FortiClient 5.2 Cookbook
FortiClient 5.2 Cookbook
Version 5.2
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET VIDEO GUIDE
https://video.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
CUSTOMER SERVICE & SUPPORT
https://support.fortinet.com
FORTINET COOKBOOK
https://cookbook.fortinet.com
FORTINET TRAINING & CERTIFICATION PROGRAM
https://www.fortinet.com/support-and-training/training.html
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com/
END USER LICENSE AGREEMENT
https://www.fortinet.com/doc/legal/EULA.pdf
FEEDBACK
Email: [email protected]
This recipe uses remote IPsec and SSL VPN tunnels to bypass Internet access restrictions. Restricted Internet access is
simulated with a Web Filter profile that blocks google.com. You will create FortiClient SSL and IPsec VPN tunnels to
bypass the web filter, connect to a remote FortiGate unit, and transparently browse the Internet to google.com.
The recipe assumes that you have already created a “vpn_users“ user group and a local LAN firewall address.
In this example, restricted Internet access is simulated using a Web Filter profile to block Google. With the user situated
behind this FortiGate, google.com cannot be accessed, and instead the FortiGuard “Web Page Blocked!” message
appears. For the user to bypass this Web Filter, the following VPN configurations must be made on a remote FortiGate
(which is not blocked by any filter), and the user must connect to it using FortiClient.
This recipe consists of the following steps:
1. Configure the IPsec VPN connection.
2. Configure the SSL VPN connection.
3. Create security policies for VPN access to the Internet.
4. Configure FortiClient for IPsec and SSL VPN.
1. In FortiOS on the remote FortiGate, go to VPN > SSL > Portals. Select the full-access portal, then click Edit.
2. Deselect Enable Split Tunneling. This allows all VPN traffic to go through the FortiGate firewall.
3. Go to VPN > SSL > Settings. Under Connection Settings, set Listen on Port to 10443.
4. Under Authentication/Portal Mapping, assign the vpn_users user group to the full-access portal. Assign All Other
Users/Groups to the desired portal. Since the FortiGate has an ssl.root firewall address by default, you only need to
create the Internet access policy.
1. In FortiClient, on the Remote Access tab, add a new connection for each VPN tunnel.
2. Enter the desired connection name, and set Type to SSL-VPN or IPsec VPN depending on the tunnel
configuration.
3. In the Remote Gateway field, enter the FortiGate IP address.
4. For the IPsec VPN tunnel, select Pre-Shared Key from the Authentication Method dropdown list. In the Pre-
Shared Key field, enter the key.
5. For the SSL VPN tunnel, enable Customize port and set to 10443.
6. (Optional) In the Username field, enter a username from the vpn_users user group.
7. Select the newly created tunnel, enter the username and password, and click Connect.
8. If the system displays a server authentication warning, click Yes. Once the FortiClient has established the
connection, the FortiGate assigns the user an IP address and FortiClient displays the connection status, including
the IP address, connection duration, and bytes sent and received.
With the tunnel up, you can now visit google.com without being blocked, since the remote FortiGate is handling
Internet traffic and the web filter on the local FortiGate has been bypassed.
This recipe uses the IPsec VPN wizard to provide a group of remote users with secure, encrypted access to the
corporate network. The tunnel provides group members with access to the internal network, but forces them through the
FortiGate unit when accessing the Internet. When the tunnel is configured, you will connect using the FortiClient
application.
This recipe consists of the following steps:
1. Create a user group for remote users.
2. Add a firewall address for the local network.
3. Configure the IPsec VPN connection.
4. Create security policies for VPN access to the Internet.
5. Configure FortiClient for IPsec VPN.
6. From the Local Interface dropdown list, select the internal interface. From the Local Address dropdown list, select
Local LAN.
7. In the Client Address Range field, enter an IP range for VPN users. Click Next.
8. Configure client options as desired. Click Create. When using the IPsec VPN wizard, FortiOS automatically creates
an IPsec firewall address range using the configured tunnel name. Since the wizard creates an IPsec-to-internal
IPv4 policy, you only need to create the Internet access policy.
6. In FortiOS, go to VPN > Monitor > IPsec Monitor. Verify that the tunnel status is up.
7. Go to Log & Report > Traffic Log > Forward Traffic to view the traffic. Verify that the Sent/Received column
In this recipe, you will create an SSL VPN that remote users connect to using FortiClient running on iOS. When a user
using an iOS device connects to this SSL VPN, they can access servers and data on the internal network. They can also
securely browse the Internet using the FortiGate’s Internet connection. This example uses FortiClient (iOS) 5.2.0.028.
This recipe consists of the following steps:
1. Create users and a user group.
2. Configure the SSL VPN connection.
3. Create security policies for VPN access to the Internet and internal network.
4. Configure FortiClient (iOS) for SSL VPN.
1. In FortiOS, go to VPN > SSL > Portals. Select the web-access portal, then click Edit. By default, this portal
supports web mode.
2. Deselect Enable Split Tunneling. This allows all SSL VPN traffic to go through the FortiGate firewall.
3. Go to VPN > SSL > Settings. From the Listen on Interface(s) dropdown list, select wan1.
4. Under Connection Settings, set Listen on Port to 10443.
5. For Address Range, select Specify custom IP ranges.
6. From the IP Ranges dropdown list, select the default IP range, SSLVPN_TUNNEL_ADDR1.
7. Under Authentication/Portal Mapping, add the FortiClient user group and map it to the web-access portal. If
necessary, map a portal for Assign All Other Users/Groups.
To create security policies for VPN access to the Internet and internal network:
3. Create a security policy that allows SSL VPN users to access the Internet securely through the FortiGate unit:
a. From the Incoming Interface dropdown list, select ssl.root.
b. From the Outgoing Interface dropdown list, select wan1.
3. Select the VPN. Enter the user password and select Login. FortiClient connects to VPN.
4. In FortiOS, go to VPN > Monitor > SSL-VPN Monitor to verify that the user is connected.
In this recipe, two-factor authentication is added to a user account to provide extra security when connecting to an IPsec
VPN using FortiClient (macOS).
Two-factor authentication requires a user to authenticate twice before being allowed to access the IPsec VPN. In this
recipe the FortiToken Mobile app for iOS provides a one-time password (OTP) (a six-digit number) that you must enter
at a second authentication prompt.
This recipe assumes that you have already activated FortiToken Mobile.
This recipe consists of the following steps:
1. Create a user and user group.
2. Add a firewall address for the LAN.
3. Configure the IPsec VPN connection.
4. Create a security policy for VPN access to the Internet.
5. Send the FortiToken activation code to the user.
6. Set up FortiToken Mobile on an iOS device.
7. Configure FortiClient (macOS).
1. In FortiOS, go to User & Device > User > User Definition. Create a new local user using the user creation wizard.
2. On the Login Credentials tab, enter the user's login credentials. This example simply creates a local user.
3. On the Contact Info tab, select SMS. In the Phone Number field, enter a phone number without dashes or spaces.
This example uses SMS to send an activation code to the user. Even if your FortiGate cannot send SMS messages,
you must include a phone number. Do not add an email address.
4. On the Extra Info tab, select the FortiToken assigned to this user. Click Create. The user list shows the FortiToken
in the Two-factor Authentication column for the new user account.