Configuring a FortiGate SSL VPN

Topology

When the user initiates a VPN connection with the FortiGate unit through the SSL VPN client, the FortiGate unit establishes a tunnel with the client and assigns the client a virtual IP address from a range of reserved addresses. The client uses the assigned IP address as its source address for the duration of the connection. After the tunnel has been established, the user can access the network behind the FortiGate unit.

Configuring the FortiGate unit to establish a tunnel with remote clients involves selecting tunnel-mode access in the user group settings and enabling the feature through SSL VPN configuration settings. The firewall policy and protection profiles on the FortiGate unit ensure that inbound traffic is screened and processed securely.

Tunnel-mode client requirements

The remote computer must be equipped with the following software:

Microsoft Windows 2000/XP/2003 or Vista (32 or 64-bit), MacOS X v10.3.9, v10.4 “Tiger”, v10.5 “Leopard”, or Linux Distributions RedHat/Fedora, Ubuntu/Debian, or Suse

Microsoft Internet Explorer 6.0 (or later) with ActiveX enabled, or Mozilla Foundation/Firefox (1.5 or later) with Java Platform enabled

Note: The browser requirements only apply if you use the tunnel mode client on Windows through the browser interface. You do not need a browser if you use the standalone tunnel client.

Note: The user account used to install the SSL VPN client on the remote computer must have administrator privileges.

Topology

In the most common Internet scenario, the remote client connects to an ISP that offers connections with dynamically assigned IP addresses. The ISP forwards packets from the remote client to the Internet, where they are routed to the public interface of the FortiGate unit.

At the FortiGate unit, you configure user groups and firewall policies to define the server applications and IP address range or network that remote clients will be able to access behind the FortiGate unit.

For example, Figure 1 shows a FortiGate gateway (FortiGate_1) to two private networks, Subnet_1 and Subnet_2.

FortiOS v3.0 MR7 SSL VPN User Guide

 

01-30007-0348-20080718

17

Page 17
Image 17
Fortinet FORTIOS V3.0 MR7 manual Topology, Tunnel-mode client requirements

FORTIOS V3.0 MR7 specifications

Fortinet's FortiOS v3.0 MR7 marks a significant advancement in network security and management, providing organizations with enhanced features, technologies, and characteristics to better protect their IT environments. This version of FortiOS is designed to facilitate comprehensive security and optimized performance, ensuring that organizations can safeguard their networks against evolving threats.

One of the main features in FortiOS v3.0 MR7 is its robust firewall capabilities. The stateful firewall technology enables dynamic packet filtering based on predefined security policies. This strengthens the organization's perimeter defense by allowing or denying traffic based on user-defined rules. Additionally, the integrated Application Control feature extends the firewall's capabilities by identifying and controlling applications regardless of port usage, enabling organizations to enforce security policies on a finer-grained level.

FortiOS v3.0 MR7 also introduces advanced intrusion prevention system (IPS) functionalities. The next-generation IPS utilizes deep packet inspection and real-time threat intelligence to detect and block attacks before they can compromise the network. Coupled with Fortinet’s threat research team, which ensures timely updates of security signatures, this system helps organizations mitigate risks posed by sophisticated cyber threats.

Another key characteristic of FortiOS v3.0 MR7 is its enhanced VPN capabilities. The support for both SSL and IPsec VPN allows secure remote access for employees and offers flexible options for secure communication over the internet. This feature is essential for organizations that embrace remote work, ensuring that sensitive data remains protected regardless of the user's location.

In addition to its powerful security features, FortiOS v3.0 MR7 includes advanced reporting and logging capabilities. Users can generate detailed reports that highlight security events, traffic patterns, and performance metrics. This data not only improves visibility into network security but also assists in compliance with regulatory requirements.

Moreover, the platform's user-friendly interface enhances the overall management experience. Administrators can quickly configure settings, monitor activity, and respond to incidents effectively. With centralized management capabilities, FortiOS v3.0 MR7 allows organizations to manage multiple devices from a single console, simplifying operations and reducing administrative overhead.

In summary, Fortinet's FortiOS v3.0 MR7 integrates a wealth of security features, including a stateful firewall, advanced IPS, VPN support, and comprehensive reporting functions. Together, these technologies ensure that organizations can maintain a strong security posture in an increasingly complex threat landscape.