Fortinet white logo
Fortinet white logo

AWS Administration Guide

Accessing a cloud server using an SDN connector via VPN

Accessing a cloud server using an SDN connector via VPN

This guide provides a sample configuration that allows a local client PC to access an FTP server deployed inside the AWS cloud by using an AWS SDN connector via SSL VPN.

In this topology, a FortiGate-VM for AWS is deployed inside the AWS cloud. The FortiGate-VM can dynamically resolve the FTP server's private IP address in the AWS cloud through an AWS SDN connector. A local client PC with FortiClient installed can establish an SSL VPN tunnel to the FortiGate-VM inside the AWS cloud, then access the FTP server through the SSL VPN tunnel.

To configure the FortiGate-VM:
  1. Configure the AWS SDN connector:
    1. In FortiOS, go to Security Fabric > Fabric Connectors.
    2. Click Create New.
    3. Select Amazon Web Services (AWS).
    4. In the AWS region name field, enter us-east-1.
    5. Leave the AWS VPC ID field blank if no VPC ID is specified.
    6. Configure other fields as required. Click OK.
    7. Go toSecurity Fabric > Fabric Connectors. Click the refresh icon for the configured connector. The green arrow means that the connector is connected.

  2. Create an SDN connector firewall address to associate the configured SDN connector:
    1. Go to Policy & Objects > Addresses.
    2. Click Create New, then select Address.
    3. From the Type dropdown list, select Fabric Connector Address.
    4. From the SDN Connector dropdown list, select the connector created in step 1.
    5. For SDN address type, select Private.
    6. In the Filter field, enter Tag.Name=publicftp. This is the name of the FTP server in the AWS cloud.
    7. From the Interface dropdown list, select any.
    8. Click OK. The following shows the FTP server as seen in the AWS management console.

  3. After the update interval (60 seconds by default), check the resolved firewall address:
    1. Go to Policy & Objects > Addresses.
    2. Hover over the address created in step 2. In this example, it shows the firewall address (172.31.31.101) that the configured SDN connector resolves to.

  4. Configure SSL VPN to access the FTP server:
    1. Configure the user and user group:
      1. Go to User & Device > User Definition.
      2. Create a new local user.
      3. Go to User & Device > User Groups.
      4. Create a group that includes the new local user.
    2. Configure SSL VPN settings:
      1. Go to VPN > SSL-VPN Settings.
      2. In the Listen on Interface field, select the proper interface. This example selects port1.
      3. In the Listen on Port field, enter 10443.
      4. From the Server Certificate dropdown list, select the desired certificate.

        Self-signed certificates are provided by default to simplify initial installation and testing. Acquiring a signed certificate for your installation is HIGHLY recommended.

        Continuing to use these certificates can result in your connection being compromised, allowing attackers to steal your information, such as credit card details.

        For more information, review Use a non-factory SSL certificate for the SSL VPN portal and learn how to Purchase and import a signed SSL certificate.

      5. Under Authentication/Port Mapping, set the default full-access portal for All Other Users/Groups.
      6. Create a new authentication/portal mapping for the group created in step a, mapping to the full-access portal.
    3. Configure the SSL VPN firewall policy:
      1. Go to Policy & Objects > IPv4 Policy.
      2. From the Incoming Interface dropdown list, select the SSL VPN tunnel interface (ssl.root).
      3. From the Outgoing Interface dropdown list, select port1.
      4. In the Source field, select all and the group configured in step a.
      5. In the Destination field, select the address created in step 2.
      6. From the Schedule dropdown list, select always.
      7. In the Service field, select ALL.
      8. For Action, select Accept.
      9. Click OK.
To establish an SSL VPN connection from the local client PC:

This example assumes that you are not using EMS to manage endpoints. If you are using EMS, use a licensed FortiClient endpoint for the following configuration, skipping the installation step.

  1. Download VPN-only FortiClient from FortiClient.com. Install onto the local client PC.
  2. In FortiClient, on the Remote Access tab, add a new connection.
  3. For VPN, select SSL-VPN.
  4. In the Remote Gateway field, enter the IP address of the listening FortiGate interface. In this example, it is 100.26.32.219, the FortiGate-VM port1 public IP address.
  5. Select Customize port, then enter 10443.
  6. Save the configuration.
  7. Use the credentials configured in step 4a above to connect to the SSL VPN tunnel. After connection, traffic to the SDN connector resolved IP address (172.31.31.101) goes through the tunnel. Other traffic goes through the local gateway. The client PC side shows the routing entry for the SSL VPN tunnel:
    Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
    0.0.0.0         172.16.200.1    0.0.0.0         UG    0      0        0 eth1
    172.31.31.101   10.212.134.200  255.255.255.255 UGH   0      0        0 ppp0

    The FortiGate-VM shows the logged in user and the assigned SSL VPN tunnel virtual IP address.

    execute vpn sslvpn list
        SSL VPN Login Users:
         Index   User    Auth Type   Timeout        From      HTTP in/out    HTTPS in/out
         0       usera   1(1)          284      208.91.115.10     0/0            0/0
        SSL VPN sessions:
         Index   User    Source IP     Duration   I/O Bytes    Tunnel/Dest IP
         0       usera   208.91.115.10   76      1883/1728     10.212.134.200
To run diagnose commands:
  1. To show SDN connector status, run the diagnose sys sdn status command. The output should be as follows:
    SDN Connector                       Type        Status
    -------------------------------------------------------------
    aws1                                aws         connected
  2. To debug the SDN connector to resolve the firewall address, run the diagnose debug application awsd -1 command. The output should be as follows:
    ...
    awsd checking firewall address object dynamic-aws, vd 0
     address change, new ip list:
      172.31.31.101
    awsd sdn connector aws1 finish updating IP addresses
    ...
  3. To restart the AWS SDN connector daemon, run the diagnose test application awsd 99 command.

Accessing a cloud server using an SDN connector via VPN

Accessing a cloud server using an SDN connector via VPN

This guide provides a sample configuration that allows a local client PC to access an FTP server deployed inside the AWS cloud by using an AWS SDN connector via SSL VPN.

In this topology, a FortiGate-VM for AWS is deployed inside the AWS cloud. The FortiGate-VM can dynamically resolve the FTP server's private IP address in the AWS cloud through an AWS SDN connector. A local client PC with FortiClient installed can establish an SSL VPN tunnel to the FortiGate-VM inside the AWS cloud, then access the FTP server through the SSL VPN tunnel.

To configure the FortiGate-VM:
  1. Configure the AWS SDN connector:
    1. In FortiOS, go to Security Fabric > Fabric Connectors.
    2. Click Create New.
    3. Select Amazon Web Services (AWS).
    4. In the AWS region name field, enter us-east-1.
    5. Leave the AWS VPC ID field blank if no VPC ID is specified.
    6. Configure other fields as required. Click OK.
    7. Go toSecurity Fabric > Fabric Connectors. Click the refresh icon for the configured connector. The green arrow means that the connector is connected.

  2. Create an SDN connector firewall address to associate the configured SDN connector:
    1. Go to Policy & Objects > Addresses.
    2. Click Create New, then select Address.
    3. From the Type dropdown list, select Fabric Connector Address.
    4. From the SDN Connector dropdown list, select the connector created in step 1.
    5. For SDN address type, select Private.
    6. In the Filter field, enter Tag.Name=publicftp. This is the name of the FTP server in the AWS cloud.
    7. From the Interface dropdown list, select any.
    8. Click OK. The following shows the FTP server as seen in the AWS management console.

  3. After the update interval (60 seconds by default), check the resolved firewall address:
    1. Go to Policy & Objects > Addresses.
    2. Hover over the address created in step 2. In this example, it shows the firewall address (172.31.31.101) that the configured SDN connector resolves to.

  4. Configure SSL VPN to access the FTP server:
    1. Configure the user and user group:
      1. Go to User & Device > User Definition.
      2. Create a new local user.
      3. Go to User & Device > User Groups.
      4. Create a group that includes the new local user.
    2. Configure SSL VPN settings:
      1. Go to VPN > SSL-VPN Settings.
      2. In the Listen on Interface field, select the proper interface. This example selects port1.
      3. In the Listen on Port field, enter 10443.
      4. From the Server Certificate dropdown list, select the desired certificate.

        Self-signed certificates are provided by default to simplify initial installation and testing. Acquiring a signed certificate for your installation is HIGHLY recommended.

        Continuing to use these certificates can result in your connection being compromised, allowing attackers to steal your information, such as credit card details.

        For more information, review Use a non-factory SSL certificate for the SSL VPN portal and learn how to Purchase and import a signed SSL certificate.

      5. Under Authentication/Port Mapping, set the default full-access portal for All Other Users/Groups.
      6. Create a new authentication/portal mapping for the group created in step a, mapping to the full-access portal.
    3. Configure the SSL VPN firewall policy:
      1. Go to Policy & Objects > IPv4 Policy.
      2. From the Incoming Interface dropdown list, select the SSL VPN tunnel interface (ssl.root).
      3. From the Outgoing Interface dropdown list, select port1.
      4. In the Source field, select all and the group configured in step a.
      5. In the Destination field, select the address created in step 2.
      6. From the Schedule dropdown list, select always.
      7. In the Service field, select ALL.
      8. For Action, select Accept.
      9. Click OK.
To establish an SSL VPN connection from the local client PC:

This example assumes that you are not using EMS to manage endpoints. If you are using EMS, use a licensed FortiClient endpoint for the following configuration, skipping the installation step.

  1. Download VPN-only FortiClient from FortiClient.com. Install onto the local client PC.
  2. In FortiClient, on the Remote Access tab, add a new connection.
  3. For VPN, select SSL-VPN.
  4. In the Remote Gateway field, enter the IP address of the listening FortiGate interface. In this example, it is 100.26.32.219, the FortiGate-VM port1 public IP address.
  5. Select Customize port, then enter 10443.
  6. Save the configuration.
  7. Use the credentials configured in step 4a above to connect to the SSL VPN tunnel. After connection, traffic to the SDN connector resolved IP address (172.31.31.101) goes through the tunnel. Other traffic goes through the local gateway. The client PC side shows the routing entry for the SSL VPN tunnel:
    Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
    0.0.0.0         172.16.200.1    0.0.0.0         UG    0      0        0 eth1
    172.31.31.101   10.212.134.200  255.255.255.255 UGH   0      0        0 ppp0

    The FortiGate-VM shows the logged in user and the assigned SSL VPN tunnel virtual IP address.

    execute vpn sslvpn list
        SSL VPN Login Users:
         Index   User    Auth Type   Timeout        From      HTTP in/out    HTTPS in/out
         0       usera   1(1)          284      208.91.115.10     0/0            0/0
        SSL VPN sessions:
         Index   User    Source IP     Duration   I/O Bytes    Tunnel/Dest IP
         0       usera   208.91.115.10   76      1883/1728     10.212.134.200
To run diagnose commands:
  1. To show SDN connector status, run the diagnose sys sdn status command. The output should be as follows:
    SDN Connector                       Type        Status
    -------------------------------------------------------------
    aws1                                aws         connected
  2. To debug the SDN connector to resolve the firewall address, run the diagnose debug application awsd -1 command. The output should be as follows:
    ...
    awsd checking firewall address object dynamic-aws, vd 0
     address change, new ip list:
      172.31.31.101
    awsd sdn connector aws1 finish updating IP addresses
    ...
  3. To restart the AWS SDN connector daemon, run the diagnose test application awsd 99 command.