FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
AnthonyH
Staff
Staff
Article Id 339561
Description

This article describes how to setup IPSec Dial up VPN to remotely manage the FortiGate.

Scope

FortiGate, FortiClient.

Solution

There are three steps involved in this article that provide setup and configuration for the VPN:

  1. Configuring the interface.
  2. Setting up IPsec Dial-Up VPN.
  3. Configuring the FortiClient.

 

Step 1:

 

To begin, start by configuring the interface to allow for HTTPS access. Navigate to Network -> Interface. Here, port2 has been allocated to be the management interface and allow HTTPS.

 
 
 
 

Management-interface.PNG

 

Step 2:

 

Configure the VPN by navigating to VPN -> IPsec Wizard.

 

IPsec_wizard.PNG

 

 In the authentication step of the wizard, set the incoming interface as the WAN interface and fill out the PSK and user group.

 

ipsec-wizard2.PNG

 

In the Policy & Routing, the local interface will be set as port2 which is the interface where I have allow HTTPS access. The local address was created to allow access to port2, 10.10.10.254/32:

 

ipsec-wizard3.PNG

 

Verify the policy was installed by the IPsec wizard, Policy & Objects -> Firewall Policy:


firewall_policy.PNG

 

Step 3:

 

Lastly configure the FortiClient settings. The FortiClient will require the remote gateway, and pre-shared key. Make sure that the FortiGate and FortiClient have matched phase1 and phase2 proposals before connecting:

 

Forticlient.PNG

 

Connect to the VPN and access the FortiGate using the interface IP https://10.10.10.254:

 

management-fortigate.PNG