Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
csmIT
New Contributor

OpenVPN and Fortigate SSL?

Has anyone connected an OpenVPN client PC to a Fortigate SSL VPN? I' m trying to connect a linux server (no GUI) to our network via the Fortigate (200B) SSL VPN. Any example configs would be appreciated. Or, should I rather use IPSec? Best Nik
9 REPLIES 9
emnoc
Esteemed Contributor III

they are not compatible. If you have a client pc that needs vpn access, use a ipsec client or a sslclient ( forticlient ) .

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
csmIT
New Contributor

Thanks emnoc. The problem is that I do not run a GUI at all on the client. Do you know if IPSec (command line) would work? I have created an IPSec VPN and connected successfully with my Mac and Windows PC via their built in IPSec clients (not fortigate software) so I assume IPSec via command line would work on Linux? -Nik
emnoc
Esteemed Contributor III

I' ve used the cisco vpnclient and strongswan from cli. Either one of these should be good for ipsec. Fortigate has forticlient for macosx or linux ( iirc ). Maybe you can getting these working from a cli also.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
csmIT
New Contributor

That' s the direction I' m looking at now. I' ve also come across something called OpenConnect VPN which is supposed to connect to SSL VPN' s on Cisco devices. Have you looked at that setup too?
emnoc
Esteemed Contributor III

OpenConnect
Yes, it works but the cisco client is way much better in my opinion. It' s beta and use at your risk.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
csmIT
New Contributor

I don' t have a cisco TAC account so I can' t download the cisco client. I' m attempting to use vpnc on ubuntu. So far it' s not working, I get a " no response from target. Looking at the logs on the FG it is saying; ike 0: IKEv1 Aggressive, comes 23.2.143.80:54981->207.69.179.34 14, peer-id=L2TPClients . ike 0: no IKEv1 phase1 configuration matching 23.2.143.80:54981->207.69.179.34 14 ike shrank heap by 118784 bytes ike shrank heap by 8192 bytes ------------------ Looks like I need the handshaking parameters for IKE. Do you have an example config I can have a look at? Thanks Nick
emnoc
Esteemed Contributor III

Basically for vpnc, it' s very simple. You will need to modify your vpnc.conf file and place the group, xauth information. Now what that said, I never used it against a fortigate, but the setup should be the same. I would be suspected of what to apply for the group setting but I' m sure it would be remote-peer identify. You will have to play around with it. I' m doing some FGT-3040 install next week, so maybe I might give it a try and see what happens on one of my VMs. Here' s my vpnc.conf that I use to a ASA. # IKE Authmode hybrid IKE DH group dh2 IPSec gateway vpn01.xxxx.net IPSec ID RAWARRIOR IPSec secret Ims0s3cur3d IPSec target network 10.20.87.0/255.255.255.0 IKE Authmode PSK Xauth username neteng-admin Xauth password Temporary # note: LinuxOS = Debian Lenny with bigmem kernel support but I don' t think I had to do anything special within the kernel or recompile anything. You might be better off using the shrewclient or the real cisco IPSCE client to test ALL parameters and then craft the same for vpnc setting on your LinuxOS. This way you can conduct better diagnostics and get better debug information, and less beating your head into the wall. I did this when working on how to use my cisco IPSEC client against a fortigate and yes, I got it to worked :) Same as with the vpnclient or vpnc, you can import a .pcf file extension for cisco into your env and conduct all on the CLI with no interaction. I did this when crafting some linux-fw-gateway devices and in the same fashion of what the cisco EzVPN does for client xauth access. I don' t think Fortinet has ever came up with something similar ( a PCF file ) that would allow you to hand over all of the vpn-gw information, and just have one pre-configuration file to ease remote-access VPNs. I think you will have to do some experimentation, no matter what path you go. But I pretty much try all of the above with 3des/AES128 and your choice of diffiehellman group 2 and with PSK or hybrid ( PSK +xauth ). I never tried any of the above with pfs enabled btw. Like I suggested above, you have to play around with it. On my ASAs it was quite simple to craft a tunnel-group for iPhone/Androids and then one for other users and get it all working with little problems. Only my androids had problems and mainly withe sslvpn and OpenVPN connections.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
csmIT
New Contributor

Thanks emnoc, but this config gives the exact same results as before " no IKEv1 phase1 configuration matching..." I' ll try a couple more things. N
emnoc
Esteemed Contributor III

So how is your ike p1 proposals set on the vpn-gateway? If the key doesn' t match you will get that same error. What you might want to do is try the -natt-mode force-natt if you think it' s NAT-T related. vpnc --debug 100 --natt-mode natt or force-natt Since your doing this from a command line, tcpdump your connection that gateway and look for any responses and the same for the fortigate. Make sure ike is getting thru and that you see trafic before the ESP proto. Like I said, vpnc was hit or miss with working. I always use the shrewsoft client 1st to weed out any configuration parameters and then tackle it with the cli binaries. I do agreed that fortigate should rethink their positions in the linux market and produce something simple and quick for CLI or crontab scripts with auto connections either ssl or ipsec VPNs.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors