SSL VPN tunnel mode host check
This topic provides a sample configuration of remote users accessing the corporate network through an SSL VPN by tunnel mode using FortiClient with AV host check.
Sample network topology
Sample configuration
WAN interface is the interface connected to ISP. This example shows static mode. You can also use DHCP or PPPoE mode. The SSL VPN connection is established over the WAN interface.
To configure SSL VPN using the GUI:
- Configure the interface and firewall address. Port1 interface connects to the internal network.
- Go to Network > Interface and edit the wan1
- Set IP/Network Mask to 20.120.123/255.255.255.0.
- Edit port1 interface and set IP/Network Mask to 168.1.99/255.255.255.0.
- Click OK.
- Go to Firewall & Objects > Address and create an address for internet subnet 168.1.0.
- Configure user and user group.
- Go to User& Device > UserDefinition to create a local user sslvpnuser1.
- Go to User& Device > UserGroups to create a group sslvpngroup with the member sslvpnuser1.
- SSL VPN web portal configuration.
- Go to VPN > SSL-VPN Portals to create a tunnel mode only portal my-split-tunnel-portal. Enable Split Tunneling.
- Select Routing Address.
- SSL VPN settings configuration.
- Go to VPN > SSL-VPN Settings.
- Choose proper Listen on Interface, in this example, wan1.
- Listen on Port 10443.
- Choose a certificate for ServerCertificate. The default is Fortinet_Factory.
- Under Authentication/Portal Mapping, set default Portal tunnel-access for All OtherUsers/Groups.
- Create new Authentication/Portal Mapping for group sslvpngroup mapping portal my-split-tunnel-portal.
- SSL VPN firewall policy configuration.
- Go to Policy & Objects > IPv4 Policy.
- Fill in the firewall policy name. In this example: sslvpn tunnel access with av check.
- Incoming interface must be SSL-VPN tunnel interface(ssl.root).
- Choose an Outgoing Interface. In this example: port1.
- Set the source to all and group to sslvpngroup.
- In this example, the destination is all.
- Set schedule to always, service to ALL, and Action to Accept.
- Click OK.
- Configure SSL VPN web portal to enable AV host-check.
- Open the CLI Console at the top right of the screen.
- Enter the following commands to enable the host to check for compliant AntiVirus software on the user’s computer:
config vpn ssl web portal
edit my-split-tunnel-access
set host-check av end
To configure SSL VPN using the CLI:
- Configure the interface and firewall address.
config system interface edit “wan1” set vdom “root” set ip 172.20.120.123 255.255.255.0
next
end
Configure internal interface and protected subnet. Connect Port1 interface to internal network.
config system interface edit “port1” set vdom “root” set ip 192.168.1.99 255.255.255.0
next
endconfig firewall address edit “192.168.1.0” set subnet 192.168.1.0 255.255.255.0
next
end
- Configure user and user group.
config user local edit “sslvpnuser1” set type password set passwd your-password
next
end config user group edit “sslvpngroup” set member”vpnuser1″
next
end
- Configure SSL VPN web portal.
config vpn ssl web portal edit “my-split-tunnel-portal” set tunnel-mode enable set split-tunneling enable
set split-tunneling-routing-address “192.168.1.0” set ip-pools “SSLVPN_TUNNEL_ADDR1”
next
end
- Configure SSL VPN settings.
config vpn ssl settings set servercert “Fortinet_Factory” set tunnel-ip-pools “SSLVPN_TUNNEL_ADDR1” set tunnel-ipv6-pools “SSLVPN_TUNNEL_IPv6_ADDR1” set source-interface “wan1” set source-address “all” set source-address6 “all”
set default-portal “full-access” config authentication-rule edit 1 set groups “sslvpngroup” set portal “my-split-tunnel-portal”
next
end
- Configure SSL VPN firewall policy.
Configure one firewall policy to allow remote user to access the internal network. Traffic is dropped from internal to remote client.
config firewall policy edit 1 set name “sslvpn web mode access”
set srcintf “ssl.root” set dstintf “port1” set srcaddr “all” set dstaddr “192.168.1.0” set groups “sslvpngroup” set action accept set schedule “always” set service “ALL”
next
end
- Configure SSL VPN web portal to enable AV host-check.
Configure SSL VPN web portal to enable the host to check for compliant AntiVirus software on the user’s computer:
config vpn ssl web portal
edit my-split-tunnel-access
set host-check av
end
To see the results:
- Download FortiClient from forticlient.com.
- Open the FortiClient Console and go to Remote Access.
- Add a new connection.
l Set VPN Type to SSL VPN. l Set Remote Gateway to the IP of the listening FortiGate interface, in this example: 172.20.120.123.
- Select Customize Port and set it to 10443.
- Save your settings.
- Use the credentials you’ve set up to connect to the SSL VPN tunnel.
If the user’s computer has AntiVirus software installed, a connection is established; otherwise FortiClient shows a compliance warning.
- After connection, traffic to 168.1.0 goes through the tunnel. Other traffic goes through local gateway.
- In FGT, go to VPN > Monitor> SSL-VPN Monitor to verify the list of SSL users.
- In FGT, go to Log & Report > Traffic Log > Forward Traffic and view the details for the SSL entry.
Hi Mike, I would like to ask you something related to the post you published. If you have Active Directory and your users have Windows and Apple laptops, how can you make sure that that they can connect SSL VPN from domain joined machine only? As the solution presented is applicable for Windows only machines and cannot be used in parallel with Apple Laptops – for example, checking registry keys or AV running and etc.
Got a question for you Mike. When users connect to the SSLVPN their machines are isolated. No traffic is allowed like Wifi isolation. Is there a way to allow all traffic on all user workstations connected to the VPN via the Fortinet VPN client? I was thinking of adding a the that sets the FROM interface to SSL-VPN tunnel interface (ssl.root) and the TO interface to SSL-VPN tunnel interface (ssl.root). But it sounds risky and I don’t want to mess things up. And I don’t see a check box for isolating clients like on Wifi. Any help would be appreciated?
Every connection is a /32 on the FortiGate.