fortinet.xml 2.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. <PAGE>
  2. <INCLUDE file="inc/header.tmpl" />
  3. <VAR match="VAR_SEL_PROTOCOLS" replace="selected" />
  4. <VAR match="VAR_SEL_FORTINET" replace="selected" />
  5. <PARSE file="menu1.xml" />
  6. <PARSE file="menu2-protocols.xml" />
  7. <INCLUDE file="inc/content.tmpl" />
  8. <h1>Fortinet SSL VPN</h1>
  9. <p>Experimental support for <a
  10. href="https://www.fortinet.com/products/vpn">Fortinet SSL
  11. VPN</a> was added to OpenConnect in March 2021. It is also known as FortiGate
  12. in some documentation. It is a
  13. <a href="https://en.wikipedia.org/wiki/Point-to-Point_Protocol">PPP</a>-based
  14. protocol using the native PPP support which was merged into the 9.00
  15. release.</p>
  16. <p>Fortinet mode is requested by adding <tt>--protocol=fortinet</tt>
  17. to the command line:
  18. <pre>
  19. openconnect --protocol=fortinet fortigate.example.com
  20. </pre></p>
  21. <p>Since <a href="http://sites.inka.de/~W1011/devel/tcp-tcp.html">TCP over
  22. TCP is very suboptimal</a>, OpenConnect tries to always use PPP-over-DTLS,
  23. and will only fall over to the PPP-over-TLS tunnel if that fails, or if
  24. disabled via the <tt>--no-dtls</tt> argument.</p>
  25. <h2>Authentication</h2>
  26. <p>OpenConnect currently supports
  27. basic username/password, optional TLS client certificate, and optional multifactor
  28. authentication token entry via the two known challenge/response mechanisms:
  29. plaintext/"tokeninfo"
  30. (<a href="https://gitlab.com/openconnect/openconnect/-/issues/225">issue #225</a>)
  31. and HTML forms
  32. (<a href="https://gitlab.com/openconnect/openconnect/-/issues/332">issue #332</a>).</p>
  33. <p>If you have access to a Fortinet VPN which uses other types of
  34. authentication, please send information to <a href="mail.html">the mailing
  35. list</a> so that we can add support to OpenConnect.</p>
  36. <h2>Quirks and Issues</h2>
  37. <p>FortiGate server versions prior to v6.2.1 do <i>not</i> allow the
  38. post-authentication cookie (as output by <tt>--authenticate</tt>) to
  39. be used to reestablish a dropped connection. This means that if the
  40. client loses its connection to the gateway (for example, due to a
  41. network outage, or after roaming to a different physical adapter) a
  42. new authentication will <i>always</i> be required. This is a substantial
  43. design flaw which is not present in any of the other protocols
  44. supported by OpenConnect.</p>
  45. <p>Starting with FortiOS 6.2.1, an optional server-side
  46. setting (<a href="https://docs.fortinet.com/document/fortigate/6.2.1/cli-reference/281620/vpn-ssl-settings"><tt>tun-connect-without-reauth</tt></a>)
  47. appears intended to support reconnection, but still doesn't work very well
  48. (see <a href="https://gitlab.com/openconnect/openconnect/-/issues/297#note_669164202">discussion on issue #297</a>).
  49. Please send reports on success and failure with Fortinet reconnection
  50. to <a href="mail.html">the mailing list</a>
  51. so we can understand it better.</p>
  52. <INCLUDE file="inc/footer.tmpl" />
  53. </PAGE>