FortiClient
FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises’ security posture.
fsoares
Staff
Staff
Article Id 336800
Description

This article describes how to allow SSL VPN when the FortiGate is operating in Policy-based mode. By default, SSL VPN connections will not be allowed.

Scope

FortiGate, FortiClient.

Solution

After configuring the following:

 

  1. SSL-VPN Settings:


SSL-VPN SettingsSSL-VPN Settings

 

  1. SSL-VPN Portal:

 

SSL-VPN PortalSSL-VPN Portal

 

  1. Security Policy:

 

Firewall PolicyFirewall Policy

 

  1. FortiClient: When trying to connect, the following message will be faced on the FortiClient:

 

FortiClientFortiClient

 

And upon running the following debug commands...

 

diagnose debug application sslvpn -1
diagnose debug enable

 

The following is the output (no processing):

 

DebugDebug

 

When checking the VPN process running on the firewall returns no process for SSLVPND.

 

no process marked.jpg

 

However, the sniffer shows incoming packets:

 

SnifferSniffer

 

The debug flow output shows 'msg="iprope_in_check() check failed on policy 0, drop"':

 

debug flow ssl vpn policy based 2.PNG

 

An SSL-Inspection & Authentication Policy must be created:

 

config firewall policy

edit 2

set name "Allow_SSL-VPN"
set srcintf "ssl.root"
set dstintf "internal"
set srcaddr "SSLVPN_TUNNEL_ADDR1"
set dstaddr "all"
set service "ALL"
set groups "VPN_Users"

next

end

 

Inspection&AuthenticationInspection&Authentication

 

After this change, the FortiGate will start to process incoming SSL VPN traffic. SSLVPND process also shows up:

 

marked SSLVPN process showing.jpg