1. Creating a user group for remote users
|
Go to User & Device > User Definition. Create a local user account for an IPsec VPN user.
|
|
|
|
|
|
|
|
Go to User & Device > User Groups. Create a user group for IPsec VPN users and add the new user account. |
|
2. Adding a firewall address for the local network
|
Go to Policy & Objects > Addresses and create an address for the local network.
Set Type to IP/Netmark, Subnet/IP Range to the local subnet, and Interface to an internal port.
|
|
3. Configuring the IPsec VPN using the IPsec VPN Wizard
|
Go to VPN > IPsec Wizard and create a new tunnel using a pre-existing template.
Name the VPN connection. Set Template to Remote Access, and set Remote Device Type to FortiClient VPN for OS X, Windows, and Android.
|
|
Set the Incoming Interface to the internet-facing interface and Authentication Method to Pre-shared Key.
Enter a pre-shared key and select the new user group, then click Next.
|
|
Set Local Interface to an internal interface (in the example, lan) and set Local Address to the local LAN address.
Enter an Client Address Range for VPN users.
Make sure Enable IPv4 Split Tunnel is not selected, so that all Internet traffic will go through the FortiGate.
|
|
Select Client Options as desired.
|
|
After you create the tunnel, a summary page appears listing the objects which have been added to the FortiGate’s configuration by the wizard.
|
|
4. Creating a security policy for access to the Internet
|
The IPsec wizard automatically created a security policy allowing IPsec VPN users to access the internal network. However, since split tunneling is disabled, another policy must be created to allow users to access the Internet through the FortiGate.
|
Go to Policy & Objects > IPv4 Policies and create a new policy. Set a policy name that will identify what this policy is used for (in the example, IPsec-VPN-Internet)
Set Incoming Interface to the tunnel interface and Outgoing Interface to wan1. Set Source to the IPsec client address range, Destination Address to all, Service to ALL, and enable NAT.
Configure any remaining firewall and security options as desired.
|
|
5. Configuring FortiClient
|
Open FortiClient, go to Remote Access and Add a new connection.
|
|
Set the Type to IPsec VPN and Remote Gateway to the FortiGate IP address.
Set Authentication Method to Pre-Shared Key and enter the key below.
|
|
6. Results
|
On FortiClient, select the VPN, enter the username and password, and select Connect.
|
|
Once the connection is established, the FortiGate assigns the user an IP address and FortiClient displays the status of the connection, including the IP address, connection duration, and bytes sent and received.
|
|
On the FortiGate unit, go to Monitor > IPsec Monitor and verify that the tunnel Status is Up.
The monitor also shows the IP address of the FortiClient user, under Remote Gateway.
|
|
Browse the Internet, then go to FortiView > Policies and select the now view. You can see traffic flowing through the IPsec-VPN-Internet policy.
|
|
Right-click on the policy, then select Drill Down to Details. You can see more information about the traffic.
|
|