FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Sgagan
Staff
Staff
Article Id 378182
Description This article describes how to configure IPsec dial-up VPN tunnel with an external DHCP server on the FortiClient.
Scope FortiGate, FortiClient.
Solution

GUI configuration:

 

  1. In this example, create a dial-up tunnel via the IPsec wizard by selecting 'custom' as the template type.
  2. Specify the parameters as shown in the screenshot below:

 

Sgagan_0-1740155780092.png

 

  1. Add the User group under XAUTH settings
  2. Make sure to disable ‘Mode Config’ which is present in IPsec Phase 1 settings.

 

Picture1.png

 

  1. Go to the Network -> Interfaces, select the IPsec interface under the assigned WAN connection.


Picture2.png

 
  1. Change the addressing mode to manual with IP as 0.0.0.0 and Remote IP/Netmask as 0.0.0.0/0.0.0.0.
  2. Enable DHCP server and select advanced settings.
  3. Select 'Relay' as the mode, select 'IPsec' as the type, and specify the external DHCP server IP.

 

Picture3.png

 

  1. For the firewall policy, configure a policy from IPsec interface to Internal interface with source as IP range that is reserved on the DHCP server and destination as Internal subnet.
  2. On the FortiClient, Enable DHCP over IPsec in the advanced settings section:


Picture4.png

 

  1. Enable IPv4 Split tunnel and specify the designated internal network subnet.


Picture5.png

 

  1. Save the configuration and login with user credentials.
  2. Once connected, the address will get assigned from the external DHCP server.