fortinet fortigate 60 implementation guide · 10/27/2006  · fortinet fortigate 60 implementation...

13
Copyright Copyright © 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of CRYPTOCard Corp. Fortinet Fortigate 60 Implementation Guide

Upload: others

Post on 11-Feb-2021

19 views

Category:

Documents


0 download

TRANSCRIPT

  • Copyright

    Copyright © 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be

    reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in

    any form or by any means without the written permission of CRYPTOCard Corp.

    Fortinet Fortigate 60 Implementation Guide

  • Fortinet Fortigate 60 Implementation Guide 2

    Fortinet Fortigate Overview

    This documentation presents an overview and necessary steps to configure a Fortinet Fortigate 60 for

    use with CRYPTO-MAS and CRYPTOCard tokens. The Fortigate can be used to create an encrypted

    tunnel between hosts. CRYPTO-MAS works in conjunction with the Fortigate to replace static

    passwords with strong two-factor authentication that prevents the use of lost, stolen, shared, or easily

    guessed passwords when establishing a connection to gain access to protected resources.

    With CRYPTO-MAS acting as the authentication server for a VPN enabled resource, an authenticated

    connection sequence would be as follows:

    1. The administrator configures the Fortinet Fortigate 60 to use RADIUS Authentication.

    2. The incoming RADIUS authentication request is relayed over to the CRYPTO-MAS Server as shown in Figure 1 below.

    Figure 1 – RADIUS authentication request is relayed to the CRYPTO-MAS Server

    3. The CRYPTO-MAS Server examines the incoming packet. If the user exists, it then checks the

    token associated with the user for the expected PIN + One-time password.

    4. Once the PIN + One-time password is verified against the user’s token and it is valid, it will

    then send an access accepted. This is illustrated in Figure 2 below.

  • Fortinet Fortigate 60 Implementation Guide 3

    If the user does not exist, or the PIN + One-time password is incorrect it will send the user an

    access reject message.

    Figure 2 – The CRYPTO-MAS Server responds with an access accepted or rejected.

  • Fortinet Fortigate 60 Implementation Guide 4

    Prerequisites

    The following systems must be verified operational prior to configuring the Fortigate to use

    CRYPTOCard authentication:

    1. Verify end users can authenticate through the Fortigate with a static password before

    configuring the Fortigate to use CRYPTOCard authentication.

    2. An initialized CRYPTOCard token assigned to a CRYPTOCard user.

    The following CRYPTO-MAS server information is also required:

    Primary CRYPTO-MAS RADIUS Server Fully Qualified

    Hostname or IP Address:

    Secondary CRYPTO-MAS RADIUS Server Fully Qualified

    Hostname or IP Address (OPTIONAL):

    CRYPTO-MAS RADIUS Accounting port number

    (OPTIONAL):

    CRYPTO-MAS RADIUS Shared Secret:

  • Fortinet Fortigate 60 Implementation Guide 5

    Configuring Fortinet Fortigate

    In order for the Fortigate to authenticate CRYPTOCard token users, RADIUS authentication must be

    enabled.

    Add RADIUS Server

    To add a new RADIUS Server, choose:

    • User

    • RADIUS

    • Create New

    The IP Address and Shared Secret will be provided so the Fortinet Fortigate will point

    towards the CRYPTO-MAS Server for authentication.

  • Fortinet Fortigate 60 Implementation Guide 6

    Creating a Local User

    Next thing to do is to create a user in the Fortigate.

    To create a user click:

    • User

    • Local

    • Create New

    Enter the user’s username, and select RADIUS, then select the radius server it will be authenticating

    to. Click OK when everything has been selected.

    Note: the username must match the username that is provided to the CRYPTO-MAS Server

  • Fortinet Fortigate 60 Implementation Guide 7

    Creating a User Group

    Now a group must be created. From the Local tab, click on:

    • User Group tab

    • Create New

    At least the following

    configuration options should

    be selected:

    • Enter the name of the

    group

    • Change type from

    Firewall to SSL VPN

    • Expand the SSL-VPN

    User Group Options.

    • Put a check mark in

    the following boxes.

    • “Enable SSL-VPN

    Tunnel Service”

    • Enable Web

    Application

    o HTTP/HTTPS

    Proxy

    o Telnet(applet)

    o VNC

    o FTP

    o Samba

    o RDP

    • Click OK

  • Fortinet Fortigate 60 Implementation Guide 8

    Configuring SSL-VPN Settings

    To configure your SSL-VPN Connection, click on VPN, then SSL.

    • Select Enable SSL-VPN.

    • Choose a port for the SSL-VPN Connection.

    • Enter the Tunnel IP Range.

    • Select the Server Certificate (Self-Signed by default)

    • Select “Default” for Encryption Key Algorithm

    • Idle Timeout is 300 seconds.

  • Fortinet Fortigate 60 Implementation Guide 9

    Creating a Firewall Policy

    To create a new firewall policy, click on Firewall, Policy, Create New.

    The following should be done.

    Source

    Interface/Zone wan1

    Address Name All

    Destination

    Interface/Zone internal

    Address Name all

    Schedule always

    Service ANY

    Action SSL-VPN

    Select the Group on the

    Available Groups side and

    move them over to the

    Allowed side for SSL-VPN

    access.

    Check off Protection Profile

    and it should be defaulted to

    unfiltered.

    Click OK when finished.

  • Fortinet Fortigate 60 Implementation Guide 10

    Testing RADIUS Authentication through HyperTerminal

    Create a new HyperTerminal on the machine where the Fortinet Fortigate is connected.

    Once you have logged on, the syntax should be entered as followed:

    # diag test auth rad

    If it succeeds, the output message will be something along the line of:

    “authenticate ‘henry’ against ‘pap’ succeeded, server=primary session_timeout=0 secs!”

  • Fortinet Fortigate 60 Implementation Guide 11

    VPN Client login page

    To test the VPN access from a browser, navigate to https://:

    A login prompt comes

    up. Enter the

    username and PIN +

    One-time password.

  • Fortinet Fortigate 60 Implementation Guide 12

    Once the user has

    successfully logs in, they will

    be prompt with a Welcome

    to SSL-VPN Service page.

    The CRYPTO-MAS Server can

    also be set up to do New PIN

    Mode – Stored on Server,

    server changeable.

    If the user’s PIN style has

    been set to Store on Server,

    server changeable, and set

    to push out a new PIN after

    next log on, it will display a

    new PIN on the webpage

    which is illustrated below.

  • Fortinet Fortigate 60 Implementation Guide 13

    Solution Overview

    Summary

    Product Name Fortinet Fortigate

    Vendor Site http://www.fortinet.com/

    Supported VPN Client Software Internet Explorer 6 or higher

    Mozilla Firefox 1.5 or higher

    Authentication Method RADIUS Authentication

    Supported RADIUS Functionality for Fortinet Fortigate

    RADIUS Authentication Encryption PAP

    Authentication Method One-time password

    Challenge-response

    Static password

    New PIN Mode User changeable Alphanumeric 4-8 digit PIN

    User changeable Numeric 4-8 digit PIN

    Server changeable Alphanumeric 4-8 digit PIN

    Server changeable Numeric 4-8 digit PIN

    Trademarks

    CRYPTOCard, CRYPTO-Server, CRYPTO-Web, CRYPTO-Kit, CRYPTO-Logon, CRYPTO-VPN, CRYPTO-MAS

    are either registered trademarks or trademarks of CRYPTOCard Corp.

    Microsoft Windows and Windows XP/2000/2003/NT are registered trademarks of Microsoft

    Corporation. All other trademarks, trade names, service marks, service names, product names, and

    images mentioned and/or used herein belong to their respective owners.

    Publication History

    Date Changes October 27, 2006 Initial Draft

    November 9, 2006 Global Draft

    November 30, 2006 Minor Revision

    http://www.fortinet.com/

    Fortinet Fortigate OverviewPrerequisitesConfiguring Fortinet FortigateTrademarksPublication History