- IPsec VPN.
- Software requirements:
- FortiClient EMS v7.4.1+.
- FortiClient (endpoints): v7.4.2+.
- FortiGate FortiOS: v7.4.4+ or v7.6.0+.
- Configuration guides: This is achieved by Fortinet implementation of RFC5723 IKEv2 session resumption:
IKEv2 session resumption 7.4.1
Resuming sessions for IPsec tunnel IKE version 2 7.4.4
IKE settings
- Configuration requirements:
- IPsec: Just IKEv2 (based on RFC5723 https://datatracker.ietf.org/doc/html/rfc5723)
- Save username: Not required.
- Save password: Not required.
- Keep running (always up): Not required.
- RADIUS MFA: compatible and will be asked just once during the first connection establishment
- SAML Authentication: compatible and will be asked just once during the first connection establishment
- Session timer: configurable on FortiOS with client-resume-interval under config vpn ipsec phase1-interface
- Client (source) IP address changes: Supported (LAN interface changes or ISP switch).
- Transport layer: tested and confirmed with IKEv2 UDP and TCP (FortiGate and FortiClient can establish IKEv2 tunnels over TCP IPsec VPN over TCP 7.4.1 | FortiClient 7.4.0 | Fortinet Document Library ).
- Sample FortiGate configuration:
config system settings set ike-session-resume enable <----- Per-vdom CLI option that affect all STATIC IKEv2 phase1s in the VDOM. end
config vpn ipsec phase1-interface edit "MyTunnelName" set type dynamic set ike-version 2 set peertype any set net-device disable set mode-cfg enable set dpd on-idle set eap enable set eap-identity send-request set reauth enable set authusrgrp "VPN_RA_Group" set client-resume enable set client-resume-interval 7200 set client-auto-negotiate enable set client-keep-alive enable set dpd-retryinterval 60 next end
config vpn ipsec phase2-interface edit "MyTunnelName" set phase1name "MyTunnelName" set keepalive enable next end
- SSL VPN.
- Software requirements:
- FortiClient EMS v7.2.x or v7.4.x.
- FortiClient (endpoints): v7.2.x or v7.4.x.
- FortiGate: v7.2.10 or v7.4 or v7.6.
- Configuration guides: This is achieved by 'set tunnel-connect-without-reauth enable under config vpn ssl settings'.
config vpn ssl settings
Technical Tip: Configuring SSL-VPN to allow tunnel reconnection without requiring reauthentication
- Configuration requirements:
- Save username: Not required.
- Save password: Not required.
- Keep running (always up): Not required.
- RADIUS MFA: compatible and will be asked just once during the first connection establishment.
- SAML Authentication: compatible and will be asked just once during the first connection establishment.
- Session timer: configurable on FortiOS with tunnel-user-session-timeout under config vpn ssl settings
- Client (source) IP address changes: supported by set auth-session-check-source-ip disable under config vpn ssl settings
- Transport layer: tested and confirmed with TCP and UDP (DTLS).
- Sample FortiGate configuration:
config vpn ssl settings set dtls-tunnel enable set auth-session-check-source-ip disable set tunnel-connect-without-reauth enable set tunnel-user-session-timeout 86400 <- This value has a limit of 255 seconds on old FortiOS versions. end
- 2FA/MFA/SAML implementation: `
To allow enough time for the remote authentication process to take place, the default value of the remote authentication timeout must be increased. This is mandatory for any kind of authentication that involves 2FA/MFA/Token or for SAML. Recommended minimum value is 60 seconds. Remote authentication timeout value should be adjusted according to the requirements of the environment. The value (60 seconds) may not work in some environments and higher values may be needed.
config system global
set remoteauthtimeout 60
end
Note: Starting v7.6.3, the SSL VPN tunnel mode will no longer be supported, and SSL VPN web mode will be called 'Agentless VPN'.
Related documents:
Save password, auto connect, and always up | FortiClient 7.4.2 | Fortinet Document Library
Configuring autoconnect with username and password authentication | FortiClient 7.4.2 | Fortinet Doc...
Enabling VPN always up | FortiClient 7.4.2 | Fortinet Document Library
Enabling VPN autoconnect | FortiClient 7.4.2 | Fortinet Document Library
IKE settings | FortiClient 7.4.2 | Fortinet Document Library
IKEv2 session resumption 7.4.1 | FortiClient 7.4.0 | Fortinet Document Library
Resuming sessions for IPsec tunnel IKE version 2 | FortiGate / FortiOS 7.6.1 | Fortinet Document Lib...
Troubleshooting Tip: IKEv2 IPSec VPN on v7.4.1 and v7.4.2 has NAT-T disabled with default settings
Increasing remote authentication timeout using FortiGate CLI | FortiAuthenticator 6.6.0 | Fortinet D...
|