XP only).
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071819
Configuring the SSL VPN clientConfiguring a FortiGate SSL VPN
SSL VPN Virtual Desktop application.
The virtual desktop application creates a virtual desktop on a user's PC and
monitors the data read/write activity of the web browser running inside the virtual
desktop. When the application starts, it presents a ‘virtual desktop’ to the user.
The user starts the web browser from within the virtual desktop and connects to
the ssl vpn web portal. The browser file/directory operation is redirected to a new
location, and the data is encrypted before it is written to the local disk. When the
virtual desktop application exits normally, all the data written to the disk is
removed. If the session terminates abnormally (power loss, system failure), the
data left behind is encrypted and unusable to the user. The next time you start the
virtual desktop, the encrypted data is removed.
Using the SSL VPN Virtual Desktop
On the FortiGate unit GUI under SSL VPN User Group Options, the 'Require
Virtual Desktop Connection' option is not selected by default. If you choose to use
the SSL VPN virtual desktop option, users are forced to use the virtual desktop to
initiate a SSL VPN session. The user must install the FortiClient SSL VPN virtual
desktop application on the client machine and run it. If a user attempt s to establish
a VPN connection that does not use the virtual desktop, the connection is refu sed.
The most recent version of the SSL VPN virtual desktop application can be found
at:
http://support.fortinet.com/
Windows XP is supported in the current release.
To download and run the SSL VPN Virtual Desktop application
1Go to the Fortinet Technologies home page at http://support.fortinet.com/
select Support.
2Under Support, enter your user name and password.
This takes you to the Fortinet customer support site.
3Select Firmware Images and then FortiGate.
and
FortiOS v3.0 MR7 SSL VPN User Guide
2001-30007-0348-20080718
Configuring a FortiGate SSL VPN Configuring the SSL VPN client
The FortiGate index page opens.
4Select v3.0 and then MR7.
This takes you to the page with firmware images for MR7.
5Select SSL VPN Clients.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071821
Configuring the SSL VPN clientConfiguring a FortiGate SSL VPN
6To download the SSL VPN Virtual Desktop, select
SSLVPNVirtualDesktopSetup_3.0.384.exe and follow the InstallShield
Wizard instructions.
The FortiGate unit may offer you a self-signed security certificate. If you are
prompted to proceed, select Yes.
8When you are prompted for your user name and password:
•In the Name field, type your user name.
•In the Password field, type your password.
9Select Login.
FortiOS v3.0 MR7 SSL VPN User Guide
2201-30007-0348-20080718
Configuring a FortiGate SSL VPN Configuring the SSL VPN client
The FortiGate unit will redirect your web browser to the FortiGate SSL VPN
Remote Access Web Portal home p age automatically.
The fields in the Tools area enable you to specify the URL or IP address of a host
computer. If required, you can ping a host computer behind the FortiGate unit to
verify connectivity to that host.
To connect to a web server from the Tools area
1In the Connect to Web Server field, type the URL of the web server (for example,
http://www.mywebexample.com or https://172.20.120.101).
2Select Go.
The FortiGate unit replaces the URL with
https://<FG_IP_address>:<port_no>/proxy/http/<specified_URL> and
the requested page is displayed.
3To end the session, close the browser window.
To ping a host or server behind the FortiGate unit
1In the Test for Reachability (Ping) field, type the IP address of the host or server
that you want to reach (for example, 192.168.12.22).
2Select Go.
A message stating whether the IP address can be reached or not is disp layed.
Using the SSL VPN standalone tunnel clients
SSL VPN standalone tunnel client applications are available for Windows, Linux,
and MacOS systems (see Tunnel-mode client requirements for the specific
versions that are supported). There are separate download files for each
operating system.
The most recent version of the SSL VPN standalone client applications can be
found at:
http://support.fortinet.com/
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071823
Configuring the SSL VPN clientConfiguring a FortiGate SSL VPN
To download the SSL VPN standalone tunnel client (Windows)
1Go to the Fortinet Technologies home page at http://support.fortinet.com/
select Support.
2Under Support, enter your user name and password.
This takes you to the Fortinet customer support site.
3Select Firmware Images and then FortiGate.
Figure 3: Firmware Images selection on Fortinet customer support site
The FortiGate index page opens.
and
Figure 4: FortiGate index page
4Select v3.0 and then MR7.
FortiOS v3.0 MR7 SSL VPN User Guide
2401-30007-0348-20080718
Configuring a FortiGate SSL VPN Configuring the SSL VPN client
This takes you to the page with firmware images for MR7.
5Select SSL VPN Clients.
6To download the SSL VPN Windows client application, select
FortiClientSSLVPNSetup_3.0.384.exe or
FortiClientSSLVPN_3.0_384.msi and follow the InstallShield Wizard
instructions.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071825
Configuring the SSL VPN clientConfiguring a FortiGate SSL VPN
To use the SSL VPN standalone tunnel client (Windows)
1Go to Start > All Programs > Fortinet > FortiClient SSL VPN >
FortiClient SSL VPN.
Server AddressEnter the IP address of the server you need to access.
UsernameEnter your user name.
PasswordEnter the password associated with your user account.
Expand buttonSelect to expand the dialog box and display Client Certificate,
Client CertificateSelect the authentication certificate from the drop-down list, if
Save user name and
password
Keep connection
alive until manually
stopped
Save user name and password, and Keep connection alive
until manually stopped.
required.
Select to save the value in Username and Password for future
logins.
Select to have the connection stay up until you log out.
2Select Connect.
3To manually terminate the connection, select Exit.
To uninstall the SSL VPN standalone tunnel client (Windows)
1Go to Start > Control Panel.
2Select Add or Remove Programs.
3Select ‘FortiClient SSL VPN’ and then Remove.
FortiOS v3.0 MR7 SSL VPN User Guide
2601-30007-0348-20080718
Configuring a FortiGate SSL VPN Configuring the SSL VPN client
To download the SSL VPN standalone tunnel client (Linux)
1Go to the Fortinet Technologies home page at http://support.fortinet.com/
and
select Support.
2Under Support, enter your user name and password.
This takes you to the Fortinet customer support site.
3Select Firmware Images and then FortiGate.
The FortiGate index page opens.
4Select v3.0 and then MR7.
FortiOS v3.0 MR7 SSL VPN User Guide
01-30007-0348-2008071827
Loading...
+ 63 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.