C:\OpenSSL-Win64\bin>openssl genrsa -des3 -out ca.key 4096Generate Server Certificate
C:\OpenSSL-Win64\bin>openssl req -new -x509 -days 365 -key ca.key -out ca.crt
C:\OpenSSL-Win64\bin>openssl x509 -req -days 365 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out ipsecdialup.crtFinally generate client certificate through the following list of commands:
C:\OpenSSL-Win64\bin>openssl genrsa -des3 -out client.key 4096
C:\OpenSSL-Win64\bin>openssl req -new -key client.key -out client.csr
C:\OpenSSL-Win64\bin>openssl x509 -req -days 365 -in client.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out client.crt
C:\OpenSSL-Win64\bin>openssl pkcs12 -export -in client.crt -inkeyclient.key -certfile ca.crt -name "test" -out client.p12
#config user peerSet up IPSEC VPN diaulp:
edit test1
set ca "" <----- specify the CA certificate already uploaded.
end
#config user peergrp
edit user_group1
set member test1
end
2) Specify the server certificate and peergrp as follow:
3) At last, specify the user group for XAUTH:
Import the CA certificate and client certificate to the user side:1) Import CA certificate in the IE to Trusted Root Certification Authorities in the PC running FortiClient.2) Import the client certificate to the FortiClient:
3) At last, select the authentication method in the FortiClient to X.509 certificate to use the client certificate already uploaded previously.
#diag debug disable#diag debug reset#diag debug appl ike -1#diag debug enable
After connection, test the debug to be disabled with the commands below:
#diag debug reset#diag debug disable
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.