DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for...

23
DIGIPASS Authentication for Fortigate SSL-VPN INTEGRATION GUIDE

Transcript of DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for...

Page 1: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

DIGIPASS Authentication for Fortigate SSL-VPN

INTEGRATION GUIDE

Page 2: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

1 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Disclaimer

Disclaimer of Warranties and Limitation of Liabilities

All information contained in this document is provided 'as is'; VASCO Data Security assumes no

responsibility for its accuracy and/or completeness.

In no event will VASCO Data Security be liable for damages arising directly or indirectly from any

use of the information contained in this document.

Copyright

Copyright © 2010 VASCO Data Security, Inc, VASCO Data Security International GmbH. All

rights reserved. VASCO®, Vacman®, IDENTIKEY®, aXsGUARD™™, DIGIPASS® and ® logo

are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data

Security International GmbH in the U.S. and other countries. VASCO Data Security, Inc.

and/or VASCO Data Security International GmbH own or are licensed under all title, rights and

interest in VASCO Products, updates and upgrades thereof, including copyrights, patent

rights, trade secret rights, mask work rights, database rights and all other intellectual and

industrial property rights in the U.S. and other countries. Microsoft and Windows are

trademarks or registered trademarks of Microsoft Corporation. Other names may be

trademarks of their respective owners.

Page 3: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

2 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Table of Contents

Disclaimer ...................................................................................................................... 1

Table of Contents ........................................................................................................... 2

Reference guide ............................................................................................................. 3

1 Reader ...................................................................................................................... 4

2 Overview................................................................................................................... 4

3 Problem Description ................................................................................................. 4

4 Solution .................................................................................................................... 4

5 Technical Concept ..................................................................................................... 5

5.1 General overview .................................................................................................. 5

5.2 Fortigate prerequisites ........................................................................................... 5

5.3 IDENTIKEY SERVER Prerequisites ............................................................................ 5

6 Fortigate Configuration ............................................................................................. 6

6.1 SSL/VPN configuration ........................................................................................... 6

6.2 RADIUS configuration ............................................................................................ 8

6.3 Group configuration ............................................................................................... 9

6.4 Firewall configuration ........................................................................................... 10

7 IDENTIKEY Server .................................................................................................. 13

7.1 Policy configuration ............................................................................................. 13

7.2 Client configuration ............................................................................................. 16

8 Fortigate SSL/VPN test ........................................................................................... 18

8.1 Response Only .................................................................................................... 18

8.2 Challenge / Response .......................................................................................... 19

9 About VASCO Data Security .................................................................................... 22

Page 4: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

3 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Reference guide

ID Title Author Publisher Date ISBN

Page 5: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

4 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

1 Reader This Document is a guideline for configuring the partner product with IDENTIKEY SERVER or

Axsguard IDENTIFIER. For details about the setup and configuration of IDENTIEKEY SERVER and

Axsguard IDENTIFIER, we refer to the Installation and administration manuals of these products.

Axsguard IDENTIFIER is the appliance based solution, running IDENTIKEY SERVER by default.

Within this document, VASCO Data Security, provides the reader guidelines for configuring the

partner product with this specific configuration in combination with VASCO Server and Digipass.

Any change in the concept might require a change in the configuration of the VASCO Server

products.

The product name`IDENTIKEY SERVER`will be used throughout the document keeping in mind

that this document applies as well to the Axsguard IDENTIFIER.

2 Overview The purpose of this document is to demonstrate how to configure IDENTIKEY SERVER to work

with a Fortigate device. Authentication is arranged on one central place where it can be used in a

regular VPN or SSL/VPN connection.

3 Problem Description The basic working of the Fortigate is based on authentication to an existing media (LDAP,

RADIUS, local authentication …). To use the IDENTIKEY SERVER with Fortigate, the external

authentication settings need to be changed or added manually.

4 Solution After configuring IDENTIKEY SERVER and Fortigate in the right way, you eliminate the weakest

link in any security infrastructure – the use of static passwords – that are easily stolen guessed,

reused or shared.

In this integration guide we will make use of a Fortigate 50A. This combines a firewall, an IPSec,

PPTP or SSL/VPN and a UTM suite in one. For authentication, we focused on the SSL/VPN part.

Figure 1: Solution

Page 6: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

5 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

5 Technical Concept 5.1 General overview

The main goal of the Fortigate is to perform authentication to secure all kind of VPN connections.

As the Fortigate can perform authentication to an external service using the RADIUS protocol, we

will place the IDENTIKEY SERVER as back-end service, to secure the authentication with our

proven IDENTIKEY SERVER software.

5.2 Fortigate prerequisites

Please make sure you have a working setup of the Fortigate. It is very important this is working

correctly before you start implementing the authentication to the IDENTIKEY SERVER.

Currently all Fortigate devices use the same web config and CLI interface. This means

our integration guide is suited for the complete product range of Fortigate devices.

5.3 IDENTIKEY SERVER Prerequisites

In this guide we assume you already have IDENTIKEY SERVER installed and working. If this is not

the case, make sure you get IDENTIKEY SERVER working before installing any other features.

Page 7: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

6 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

6 Fortigate Configuration The Fortigate device is configured by web config or by CLI, there is even a CLI window available

in the web config screen.

By default the web config is reachable by https://<IP_OR_NAME_Fortigate>.

In our case this becomes: https://Fortigate

6.1 SSL/VPN configuration

In the web config menu, select the VPN main category.

Figure 2: SSL/VPN configuration (1)

Page 8: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

7 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Select the SSL sub category.

Select the Enable SSL-VPN box.

If necessary you can select another ‘Server Certificate’ or a ‘Tunnel IP Range’, if you want to

allow client to create a VPN-tunnel.

Click Apply to continue.

Figure 3: SSL/VPN configuration (3)

Page 9: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

8 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

6.2 RADIUS configuration

Go to the User main category and select RADIUS as sub category.

Click the Create New button to add a new RADIUS connection.

Figure 4: RADIUS configuration (1)

Fill in the Name and Primary Server Name/IP and Primary Server Secret.

If you necessary you can add a secondary server as well, but this is not required to continue.

Click OK to create the RADIUS server.

Page 10: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

9 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Figure 5: RADIUS configuration (2)

6.3 Group configuration

We will now create a group to use in the firewall rules. Click on the User main category, select

User Group as sub category and click the Create New button.

Figure 6: Group configuration (1)

Enter a Name and select SSL VPN as type. Select in the left column the RADIUS server you

created earlier and click on the button to get in the right column. If necessary click on the

Page 11: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

10 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

SSL-VPN User Group Options for more options. Here you can enable tunneling options and

enable web applications. Click OK to create this group.

Figure 7: Group configuration (2)

6.4 Firewall configuration

To enable SSL-VPN we have to create also a firewall policy allowing connection from the VPN side

to the internal network. To do so, click the Firewall main category and select Policy as sub

category. Click the Create New button.

Page 12: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

11 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Figure 8: Firewall configuration (1)

Page 13: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

12 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

The following settings are used for an SSL-VPN connection:

Source Interface/Zone external

Source Address all

Destination Interface/Zone internal

Destination Address LocalNetwork

Shedule always

Service ANY

Action SSL-VPN

From the ‘Available Groups’ window, select the RADIUS group and click the button to transfer

the group to the Allowed window.

To finish, click on the OK button in the bottom of the screen.

Figure 9: Firewall configuration (2)

This concludes the configuration of the Fortigate device. The incoming request from the SSL-VPN

service will now be handled by the IDENTIKEY SERVER. In the next chapters we will show how to

configure IDENTIKEY SERVER and how to assign a DIGIPASS to a user.

In the chapter after those we will test the Fortigate setup with a response only and a

challenge/response DIGIPASS.

Page 14: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

13 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

7 IDENTIKEY Server Go to the IDENTIKEY Server web administration page, and authenticate with and administrative

account.

7.1 Policy configuration

To add a new policy, select PoliciesCreate.

Figure 10: Policy configuration (1)

There are some policies available by default. You can also create new policies to suit your needs.

Those can be independent policies or inherit their settings from default or other policies.

Page 15: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

14 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Fill in a policy ID and description. Choose the option most suitable in your situation. If you want

the policy to inherit setting from another policy, choose the right policy in the Inherits From list.

Otherwise leave this field to None.

Figure 11: Policy configuration (2)

In the policy options configure it to use the right back-end server. This could be the local

database, but also active directory or another radius server.

This is probably the same that was in your default client authentication options before you

changed it. Or you use the local database, Windows or you go further to another radius server.

In our example we select our newly made Demo Policy and change it like this:

Local auth.: Digipass/Password

Back-End Auth.: Default (None)

Back-End Protocol: Default (None)

Dynamic User Registration: Default (No)

Password Autolearn: Default (No)

Stored Password Proxy: Default (No)

Windows Group Check: Default (No Check)

After configuring this Policy, the authentication will happen locally in the IDENTIKEY Server. So

user credentials are passed through to the IDENTIKEY Server, it will check these credentials to its

local user database and will answer to the client with an Access-Accept or Access-Reject

message.

Page 16: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

15 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

In the Policy tab, click the Edit button, and change the Local Authentication to

Digipass/Password.

Figure 12: Policy configuration (3)

The user details can keep their default settings.

Figure 13: Policy configuration (4)

Page 17: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

16 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

7.2 Client configuration

Now create a new component by right-clicking the Components and choose New Component.

Figure 14: Client configuration (1)

Page 18: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

17 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

As component type choose RADIUS Client. The location is the IP address of the client. In the

policy field you should find your newly created policy. Fill in the shared secret you entered

also in the client for the RADIUS options. In our example this was “vasco”. Click Create.

Figure 15: Client configuration (2)

Now the client and the IDENTIKEY Server are set up. We will now see if the configuration is

working.

Page 19: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

18 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

8 Fortigate SSL/VPN test By default the Fortigate configures the SSL/VPN service on port 10443.

8.1 Response Only

To start the test, browse to the public IP address or hostname of the Fortigate device.

In our example this is https://fortigate.labs.vasco.com:10443. Enter your Name and Password

(One Time Password) and click the Login button.

Figure 16: Response Only (1)

If all goes well, you will be authenticated and see the SSL/VPN portal page.

Page 20: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

19 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Figure 17: Response Only (2)

8.2 Challenge / Response

For the challenge response test, enter your Name and Password (challenge/response trigger).

Click the Login button.

In our case the challenge/response trigger is the user’s static password.

Figure 18: Challenge / Response (1)

You will be presented with a DP300 Challenge code. Enter the response in the Answer field

and click OK.

Page 21: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

20 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

Figure 19: Challenge / Response (2)

Page 22: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

21 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

And if everything goes well, you will be shown the SSL/VPN portal page.

Figure 20: Challenge / Response (3)

Page 23: DIGIPASS Authentication for Fortigate SSL-VPN - VASCO · PDF file4 DIGIPASS Authentication for Fortigate SSL-VPN DIGIPASS Authentication for Fortigate SSL-VPN 1 Reader This Document

22 DIGIPASS Authentication for Fortigate SSL-VPN

DIGIPASS Authentication for Fortigate SSL-VPN

9 About VASCO Data Security VASCO designs, develops, markets and supports patented Strong User Authentication products

for e-Business and e-Commerce.

VASCO’s User Authentication software is carried by the end user on its DIGIPASS products which

are small “calculator” hardware devices, or in a software format on mobile phones, other portable

devices, and PC’s.

At the server side, VASCO’s VACMAN products guarantee that only the designated DIGIPASS user

gets access to the application.

VASCO’s target markets are the applications and their several hundred million users that utilize

fixed password as security.

VASCO’s time-based system generates a “one-time” password that changes with every use, and

is virtually impossible to hack or break.

VASCO designs, develops, markets and supports patented user authentication products for the

financial world, remote access, e-business and e-commerce. VASCO’s user authentication

software is delivered via its DIGIPASS hardware and software security products. With over 25

million DIGIPASS products sold and delivered, VASCO has established itself as a world-leader for

strong User Authentication with over 500 international financial institutions and almost 3000

blue-chip corporations and governments located in more than 100 countries.