Fortinet FORTIOS V3.0 MR7 manual To define the firewall policy for web-only mode connections

Page 45

 

 

Configuring a FortiGate SSL VPN

Configuring firewall policies

Note: To provide access to a single host or server, you would type an IP address like 172.16.10.2/32. To provide access to two servers having contiguous IP addresses, you would type an IP address range like 172.16.10.[4-5].

5Select OK.

To define the firewall policy for web-only mode connections

1Go to Firewall > Policy and select Create New.

2Enter these settings in particular:

Source

Interface/Zone

 

Select the FortiGate interface that accepts connections from remote

 

users.

 

Address Name

 

Select all.

Destination

Interface/Zone

 

Select the FortiGate interface to the local private network (for example,

 

dmz).

 

Address Name

 

Select the IP destination address that you defined previously (for

 

example, Subnet_1).

Service

Select ANY.

Action

Select SSL-VPN.

SSL Client

Select to allow traffic generated by holders of a (shared) group

Certificate

certificate, for example, a user group containing PKI peers/users. The

Restrictive

holders of the group certificate must be members of an SSL VPN user

group, and the name of that user group must be present in the Allowed

 

 

list.

Cipher Strength

Select one of the following options to determine the level of SSL

 

encryption to use. The web browser on the remote client must be

 

capable of matching the level that you select:

 

• To use any cipher suite, select Any.

 

• To use a 164-bit or greater cipher suite, select High >= 164.

 

• To use a 128-bit or greater cipher suite, select Medium >= 128.

User

Select one of the following options to bind user groups to authentication

Authentication

methods:

Method

• If the user group contains only local users, select Local.

 

• If the remote clients will be authenticated by an external RADIUS

 

server, select Radius.

 

• If the remote clients will be authenticated by an external LDAP server,

 

select LDAP.

 

• If the user group contains Local, RADIUS, and LDAP users, select

 

Any to enable all of the authentication methods. Local is attempted

 

first, then RADIUS, then LDAP.

Available

Select the name of the user group requiring SSL VPN access, and then

Groups

select the right-pointing arrow. Do not select more than one user group

 

unless all members of the selected user groups have identical access

 

requirements.

3Select OK.

4If the user group requires access to another server or network, create the IP destination address (see “To specify the destination IP address” on page 46) and repeat this procedure to create the required firewall policy.

5Create additional IP destination addresses and firewall policies if required for each additional user group.

FortiOS v3.0 MR7 SSL VPN User Guide

 

01-30007-0348-20080718

45

Image 45
Contents E R G U I D E Trademarks FortiGate v3.0 MR7 SSL VPN User GuideContents Working with the web portal Configuring SSL VPN settingsSSL VPN host OS patch check Starting a session from the Tools areaTunnel-mode features IndexLogging out Page About FortiGate SSL VPN IntroductionDocument conventions About this documentTypographic conventions FortiGate documentationFortiManager documentation Related documentationFortiMail documentation FortiClient documentationFortiAnalyzer documentation Fortinet Tools and Documentation CDComments on Fortinet technical documentation Customer service and technical supportComparison of SSL and IPSec VPN technology Configuring a FortiGate SSL VPNAuthentication differences Legacy versus web-enabled applicationsAccess control Connectivity considerationsWeb-only mode SSL VPN modes of operationSession failover support Tunnel mode Web-only mode client requirementsTunnel-mode client requirements TopologyInfrastructure requirements Example SSL VPN configurationConfiguring the SSL VPN client Configuration overviewUsing the SSL VPN Virtual Desktop SSL VPN Virtual Desktop applicationTo download and run the SSL VPN Virtual Desktop application Configuring the SSL VPN client To download the SSL VPN Virtual Desktop, select Using the SSL VPN standalone tunnel clients To connect to a web server from the Tools areaTo ping a host or server behind the FortiGate unit Firmware Images selection on Fortinet customer support site To download the SSL VPN standalone tunnel client WindowsFortiClientSSLVPNSetup3.0.384.exe or Save user name and password , and Keep connection alive PasswordServer Address UsernameTo download the SSL VPN standalone tunnel client Linux Configuring the SSL VPN client Configuring a FortiGate SSL VPN Advanced settings User Enter your user name PasswordTo use the SSL VPN standalone tunnel client Linux ServerTo uninstall the SSL VPN standalone tunnel client Linux To download the SSL VPN standalone tunnel client MacOSUse Client File Path Configuring the SSL VPN client To use the SSL VPN standalone tunnel client MacOS To uninstall the SSL VPN standalone tunnel client MacOSEnabling SSL VPN connections and editing SSL VPN settings Configuring SSL VPN settingsSee Specifying the cipher suite for SSL negotiations Go to System Admin Settings Specifying a port number for web portal connectionsSpecifying an IP address range for tunnel-mode clients Specifying the cipher suite for SSL negotiations Setting the idle timeout settingAdding Wins and DNS services for clients Setting the client authentication timeout settingTo add a custom caption Go to VPN SSL Config Adding a custom caption to the web portal homeCustomizing the web portal login Configuring user accounts and SSL VPN user groupsDisable To create a user account in the Local domainUser Name To create a user group Configuring user accounts and SSL VPN user groups Configuring firewall policies Configuring firewall addresses Configuring Web-only firewall policiesTo specify the destination IP address To define the firewall policy for web-only mode connections To specify the source IP address Configuring tunnel-mode firewall policiesTo define the firewall policy for tunnel-mode operations Subnet2Configuring SSL VPN event-logging User AuthenticationAvailable Groups Monitoring active SSL VPN sessions To view SSL VPN event logs Go to Log&Report Log AccessViewing the SSL VPN bookmark list Configuring SSL VPN bookmarks and bookmark groupsDelete See alsoCreate New Bookmark Configuring SSL VPN bookmarksViewing the SSL VPN Bookmark Groups list Configuring SSL VPN bookmark groupsAssigning SSL VPN bookmark groups to SSL VPN users SSL VPN host OS patch check Configuration ExampleVariable DescriptionSSL VPN configuration for unique access permissions Enable SSL-VPN Settings Group1 user group attributes Source/destination firewall addresses Public IP To view the SSL VPN policies, go to Firewall Policy Firewall policy list SSL VPN virtual interface ssl.rootPeer network policy Source Ssl.root Source address Internet browsing policy Source Ssl.root Source addressSSL VPN dropping connections SSL VPN dropping connections SSL VPN dropping connections To log in to the FortiGate secure Http gateway Connecting to the FortiGate unitWeb portal home page features FortiGate SSL VPN Remote Access Web Portal URL re-writing Launching web portal applicationsAdd Bookmark Adding a bookmark to the My Bookmarks listBookmark DetailsHost Name/IP, or Shared File Folder Title10.10.10.10 To add a telnet connection and start a telnet sessionTo add an FTP connection and start an FTP session To add a SMB/CIFS connection and start a SMB session Launching web portal applications To add a VNC connection and start a VNC session To add a RDP connection and start a RDP session Working with the web portal 192.168.1.3 To add a SSH connection and start a SSH sessionSee also Tunnel-mode features Starting a session from the Tools areaTo start a telnet session from the Tools area Working with the ActiveX/Java Platform plug-in To initiate a VPN tunnel with the FortiGate unit To download and install the ActiveX/Java Platform pluginUninstalling the ActiveX/Java Platform plugin To uninstall the ActiveX/Java Platform pluginLogging out Logging out Index URL Index Page

FORTIOS V3.0 MR7 specifications

Fortinet's FortiOS v3.0 MR7 marks a significant advancement in network security and management, providing organizations with enhanced features, technologies, and characteristics to better protect their IT environments. This version of FortiOS is designed to facilitate comprehensive security and optimized performance, ensuring that organizations can safeguard their networks against evolving threats.

One of the main features in FortiOS v3.0 MR7 is its robust firewall capabilities. The stateful firewall technology enables dynamic packet filtering based on predefined security policies. This strengthens the organization's perimeter defense by allowing or denying traffic based on user-defined rules. Additionally, the integrated Application Control feature extends the firewall's capabilities by identifying and controlling applications regardless of port usage, enabling organizations to enforce security policies on a finer-grained level.

FortiOS v3.0 MR7 also introduces advanced intrusion prevention system (IPS) functionalities. The next-generation IPS utilizes deep packet inspection and real-time threat intelligence to detect and block attacks before they can compromise the network. Coupled with Fortinet’s threat research team, which ensures timely updates of security signatures, this system helps organizations mitigate risks posed by sophisticated cyber threats.

Another key characteristic of FortiOS v3.0 MR7 is its enhanced VPN capabilities. The support for both SSL and IPsec VPN allows secure remote access for employees and offers flexible options for secure communication over the internet. This feature is essential for organizations that embrace remote work, ensuring that sensitive data remains protected regardless of the user's location.

In addition to its powerful security features, FortiOS v3.0 MR7 includes advanced reporting and logging capabilities. Users can generate detailed reports that highlight security events, traffic patterns, and performance metrics. This data not only improves visibility into network security but also assists in compliance with regulatory requirements.

Moreover, the platform's user-friendly interface enhances the overall management experience. Administrators can quickly configure settings, monitor activity, and respond to incidents effectively. With centralized management capabilities, FortiOS v3.0 MR7 allows organizations to manage multiple devices from a single console, simplifying operations and reducing administrative overhead.

In summary, Fortinet's FortiOS v3.0 MR7 integrates a wealth of security features, including a stateful firewall, advanced IPS, VPN support, and comprehensive reporting functions. Together, these technologies ensure that organizations can maintain a strong security posture in an increasingly complex threat landscape.