Basic Settings
|
|
Name
|
Enter a VPN name. Use only standard alphanumeric characters. Do not use symbols or accented characters.
|
Type
|
Select SSL VPN or IPsec VPN.
|
Remote Gateway
|
Enter the remote gateway IP address/hostname. You can configure multiple remote gateways by clicking the + button. If one gateway is not available, the tunnel connects to the next configured gateway.
|
Port
|
Enter the access port. Available if you selected SSL VPN. The default port is 443.
|
Require Certificate
|
Require a certificate. Available if you selected SSL VPN.
|
Authentication Method
|
Select the authentication method for the VPN. Available if you selected IPsec VPN.
|
Pre-Shared Key
|
Enter the preshared key required. Available if you selected Pre-Shared Key for Authentication Method.
|
Prompt for Username
|
Prompt for the username when accessing VPN.
|
VPN Settings
|
Available if you selected IPsec VPN for the VPN type.
|
IKE
|
Select Version 1 or Version 2.
|
Mode
|
Select Main or Aggressive.
|
Options
|
Select Mode Config, Manual Set, or DHCP over IPsec.
|
Specify DNS Server (IPv4)
|
Specify the DNS server for the VPN tunnel. Available if you selected Manual Set.
|
Assign IP Address (IPv4)
|
Enter the IP address to assign for the VPN tunnel. Available if you selected Manual Set.
|
Split Table
|
Enter the IP address and subnet mask for the VPN tunnel. Available if you selected Manual Set or DHCP over IPsec.
|
Phase 1
|
Available if you selected IPsec VPN for the VPN type.
Select the encryption and authentication algorithms used to generate keys for protecting negotiations and add encryption and authentication algorithms as required.
You need to select a minimum of one and a maximum of two combinations. The remote peer or client must be configured to use at least one of the proposals that you define.
|
Encryption
|
Select the encryption standard.
|
Authentication
|
Select the authentication method.
|
DH Groups
|
Select one or more Diffie-Hellman (DH) groups from groups 1, 2, 5, 14, 15, 16, 17, 18, 19, 20, and 21. At least one of the selected groups on the remote peer or client must match one of the selections on the FortiGate. Failure to match one or more DH groups results in failed negotiations.
|
Key Life
|
Enter the time (in seconds) that must pass before the IKE encryption key expires. When the key expires, a new key is generated without interrupting service. The key life can be from 120 to 172,800 seconds.
|
Local ID
|
Enter the local ID.
|
Enable Implied SPDO
|
Enable implied SPDO. Enter the timeout in seconds.
|
Dead Peer Detection
|
Select this checkbox to reestablish VPN tunnels on idle connections and clean up dead IKE peers if required.
|
NAT Traversal
|
Select the checkbox if a NAT device exists between the client and the local FortiGate. The client and the local FortiGate must have the same NAT traversal setting (both selected or both cleared) to connect reliably.
|
Enable Local LAN
|
Enable local LAN.
|
Enable IKE Fragmentation
|
Enable IKE fragmentation.
|
Allow non-administrators to use machine certificates
|
Allow non-administrator users to use local machine certificates to connect IPsec VPN.
|
Phase 2
|
Available if you selected IPsec VPN for the VPN type.
Select the encryption and authentication algorithms that to propose to the remote VPN peer. You can specify up to two proposals. To establish a VPN connection, at least one of the proposals that you specify must match configuration on the remote peer.
|
Encryption
|
Select the encryption standard.
|
Authentication
|
Select the authentication method.
|
DH Group
|
Select one DH group (1, 2, 5, 14, 15, 16, 17, 18, 19, 20, or 21). This must match the DH group that the remote peer or dialup client uses.
|
Key Life
|
Set a limit on the length of time that a phase 2 key can be used. The default units are seconds. Alternatively, you can set a limit on the number of kilobytes (KB) of processed data, or both. If you select both, the key expires when the time has passed or the number of KB have been processed. When the phase 2 key expires, a new key is generated without interrupting service.
|
Enable Replay Detection
|
Replay detection enables the unit to check all IPsec packets to see if they have been received before. If any encrypted packets arrive out of order, the unit discards them.
|
Enable Perfect Forward Secrecy (PFS)
|
Enable PFS. PFS forces a new DH exchange when the tunnel starts and whenever the phase 2 key life expires, causing a new key to be generated each time.
|
Advanced Settings
|
|
|
Enable One-Time Password
|
Enable one-time password. Available if you selected IPsec VPN for the VPN type.
|
Enable XAuth
|
Enable IKE Extended Authentication (xAuth). Available if you selected IPsec VPN for the VPN type.
|
|
XAuth Timeout
|
Only available if Enable XAuth is enabled. Configure the IKE Extended Authentication (xAuth) timeout in seconds. Default value is two minutes if not configured. Enter a value between 120 and 300 seconds.
|
Prompt for Certificate
|
Prompt the user for the certificate. Available if you selected IPsec VPN for the VPN type.
|
Enable Single User Mode
|
Enable single user mode.
|
Show Passcode
|
Display Passcode instead of Password in the VPN tab in FortiClient.
|
Enable Invalid Server Certificate Warning
|
Display a warning to the user that the certificate is invalid before attempting VPN connection. Available if you selected SSL VPN for the VPN type.
|
Save Username
|
Save your username.
|
Allow Non-Administrators to Use Machine Certificates
|
Allow non-administrator users to use local machine certificates. Available if you selected SSL VPN for the VPN type.
|
Enforce Acceptance of Disclaimer Message
|
Enable and enter a disclaimer message that appears when the user attempts VPN connection. The user must accept the message to allow connection.
|
Show "Remember Password" Option
|
Show option to have the VPN tunnel remember the password. You must also enable this option on the FortiGate.
|
Show "Always Up" Option
|
Show option to have the VPN tunnel always up. You must also enable this option on the FortiGate.
|
Show "Auto Connect" Option
|
Automatically connect the VPN tunnel. You must also enable this option on the FortiGate. Automatic connection to the VPN tunnel may fail if the endpoint boots up with a user profile set to automatic logon.
|
On Connect Script
|
|
Enable the on connect script. Enter your script.
|
On Disconnect Script
|
|
Enable the disconnect script. Enter your script.
|