Description
This article explains how to configure Secure Remote Access. This feature enhances VPN security by continuously checking the absence or presence of a Security Posture Tag to allow or block a new VPN connection and terminate the already established VPN tunnel if Security Posture Tag check fails.
Scope
FortiClientEMS, FortiClient Windows, FortiClient MacOS, FortiClient Linux
Solution
Explanation:
- In FortiClient Secure Remote Access, a Security Posture Tag condition is defined which the endpoint needs to fulfil to establish and maintain a VPN Connection.
- When the Secure Remote Access Tag Checking Fails:
- A new VPN connection will fail with a warning.
- An already established VPN connection will disconnect and will show a warning.
- For a Warning, the message configured under 'Customize Host Check Fail Warning' will be shown to the user.
- If the message is not defined, the user will get a default message 'VPN blocked, please contact IT administrator'.
- Either configure an allowed type or prohibited type. The Allowed Type will allow the VPN when the specified Tag is available and the Prohibit Type Tag will block the VPN when the specified Tag is available.
Configuration:
- Configure Security Posture Tag Rule on EMS. In EMS v7.2.x the Security Posture Tags is called as Zero Trust Tags.
- Security Posture Tag to check if a file is present on the Endpoint.
- Enabling the Secure Remote Access feature:
- Login to EMS -> Endpoint Profiles -> Remote Access -> Edit the Profile -> Advanced -> Enable 'Secure Remote Access'.
- Configuring the Secure Remote Access Rule:
- Scroll down to the bottom, select and edit the Tunnel -> Advanced Settings -> Under Tags -> Select the Tag -> Select the type to be either Allowed/Prohibited -> Save.
- Where necessary, enable 'Customize Host Check Fail Warning' and specify a message which will be displayed if the secure remote access check fails.
- Error when trying to connect the VPN as File-Present Security Posture Tag is not available:
Docs for reference:
Notes:
- The above is a Client Side check. For example: this will not block VPN connection to FortiGate from a free FortiClient unless more checks are put on the FortiGate.
- On the FortiGate, to enhance the Security further, enable EMS SN Check and Security Posture Tags in the VPN Policies.