FortiGate: Configure IPSec with FortiClient using Certificate authentication/local CA

Поделиться
HTML-код
  • Опубликовано: 24 июл 2024
  • Configure IPSec with FortiClient using Certificate authentication/local CA
    0:00 Overview
    1:08 2 Implementation Comparisons
    1:28 Implementation #1 - Certificate creation
    3:12 Implementation #1 - FortiGate Configuration
    7:32 Implementation #1 - FortiClient Configuration/Testing
    9:17 Implementation #1 - Explanation of Certificate Placement/Testing
    11:31 Implementation #2 - Certificate creation
    12:52 Implementation #2 - Certificate import
    13:14 Implementation #2 - FortiGate Configuration
    14:55 Implementation #2 - FortiClient Configuration/Testing
    15:27 Implementation #2 - Certificate + Credential Authentication with XAUTH
  • НаукаНаука

Комментарии • 9

  • @netconfig999
    @netconfig999 3 месяца назад +1

    thanks you for sharing this VD

  • @maheshkulkarni7236
    @maheshkulkarni7236 Год назад

    I have Cert Chain as - Root CA, Intermediate CA and Client certificate. Do i need seperate Certificate for Fortigate under SSL VPN-Settings Server Certificate?

  • @maheshkulkarni7236
    @maheshkulkarni7236 Год назад

    Can you please share video for SSL VPN with FortiClient using Certificate Auth please ?

  • @DJ-jh2hd
    @DJ-jh2hd 3 месяца назад

    How about machine certificate? So you want just a certificate for machines to restrict which machines are used to connect to SSL VPN or maybe this is done with another feature / product

    • @tothepointfortinet3823
      @tothepointfortinet3823  3 месяца назад

      You should be able to use a similar process to make machine cerrt work too. Ie. I see no reason why machine cert won't work

  • @michait3866
    @michait3866 Год назад

    Will it work with certificates signed with OpenSSL?