Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
bluemerle
New Contributor II

Merge IPSec-VPN and SSL-VPN into common VPN-Zone with 3rd party Radius for 2FA?

Can I just flip the switch on IPSec XAUTH² to 'inherit from policy' and use the same rules as SSL-VPN, where you have to specify a Source and User/Group?

 

Last time I tried this, the FortiGate acted as a MITM for IPSec users and redirected HTTPS³ to its own IP, causing a certificate error. I had to roll back without investigating further.

 

FortiGate 200F 7.2.11

² XAUTH is set to a group containing a remote group which is a radius of our 2FA token.

³Split Tunnel, so not all HTTPS requests, only the ones where a FW rule was hit.

 

 

 

 

1 Solution
Anthony_E
Community Manager
Community Manager

To merge IPsec-VPN and SSL-VPN into a common VPN zone using a third-party RADIUS server for two-factor authentication (2FA) on a FortiGate:

  1. Configure RADIUS Server: Go to `User & Authentication` -> `RADIUS Servers`. Create a new RADIUS server entry with the necessary details (IP address, secret, etc.).
    - Test connectivity to ensure the RADIUS server is reachable.
  2. Set Up User Groups:  Go to `User & Authentication` -> `User Groups`. Create a user group for VPN users and add the RADIUS server as a member.
  3. Configure IPsec VPN: Go to `VPN` -> `IPsec Wizard` to create a new IPsec VPN. Set the authentication method to use the RADIUS server. Configure the necessary Phase 1 and Phase 2 settings.
  4. Configure SSL VPN: Go to `VPN` -> `SSL-VPN Settings`. Set the authentication method to use the RADIUS server. Configure the SSL VPN portal and IP pools.
  5. Create a VPN Zone: Go to `Network` -> `Interfaces`. Create a new zone and add both the IPsec and SSL VPN interfaces to this zone.
  6. Configure Firewall Policies: Go to `Policy & Objects` -> `Firewall Policy`. Create policies to allow traffic from the VPN zone to the internal network. Ensure the source user is set to the user group configured with the RADIUS server.
  7. Enable Two-Factor Authentication: Ensure the RADIUS server is configured to support 2FA, such as using FortiToken or another method.  Verify that users are prompted for 2FA when connecting to the VPN.
Anthony-Fortinet Community Team.

View solution in original post

3 REPLIES 3
Anthony_E
Community Manager
Community Manager

Hello,


Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.


Thanks,

Anthony-Fortinet Community Team.
Anthony_E
Community Manager
Community Manager

Hello,

 

We are still looking for someone to help you.

We will come back to you ASAP.


Thanks,

Anthony-Fortinet Community Team.
Anthony_E
Community Manager
Community Manager

To merge IPsec-VPN and SSL-VPN into a common VPN zone using a third-party RADIUS server for two-factor authentication (2FA) on a FortiGate:

  1. Configure RADIUS Server: Go to `User & Authentication` -> `RADIUS Servers`. Create a new RADIUS server entry with the necessary details (IP address, secret, etc.).
    - Test connectivity to ensure the RADIUS server is reachable.
  2. Set Up User Groups:  Go to `User & Authentication` -> `User Groups`. Create a user group for VPN users and add the RADIUS server as a member.
  3. Configure IPsec VPN: Go to `VPN` -> `IPsec Wizard` to create a new IPsec VPN. Set the authentication method to use the RADIUS server. Configure the necessary Phase 1 and Phase 2 settings.
  4. Configure SSL VPN: Go to `VPN` -> `SSL-VPN Settings`. Set the authentication method to use the RADIUS server. Configure the SSL VPN portal and IP pools.
  5. Create a VPN Zone: Go to `Network` -> `Interfaces`. Create a new zone and add both the IPsec and SSL VPN interfaces to this zone.
  6. Configure Firewall Policies: Go to `Policy & Objects` -> `Firewall Policy`. Create policies to allow traffic from the VPN zone to the internal network. Ensure the source user is set to the user group configured with the RADIUS server.
  7. Enable Two-Factor Authentication: Ensure the RADIUS server is configured to support 2FA, such as using FortiToken or another method.  Verify that users are prompted for 2FA when connecting to the VPN.
Anthony-Fortinet Community Team.
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors