Fortinet Fortigate 60 Implementation Guide - gemalto.com · Fortinet Fortigate 60 Implementation...

13
Copyright Copyright © 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of CRYPTOCard Corp. Fortinet Fortigate 60 Implementation Guide

Transcript of Fortinet Fortigate 60 Implementation Guide - gemalto.com · Fortinet Fortigate 60 Implementation...

Copyright

Copyright © 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be

reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in

any form or by any means without the written permission of CRYPTOCard Corp.

Fortinet Fortigate 60 Implementation Guide

Fortinet Fortigate 60 Implementation Guide 2

Fortinet Fortigate Overview

This documentation presents an overview and necessary steps to configure a Fortinet Fortigate 60 for

use with CRYPTO-MAS and CRYPTOCard tokens. The Fortigate can be used to create an encrypted

tunnel between hosts. CRYPTO-MAS works in conjunction with the Fortigate to replace static

passwords with strong two-factor authentication that prevents the use of lost, stolen, shared, or easily

guessed passwords when establishing a connection to gain access to protected resources.

With CRYPTO-MAS acting as the authentication server for a VPN enabled resource, an authenticated

connection sequence would be as follows:

1. The administrator configures the Fortinet Fortigate 60 to use RADIUS Authentication.

2. The incoming RADIUS authentication request is relayed over to the CRYPTO-MAS Server as

shown in Figure 1 below.

Figure 1 – RADIUS authentication request is relayed to the CRYPTO-MAS Server

3. The CRYPTO-MAS Server examines the incoming packet. If the user exists, it then checks the

token associated with the user for the expected PIN + One-time password.

4. Once the PIN + One-time password is verified against the user’s token and it is valid, it will

then send an access accepted. This is illustrated in Figure 2 below.

Fortinet Fortigate 60 Implementation Guide 3

If the user does not exist, or the PIN + One-time password is incorrect it will send the user an

access reject message.

Figure 2 – The CRYPTO-MAS Server responds with an access accepted or rejected.

Fortinet Fortigate 60 Implementation Guide 4

Prerequisites

The following systems must be verified operational prior to configuring the Fortigate to use

CRYPTOCard authentication:

1. Verify end users can authenticate through the Fortigate with a static password before

configuring the Fortigate to use CRYPTOCard authentication.

2. An initialized CRYPTOCard token assigned to a CRYPTOCard user.

The following CRYPTO-MAS server information is also required:

Primary CRYPTO-MAS RADIUS Server Fully Qualified

Hostname or IP Address:

Secondary CRYPTO-MAS RADIUS Server Fully Qualified

Hostname or IP Address (OPTIONAL):

CRYPTO-MAS RADIUS Accounting port number

(OPTIONAL):

CRYPTO-MAS RADIUS Shared Secret:

Fortinet Fortigate 60 Implementation Guide 5

Configuring Fortinet Fortigate

In order for the Fortigate to authenticate CRYPTOCard token users, RADIUS authentication must be

enabled.

Add RADIUS Server

To add a new RADIUS Server, choose:

• User

• RADIUS

• Create New

The IP Address and Shared Secret will be provided so the Fortinet Fortigate will point

towards the CRYPTO-MAS Server for authentication.

Fortinet Fortigate 60 Implementation Guide 6

Creating a Local User

Next thing to do is to create a user in the Fortigate.

To create a user click:

• User

• Local

• Create New

Enter the user’s username, and select RADIUS, then select the radius server it will be authenticating

to. Click OK when everything has been selected.

Note: the username must match the username that is provided to the CRYPTO-MAS Server

Fortinet Fortigate 60 Implementation Guide 7

Creating a User Group

Now a group must be created. From the Local tab, click on:

• User Group tab

• Create New

At least the following

configuration options should

be selected:

• Enter the name of the

group

• Change type from

Firewall to SSL VPN

• Expand the SSL-VPN

User Group Options.

• Put a check mark in

the following boxes.

• “Enable SSL-VPN

Tunnel Service”

• Enable Web

Application

o HTTP/HTTPS

Proxy

o Telnet(applet)

o VNC

o FTP

o Samba

o RDP

• Click OK

Fortinet Fortigate 60 Implementation Guide 8

Configuring SSL-VPN Settings

To configure your SSL-VPN Connection, click on VPN, then SSL.

• Select Enable SSL-VPN.

• Choose a port for the SSL-VPN Connection.

• Enter the Tunnel IP Range.

• Select the Server Certificate (Self-Signed by default)

• Select “Default” for Encryption Key Algorithm

• Idle Timeout is 300 seconds.

Fortinet Fortigate 60 Implementation Guide 9

Creating a Firewall Policy

To create a new firewall policy, click on Firewall, Policy, Create New.

The following should be done.

Source

Interface/Zone wan1

Address Name All

Destination

Interface/Zone internal

Address Name all

Schedule always

Service ANY

Action SSL-VPN

Select the Group on the

Available Groups side and

move them over to the

Allowed side for SSL-VPN

access.

Check off Protection Profile

and it should be defaulted to

unfiltered.

Click OK when finished.

Fortinet Fortigate 60 Implementation Guide 10

Testing RADIUS Authentication through HyperTerminal

Create a new HyperTerminal on the machine where the Fortinet Fortigate is connected.

Once you have logged on, the syntax should be entered as followed:

# diag test auth rad <radius server name> <auth protocol> <username> <One-Time Password>

If it succeeds, the output message will be something along the line of:

“authenticate ‘henry’ against ‘pap’ succeeded, server=primary session_timeout=0 secs!”

Fortinet Fortigate 60 Implementation Guide 11

VPN Client login page

To test the VPN access from a browser, navigate to https://<Fortigate_Wan_IP_Address>:<port>

A login prompt comes

up. Enter the

username and PIN +

One-time password.

Fortinet Fortigate 60 Implementation Guide 12

Once the user has

successfully logs in, they will

be prompt with a Welcome

to SSL-VPN Service page.

The CRYPTO-MAS Server can

also be set up to do New PIN

Mode – Stored on Server,

server changeable.

If the user’s PIN style has

been set to Store on Server,

server changeable, and set

to push out a new PIN after

next log on, it will display a

new PIN on the webpage

which is illustrated below.

Fortinet Fortigate 60 Implementation Guide 13

Solution Overview

Summary

Product Name Fortinet Fortigate

Vendor Site http://www.fortinet.com/

Supported VPN Client Software Internet Explorer 6 or higher

Mozilla Firefox 1.5 or higher

Authentication Method RADIUS Authentication

Supported RADIUS Functionality for Fortinet Fortigate

RADIUS Authentication Encryption PAP

Authentication Method One-time password

Challenge-response

Static password

New PIN Mode User changeable Alphanumeric 4-8 digit PIN

User changeable Numeric 4-8 digit PIN

Server changeable Alphanumeric 4-8 digit PIN

Server changeable Numeric 4-8 digit PIN

Trademarks

CRYPTOCard, CRYPTO-Server, CRYPTO-Web, CRYPTO-Kit, CRYPTO-Logon, CRYPTO-VPN, CRYPTO-MAS

are either registered trademarks or trademarks of CRYPTOCard Corp.

Microsoft Windows and Windows XP/2000/2003/NT are registered trademarks of Microsoft

Corporation. All other trademarks, trade names, service marks, service names, product names, and

images mentioned and/or used herein belong to their respective owners.

Publication History

Date Changes October 27, 2006 Initial Draft

November 9, 2006 Global Draft

November 30, 2006 Minor Revision