Procedure
Prerequisite—Verify that the device is ready for configuration.
This procedure assumes that the Fortigate appliance is already configured with the inside interface or group object with multiple inside interfaces and an outside interface that will communicate with the Web Security Service.
STEP 1—Begin a Custom VPN Tunnel configuration
- From the left-menu, select VPN > Tunnels.
- Click Create New.
- The interface displays the VPN Setup screen.
Define the Phase 1 tunnel.
- Enter a meaningful Name for the tunnel interface.
For example, the location of the device.
- Select Custom VPN Tunnel (No Template).
- Click Next. The interface displays a page with numerous network configuration parameters.
STEP 2—Define the tunnel network parameters
Tip: If a parameter change is not described here, the default is acceptable.
- Enter the following network and connection authentication information.
- Select the nearest Data Center to your network from this KB article, and enter the Web Security Service IP Address.
- Select the Interface that provides the outside connection.
- Enter the Pre-shared Key, (PSK) which is the string used to secure the encrypted tunnel between the router and the Web Security Service.
Tip: The PSK must be at least eight characters and cannot use special characters.
- Scrolling down displays the Phase 1 Proposal area.
- The Web Security Service supports various encryption algorithm combinations.
Refer to the Web Security Service help center for details.
- Leave the Local ID field blank. By default, this value is auto. An added value might cause the tunnel to fail
because of a FQDN interruption.
- The final area on the screen is New Phase 2.
- If the device did not populate the Name field, enter the meaningful name.
- The Local Address value(s) tell the device which internal segments to route to the outside and thus to the
Web Security Service.
- If you are performing a test, you can select IP Address from the drop-down and enter a single client
IP.
- If you are ready to add production traffic, select Subnet and enter the IP address and subnet
information.
- Click Advanced to display additional configuration options.
- Select Perfect Forward Secrecy (PFS), as this is a required option.
Step 3—Create a backup tunnel
(Optional, but recommended) For failover, repeat Steps 1 and 2 to create backup VPN tunnel that directs traffic to another regional Web Security Service datacenter. When complete, the device displays VPN configurations similar to the following:
Step 4—Route Web Security Service-bound traffic through the tunnel interfaces
- Select Router > Static Routes.
- Click Create New. The device displays the New Static Route page.
- From the Device drop-down list, select the primary Web Security Service location that you configured in Step 2.1.a.
Click OK.
- If you defined a backup location, repeat sub-steps 4.2 and 4.3 above to add that location. When complete, the
device displays locations similar to the following.
Step 5—Define policy routes
- Select Router > Policy Routes.
- Click Create New.
The device displays the New Routing Policy page.
- Route port 80 traffic to the primary Web Security Service tunnel interface.
- For the Protocol, select TCP.
- From the Incoming Interface drop-down list, select the internal object (traffic coming from internal sources).
- Enter the Source Address/Mask test IP address or production IP address and subnet.
- For the Destination Address/Mask, enter 0.0.0.0/0, which equals traffic sent to any destination.
- For the Destination Ports, enter 80 to 80. This designates web (HTTP) traffic.
- From the Outgoing Interface drop-down list, select the primary Web Security Service location.
- Click OK.
- Repeat sub-steps 5.2 and 5.3 to create the a route with the same parameters, but in the Destination Ports fields,
enter 443, which designates secure web (HTTPS) traffic.
- Repeat sub-steps 5.2 and 5.3 to create HTTP (port 80) and HTTPS (port 443) policy routes for the backup tunnel
interface (if you are configuring one).
Tip: The order of the entries is important. The primary tunnel must be listed above the secondary tunnel.
Note: If you employing SAML authentication, you must also create an additional policy route for Destination Port 443.
Step 6—Define firewall policies that allow traffic through the tunnel interface.
- Select Policy & Objects > IPv4.
- Click Create New. The device displays the New Policy page.
- Define the following policy options.
- From the Incoming Interface drop-down list, select internal.
- From the Source Address drop-down list, select internal_subnet.
- From the Outgoing Interface drop-down list, select the primary Web Security Service location.
- From the Destination Address drop-down list, select all.
- The default Schedule is always (applies).
- From the Service drop-down list, select HTTP (in the Web Access section).
- Click the + icon to add another Service drop-down list; select HTTPS
- Verify that NAT is disabled.
- Click OK.
Tip: In the example, only HTTP and HTTPS protocols are allowed over the VPN tunnel interfaces. If both VPN interfaces are down, then HTTP and HTTP traffic triggers the permit rule on the wan1 interface and web traffic goes direct to the Internet. If you have a requirement that web traffic must be denied if both tunnel interfaces are down, and additional rule on internal-wan1 to deny that traffic.
Step 7—Optional Failover Configuration
Symantec testing indicates that Data Center failover is provided without any additional configuration.
If a Web Security Service data center location IP address becomes unresponsive, the Fortinet device takes the appropriate interface down and the route policies will not apply. The next route policies are used instead, which sends traffic to the backup data center.
Fortinet provides an optional setting for the backup interface to monitor the primary. Testing did not indicate a difference in failover results when set, but you can set this option. Follow the commands in the Fortinet CLI example to setup monitoring.