Tag: FortiGate firewall

Authenticating SSL VPN users using LDAP

This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel.

  1. Downloading and installing FSSO agent in the LDAP server
  2. Registering the LDAP server on the FortiGate
  3. Configuring Single Sign-On on the FortiGate
  4. Importing LDAP users
  5. Creating the SSL VPN user group
  6. Creating the SSL address range
  7. Configuring the SSL VPN tunnel
  8. Creating security policies
  9. Results

capture1

  1. Downloading and installing FSSO agent in the LDAP server

The current Forti OS version which we are using in our firewall is 5.2.5 build 701 (shown below)

Forti OS version.JPG

Download and install FSSO client on your Domain Controller, find a download link here:

https://support.fortinet.com/Download/FirmwareImages.aspx

fsso

Accept the license and follow the Wizard. Enter the Windows AD administrator password.

ca-step1

Click Next, select the Advanced Access method

ca-step2

In the Collector Agent IP address field, enter the IP address of the Windows AD server.

ca-step3

Select the domain you wish to monitor.

ca-step4

Next, select the users you do not wish to monitor.

ca-step5

Under Working Mode, select DC Agent mode.

ca-step6

Reboot the Domain Controller.

ca-step7

Upon reboot, the collector agent will start up.

You can choose to Require authenticated connection from FortiGate and set a Password.

ca-step8

2. Registering the LDAP server on the FortiGate

Go to User & Device > Authentication > LDAP Servers to configure the LDAP server.

ldap

3.  Configuring Single Sign-On on the FortiGate

Go to User & Device > Authentication > Single Sign-On and create a new SSO server.

Under Groups tab, select the user groups to be monitored. In this example, “FortiOS Writers” group is used.

sso_fgt

4.  Importing LDAP users

Go to User & Device > User > User Definition, and create a new user, selecting Remote LDAP User.

Choose your LDAP Server from the dropdown list.

You will be presented with a list of user accounts, filtered by the LDAP Filter to include only common user classes.

fsso-1

5.  Creating the SSL VPN user group

Go to User & Device > User > User Groups to create a new FSSO user group.

user-group

6.  Creating the SSL address range

Go to Policy & Objects > Objects > Addresses, and create a new address.

Set the Type to IP Range, and in the Subnet/IP Range field, enter the range of addresses you want to assign to SSL VPN clients. Select Any as the Interface.

Then create another Address for each Subnet or IP Range within your internal network to which remote users will connect.

capture-2

7.  Configuring the SSL VPN tunnel

Go to VPN > SSL > Portals and create the full-access portal or edit the full-access portal

capture-3

Source IP pools > select from the drop down menu > SSL address range created above (point#6)

Go to VPN > SSL > Settings.

Under Connection Settings set Listen on Port to 443.

ssl-settings1

Under Authentication/Portal Mapping, select Create New.

capture-4

Assign the LDAP group user group to the full-access portal

8.  Creating security policies

Go to Policy & Objects > Policy >  IPv4 and create an ssl.root – wan1 policy.

policyconfig1

9.  Results

Click on  VPN client > Select SSl-VPN > click on New VPN > Give Connection Name

Type the IP Address of Remote Gateway ( WAN IP Address)

Click customize the port( default port# 443)

Click on Do not Warn Invalid Server Certificate

Click > Apply and close

capture-5

Open the Forticlient >

capture-6

Type your LDAP credentials and click on Connect.

That’s it.

Happy Browsing!!

Check this video for detailed information about installation,

 source: FortiGate

File System Check Error in FortiGate

File System Check Error in FortiGate 5.2.3 and above

In FortiOS 5.2 patch3, the file system check dialogue was introduced in the GUI and it offers the options to restart the unit and perform a file system check or, if desired, to be reminded later for performing the action in a maintenance window.

FortiGate error

File System check is a feature that is checking if the device was not shutdown properly. It will do a disk scan when the system boots up to avoid any potential file system errors.  In fact, if the unit was shut down without using the proper command (#execute shutdown), during the booting sequence, the FortiGate will check internal files for this log event and, if it cannot find it, the message will be shown.

This behavior is by design and there is no option to disable this message.

The message should no longer be seen once the following actions have been completed:

– Check of the file system.
– Reboot of the device.

source:itzecurity

FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0

FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0:

Do the following tasks to take FortiGate firewall backup.

Steps:

  1. Connect the firewall through browser.

 2.   Login to the firewall (Enter User name & Password) (see Figure-4).

Figure-4

3.  After logging in, click on System –>Dashboard –> Dashboard on the left hand side of the window (see Figure-5)

Figure-5

4.  Right side pane of the window, under System Information –> System Configuration –> click on Backup (see Figure-6)

Figure-6

5.  Backup window will appear (see Figure-7); Enter a password to encrypt the configuration file. You will need this password while restoring the configuration file. Confirm Enter the password again to confirm the password. Click on Backup tab.

Figure-7

Restore

After logging in, click on System –>Dashboard –> Dashboard on the left hand   side of the window.

 Right side pane of the window, under System Information –> System Configuration –> click on Backup (see Figure-8)

Figure-8

7.     Use the “choose file” button if you are restoring the configuration file from the management computer.

                Select the configuration file name from the browse list if you are restoring the configuration file from the USB disk.

       8.   Enter the password, you entered when backing up the configuration file.

Figure-9

     NOTE:  If the password is forgotten, there is no way to use the file.

source: fortinet

FortiGate Firewall Configuration Backup and Restore procedure Firmware V3.0

FortiGate Firewall Configuration Backup and Restore procedure Firmware V3.0:

Do the following tasks to take FortiGate firewall backup.

Steps:

  1. Connect the firewall through browser.
  2. Login to the firewall (Enter User name & Password) (see Figure-1)
Figure-1

3.  After logging in, click on System –>Maintenance –>Backup & Restore on the left hand side of the window (see Figure-2).

Figure-2

 4.  FortiGate firewall configuration can be saved to management computer, a central Mangement station or to a USB stick, if the FortiGate supports a USB stick.

5.  The central management station is referred to remote management service the FortiGate unit is connected to. For example, if the current configuration on a FortiGate-60 is backed up to a FortiManager unit, the central management station would be the FortiManager unit.

 USB Disk – displays if the FortiGate unit supports USB disks. This option is grayed out if no USB disks are connected.

6.  Select to encrypt the backup file. Encryption must be enabled to save VPN certificates with the configuration. This option is not available for FortiManager backup option.

 Enter a password to encrypt the configuration file. You will need this password while restoring the configuration file. Confirm Enter the password again to confirm the password.

NOTE:If the password is forgotten, there is no way to use the file.

 Enter the name of the backup file or select Browse to locate the file. The File name field is only available when the USB drive is connected.

Figure-3

7.  Restoreprovides the ability to restore the firewall configuration file.

   8.  Use the “choose file” button if you are restoring the configuration file from the management computer.

         Select the configuration file name from the browse list if you are restoring the configuration file from the USB disk.

  9.  Enter the password, you entered when backing up the configuration file.

source: fortinet