YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Copyright

Copyright © 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be

reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in

any form or by any means without the written permission of CRYPTOCard Corp.

Fortinet Fortigate 60 Implementation Guide

Page 2: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 2

Fortinet Fortigate Overview

This documentation presents an overview and necessary steps to configure a Fortinet Fortigate 60 for

use with CRYPTO-MAS and CRYPTOCard tokens. The Fortigate can be used to create an encrypted

tunnel between hosts. CRYPTO-MAS works in conjunction with the Fortigate to replace static

passwords with strong two-factor authentication that prevents the use of lost, stolen, shared, or easily

guessed passwords when establishing a connection to gain access to protected resources.

With CRYPTO-MAS acting as the authentication server for a VPN enabled resource, an authenticated

connection sequence would be as follows:

1. The administrator configures the Fortinet Fortigate 60 to use RADIUS Authentication.

2. The incoming RADIUS authentication request is relayed over to the CRYPTO-MAS Server as

shown in Figure 1 below.

Figure 1 – RADIUS authentication request is relayed to the CRYPTO-MAS Server

3. The CRYPTO-MAS Server examines the incoming packet. If the user exists, it then checks the

token associated with the user for the expected PIN + One-time password.

4. Once the PIN + One-time password is verified against the user’s token and it is valid, it will

then send an access accepted. This is illustrated in Figure 2 below.

Page 3: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 3

If the user does not exist, or the PIN + One-time password is incorrect it will send the user an

access reject message.

Figure 2 – The CRYPTO-MAS Server responds with an access accepted or rejected.

Page 4: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 4

Prerequisites

The following systems must be verified operational prior to configuring the Fortigate to use

CRYPTOCard authentication:

1. Verify end users can authenticate through the Fortigate with a static password before

configuring the Fortigate to use CRYPTOCard authentication.

2. An initialized CRYPTOCard token assigned to a CRYPTOCard user.

The following CRYPTO-MAS server information is also required:

Primary CRYPTO-MAS RADIUS Server Fully Qualified

Hostname or IP Address:

Secondary CRYPTO-MAS RADIUS Server Fully Qualified

Hostname or IP Address (OPTIONAL):

CRYPTO-MAS RADIUS Accounting port number

(OPTIONAL):

CRYPTO-MAS RADIUS Shared Secret:

Page 5: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 5

Configuring Fortinet Fortigate

In order for the Fortigate to authenticate CRYPTOCard token users, RADIUS authentication must be

enabled.

Add RADIUS Server

To add a new RADIUS Server, choose:

• User

• RADIUS

• Create New

The IP Address and Shared Secret will be provided so the Fortinet Fortigate will point

towards the CRYPTO-MAS Server for authentication.

Page 6: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 6

Creating a Local User

Next thing to do is to create a user in the Fortigate.

To create a user click:

• User

• Local

• Create New

Enter the user’s username, and select RADIUS, then select the radius server it will be authenticating

to. Click OK when everything has been selected.

Note: the username must match the username that is provided to the CRYPTO-MAS Server

Page 7: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 7

Creating a User Group

Now a group must be created. From the Local tab, click on:

• User Group tab

• Create New

At least the following

configuration options should

be selected:

• Enter the name of the

group

• Change type from

Firewall to SSL VPN

• Expand the SSL-VPN

User Group Options.

• Put a check mark in

the following boxes.

• “Enable SSL-VPN

Tunnel Service”

• Enable Web

Application

o HTTP/HTTPS

Proxy

o Telnet(applet)

o VNC

o FTP

o Samba

o RDP

• Click OK

Page 8: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 8

Configuring SSL-VPN Settings

To configure your SSL-VPN Connection, click on VPN, then SSL.

• Select Enable SSL-VPN.

• Choose a port for the SSL-VPN Connection.

• Enter the Tunnel IP Range.

• Select the Server Certificate (Self-Signed by default)

• Select “Default” for Encryption Key Algorithm

• Idle Timeout is 300 seconds.

Page 9: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 9

Creating a Firewall Policy

To create a new firewall policy, click on Firewall, Policy, Create New.

The following should be done.

Source

Interface/Zone wan1

Address Name All

Destination

Interface/Zone internal

Address Name all

Schedule always

Service ANY

Action SSL-VPN

Select the Group on the

Available Groups side and

move them over to the

Allowed side for SSL-VPN

access.

Check off Protection Profile

and it should be defaulted to

unfiltered.

Click OK when finished.

Page 10: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 10

Testing RADIUS Authentication through HyperTerminal

Create a new HyperTerminal on the machine where the Fortinet Fortigate is connected.

Once you have logged on, the syntax should be entered as followed:

# diag test auth rad <radius server name> <auth protocol> <username> <One-Time Password>

If it succeeds, the output message will be something along the line of:

“authenticate ‘henry’ against ‘pap’ succeeded, server=primary session_timeout=0 secs!”

Page 11: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 11

VPN Client login page

To test the VPN access from a browser, navigate to https://<Fortigate_Wan_IP_Address>:<port>

A login prompt comes

up. Enter the

username and PIN +

One-time password.

Page 12: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 12

Once the user has

successfully logs in, they will

be prompt with a Welcome

to SSL-VPN Service page.

The CRYPTO-MAS Server can

also be set up to do New PIN

Mode – Stored on Server,

server changeable.

If the user’s PIN style has

been set to Store on Server,

server changeable, and set

to push out a new PIN after

next log on, it will display a

new PIN on the webpage

which is illustrated below.

Page 13: Fortinet Fortigate 60 Implementation Guide - · PDF fileFortinet Fortigate 60 Implementation Guide 2 Fortinet Fortigate Overview This documentation presents an overview and necessary

Fortinet Fortigate 60 Implementation Guide 13

Solution Overview

Summary

Product Name Fortinet Fortigate

Vendor Site http://www.fortinet.com/

Supported VPN Client Software Internet Explorer 6 or higher

Mozilla Firefox 1.5 or higher

Authentication Method RADIUS Authentication

Supported RADIUS Functionality for Fortinet Fortigate

RADIUS Authentication Encryption PAP

Authentication Method One-time password

Challenge-response

Static password

New PIN Mode User changeable Alphanumeric 4-8 digit PIN

User changeable Numeric 4-8 digit PIN

Server changeable Alphanumeric 4-8 digit PIN

Server changeable Numeric 4-8 digit PIN

Trademarks

CRYPTOCard, CRYPTO-Server, CRYPTO-Web, CRYPTO-Kit, CRYPTO-Logon, CRYPTO-VPN, CRYPTO-MAS

are either registered trademarks or trademarks of CRYPTOCard Corp.

Microsoft Windows and Windows XP/2000/2003/NT are registered trademarks of Microsoft

Corporation. All other trademarks, trade names, service marks, service names, product names, and

images mentioned and/or used herein belong to their respective owners.

Publication History

Date Changes October 27, 2006 Initial Draft

November 9, 2006 Global Draft

November 30, 2006 Minor Revision


Related Documents