Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Not applicable

SSL-VPN for iPad

Hi everyone, You know my boss' s boss wants to conect his iPad via ssl-vpn, i he already installed the forticlient mobile app for this but as i have read some forums and documentations it says that the forticlient mobile app only works for http and that not really handy, as my boss' s boss wants to connect to the iPad and register a softphone to call as if he were on the office, so the question, does anyone have tried this?? Did it work? any other possible solutions? Thanks in advance eldekal
5 REPLIES 5
Fullmoon
Contributor III

Take a look on this http://kb.fortinet.com/kb/viewContent.do?externalId=FD31619&sliceId=1

Fortigate Newbie

Fortigate Newbie
Carl_Wallmark
Valued Contributor

SSL VPN tunnel mode is not supported for iphone/ipad, you have to use the IPSEC client that is built in to the iphone/ipad, and it demands some extra config to work, search for iphone at kb.fortinet.com

FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C

FCNSA, FCNSP---FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30BFortiAnalyzer 100B, 100CFortiMail 100,100CFortiManager VMFortiAuthenticator VMFortiTokenFortiAP 220B/221B, 11C
Not applicable

Thank you both guys for your answers, I' m gonna check out that link and see if it works. Regards
Kess
New Contributor

Theres what I did in order to make it work in order to allow an iPhone user to gain access to the entire internal network: In this example, my internal network is 192.168.100.0/24 1. Create a new user on your fortinet device (ex: kess) 2. Create a new firewall group on your fortinet device and call it IPSec-VPN 3. Assign the users that will be able to connect with iPhone/iPad to that new FW group 4. Create a new FW Address called NET-Internal with IP 192.168.100.0/24 5. Create a new FW Address called NET-IPSec-VPN with IP 10.0.0.0/24 6. Create a new IPSec VPN Phase 1 with auto-key as follows: Name: iPhone Remote Gateway: Dialup User Local interface: WAN1 Mode: Main (ID protection) Auth Method: Preshared Key Preshared-Key: YourSecretAndStrongKey Peer Options: Accept Any Peer ID Advanced: Enable Interface Mode: Yes IKE Version: 1 Local gateway IP: Main interface IP P1 proposal: 1-Enc: AES256 / Auth: MD5 2-Enc: AES256 / Auth: SHA1 DH Group: 2 Keylife: 28800 XAUTH: Enable as Server Server Type: Auto User Group: IPSec-VPN NAT Trasversal: Yes Keepalive Frequency: 10 Dead Peer Detection: Yes Click OK 7. Create a new IPSec VPN Phase 2 as follows: Name: iPhone-P2 Phase 1: iPhone Click on Advanced: P2 Proposal: 1-Enc: AES256 / Auth: MD5 2-Enc: AES256 / Auth: SHA1 Enable replay detection: Yes Enable perfect forward secrecy(PFS): Yes DH Group: 2 Keylife: Seconds / 1800 Auto Keep Alive: Yes Click OK 8. Open up your CLI and type: config vpn ipsec phase1-interface edit iPhone set mode-cfg enable set ipv4-start-ip 10.0.0.1 set ipv4-end-ip 10.0.0.254 set ipv4-netmask 255.255.255.0 set ipv4-split-include " NET-Internal" set ipv4-dns-server1 192.168.100.1 set ipv4-dns-server2 192.168.100.2 set ipv4-wins-server1 192.168.100.1 set ipv4-wins-server1 192.168.100.2 set domain " your-internal-domain.lan" next end exit 9. Setup a firewall policy to allow iPhone traffic through VPN tunnel Source Interface/Zone: iPhone Souce Address: NET-IPSec-VPN Destination interface/Zone: internal Destination Address: NET-Internal Schedule: always Service: ANY Action: Accept No NAT Click OK Now you have to configure iPhone/iPad device: Settings -> VPN -> New... IPSec Description: My Office VPN Server: Your public IP address or FQDN name Account: kess Password: the-strong-kess-password Use Certificate: No Group Name: <empty> Secret: YourSecretAndStrongKey After that you can connect FROM EXTERNAL with your new IPSec VPN. If you need to assign only few internal ressources, you can then nodify your firewall policy in order to permit only some services on some internal machines. Keep in mind that iPhone/iPad devices should be able to connect to your DNS and WINS servers with appropriate ports, so the policy rule should allow that. VERY IMPORTANT !!! If your internal domain name FQDN ends with " .local" your device won' t be able to resolve DNS names. This is not a Fortinet related issue, but this is how apple OS works (Mac OS X included). For that reason I always choose to use a domain ending in " .lan" . If your internal FQDN names are something like somename.mydomain.local you must use IP addresses in order to connect to internal ressources. Cya Kess.
Not applicable

Hi kess Thanks for your answer I haven' t had any time to check on this but as soon as I have some free time i' m gonna check that out Thanks for your answers everyone Regards, eldekal
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors