IPSec Site to Site VPN Configuration Series:
- Set Up IPSec Site to Site VPN Between Fortigate 60D (1) – Route-Based VPNs
- Set Up IPSec Site to Site VPN Between Fortigate 60D (2) – Policy-Based VPNs
- Set Up IPSec Site to Site VPN Between Fortigate 60D (3) – Concentrator and Troubleshooting
- Set Up IPSec Site to Site VPN Between Fortigate 60D (4) – SSL VPN
SSL VPNs establish connectivity using SSL, which functions at Levels 4 – 5 (Transport and Session layers). Information is encapsulated at Levels 6 – 7 (Presentation and Application layers), and SSL VPNs communicate at the highest levels in the OSI model. SSL is not strictly a Virtual Private Network (VPN) technology that allows clients to connect to remote networks in a secure way.
FortiOS supports the SSL (not SSL1.0) and TLS (TLS1.3) versions defined below:
Defined | |
---|---|
Protocol | Year |
SSL 1.0 | n/a |
SSL 2.0 | 1995 – RFC 6176 |
SSL 3.0 | 1996 – RFC 6101 |
TLS 1.0 | 1999 – RFC 2246 |
TLS 1.1 | 2006 – RFC 4346 |
TLS 1.2 | 2008 – RFC 5246 |
TLS 1.3 | TBD |
When a remote client connects to the FortiGate unit, the FortiGate unit authenticates the user based on username, password, and authentication domain. A successful login determines the access rights of remote users according to user group. The user group settings specify whether the connection will operate in web-only mode or tunnel mode. There are three types of mode:
- Web-only Mode
- Tunnel Mode
- Port Forwarding Mode (Proxy Mode)
Lab Topology:
Configuration Steps:
1. Create SSL VPN Portal
2. Create Remote Users and Groups
3. Create Security Policies
3.1 SSL-VPN Rule from WAN1 to Internal
3.2 Firewall Address Policy from SSL Tunnel Address to Internal
4. Test
Reference:
- FortiOS™ Handbook – SSL VPN (VERSION 5.2.2)
- How to setup SSL VPN (Web & Tunnel mode) for remote access
- Chapter 16 SSL VPN for FortiOS 5.0
- Setup examples : Remote Access with SSLVPN