Integrate Fortinet-FortiGate

This technical integration guide describes how to integrate a Fortinet-Fortigate and Identity as a Service. The aim of this integration is to provide strong, second-factor authentication for your Fortinet-Fortigate VPN solution using Identity as a Service.

Note:  Some configuration steps may differ from the documentation provided or the steps in this integration guide may not be effective (due to Entrust not having tested and validated with the version you are using). For different versions, this integration guide may still offer a standard base to help fast-track SAML authentication setup for your application, but in the event there are issues, contact support@entrust.com for assistance.

The Fortinet-Fortigate software supports the Identity as a Service authentication methods and authentication protocols listed in the table below. The capabilities may depend on the Identity as a Service configuration, or the setup of other 3rd party authentication resources (Active Directory, for example).

Supported authentication methods

Prerequisites

Integrate Fortinet-FortiGate VPN

Complete the following steps to integrate FortiNet-FortiGate VPN with IDaaS:

Step 1: Start the Fortinet-FortiGate configuration utility

Before you configure Fortinet-FortiGate and manage the system, you need to connect the unit to a management workstation or network.

Start the Fortinet-FortiGate configuration utility

Step 2: Configure the FortiGate unit to use IDaaS

There are three steps to integrate the Fortinet-FortiGate with Entrust Identity as a Service and setup the SSL/IPSec Remote Access VPN. Complete all the steps.

Step 2a: Create a new RADIUS server

Step 2b: Create a RADIUS user

Step 2c: Create a RADIUS user group

Step 3: Configure the remote authentication timeout

The default timeout is 5 seconds; however, this timeout is insufficient when using Entrust Mobile Soft Token and Mobile Smart Credentials Push. Run following commands from the command line to increase the timeout. The timeout should be greater than Entrust Push timeout settings.

config system global

    set remoteauthtimeout 100

end

Step 4: Configure the SSL VPN and policy

In any firewall user group, you can enable SSL VPN access and select the web-portal that the users can access. When the user connects to the FortiGate unit through HTTPS on the SSL VPN port (default 10443), the FortiGate unit requests a username and password.

SSL VPN access also requires an SSL VPN security policy (action is SSL VPN) with an identity-based rule enabling access for the user group.

Step 4a: Configure the SSL VPN

Step 4b: Create an SSL VPN policy

Step 5: Configure an IPsec VPN and policy

An IPsec VPN can be configured to accept connections from multiple dynamically addressed peers. You would do this to enable employees to connect to the corporate network remotely. On a FortiGate unit, you create this configuration by setting the Remote Gateway to Dialup User. A VPN tunnel has one end on a local trusted network, and the other end is at a remote location. The remote peer (device) must be authenticated to be able to trust the VPN tunnel. The pre-shared key is used to authenticate each other with IPsec VPN.

Step 5a: Configure the IPsec VPN

Step 5b: Modify the IPsec VPN Policy

Step 6: Add FortiClient VPN connections

Download the FortiClient software from the Fortinet web and install on it on a Client Computer. After installing the FortiClient, you need to add a VPN connection.

Step 6a: Add the FortiClient SSL VPN connection

Step 6b: Add an IPsec VPN connection

Step 7: Add Fortinet-FortiGate to IDaaS

Add Fortinet-FortiGate to Identity as a Service

Step 8: Protect Fortinet-FortiGate with a resource rule

 Add a resource rule to protect Fortinet-FortiGate

Step 9: Test the integration

Test the authentication using FortiClient SSL VPN

Test the authentication using FortiClient IPsec VPN

  • Test using mobile soft token authentication