Google+ Badge

Sunday, February 5, 2017

Fortigate - How to Configure SSL-VPN in 100D and connecting with Web and Tunnel Mode

In this example, you will allow remote users to access the corporate network using an SSL VPN, connecting either by web mode using a web browser or tunnel mode using FortiClient. This allows users to access network resources, such as the Internal Segmentation Firewall (ISFW) used in this example.

For users connecting via tunnel mode, traffic to the Internet will also flow through the FortiGate, to apply security scanning to this traffic.



Step 1 - Check the fortigate version and details, backup the configuration first.

Step 2 - Check the Interface details like LAN & WAN IP and Ports.

    => CO-LAN is my Internal Network interface "PORT1"
         
    => WAN is my External Network Interface, two WAN "WAN1 & WAN2" connected to a Zone "WAN".

Step 3 - Create an Address for SSL-VPN-Range & Local LAN. Here I have two network connections "CO & BMU", so I have created two address.

Also create SSL-VPN range to access from remote users.

Step 4 - In my case, as I have two network range, I need to add both network range to one group.


Step 5 - Create a user for SSL-VPN access.


This username and  Password will ask at connecting time.

Step 6 - Create a User Group for SSL-VPN access. If we have one or more users in this VPN access, we need to add to this group.


Step 7 - Now we can create SSL-VPN Tunnel.

Here, I have selected all options for testing purpose, you can select according to your choice.



Step 8 - We need to create policy for accessing Remote location (Home) to CO-Network (Office).


 


Step 9 - Check the SSL-VPN web tunnel mode using browser.



Step 10 - Check the connection through FortiClient (Tunnel Mode).

 
 

Step 11 - Check and Monitor the connection status in both side.
 

That's it...