12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firewall Policy<br />

Configuring firewall policies<br />

Note: For a route-based (interface mode) VPN, you do not configure an IPSEC firewall<br />

policy. Instead, you configure two regular ACCEPT firewall policies, one for each direction<br />

of <strong>com</strong>munication, with the IPSec virtual interface as the source or destination interface as<br />

appropriate.<br />

For more information, see the “Defining firewall policies” chapter of the <strong>FortiGate</strong><br />

IPSec VPN User <strong>Guide</strong>.<br />

SSL-VPN firewall policy options<br />

When Action is set to SSL-VPN, the following options are available:<br />

Note: The SSL-VPN option is available from the Action list after one or more SSL VPN user<br />

groups have been created. To create user accounts and SSL VPN user groups, see<br />

“Configuring SSL VPN user group options” on page 392.<br />

Figure 170:SSL-VPN encryption policy<br />

SSL Client<br />

Certificate<br />

Restrictive<br />

Cipher Strength<br />

User<br />

Authentication<br />

Method<br />

Allow traffic generated by holders of a (shared) group certificate. The<br />

holders of the group certificate must be members of an SSL VPN user<br />

group, and the name of that user group must be present in the Allowed<br />

field.<br />

Select one of the following options to determine the level of SSL<br />

encryption to use. The web browser on the remote client must be<br />

capable of matching the level that you select:<br />

• To use any cipher suite, select Any.<br />

• To use a 164-bit or greater cipher suite, select High >= 164.<br />

• To use a 128-bit or greater cipher suite, select Medium >= 128.<br />

Select one of the following options:<br />

• If the user group that will be bound to this firewall policy is a local user<br />

group, select Local.<br />

• If the remote clients will be authenticated by an external RADIUS<br />

server, select Radius.<br />

• If the remote clients will be authenticated by an external LDAP server,<br />

select LDAP.<br />

• Select Any to enable all of the above authentication methods. Local is<br />

attempted first, then Radius, then LDAP.<br />

Available Groups Select the name of the user group requiring SSL VPN access, and then<br />

select the right-pointing arrow. Do not select more than one user group<br />

unless all members of the selected user groups have identical access<br />

requirements.<br />

For information about how to create a firewall encryption policy for SSL VPN<br />

users, see the “SSL VPN administration tasks” chapter of the <strong>FortiGate</strong> SSL VPN<br />

User <strong>Guide</strong>.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 281

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!