Skip to main content

Fortigate guide for Begineer - 8



I'd like to show how to create and setup SSL VPN in Fortigate now.
Below picture is the Configuration Setting that I'd like to use for SSL VPN.



Before you begin, you need to make sure SSL VPN is
enabled using the CLI command:


config vpn ssl settings
set sslvpn-enable enable
end


Create a firewall address for the email server.
1) To add the email server address, go to Firewall Objects > Address > Address, select
Create New and enter the email server address:


Address Name
Email Server
Type
Subnet / IP Range
Subnet / IP Range
192.168.1.12
Interface
Internal



2) Select OK.
Create the SSL VPN portal and a bookmark for the email server that the user connects to after logging in.
1) Go to VPN > SSL > Config and for IP Pools select Edit and add Test VPN to the Selected table.
2) Go to VPN > SSL > Portal and select Create New to create the portal:


Name
Internal_company_sites_portal
Applications
HTTP/HTTPS
Portal Message
Internal Company Sites



3) Select OK to close the Edit Settings window.
4) On the default web portal delete the Bookmarks widget by selecting its Remove icon.
5) On the Add Widget on the right of the default portal select Bookmarks.
6) In the new Bookmarks widget select the Edit icon (looks like a pencil).
7) Optionally edit the Name and make sure Applications is set to HTTP/HTTPS.
8) Select OK in the Bookmarks widget.
9) In the Bookmarks widget select Add and create a bookmark to link the email server web page:


Name
Email
Type
HTTP/HTTPS
Location
Description
Corporate email system



10) Select OK at the bottom of the Bookmarks widget.
11) Select Apply at the top of web portal page to save the web portal configuration.

Create the SSL VPN user and add the user to a user group configured for SSL VPN use.
1) Go to User > User > User and select Create New to add the user:


User Name
Test VPN
Password
password


2) Go to User > User Group > User Group and select Create New to add Test VPN to the SSL VPN user group:.

Name
Sales
Type
Firewall
Allow SSL-VPN Access
Internal Company Sites



3 Move Test VPN to the Members list.
4 Select OK.

Create an SSL VPN security policy with SSL VPN user authentication.
1) Go to Policy > Policy > Policy and select Create New to add the SSL VPN security policy:



Source Interface/Zone
WAN1
Source Address
All
Destination Interface/Zone
Internal
Destination Address
Email
Action
SSL-VPN



2) Select Configure SSL-VPN Users and select Add to add an authentication rule for remote SSL VPN users:


Selected User Groups
Sales
Selected Services
HTTP
HTTPS
Destination Interface/Zone
Internal


3) Select OK.


SSL VPN Connection, User Account creation, configuration and setup done.
But take note the above steps are may be vary depends on Fortigate Unit Mode.


May you be all happy.
(Be knowledgeable, pass it on then)

Comments

  1. Nice information, valuable and excellent design, as share good stuff with good ideas and concepts, lots of great information and inspiration, both of which I need, thanks to offer such a helpful information here.
    Data Science Training in Indira nagar
    Data Science training in marathahalli
    Data Science Interview questions and answers
    Data Science training in btm layout
    Data Science Training in BTM Layout
    Data science training in bangalore

    ReplyDelete

Post a Comment

Popular posts from this blog

Fortigate guide for Begineer - 6

I would like to explaine how to troubleshoot the Fortigate Unit configured by Transparent Mode in step by step this time. Let's assume, you have one Fortigate Unit that configured as Transparent Mode. But devices from Internal/Private Network unable to access Internet/Public Network through your Fortigate Unit. OK. Let's troubleshoot with following steps, 1) Check the physical network connections between the network and the FortiGate unit, and between the FortiGate unit and the Internet. 2) Check the router and ISP-supplied equipment to make sure it is operating correctly. 3) Verify that you can connect to the internal interface by connecting to the management IP address of the FortiGate unit from the Internal network. From the internal network, attempt to ping the management IP address. If you cannot connect to the internal interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other devices on the network are powered on a

Solving the "A general system error occured:Invalid fault" error in vSphere 4

Below error was come out when you try to migrate VM to other host for some reason. Below error was come out when you try to edit VM setting. Below error was come out when you power on the VM. How to solve those error? Here is how I resolve the error! Login to the Host that errored VM exist by using Terminal or Direct Console. Enter below command and press enter. services.sh restart Wait until all VMware Services are restarted. After that try to Power On/Edit Settings or Migrate the errored VM and you will see all you can do without any error pop-up. This kind of errors can occur if you shutdown/restart VM unproperly or shutdown/restart the Host unproperly that VM exist. You can check log file deeply if you willing to know precisely on this. May you all be happy. (Be knowledgeable, pass it on then)

Link Aggregating with Synology NAS and Cisco Switch

I’d like to share how to setup Link Aggregating between Synology NAS and Cisco Switch. I’ve got one Synology NAS with 4 Network Ports and I’m going to use 2 of them. Both Network Port to be as one Logical Link, Fault Tolerance and Load Balancing. To do that, I need to configure Link Aggregating on Synology NAS and EtherChannel with LACP on Cisco Switch. Below is brief steps to do to meet with my requirements. - Get connected Synology NAS and Cisco Switch as shown in picture. - Bonding two Network Ports of Synology NAS and assign IP Address - Configure EtherChannel with LACP in Cisco Switch and add two physical ports as Member. OK. Let’s begin from Synology NAS. - Login to the Synology and go to Control Panel>Network>Create>Create Bond - Select IEEE 802.3ad to get Fault Tolerance and Load Balancing Featureyou’re your switch not support 802.3ad you can only select Fault Tolerance only feature). After that click “Next”. - Choose the network port f