FortiOS-7.4.4-SSL VPN To IPsec VPN Migration
FortiOS-7.4.4-SSL VPN To IPsec VPN Migration
FortiOS 7.4.4
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change Log 4
Introduction 5
Migration background 6
Security Comparison 6
IKEv1 or IKEv2? 6
Tunneling protocol and encapsulation 7
Migration basics 8
Design considerations 8
Authentication method 9
Multiple user groups 9
Full tunneling versus split tunneling 10
Client address assignments 10
Policy configurations 10
FortiClient or endpoint configurations 10
Migrate VPNs before or after upgrade? 13
FortiOS SSL VPN to dial-up VPN migration 13
Topology 14
Part 1: Identifying user authentication methods 14
Part 2: Configuring IPsec tunnels using the IPsec wizard 22
FortiClient endpoint configuration migration 31
2024-07-10 Updated FortiOS SSL VPN to dial-up VPN migration on page 13.
Virtual Private Network (VPN) technology allows users, devices, and sites to securely connect to each other over the
internet in an otherwise insecure medium. SSL VPN and IPsec VPN in particular are well used technologies that are
easy to configure and deploy.
Each technology has its advantages and common use cases. SSL VPN, for example, is typically tailored towards secure
remote access from individual users and endpoints. It is generally easy to set up, and because connections are secured
over TLS on TCP/443, few ISPs will restrict SSL VPN connections. It also offers two modes (tunnel and web mode) that
can be provisioned in agent and agentless deployments.
On the other hand, IPsec VPN is typically associated with site-to-site connections, and is especially convenient in multi-
site hub and spoke deployments using ADVPN (Auto Discovery VPN). Complex multi-site deployments are simplified, as
ADVPN incorporates automatic tunnel establishment between sites, dynamic routing, and mass provisioning using an
orchestrator such as FortiManager.
On a smaller scale, IPsec VPN is just as capable of supporting remote users using dial-up VPN connections. Protocols,
encryption algorithms, and authentication methods can all be customized to suit a company’s needs.
Finally, as an alternative to VPN—and especially SSL VPN web-based VPN—ZTNA (Zero Trust Network Access) can
also be used to secure remote access. ZTNA offers a seamless connection secured over TLS between the endpoints
and Zero Trust Application Gateway. A Zero Trust approach assumes devices cannot be trusted until they have passed
required security posture checks, such as client certificate verification and vulnerability scans. See the SSL VPN to
ZTNA Migration Guide for more information.
This document explores SSL VPN and IPsec VPN a little deeper, as well as things to consider while migrating from SSL
VPN to IPsec VPN. Additionally, we will review examples of common SSL VPN use cases and demonstrate steps to
migrate these setups to IPsec VPN.
To understand how to migrate from SSL VPN to IPsec VPN, we first examine a few aspects of each VPN technology:
l Security Comparison on page 6
l IKEv1 or IKEv2? on page 6
l Tunneling protocol and encapsulation on page 7
Security Comparison
IKEv1 or IKEv2?
FortiGate supports IKEv1 and IKEv2, and both are configured similarly. The underlying protocol for IKEv2 is more
streamlined, requiring fewer message exchanges to negotiate the SAs compared to IKEv1. The major difference is
IKEv1 uses XAuth (Extended Authentication) for user authentication, and IKEv2 uses EAP (Extensible Authentication
Protocol). IKEv1 is generally well used and well understood, with a more rigid protocol that is simpler to troubleshoot.
Whereas IKEv2 offers more flexibility, resulting in more variations when troubleshooting.
Once you understand the differences between SSL VPN and IPsec VPN technologies, it is time to plan the migration.
This section describes the following:
l Design considerations on page 8
l FortiOS SSL VPN to dial-up VPN migration on page 13
l FortiClient endpoint configuration migration on page 31
Design considerations
The following example diagram represents a common SSL VPN tunnel-mode topology:
Individual users connect from the internet to the WAN interface of the FortiGate. Each user must authenticate to be
granted access and establish an SSL VPN tunnel. Once connected, traffic is encrypted and secured by TLS between the
endpoint and the FortiGate WAN interface. Users can access internal resources based on the configured firewall policy
for their user group.
In a dial-up IPsec VPN scenario, the topology is generally the same:
Individual users connect to the WAN interface of the VPN gateway and will authenticate using the chosen method. Once
the IPsec tunnel is established, traffic is encrypted and secured by the ISAKMP protocol between the endpoint and the
FortiGate WAN interface. Users can access internal resources based on the configured firewall policy for their user
group.
In conclusion, no topology design changes are needed to migrate from SSL VPN to IPsec VPN.
Authentication method
In order to establish an SSL VPN tunnel, users must authenticate to a user group that is associated with SSL VPN in a
user group to portal mapping. Authentication can be any of the following methods supported by the FortiGate:
Two-factor authentication using FortiToken is also supported, and can work in combination with Local, LDAP, RADIUS
or SAML authentication.
For IPsec tunnels, users can authenticate using pre-shared keys or certificates or through XAuth (Extended
Authentication) in IKEv1 tunnels and EAP in IKEv2 tunnels. Authentication can be any of the following methods
supported by the FortiGate:
Pre-shared key and PKI authentication can be paired with any of the other user authentication methods. Two-factor
authentication using FortiToken is also supported and can work in combination with Local, LDAP, RADIUS, or SAML
authentication.
In conclusion, when migrating from SSL VPN to IPsec VPN, all authentication methods are supported and can be
migrated. Users and user groups can be reused in the new IPsec configurations. Administrators must choose a pre-
shared key or PKI certificate while configuring the IPsec tunnel as it is a required setting.
SSL VPN configurations use only one SSL VPN settings page and one SSL VPN interface. Multiple user groups can be
configured and mapped to different portals, and granular access is controlled by the firewall policy.
In IPsec VPN, one dial-up VPN tunnel setting can accommodate one or more user groups by defining the group within
the VPN settings or inheriting the groups from the firewall policy. Unlike SSL VPN, administrators can also create
individual dial-up VPN tunnels for each group.
When using multiple dial-up VPN tunnels, each tunnel with the same settings requires a unique peer ID in order for dial-
up clients to engage the right tunnel when initiating a connection to the VPN gateway. In IKEv1, it is recommended to use
aggressive mode to accommodate the peer ID field within the phase1 tunnel.
When migrating from SSL VPN to IPsec VPN, use one of these methods to define your group settings.
Full tunneling forces all remote user traffic to go through the VPN; whereas, split tunneling allows administrators to
specify the traffic destinations that go through VPN.
Both SSL VPN and IPsec VPN support split tunneling. By default, SSL VPN enables split tunneling based on the
destination configured in the firewall policy. By default, IPsec disables split tunneling in custom configurations, but
enables it in wizard configurations. When enabled, you must configure the network(s) to be included or excluded from
routing through the tunnel.
SSL VPN assigns addresses out of a pre-defined or custom IP range. Dialup IPsec VPN has many methods of address
assignments. However, it is recommended to use mode config where the FortiGate acts as the IP addressing server.
The mode config setting has many options for address assignments, ranging from manual IP address range to
integration with a DHCP server.
Migrating from SSL VPN to IPsec VPN provides added flexibility in IP addressing. Use mode config and one of the
addressing options that it provides.
Policy configurations
SSL VPN uses a single ssl.root tunnel interface as source within a firewall policy to control inbound access from
endpoint clients. User groups must be defined within the policy to control user groups that are allowed access to the
internal resources.
Conversely, IPsec VPN creates a virtual VPN interface using the name of each IPsec tunnel. The virtual tunnel interface
(s) can be chosen as a source within a firewall policy to control inbound access from endpoint clients. User groups can
be defined in the policy and inherited by the VPN tunnel configurations, or they can be defined individually in each tunnel
configuration.
When migrating from SSL VPN to IPsec VPN, consider the changes to the firewall policies needed to accommodate user
group configurations.
When connecting to SSL VPN in tunnel mode, endpoints must have FortiClient installed. Same is the case for IPsec
tunnels.
FortiClient can be installed individually on endpoints or managed by FortiClient EMS. Using FortiClient EMS is preferred
because it allows administrators to centrally manage their clients and easily scale their deployments. See FortiClient
endpoint configuration migration on page 31 for more information.
A basic FortiClient SSL VPN configuration consists of:
Port The listening port on the FortiGate. Defaults to TCP/443. Can be customized to
another port.
Client Certificate When SSL VPN server requires a client certificate, FortiClient must supply the
certificate to be used.
Authentication (XAuth or EAP) Supports manual entry of username/password each time to authenticate or a
saved login.
Failover SSL VPN Relevant only when using SSL VPN for redundancy. Set to None otherwise.
These settings must match the VPN settings configured on the FortiGate. For example, when multiple dial-up tunnels
are configured on the FortiGate with peer ID enabled, the client must configure a local ID to match. On FortiClient,
configure a local ID under Phase 1 options.
VPN settings should be configured and centrally managed by FortiClient EMS and pushed to each endpoint when
possible. From FortiClient EMS, create a new remote access profile for the IPsec tunnel to match the FortiGate tunnel
setting. See FortiClient or endpoint configurations on page 10 for more information about IPsec configuration using
FortiClient EMS.
Deciding whether to migrate VPNs before or after an upgrade is a choice that administrators should make based on their
company policies, best practices, and business impact. One consideration is to evaluate the potential downtime for
remote users in either scenario.
Another factor to consider is whether the current firmware impacts security. If a security patch is critical, administrators
may decide to upgrade before migrating their VPN.
Finally, it takes time to carefully assess the design considerations, create a plan, execute and test configurations in a
controlled manner, and then deploy changes to users. Give yourself time to plan accordingly. Schedule your upgrade
and maintenance only after you decide on an approach.
Once you understand the design considerations, you can migrate the configurations based on your preferences. We
recommend taking a two-part approach:
l First, analyze the user authentication method(s) that are used in your current SSL VPN setup. Understand any
conditions that may require you to choose between different IPsec VPN implementations.
l Next, configure your IPsec tunnel settings using the IPsec wizard. Further customization may be needed to
complete the configuration for specific setups.
The following sections will guide you through these steps:
l Topology on page 14
l Part 1: Identifying user authentication methods on page 14
l Part 2: Configuring IPsec tunnels using the IPsec wizard on page 22
Topology
It is assumed that SSL VPN is preconfigured on the WAN interface of the FortiGate, and the remote users connect to the
WAN interface to access internal resources hosted behind the FortiGate’s LAN interface.
This SSL VPN configuration will be migrated to IPsec using the same basic topology.
In Part 1, we identify the user authentication methods currently used in your SSL VPN configuration. For each method,
we outline any restrictions and limitations related to using those methods for IPsec.
User authentication methods on FortiGate require configuration of either users or user groups. These user groups make
use of different authentication servers, such as RADIUS, LDAP, and SAML inside their configuration. These
preconfigured objects can generally be used in the IPsec VPN configurations without further modifications.
Follow these steps to identify the user authentication method currently used in your SSL VPN configuration. If you
already know the authentication method, you can skip these steps and go to Next steps after identifying the
authentication method on page 15.
To identify the user authentication method currently used in SSL VPN configurations:
Remote Groups > Remote Server, uses LDAP LDAP-based user authentication
Server
Remote Groups > Remote Server, uses RADIUS RADIUS-based user authentication
Server
Remote Groups > Remote Server, uses SAML SSO SAML-based user authentication
Server
PKI users are configured under Member, and if Certificate-based user authentication
Remote Groups > Remote Server uses LDAP Server Note: This guide does not demonstrate how to
l If Remote Group > Remote Server uses LDAP
migrate certificate-based user authentication.
Server, then you are using Certificate-based
user authentication with LDAP as two-factor
authentication.
l If Remote Group > Remote Server uses
RADIUS Server, then you are using Certificate-
based user authentication with RADIUS as two-
factor authentication.
Based on the identified authentication method, go to the following topics to find more information about migrating the
authentication method to IPsec VPN as well as specific IPsec IKE version support requirements, if any:
l Local user authentication on page 15
l LDAP-based user authentication on page 16
l RADIUS-based user authentication on page 18
l SAML-based user authentication on page 19
After reviewing the authentication method, move to Part 2, which outlines configuring IPsec tunnel using IPsec wizard
and makes use of user groups discussed in Part 1.
In local user authentication, username and password are configured locally on FortiGate for each user. You can then
configure local user groups to contain multiple local users. See Users to configure a local user, and see User groups to
configure user groups.
This example configuration shows a local user with username johnlocus added to local user group named Local user
group.
The user group named Local user group can be used inside the IPsec tunnel configuration, if you have a single user
group. If you have multiple user groups, they can be used inside firewall policies, after configuring Inherit from policy on
the IPsec tunnel. See Part 2: Configuring IPsec tunnels using the IPsec wizard on page 22.
IPsec IKEv1 uses XAUTH for user authentication, and IPsec IKEv2 uses EAP for user authentication. EAP is not
completely interoperable with LDAP. It requires customization on the LDAP server to store user credentials in plain text,
which is not feasible. Therefore, LDAP-based user authentication only works with XAUTH and only supports IPsec
IKEv1 by design. If you are required to use IKEv2, migrate to use RADIUS-based user authentication instead.
In LDAP-based user authentication, LDAP server acts as a centralized authentication server. Thus, usernames and
passwords must be directly managed on the LDAP server. To use this authentication method for IPsec (IKEv1),
FortiGate requires a configured LDAP server and user group that uses LDAP server. Optionally, to segregate user
groups based on user’s LDAP group membership to perform group matching, you can configure multiple user groups
and use group name option.
See Configuring an LDAP server to configure an LDAP server. See Tracking users in each Active Directory LDAP group
to configure group matching.
This example configuration shows an LDAP server named LDAP Connector that is used inside a user group named
LDAP user group. The Group Name setting matches only users belonging to the LDAP group called Domain Users on
the LDAP server. Only users belonging to Domain Users are allowed to connect to the IPsec tunnel.
end
next
end
The user group named LDAP user group can be used inside the IPsec tunnel configuration, if you have a single user
group. If you have multiple user groups, they can be used inside firewall policies, after configuring Inherit from policy on
the IPsec tunnel. Be sure to change IKE version to version 2. See Part 2: Configuring IPsec tunnels using the IPsec
wizard on page 22.
In RADIUS-based user authentication, the RADIUS server is used as a centralized authentication server. Thus,
usernames and passwords must directly be managed on the RADIUS server. To configure a RADIUS server on
FortiGate, see Configuring a RADIUS server.
To use this authentication method for IPsec, FortiGate requires a configured RADIUS server and a user group that
references the RADIUS server.
Optionally, to segregate user groups based on user’s group membership on RADIUS server, you can use the Group
Name option. FortiGate expects the RADIUS server to be configured correctly to return the correct RADIUS attribute
(that is, Fortinet-Group-Name VSA) in RADIUS response packet. See Restricting RADIUS user groups to match
selective users on the RADIUS server.
In this example configuration, FortiGate is configured with RADIUS server named Radius Connector, and a user group
called Radius user group references the RADIUS server. The group name option is configured to only allow the user to
connect to IPsec tunnel, if RADIUS server returns Domain Users in the RADIUS response packet to FortiGate.
The user group named Radius user group can be used inside the IPsec tunnel configuration, if you have a single user
group. If you have multiple user groups, they can be used inside firewall policies, after configuring Inherit from policy on
IPsec tunnel. See Part 2: Configuring IPsec tunnels using the IPsec wizard on page 22.
IPsec supports SAML-based user authentication on FortiClient version 7.2.4 and later. SAML authentication is only
supported on IPsec IKEv2. IPsec IKEv1 is not supported.
Ensure to upgrade FortiClient to version 7.2.4 or later. See Deployment & Installers to upgrade FortiClient using
FortiClient EMS.
Part 2 of this guide uses the IPsec wizard to configure IPsec. By default, IPsec wizard configures IKEv1. The
configuration is then later customized to use IKEv2 along with enabling EAP for user authentication, see Changing from
IKEv1 to IKEv2 on page 30.
For SAML to work with IPsec, it needs additional configuration of auth-ike SAML port, SAML sever certificate, and
interface binding between interface used by IPsec VPN gateway and SAML server. For end-to-end configuration
example on deploying SAML with IKEv2 using different IdPs, review SAML-based authentication for FortiClient remote
access dialup IPsec VPN clients.
This example configuration demonstrates the additional SAML configurations needed. The configuration is based on
using FortiAuthenticator as the SAML IdP.
To configure and view the auth-ike-saml-port used for authentication in the CLI:
You can only configure and view this setting in the CLI.
config system global
set auth-ike-saml-port 9443
end
2. View the SAML user group named SAML User group that uses the SAML SSO server named SAML-FAC.
config user group
edit "SAML User group"
set member "SAML-FAC"
config match
edit 1
set server-name "SAML-FAC"
set group-name "Corporate"
next
end
next
end
To configure the binding between the SAML server and the interface on which IPsec gateway is
configured:
1. Configure the binding between the SAML server and interface on which IPsec gateway is configured. This
configuration can only be performed and viewed using the CLI.
config system interface
edit "WAN"
set ike-saml-server "SAML-FAC"
next
end
The user group named SAML User group can be used inside the IPsec tunnel configuration, if you have a single user
group. If you have multiple user groups, they can be used inside firewall policies, after configuring Inherit from policy on
IPsec tunnel. See Part 2: Configuring IPsec tunnels using the IPsec wizard on page 22.
After reviewing user authentication methods used in your current SSL VPN configuration and comparing it with IPsec
authentication methods discussed in Part 1: Identifying user authentication methods on page 14, you can now migrate
SSL VPN to IPsec VPN.
IPsec tunnels can be configured using the IPsec wizard, a custom IPsec configuration, or a combination of both. In this
guide, the IPsec wizard is used to configure IPsec tunnels. When using the IPsec wizard, FortiGate configures IPsec
tunnels using IKEv1 in aggressive mode by default. IPsec tunnel configuration using the IPsec wizard can also be
modified to use the needed IKE version, IKE mode, custom security associations (SAs), and other granular settings.
1. On FortiGate, go to VPN > IPsec Wizard. The VPN Creation Wizard opens to the VPN Setup step.
2. On the VPN Setup page, set the following options, and click Next:
Remote device type Different clients are supported. Since SSL VPN tunnel mode requires
FortiClient, leave the default as Client-based and FortiClient.
Incoming Interface This interface is the same Listen on interface as defined in your SSL VPN
settings.
Local Address These are the internal network(s) accessed by VPN users.
The equivalent SSL VPN configurations are the destination address(es) in the
ssl.root to <destination> firewall policies.
Client Address Range Enter the IP address range from which you want to assign IP addresses to the
dialup clients that successfully connect to IPsec VPN.
(Optional) You can use different address ranges as your SSL VPN
configurations to avoid IP overlap.
Enable IPv4 Split Tunnel When enabled, only traffic configured in the Local address field will go through
the tunnel (that is, split tunneling).
When disabled, all traffic from remote users will go through the tunnel (that is,
full tunneling).
Allow Endpoint Registration Deprecated. Settings do not affect the VPN configuration.
Save Password Enable saving XAuth username and password on the VPN clients. Enabled by
default. CLI setting is set save-password enable.
Auto Connect Allow the client to bring the tunnel up when there is no traffic. Disabled by
default. CLI setting is set client-auto-negotiate disable.
Always Up (Keep Alive) Allow the client to keep the tunnel up when there is no traffic. Disabled by
default. CLI setting is set client-keep-alive disable.
Split Tunnel Group Address group for the destination address(es) allowed by the tunnel. Used for
split tunneling configurations.
Address Firewall address for the range defined for the endpoint clients.
The IPsec wizard generates all the configurations, objects, and policies. Notice the name of the firewall policy is
prefixed with vpn_.
7. Click Show Tunnel List to view the new tunnel on the VPN > IPsec Tunnels page. Locate the tunnel under Dialup –
FortiClient (Windows, Mac OS, Android).
8. Select the new tunnel and click Edit to view the basic settings:
Next steps
You may need to edit or customize the IPsec tunnel settings created by the IPsec wizard, depending on your
requirements. For further customization, see Customizing IPsec tunnel settings on page 26.
You can edit the IPsec tunnels created by the IPsec wizard, or you can convert them to custom tunnels to access more
options. This section includes the following optional procedures:
l Editing IPsec tunnel settings on page 27
l Converting to custom IPsec tunnel settings on page 27
You can edit some settings for the IPsec tunnels created by the IPsec wizard without converting them to custom tunnels.
1. Go to the VPN > IPsec Tunnels page, and locate the IPsec tunnel configuration created by the IPsec Wizard under
Dialup – FortiClient (Windows, Mac OS, Android).
2. Select the tunnel and click Edit to view the settings:
You can convert the IPsec tunnels created by the IPsec wizard to custom tunnels to access additional settings for your
requirements.
1. Go to the VPN > IPsec Tunnels page, and locate the IPsec tunnel configuration created by the IPsec wizard under
Dialup – FortiClient (Windows, Mac OS, Android).
2. Select the tunnel and click Edit.
3. Click Convert To Custom Tunnel to access more options.
If multiple user groups are configured in SSL VPN Authentication/Portal Mapping, then you can choose one of the
following design options:
l Option 1: Inherit settings from the policy on page 28
l Option 2: configure an IPsec tunnel for each user group on page 29
If your current SSL VPN configuration uses multiple user groups under Authentication/Portal mapping, you can achieve
the same on IPsec tunnels by using the Inherit from policy setting, which enables users to configure the user groups
directly on the firewall policy.
3. Click OK to save.
4. Add the user groups to the auto generated firewall policy:
a. Go to Policy & Object > Firewall Policy.
b. Locate the respective firewall policy, and open it for editing.
The IPsec wizard uses a prefix of vpn_ for the policies it creates.
c. Set the Source field to the user group.
For example, user group named LDAP User Group is added to the automatically generated firewall policy
named vpn_Dialup_remote_0:
Configure a new IPsec tunnel for each individual user group. Because multiple IPsec tunnels are configured on same
physical (WAN) interface, FortiGate uses a peer ID to differentiate between incoming IPsec connection attempts and
associate the connection to the correct IPsec tunnel. As such, it is important to configure a unique peer ID for each IPsec
tunnel.
A unique peer ID must be configured on different IPsec tunnels using following steps.
1. Under VPN > IPsec Tunnels, edit the respective IPsec tunnel.
2. Under Tunnel Template, click Convert to Custom Tunnel to access more options.
3. Under Authentication > Peer Options, change the Accept Types to Specific peer ID:
FortiClient must use same peer ID when it sends the request to connect to IPsec tunnels. Peer
ID is called Local ID on FortiClient’s VPN configuration. Thus, local ID on FortiClient must
match peer ID on FortiGate to connect to correct IPsec tunnel.
IPsec wizard uses IKEv1 to configure the IPsec tunnel. If you want to use IPsec IKEv2 instead, you can change the
configuration.
To configure IKEv2:
4. Click OK.
5. IPsec IKEv2 uses EAP for user authentication. You must enable the following CLI settings to enable EAP to perform
user authentication. These settings can only be enabled using CLI.
User authentication is then performed using user groups
config vpn ipsec phase1-interface
edit <tunnel-name>
set eap enable
set eap-identity send-request
next
end
3. Under Phase 1 Proposal, click Edit, and select required custom configuration.
4. Click the checkmark button to save.
5. Under Phase 2 Selectors, click Edit, and select the required custom configuration.
6. Click the checkmark button to save.
7. Click OK to save the changes on the IPsec tunnel.
Migration from SSL VPN to IPsec on FortiClient EMS must be done in parallel with FortiGate configuration since IPsec
settings have to be matched on both FortiGate (VPN server) and FortiClient (VPN client). On FortiClient EMS, VPN
configuration is accomplished through the Remote Access endpoint profile, which enables setting up either SSL VPN or
IPsec or both. See FortiClient EMS Remote Access documentation.
To get started, add a remote access profile under the Endpoint Profiles section on FortiClient EMS. See Creating a new
profile.
Once new Remote Access profile is added, add tunnel under the VPN Tunnels section within the same Remote Access
profile context.
Remote Gateway IP address or FQDN that FortiClient uses to reach FortiGate for VPN
connection.
If you used FortiGate’s IPsec wizard, this setting corresponds to the address of
the incoming interface configured during the wizard's Authentication step.
Typically, this is the same address used for the SSL VPN remote gateway.
Authentication Method Available options are Local Certificate, Pre Shared Key, Smart Card
Certificate, and Local Store Certificate.
The FortiGate IPsec wizard permits either pre-shared key or signature. When
the pre-shared key option is configured on the FortiGate, use the same value
in the Pre Shared Key field in FortiClient EMS.
If signature authentication method is preferred, select the certificate option
suitable for your company requirements. Ensure that the certificate’s CA
matches the Peer Certificate CA configured during the Authentication step of
the FortiGate IPsec wizard.
5. Under Basic Settings, go to VPN Settings section, and configure the IKE version, Mode, and Options. These
settings must match the ones configured on FortiGate.
Mode Select Aggressive or Main mode. Default option for the FortiGate
VPN Creation Wizard is Aggressive.
Options The Mode Config option is the default option and recommended. It's also the
default mode configured on FortiGate with the IPsec wizard.
6. Under Basic Settings, go to the Phase 1 section and configure the option. FortiGate’s IPsec wizard automatically
selects phase 1 parameters. You can check these parameters by running the following CLI commands on the
FortiGate:
show full vpn ipsec phase1-interface <tunnel-name>
Ensure that you match phase 1 settings on FortiClient EMS to the phase 1 settings
configured on FortiGate.
IKE Proposal Select Encryption and Authentication algorithms used for generating keys to
protect FortiClient and FortiGate negotiations. At least one of the selected
encryption-authentication pairs must match to any of the ones configured on
FortiGate. FortiGate’s IPsec wizard sets the following algorithms
automatically:
l AES128 - SHA256
l AES256 - SHA256
l AES128 - SHA1
l AES256 - SHA1
DH Groups Select a Diffie-Hellman (DH) group. It must match to one of the groups
selected on FortiGate.
The FortiGate IPsec wizard configures DH groups 14 and 5 automatically.
Key Life Enter the time (in seconds) that must pass before IKE encryption key expires.
New key gets generated in real-time without interrupting the service. Key life
can be configured within the range of 120 and 172,800 seconds.
The default value for the FortiGate IPsec wizard is 86400 seconds.
7. Configure the remaining Phase 1 options as needed by your requirements. Refer to IPsec VPN documentation for
details.
Phase 1 configuration also allows configuring Dead Peer Detection (DPD) mechanism on both FortiClient and
FortiGate. DPD configuration is not available in the GUI but is available in XML on FortiClient EMS. For more
information regarding DPD and how to configure it on FortiGate, see Dead peer detection. The IKE Settings section
describes FortiClient\EMS configuration of DPD with XML.
8. Under Basic Settings, go to the Phase 2 section. The same concept applies for phase 2 settings, the settings on
FortiClient EMS and FortiGate must match. As with phase 1, you can confirm what settings were automatically set
by the FortiGate IPsec wizard by running the following command on FortiGate:
show full vpn ipsec phase2-interface <tunnel-name>
IKE Proposal Select Encryption and Authentication algorithms used to protect the data
transferred between the IPsec peers. At least a single pair must match on both
FortiClient and FortiGate. The FortiGate IPsec wizard configures the following
settings by default:
l AES128-SHA1
l AES256-SHA1
l AES128-SHA256
l AES256-SHA256
l AES128GCM
l AES256GCM
DH groups Configure the DH groups to match on FortiGate. The FortiGate IPsec wizard
uses 14, 5 by default.
Key Life Set the time until the phase 2 key expires. The default option is in seconds;
however, you can also configure the key life in kilobytes (KBytes) or both. If
both is selected, whichever limit gets exceeded first takes precedence. Default
value is 43200 (seconds), which matches the value set by the FortiGate IPsec
wizard.
Replay Detection When enabled, FortiGate checks for already- received packets and discards
the ones that arrive out of order. Enabled by default on both FortiClient EMS
and FortiGate.
PFS PFS forces a new DH key exchange upon tunnel establishment and after
phase 2 key expiration, causing a new key to be generated each time. Enabled
by default on both FortiClient EMS and FortiGate.
9. Go to the Advanced Settings section to configure multiple options for IPsec connection including Save Password,
Auto-Connect, and Always Up, which then appear on FortiClient GUI. They enable automatic connection to a VPN
tunnel and its recovery from network disruption. If you decide to include these settings in your configuration, ensure
that you also configure them in the Client Options step of FortiGate IPsec wizard. For more information on the
available options, refer to Remote Access IPsec documentation.
The user must select Save Password, Auto-Connect, and Always Up to activate them.
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.