VPNs Configuration

Fortigate

Fortigate firmaware: 5.6.0

Access to the adminitration portal for Fortigate appliances, and go to the User & Device -> User Groups as shown in the picture bellow:

../../../_images/vpn8.PNG

From there its required to create a user group where the VPN concentrator is selected, is important to leave the field members without any value, this is equal to ANY value.

../../../_images/vpn9.PNG

Radius Servers must be configured to integrate fortigate with openNAC Core, go to RADIUS Servers menú.

../../../_images/vpn6.PNG

Create one radius server pointing to the openNAC Core Server where “Primary Server IP/Name” and the preshared must be set, this PSK will be defined in the openNAC Core to establishstablish the trusted relationship.

../../../_images/vpn7.PNG

After that User groups is created, is required to enable the VPN and its configuration, go to the VPN -> SSL-VPN Settings

../../../_images/vpn1.PNG

From settings section is required to define a few parameters to have the VPN SSL daemon up and running.

The following settings must be set:

  • Interface where the VPN will listen the network access requests, in this case “internal”.
  • The port where the service will be published, in this case has been set 4430.
  • There will not be limited access to the SSL-VPN interface, this can be adapted by customer requirements.
  • There will be used built-in certificates, if you have a PKI infrastructure in place you can use your own certificates or issued by third parties, remember that this certificate are the certificate used by VPN (server certificates)
../../../_images/vpn3.PNG
  • To assign client IP configuration when accessing in the network there will be used the same VPN concentrator as DHCP Server assigning a scope 10.212.134.200-210.
../../../_images/vpn4.PNG
  • And finally you map the group radius created before with the Authentication/Portal mapping.
../../../_images/vpn5.PNG

As soon as the VPN SSL and the radius configuration is in place is required to create a specific rule to allow this traffic, to manage access policy go to Policy & Objects menu.

../../../_images/vpn10.PNG

A rule must be defined to allow SSL-VPN services.

../../../_images/vpn11.PNG

After the configuration is create is required to test it, go to the SSL-VPN web portal to check credentials, this test must be done when all the configuration pieces including openNAC are properly set.

../../../_images/vpn12.PNG

As soon as you access you are able to download the Fortigate Client.

../../../_images/vpn14.PNG

Once the Fortigate client is installed you can use the following parameters to define a new SSL-VPN connection, setting the IP, the port.

../../../_images/vpn15.PNG

Once the Fortigate client is configured a logon prompt will apears.

../../../_images/vpn16.PNG

Technical checks are done by Fortigate out of the box.

../../../_images/vpn17.PNG

And the connection is finally established.

../../../_images/vpn18.PNG ../../../_images/vpn19.PNG

Instead of using the fortigate client is possible to use a quick connection where is possible to use the webportal plugins to connect.

../../../_images/vpn23.PNG

To check the correct connection to any corporative internal server will be used a ssh connection.

../../../_images/vpn21.PNG

As soon as a valid credentials are introduced an promt appears.

../../../_images/vpn22.PNG

PaloAlto

This configuration shows the integration between paloalto and openNAC with Global protect, to understand this paloalto deployment is important to mention key concepts before starting the configuration:

1. PaloAlto VPN client: That needs to be installed in the customer’s PC, the customer will use an URL vía https, this type of deployment can be deployed as multitenat so could exist multiples service URL. As soon as the client tries to connect to the VPN service a configuration file is download and is offered a valid pool of Global protect gateways, the Global protect gateway selected will be that one with the lowest TTL. The user will be sent to this gateway and the user introduce valid credentials.

2. Global protect gateway: This is the component where the service is published to the remote users.

3. Global protect portal: This is a piece where is carried out the provisioning and configuration changes.

The frist step is to connect to administration portal and configure the Radius server going to Device -> Server profiles -> RADIUS Is required to define a Profile name, set CHAP as authentication protocol, the IP address or FQDN of the radius servers that in this case must the openNAC Core server. Other key important configuration is the preshared key.

../../../_images/paloaltovpn.PNG

After that is required to create an Authentication profile going to Device -> Authentication Profile, where is mapped with the radius server just created in the step before.

../../../_images/paloaltovpn1.PNG

You can apply a filter and in this cases is being selected ANY, failed attempts and account lookout is also available.

../../../_images/paloaltovpn2.PNG

To create the VPN is needed to create an interface tunnel going to Network -> Interface -> Tunnel

../../../_images/paloaltovpn3.PNG

When you have a Global protect Gateway is required to configure the paloalto node (IP) that will provide the service.

../../../_images/paloaltovpn4.PNG

Define the server authentication allows to define authentication profile and the use of certicates, in this case will not be used certicates.

../../../_images/paloaltovpn5.PNG

Map the gateway with the tunnel interface.

../../../_images/paloaltovpn6.PNG

Define the DHCP pool that is going to be assigned to the remote users.

../../../_images/paloaltovpn7.PNG

Going to the Configs section is possible to define the DHCP scope and pools.

../../../_images/paloaltovpn8.PNG

Is required to configure the Portal in the Global protect at Network -> Global Protect -> Portal, same steps are required for the Portal.

  • General configuration must be set.
../../../_images/paloaltovpn9.PNG

Authentication configuration must be set.

../../../_images/paloaltovpn10.PNG
  • Agent configuration.
../../../_images/paloaltovpn11.PNG

And after that to create the configuration (External) where is defined the available gateways, in this case we have only one Paloalto firewall available.

../../../_images/paloaltovpn12.PNG