Chapter 4. VPN
4.2 SSL VPN
Learning Objectives
- Configure a tunnel-based SSL VPN
 - Configure a web-based SSL VPN (Web Portal)
 

| Device | IP address | Access | 
|---|---|---|
| FortiGate | Port3: 192.168.1.1/24 – DHCP (192.168.1.20 to 192.168.1.30)
 Port2: DHCP Client  | 
ICMP-HTTP-HTTPS | 
| WebTerm (FMC) | 192.168.1.2/24 | – | 
| KALI Linux (SSH Server) | 192.168.1.3/24 | – | 
| WordPress | 192.168.1.4/24 | |
| KALI-outside | DHCP Client | |
| Windows | DHCP Client | 
Configure the interfaces of the firewall. Port2 and Port3 should be configured in the terminal to access the firewall.
- Port 3 Configuration:

Figure 4.39: Port3 settings  - Port 2 Configuration:

Figure 4.40: Port2 settings  - Configure DHCP Server on port3.

Figure 4.41: Enable DHCP Server on port3  - Configure user and user group. Go to User & Authentication > User Definition to create a local user sslvpnuser1.

Figure 4.42: Create a local user 
Figure 4.43: Configure login credentials Go to User & Authentication > User Groups to create a group sslvpngroup with the member sslvpnuser1.

Figure 4.44: Create a group  - Configure SSL VPN web portal and Tunnel mode. Go to VPN > SSL-VPN Portals:
- Split-Tunneling: Disabled
 - Source IP Pools: SSLVPN_TUNNEL_ADDR1
 

Figure 4.45: SSL-VPN Portal Go to VPN > SSL-VPN Portals, add KALI IP address (SSH Server: IP Address of Kali) and WordPress (IP Address of WordPress) in the bookmark section.

Figure 4.46: Create an SSH bookmark 
Figure 4.47: Create an HTTP/HTTPS bookmark 
Figure 4.48: Bookmark settings  - Configure SSL VPN settings. Go to VPN > SSL-VPN Settings:
- For Listen on Interface(s), select Port2.
 - Set Listen on Port to 8080.
 - Server Certificate: Fortinet
 - In restrict Access, select “Allow access from any host”
 - Address range: Automatically assign address.
 - In Authentication/Portal Mapping All Other Users/Groups, set the Portal to MyPortal
 - Create new Authentication/Portal Mapping for group sslvpngroup mapping portal MyPortal.
 

Figure 4.49: Enable SSL-VPN Settings 
Figure 4.50: Assign sslvpngroup to MyPortal 
Figure 4.51: Authentication/Portal Mapping  - Configure SSL VPN firewall policy:
- Go to Policy & Objects > Firewall Policy.
 - Fill in the firewall policy name. In this example, SSLVPN full tunnel access.
 - The incoming interface must be SSL-VPN tunnel interface(ssl.root).
 - Choose an Outgoing Interface. In this example, port3.
 - Set the Source to all and group to sslvpngroup.
 - Set the Destination to all.
 - Set Schedule to always, Service to ALL, and Action to Accept.
 

Figure 4.52: Create a Firewall Policy for SSLVPN  - Now connect to Kali outside and open the browser https://IP-PORT 2-Firewall:8080
Enter the username and password you created earlier. Then try to connect to the KALI SSH Server and WordPress through the browser.
Figure 4.53: SSL-VPN Portal 
Figure 4.54: SSL-VPN Portal 
Figure 4.55: Verify WordPress 
Figure 4.56: Verify SSH  - Now, go to Windows and install FortiClient on Windows. Try to use FortiClient to connect through SSLVPN.

Figure 4.57: Download FortiClient 
Figure 4.58: FortiClient Installation 
Figure 4.59: FortiClient Installation  - Configure FortiClient.

Figure 4.60: Configure FortiClient 
Figure 4.61: Configure SSLVPN  - Verify configuration. Enter the Username and Password you have set for SSLVPN.

Figure 4.62: SSLVPN Credentials Accept the Certificate Issuer to have a secure connection.

Figure 4.63: Click on Yes in Security Alert 
Figure 4.64: Verify SSLVPN Connection Verify your connectivity by entering the IP address of WordPress.

Figure 4.65: Verify WordPress Verify your connectivity by entering the IP address of SSH Server.

Figure 4.66: Verify SSH 
Figure 4.67: Verify SSH connection