Fortinet white logo
Fortinet white logo

Administration Guide

Agentless VPN with FortiToken mobile push authentication

Agentless VPN with FortiToken mobile push authentication

This is a sample configuration of Agentless VPN that uses FortiToken mobile push two-factor authentication. If you enable push notifications, users can accept or deny the authentication request.

Sample topology

Sample configuration

WAN interface is the interface connected to ISP. This example shows static mode. You can also use DHCP or PPPoE mode. The Agentless VPN connection is established over the WAN interface.

To configure Agentless VPN using the GUI:
  1. Configure the interface and firewall address. The port1 interface connects to the internal network.

    1. Go to Network > Interfaces and edit the wan1 interface.

    2. Set IP/Network Mask to 172.20.120.123/255.255.255.0.

    3. Edit port1 interface and set IP/Network Mask to 192.168.1.99/255.255.255.0.

    4. Click OK.

    5. Go to Policy & Objects > Address and create an address for internet subnet 192.168.1.0.

  2. Register FortiGate for FortiCare Support:

    To add or download a mobile token on FortiGate, FortiGate must be registered for FortiCare Support. If your FortiGate is registered, skip this step.

    1. Go to Dashboard > Licenses.

    2. Hover the pointer on Support to check if FortiCare registered. If not, click it and select Register.

  3. Add FortiToken mobile to FortiGate:

    If your FortiGate has FortiToken installed, skip this step.

    1. Go to User & Authentication > FortiTokens and click Create New.

    2. Select Mobile Token and type in Activation Code.

    3. Every FortiGate has two free mobile tokens. Go to User & Authentication > FortiTokens and click Import Free Trial Tokens.

  4. Enable FortiToken mobile push:

    To use FTM-push authentication, use CLI to enable FTM-Push on the FortiGate.

    1. Ensure server is reachable from the Internet and enter the following CLI commands:

      config system ftm-push
          set server 172.20.120.123
          set status enable
      end
    2. Go to Network > Interfaces.

    3. Edit the wan1 interface.

    4. Under Administrative Access > IPv4, select FTM.

    5. Click OK.

  5. Configure user and user group:

    1. Go to User & Authentication > User Definition to create a local user agentlessvpnuser1.

    2. Enter the user's Email Address.

    3. Enable Two-factor Authentication and select one mobile Token from the list,

    4. Enable Send Activation Code and select Email.

    5. Click Next and click Submit.

    6. Go to User & Authentication > User Groups to create a group agentlessvpngroup with the member agentlessvpnuser1.

  6. Activate the mobile token:

    1. When the user agentlessvpnuser1 is created, an email is sent to the user's email address. Follow the instructions to install your FortiToken mobile application on your device and activate your token.

  7. Configure Agentless VPN portals.

    1. Go to VPN > Agentless VPN Portals, and click Create New.

    2. Enter a name, such as agentless-portal.

    3. Under Predefined Bookmarks, click Create New, and enter the following details:

      Field

      Value

      Name

      Windows Server

      Type

      RDP

      Host

      192.168.1.114

      Port

      3389

      Single Sign-On

      Disable

      Username

      Set the username to log in to Windows Server.

      Password

      Set the password to log in to Windows Server.

      Port

      3389

    4. Click OK to save the predefined bookmark.

    5. Click OK to save the portal settings.

    6. Create another Agentless VPN portal and name it portal-access-disabled.

    7. Click OK to save the portal settings.

    8. Disable Agentless VPN for the newly created portal (that is, portal-access-disabled) using CLI:

      config vpn ssl web portal
          edit "portal-access-disabled"
              set web-mode disable
          next
      end
  8. Configure Agentless VPN settings.

    1. Go to VPN > Agentless VPN Settings.

    2. Set Agentless VPN to Enable.

    3. Set the Listen on Interface(s) to wan1.

    4. Set Listen on Port to 10443.

    5. Choose a certificate for Server Certificate. The default is Fortinet_Factory.

    6. Under Authentication/Portal Mapping, set select All Other Users/Groups, and click Edit.

    7. Use Portal dropdown to select portal-access-disabled.

    8. Click OK.

    9. In Authentication/Portal Mapping, click Create New.

      1. Set Users/Groups to agentlessvpngroup.

      2. Set Portal to agentless-portal.

      3. Click OK.

    10. Click Apply to save the Agentless VPN settings.

  9. Configure Agentless VPN firewall policy:

    1. Go to Policy & Objects > Firewall Policy, and click Create New.

    2. Set Name to Agentless VPN firewall policy.

    3. Set Schedule to always and Action to Accept.

    4. Set Incoming interface to Agentless VPN tunnel interface(ssl.root).

    5. Choose an Outgoing Interface. This example uses port1.

    6. Set the Source to all and User/group to agentlessvpngroup.

    7. Set Destination Address. In this example, the destination is the internal, protected subnet 192.168.1.0.

    8. Set Service to ALL.

    9. Click OK.

To configure Agentless VPN using the CLI:
  1. Configure the interface and firewall address.

    config system interface 
        edit "wan1"
            set vdom "root"
            set ip 172.20.120.123 255.255.255.0
        next
    end
  2. Configure internal interface and protected subnet, then connect the port1 interface to the internal network.

    config system interface
        edit "port1"
            set vdom "root"
            set ip 192.168.1.99 255.255.255.0
        next
    end
    config firewall address
        edit "192.168.1.0"
            set subnet 192.168.1.0 255.255.255.0
        next
    end
  3. Register FortiGate for FortiCare Support.

    To add or download a mobile token on FortiGate, FortiGate must be registered for FortiCare Support. If your FortiGate is registered, skip this step.

    diagnose forticare direct-registration product-registration -a "your account@xxx.com" -p "your password" -T "Your Country/Region" -R "Your Reseller" -e 1
  4. Add FortiToken mobile to FortiGate:

    execute fortitoken-mobile import <your FTM code>

    If your FortiGate has FortiToken installed, skip this step.

    Every FortiGate has two free mobile Tokens. You can download the free token.

    execute fortitoken-mobile import 0000-0000-0000-0000-0000
  5. Enable FortiToken mobile push:

    1. To use FTM-push authentication, ensure server is reachable from the Internet and enable FTM-push in the FortiGate:

      config system ftm-push
          set server 172.20.120.123
          set status enable
      end
    2. Enable FTM service on WAN interface:

      config system interface 
          edit "wan1"
              append allowaccess ftm 
          next
      end
  6. Configure user and user group:

    config user local
        edit "agentlessvpnuser1"
            set type password
            set two-factor fortitoken
            set fortitoken <select mobile token for the option list>
            set email-to <user's email address>
            set passwd <user's password>
        next
    end
    config user group
        edit "agentlessvpngroup" 
            set member "agentlessvpnuser1"
        next 
    end
  7. Activate the mobile token.

    When the user agentlessvpnuser1 is created, an email is sent to the user's email address. Follow the instructions to install your FortiToken mobile application on your device and activate your token.

  8. Configure Agentless VPN portal and predefine RDP bookmark for windows server.

    config vpn ssl web portal
        edit "agentless-portal"
            set web-mode enable
            config bookmark-group
                edit "gui-bookmarks"
                    config bookmarks
                        edit "Windows Server"
                            set apptype rdp
                            set host "192.168.1.114"
                            set port 3389
                            set logon-user "your-windows-server-user-name"
                            set logon-password your-windows-server-password
                        next
                    end
                next
            end
        next
    end
  9. Configure another Agentless VPN portal and disable Agentless VPN on it.

    config vpn ssl web portal
        edit "portal-access-disabled"
            set web-mode disable
        next
    end
  10. Configure Agentless VPN settings:

    config vpn ssl settings
        set servercert "Fortinet_Factory"
        set source-interface "wan1"
        set source-address "all"
        set default-portal "portal-access-disabled"
        config authentication-rule
            edit 1
                set groups "agentlessvpngroup"
                set portal "agentless-portal"
            next        
        end
    end
  11. Configure one Agentless VPN firewall policy to allow remote user to access the internal network. This policy does not allow traffic initiated from internal network to remote client.

    config firewall policy 
        edit 1
            set name "sslvpn web mode access"
            set srcintf "ssl.root"
            set dstintf "port1"
            set srcaddr "all"
            set dstaddr "192.168.1.0"
            set groups “sslvpngroup”
            set action accept
            set schedule "always"
            set service "ALL"
            set nat enable
        next
    end
To see the results of web portal:
  1. From a remote device, use a web browser to log into the Agentless VPN web portal http://172.20.120.123:10443.

  2. Log in using the agentlessvpnuser1 credentials.

    The FortiGate pushes a login request notification through the FortiToken mobile application.

  3. Check your mobile device and select Approve.

    When the authentication is approved, agentlessvpnuser1 is logged into the Agentless VPN portal.

To check the Agentless VPN connection using the GUI:
  1. On FortiGate, go to Dashboard > Agentless VPN Monitor to verify the list of Agentless VPN users.

    If the Agentless VPN Monitor is hidden, click + under the Dashboard, search for Agentless VPN Monitor, and add it to the display.

  2. Go to Log & Report > System Events, and use the dropdown to select VPN Events to view VPN logs.

To check the web portal login using the CLI:
get vpn ssl monitor
Agentless VPN Login Users:
 Index   User           Auth Type    Timeout   From           HTTP in/out   HTTPS in/out
 0       agentlessvpnuser1    1(1)         229       10.1.100.254   0/0           0/0

Agentless VPN sessions:
 Index   User    Source IP      Duration        I/O Bytes       Tunnel/Dest IP 

Agentless VPN with FortiToken mobile push authentication

Agentless VPN with FortiToken mobile push authentication

This is a sample configuration of Agentless VPN that uses FortiToken mobile push two-factor authentication. If you enable push notifications, users can accept or deny the authentication request.

Sample topology

Sample configuration

WAN interface is the interface connected to ISP. This example shows static mode. You can also use DHCP or PPPoE mode. The Agentless VPN connection is established over the WAN interface.

To configure Agentless VPN using the GUI:
  1. Configure the interface and firewall address. The port1 interface connects to the internal network.

    1. Go to Network > Interfaces and edit the wan1 interface.

    2. Set IP/Network Mask to 172.20.120.123/255.255.255.0.

    3. Edit port1 interface and set IP/Network Mask to 192.168.1.99/255.255.255.0.

    4. Click OK.

    5. Go to Policy & Objects > Address and create an address for internet subnet 192.168.1.0.

  2. Register FortiGate for FortiCare Support:

    To add or download a mobile token on FortiGate, FortiGate must be registered for FortiCare Support. If your FortiGate is registered, skip this step.

    1. Go to Dashboard > Licenses.

    2. Hover the pointer on Support to check if FortiCare registered. If not, click it and select Register.

  3. Add FortiToken mobile to FortiGate:

    If your FortiGate has FortiToken installed, skip this step.

    1. Go to User & Authentication > FortiTokens and click Create New.

    2. Select Mobile Token and type in Activation Code.

    3. Every FortiGate has two free mobile tokens. Go to User & Authentication > FortiTokens and click Import Free Trial Tokens.

  4. Enable FortiToken mobile push:

    To use FTM-push authentication, use CLI to enable FTM-Push on the FortiGate.

    1. Ensure server is reachable from the Internet and enter the following CLI commands:

      config system ftm-push
          set server 172.20.120.123
          set status enable
      end
    2. Go to Network > Interfaces.

    3. Edit the wan1 interface.

    4. Under Administrative Access > IPv4, select FTM.

    5. Click OK.

  5. Configure user and user group:

    1. Go to User & Authentication > User Definition to create a local user agentlessvpnuser1.

    2. Enter the user's Email Address.

    3. Enable Two-factor Authentication and select one mobile Token from the list,

    4. Enable Send Activation Code and select Email.

    5. Click Next and click Submit.

    6. Go to User & Authentication > User Groups to create a group agentlessvpngroup with the member agentlessvpnuser1.

  6. Activate the mobile token:

    1. When the user agentlessvpnuser1 is created, an email is sent to the user's email address. Follow the instructions to install your FortiToken mobile application on your device and activate your token.

  7. Configure Agentless VPN portals.

    1. Go to VPN > Agentless VPN Portals, and click Create New.

    2. Enter a name, such as agentless-portal.

    3. Under Predefined Bookmarks, click Create New, and enter the following details:

      Field

      Value

      Name

      Windows Server

      Type

      RDP

      Host

      192.168.1.114

      Port

      3389

      Single Sign-On

      Disable

      Username

      Set the username to log in to Windows Server.

      Password

      Set the password to log in to Windows Server.

      Port

      3389

    4. Click OK to save the predefined bookmark.

    5. Click OK to save the portal settings.

    6. Create another Agentless VPN portal and name it portal-access-disabled.

    7. Click OK to save the portal settings.

    8. Disable Agentless VPN for the newly created portal (that is, portal-access-disabled) using CLI:

      config vpn ssl web portal
          edit "portal-access-disabled"
              set web-mode disable
          next
      end
  8. Configure Agentless VPN settings.

    1. Go to VPN > Agentless VPN Settings.

    2. Set Agentless VPN to Enable.

    3. Set the Listen on Interface(s) to wan1.

    4. Set Listen on Port to 10443.

    5. Choose a certificate for Server Certificate. The default is Fortinet_Factory.

    6. Under Authentication/Portal Mapping, set select All Other Users/Groups, and click Edit.

    7. Use Portal dropdown to select portal-access-disabled.

    8. Click OK.

    9. In Authentication/Portal Mapping, click Create New.

      1. Set Users/Groups to agentlessvpngroup.

      2. Set Portal to agentless-portal.

      3. Click OK.

    10. Click Apply to save the Agentless VPN settings.

  9. Configure Agentless VPN firewall policy:

    1. Go to Policy & Objects > Firewall Policy, and click Create New.

    2. Set Name to Agentless VPN firewall policy.

    3. Set Schedule to always and Action to Accept.

    4. Set Incoming interface to Agentless VPN tunnel interface(ssl.root).

    5. Choose an Outgoing Interface. This example uses port1.

    6. Set the Source to all and User/group to agentlessvpngroup.

    7. Set Destination Address. In this example, the destination is the internal, protected subnet 192.168.1.0.

    8. Set Service to ALL.

    9. Click OK.

To configure Agentless VPN using the CLI:
  1. Configure the interface and firewall address.

    config system interface 
        edit "wan1"
            set vdom "root"
            set ip 172.20.120.123 255.255.255.0
        next
    end
  2. Configure internal interface and protected subnet, then connect the port1 interface to the internal network.

    config system interface
        edit "port1"
            set vdom "root"
            set ip 192.168.1.99 255.255.255.0
        next
    end
    config firewall address
        edit "192.168.1.0"
            set subnet 192.168.1.0 255.255.255.0
        next
    end
  3. Register FortiGate for FortiCare Support.

    To add or download a mobile token on FortiGate, FortiGate must be registered for FortiCare Support. If your FortiGate is registered, skip this step.

    diagnose forticare direct-registration product-registration -a "your account@xxx.com" -p "your password" -T "Your Country/Region" -R "Your Reseller" -e 1
  4. Add FortiToken mobile to FortiGate:

    execute fortitoken-mobile import <your FTM code>

    If your FortiGate has FortiToken installed, skip this step.

    Every FortiGate has two free mobile Tokens. You can download the free token.

    execute fortitoken-mobile import 0000-0000-0000-0000-0000
  5. Enable FortiToken mobile push:

    1. To use FTM-push authentication, ensure server is reachable from the Internet and enable FTM-push in the FortiGate:

      config system ftm-push
          set server 172.20.120.123
          set status enable
      end
    2. Enable FTM service on WAN interface:

      config system interface 
          edit "wan1"
              append allowaccess ftm 
          next
      end
  6. Configure user and user group:

    config user local
        edit "agentlessvpnuser1"
            set type password
            set two-factor fortitoken
            set fortitoken <select mobile token for the option list>
            set email-to <user's email address>
            set passwd <user's password>
        next
    end
    config user group
        edit "agentlessvpngroup" 
            set member "agentlessvpnuser1"
        next 
    end
  7. Activate the mobile token.

    When the user agentlessvpnuser1 is created, an email is sent to the user's email address. Follow the instructions to install your FortiToken mobile application on your device and activate your token.

  8. Configure Agentless VPN portal and predefine RDP bookmark for windows server.

    config vpn ssl web portal
        edit "agentless-portal"
            set web-mode enable
            config bookmark-group
                edit "gui-bookmarks"
                    config bookmarks
                        edit "Windows Server"
                            set apptype rdp
                            set host "192.168.1.114"
                            set port 3389
                            set logon-user "your-windows-server-user-name"
                            set logon-password your-windows-server-password
                        next
                    end
                next
            end
        next
    end
  9. Configure another Agentless VPN portal and disable Agentless VPN on it.

    config vpn ssl web portal
        edit "portal-access-disabled"
            set web-mode disable
        next
    end
  10. Configure Agentless VPN settings:

    config vpn ssl settings
        set servercert "Fortinet_Factory"
        set source-interface "wan1"
        set source-address "all"
        set default-portal "portal-access-disabled"
        config authentication-rule
            edit 1
                set groups "agentlessvpngroup"
                set portal "agentless-portal"
            next        
        end
    end
  11. Configure one Agentless VPN firewall policy to allow remote user to access the internal network. This policy does not allow traffic initiated from internal network to remote client.

    config firewall policy 
        edit 1
            set name "sslvpn web mode access"
            set srcintf "ssl.root"
            set dstintf "port1"
            set srcaddr "all"
            set dstaddr "192.168.1.0"
            set groups “sslvpngroup”
            set action accept
            set schedule "always"
            set service "ALL"
            set nat enable
        next
    end
To see the results of web portal:
  1. From a remote device, use a web browser to log into the Agentless VPN web portal http://172.20.120.123:10443.

  2. Log in using the agentlessvpnuser1 credentials.

    The FortiGate pushes a login request notification through the FortiToken mobile application.

  3. Check your mobile device and select Approve.

    When the authentication is approved, agentlessvpnuser1 is logged into the Agentless VPN portal.

To check the Agentless VPN connection using the GUI:
  1. On FortiGate, go to Dashboard > Agentless VPN Monitor to verify the list of Agentless VPN users.

    If the Agentless VPN Monitor is hidden, click + under the Dashboard, search for Agentless VPN Monitor, and add it to the display.

  2. Go to Log & Report > System Events, and use the dropdown to select VPN Events to view VPN logs.

To check the web portal login using the CLI:
get vpn ssl monitor
Agentless VPN Login Users:
 Index   User           Auth Type    Timeout   From           HTTP in/out   HTTPS in/out
 0       agentlessvpnuser1    1(1)         229       10.1.100.254   0/0           0/0

Agentless VPN sessions:
 Index   User    Source IP      Duration        I/O Bytes       Tunnel/Dest IP