VPN Fortinet
VPN Fortinet
VPN Fortinet
CURSO INTERMEDIO
ING. EDDER HERNANDEZ
ING. VICTOR TOVAR
Métodos principales para implementar VPN
de acceso remoto
4
Creación de VPN por SSL
Definición de usuarios y grupos
SSL settings
Políticas de firewall
Xtreme-Student-1 #
Xtreme-Student-1 #
Xtreme-Student-1 # [69:root]rmt_apsession.c:1940 checking web session
[69:root]rmt_apsession.c:1945 remote_ip=[172.16.10.254],
user=[Xtm_Stnd1_SSL], iif=6, auth=1, dsthost=[192.168.10.30],
dst=192.168.10.30, dport=80, service=[http]
[69:root]1 0x41e8a400,ssl=0x41c56200,(nil),connect to 192.168.10.30:80.
“diag debug application sslvpn 64”
[69:root]proxy_http_state.c:517 no filtering for pol 2 group SSL_Web_Access
[69:root]0x41e8b000 doSSLConnect() cookie in:
SVPNCOOKIE=8ca5m9WCVIfw1tea7rM4HQbS2iFPlsL/4yzl8d0V+U9VGUvE5jDzvpFisO
qkoYk7%0axkPqjFLlFSlUFBtFCBrZ+2CAQziUZOLb2m8tsDZ7pRYeYZPWo+YlI1IN73aCh
HVh%0agTBXSyZzYbNnCHCWBSXywQ==%0a
[69:root]0x41e8b000 doSSLConnect() cookie out:
[69:root]0x41e8b000 proxyHttpSendHeader() send header:
GET / HTTP/1.1
Host: 192.168.10.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
If-Modified-Since: Mon, 09 Apr 2012 01:34:32 GMT
If-None-Match: "5cdd1eaf015cd1:0"
Referer: htt
“diag debug application sslvpn 128”
[69:root]SSL state:warning close notify (172.16.10.254)
[69:root]SSL state:warning close notify (172.16.10.254)
[69:root]SSL state:warning close notify (172.16.10.254)
[69:root]SSL state:warning close notify (172.16.10.254)
[69:root]SSL state:before/accept initialization (172.16.10.254)
[69:root]SSL state:SSLv3 read client hello A (172.16.10.254)
[69:root]SSL state:SSLv3 write server hello A (172.16.10.254)
[69:root]SSL state:SSLv3 write change cipher spec A (172.16.10.254)
[69:root]SSL state:SSLv3 write finished B (172.16.10.254)
[69:root]SSL state:SSLv3 flush data (172.16.10.254)
[69:root]SSL state:SSLv3 read finished A (172.16.10.254)
[69:root]SSL state:SSL negotiation finished successfully (172.16.10.254)
“diag debug application sslvpn 255”
[69:root]SSL state:before/accept initialization (172.16.10.254)
[69:root]SSL state:SSLv2/v3 read client hello A:system lib(172.16.10.254)
[69:root]SSL state:SSLv3 read client hello A (172.16.10.254)
[69:root]SSL state:SSLv3 write server hello A (172.16.10.254)
[69:root]SSL state:SSLv3 write certificate A (172.16.10.254)
[69:root]SSL state:SSLv3 write key exchange A (172.16.10.254)
[69:root]SSL state:SSLv3 write server done A (172.16.10.254)
[69:root]SSL state:SSLv3 flush data (172.16.10.254)
[69:root]SSL state:SSLv3 read client certificate A:system lib(172.16.10.254)
[69:root]SSL state:SSLv3 read client certificate A:system lib(172.16.10.254)
[69:root]SSL state:SSLv3 read client key exchange A (172.16.10.254)
[69:root]SSL state:SSLv3 read finished A (172.16.10.254)
[69:root]SSL state:SSLv3 write change cipher spec A (172.16.10.254)
[69:root]SSL state:SSLv3 write finished B (172.16.10.254)
[69:root]SSL state:SSLv3 flush data (172.16.10.254)
[69:root]SSL state:SSL negotiation finished successfully (172.16.10.254)
[69:root]SSL established: DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA
Enc=AES(256) Mac=SHA1
[69:root]two factor check for Xtm_Stnd1_SSL: off
[69:root]SSLVPN login matched policy 2 (vd 0)
[69:root]rmt_websession.c:310 decode session id ok,
user=[Xtm_Stnd1_SSL],group=[SSL_Web_Access],host=[172.16.10.254],idx=0,auth=1,lo
gin=1334150476
[69:root]rmt_websession.c:310 decode session id ok,
user=[Xtm_Stnd1_SSL],group=[SSL_Web_Access],host=[172.16.10.254],idx=0,auth=1,lo
gin=1334150476
[69:root]SSL state:before/accept initialization (172.16.10.254)
[69:root]SSL state:SSLv2/v3 read client hello A:system lib(172.16.10.254)
[69:root]SSL state:SSLv3 read client hello A (172.16.10.254)
[69:root]SSL state:SSLv3 write server hello A (172.16.10.254)
[69:root]SSL state:SSLv3 write certificate A (172.16.10.254)
[69:root]SSL state:SSLv3 write key exchange A (172.16.10.254)
[69:root]SSL state:SSLv3 write server done A (172.16.10.254)
[69:root]SSL state:SSLv3 flush data (172.16.10.254)
Cuando el tunnel se encuentra abajo estos son los resultados que muestra
[69:root]ipcp: down ppp:0x41cde000 tun: 0x41c74050 ref 1
[69:root]sys-fortik.c:703 deassociate 192.16.210.100 to tun (22)
[69:root]tun: delete device: 0x41c74050
Fase 1
Fase 2
Políticas de firewall
Fase 1
Enesta fase los compañeros utilizan la
clave precompartida o los certificados
para la autenticación. Después de esto
se crea un DES, 3DES o AES clave
simétrica para cifrar la comunicación.
Fase 2
Una vez que la Fase 1 está terminado, la negociación se
inicia la fase 2.
En esta fase los gateway se autentican y se requiere
especificar la clave de cifrado que se va a utilizar para
establecer la asociación de seguridad que en realidad se
configura el túnel de comunicación seguro.
Una vez que se han puesto de acuerdo en la clave, los
compañeros envían las redes de origen y destino en que
se cifrará el tráfico.
VPN IPSEC DEBUGGING