Mirket Help Center
  • Mirket Help Center
    • End User License Agreement
    • Privacy Policy
    • Mirket On Premise
      • Mirket Installation
        • Mirket MFA Installation Requirements
        • Mirket Installation Steps
      • Mirket Admin Panel
        • Dashboard
        • Admin Accounts Configuration
        • User Management
          • Local Users Configuration
          • Local Group Configuration
          • Ldap Users
          • LDAP Group Configuration
        • Rules
          • Radius Rules
            • Radius Clients
            • Radius Rules
            • Authorization Profiles
          • RDP Rules
          • OWA Rules
          • API Rules
            • API Docs
        • Providers
          • Approve / Deny
          • Mirket OTP
          • TOTP
          • SMS Providers
          • Pauth
          • Pauth or Approve/Deny
          • Bypass
        • Logging
          • Radius Logging
          • RDP Logging
          • OWA Logging
          • API Logging
        • Reports
        • Settings
          • General Settings
          • Syslog Settings
          • Notification Settings
          • License
        • Mirket Upgrade Process
      • Mirket Agents
        • Mirket RDP Agent
        • Mirket OWA Agent
      • Mirket MFA App
      • Integrations
        • Array Networks SSL VPN Integration
        • Barracuda CloudGen Firewall Integration
        • Citrix Integration
        • Cisco ASA Integration
        • Cisco ISE RADIUS Integration
        • Checkpoint SSL VPN Integration
        • CyberArk Integration
        • Dell SonicWall Network Security Appliance Integration
        • Fortigate MFA for admin accounts
        • Fortigate SSL VPN Integration
        • F5 integration
        • Ivanti Pulse Secure Connect Integration
        • Palo Alto MFA for admin accounts
        • Palo Alto SSL VPN Integration
        • Sophos SSL VPN Integration
        • Watchguard SSL VPN Integration
        • Ubuntu Server 22.0.4 SSH connections
        • XLOG Integration
        • VMware Horizon 8 RADIUS Integration
      • Knowledge Base
        • User not found on logs even user exist
        • Global Protect authentication happened two time while using RADIUS
        • User is not withdrawn from LDAP.
        • Fortigate SSL VPN timeout
        • Provider not found error
        • How to install SSL certificate to Mirket
        • Can a Palo Alto be set up to forward client IP addresses to Mirket?
        • SMS not sent to the phone number
      • Release Notes
        • Mirket Version 4.1.2
        • Mirket Version 4.0.6
        • Mirket Version 4.0.0
        • Mirket Version 3.9.2
    • Mirket SAAS Platform
      • Mirket Gateways Installation Requirements
      • Mirket Portal
        • Dashboard
        • Administration
        • Users
          • LDAP Users
          • Local Users
        • Groups
        • External Sources
        • Authentication
          • Radius Rules
          • Proxy Rules
          • OWA Rules
          • ADFS
            • ADFS Management
            • ADFS Agent
          • Custom API
          • OS Logon
            • OS Logon Management
            • OS Logon Agent
        • User Portal
          • User Portal Management
          • User Portal Login Page
          • User Portal Dashboard
        • Connector
          • Radius Gateways
          • LDAP Gateways
          • Proxy Gateways
        • SMS Providers
        • Settings
          • General Settings
          • Syslog
          • Attribute Profiles
      • Monitor
        • Audit Logs
        • Radius Logs
        • Proxy Logs
        • OWA Logs
        • User Portal
        • ADFS Logs
        • OS Logon Logs
      • Mirket Mobile App
      • Integrations
        • Array Networks SSL VPN Integration
        • Barracuda CloudGen Firewall Integration
        • Citrix Integration
        • Cisco ASA Integration
        • Cisco ISE RADIUS Integration
        • Checkpoint SSL VPN Integration
        • CyberArk Integration
        • Dell SonicWall Network Security Appliance Integration
        • Fortigate MFA for admin accounts
        • Fortigate SSL VPN Integration
        • F5 integration
        • Ivanti Pulse Secure Connect Integration
        • Palo Alto MFA for admin accounts
        • Palo Alto SSL VPN Integration
        • Sophos SSL VPN Integration
        • Watchguard SSL VPN Integration
        • Ubuntu Server 22.0.4 SSH connections
        • XLOG Integration
        • VMware Horizon 8 RADIUS Integration
      • Knowledge Base
      • Release Notes
Powered by GitBook
On this page
  • General Overview
  • Preparation Steps
  • Configuring the Fortinet Firewall
  • Configure a RADIUS Server
  • Configure a User Group
  • Configure SSL VPN Settings
  • Create an SSL VPN Policy
  • Configure Mirket
  • Add Fortigate as a Resource in Mirket with Radius Gateway
  • Configuring Radius Gateway
  • User and Group configuration on Mirket
  • Add a Radius Rule to Mirket
  • Test the Integration
  1. Mirket Help Center
  2. Mirket SAAS Platform
  3. Integrations

Fortigate SSL VPN Integration

PreviousFortigate MFA for admin accountsNextF5 integration

Last updated 2 months ago

General Overview

This guide explains the process of configuring multi-factor authentication (MFA) for your Fortinet Firewall using Mirket, and setting up the integration of your Fortinet Firewall with Mirket RADIUS.

This integration was tested with version v7.2.2 of Fortinet FortiGate.

Preparation Steps

Before proceeding with these procedures, ensure the following:

  • You've completed the installation and configuration of the Mirket (go to"" ).

  • End-users can access the FortiGate Firewall.

  • Ensure that FortiClient version 7.0.5 or a higher version is installed.

Configuring the Fortinet Firewall

Configure a RADIUS Server

For RADIUS authentication in FortiGate Firewall VPN, you need to add a RADIUS server (the Mirket server ip address).

Follow these steps to configure a RADIUS server:

  • Access the FortiGate web UI using https://<IP address of FortiGate>

  • Select User & Authentication > RADIUS Servers. Then click on Create New.

  • Enter a name for the RADIUS server in the Name field; for instance, input "Mirket Radius."

  • Click on the Specify option in Authentication Method field, and then choose the PAP protocol for the authentication method.

  • Input the IP address of the Mirket (RADIUS server) into the IP/Name field.

  • Assign a shared secret key to identify your RADIUS client in the Secret field. Make sure to use the same shared secret key while configuring your RADIUS client resource in Mirket.

  • Click OK to confirm the settings.

After creating the RADIUS service, we set the RADIUS timeout value and global timeout value using the FortiGate CLI.

config user radius    
    edit <name> {enter radius server name you created.}
        set timeout 60
        set source-ip {if radius status is failure,you may need to specify source ip}
    next
end
 config system global 
        set remoteauthtimeout 60
end

Configure a User Group

Once you've added the Mirket RADIUS server, you'll need to define a group that will authenticate using this server. Additionally, you can create a user assigned to this group.

Follow these steps to configure a user group:

  • Select User & Authentication > User Groups. Then click on Create New.

  • Enter a name in the Name field, for instance input Radius User Group.

  • Choose Firewall option from the Type field.

  • Click on Add under the Remote Groups section.

  • Choose the Mirket Radius you previously created in the Remote Server dropdown list.

  • Choose the Specify option in the Groups field.

  • In the Groups field, enter the group name you are going to create ,for instance input Radius User Group. Then click on OK. In the Group Name section, the authorizaiton profile in Mirket must be the same as the value.

  • Click on OK to confirm settings.

Configure SSL VPN Settings

Follow these steps to configure SSL VPN settings:

  • Select VPN > SSL-VPN Settings.

  • Choose WAN1 from the Listen on Interfaces(s) dropdown list.

  • Enter 10443 in the Listen on Port field. You should define your own port here.

  • Select Fortinet_Factory from the Server Certificate dropdown list.

  • Toggle the Idle Logout option.

  • Click on Create New in the Authentication/Portal Mapping section.

  • Choose full-access option from the Portal dropdown list.

  • Then click on OK and keep the remaining settings as default.

  • Click on Apply to confirm settings.

Create an SSL VPN Policy

An SSL VPN policy needs to be established to permit specific users and groups for SSL VPN usage.

To create an SSL VPN policy:

  • Select Policy & Objects > Firewall Policy. Then click on Create New.

  • Enter a name in the Name field.

  • Choose SSL-VPN tunnel interface(ssl.root) from the Incoming Interface dropdown list.

  • Choose the internal interface connected to the Mirket from the Outgoing Interface dropdown list, for example, lan.

  • Under Source, select “SSLVPN address you defined on portal settings” for Address and "Radius User Group" for User.

  • Under Destination, select the internal protected subnet under Address, such as "all”.

  • Choose "always" from the Schedule dropdown list.

  • Under Service select "ALL" option.

  • Keep the remaining settings as default values.

  • Click OK to confirm settings.

Configure Mirket

To enable Mirket to receive authentication requests from FortiClient, follow these steps:

Add Fortigate as a Resource in Mirket with Radius Gateway

Before starting, ensure that you have installed Mirket Radius Gateway from the Configuration > Gateway. To add a Radius Gateway to the Mirket, follow these steps:

  • Go to Configuration > Gateway and click on the Add Radius Gateway button.

  • On the displayed screen, enter a name for your Radius Gateway in the Name field.

  • Enter the SAM value of the gateway in the Sam Value field. In Mirket, user identification is done using the SAM (Security Account Manager) name. This is preferred over the standard username. This username is used for authentication and access controls.

  • Enter the IP address of the server where the gateway is installed in the Host IP Address field.

  • Enter the authentication port value you set for the gateway in the Auth Port field. The default value is 1812.

  • Enter the accounting port value you specified for the gateway in the Acc Port field. The default value is 1813. Note: After completing these fields, you must create a RADIUS client for the newly created RADIUS Gateway.

  • Click on the Add Radius Client option at the bottom of the displayed screen.

  • Enter a name for your Radius Client in the Radius Client field.

  • Enter the IP address of the client(firewall) that will communicate with the gateway in the IP Address field.

  • Enter the secret key that the client will communicate with the gateway in the Secret Key field.

  • Click on the Save button to confirm the settings.

Configuring Radius Gateway

  • After creating the Radius Gateway, click on the Download > Config from the menu on the right side of the gateway.

  • This option will generate a script related to the gateway, which will be displayed from the RADIUS Setup config file. The config file will automatically begin downloading once this option is selected.

  • Replace the existing config file in the "C:\MirketRadius" directory with the downloaded file. Alternatively, copy the displayed script and paste it into the config file in "C:\MirketRadius".

  • Then, restart the Mirket Radius Service.

You can check whether the Radius Gateway you created is active by navigating to Configuration > Gateway.

User and Group configuration on Mirket

To set up multifactor authentication, make sure you have at least one user or group in Mirket.

If it is preferred to use a local user, you can first create a local group and then create a local user and make the user a member of the group. Alternatively, you can create a local user without creating a local group.

Add a Radius Rule to Mirket

Radius Rules define user access to resources and the authentication methods available (such as SMS, Approve / Deny, OTP, etc.).

First, you should follow these steps:

  • Go to Configuration > Radius Rules.

  • Click on the Add Radius Rule button.

  • On the displayed screen, enter a name for the rule in the Name field.

  • Enter the rule description in the Description field.

  • Select the Radius Client to which the rule will apply from the Radius Client dropdown list.

  • Enter the source IP addresses to which the rule will apply in the Source Adress field.

  • Select the source countries where the rule will be applied from the Source Country dropdown list.

  • Click on the Next button.

  • Specify whether the rule will be applied to a user or a group.

  • After specifying, click on the Next button.

  • Select the users or groups to which the rule will apply. Transfer your selections to the Selected Users/Groups table by clicking the arrow icon next to the Available Users/Groups table.

  • Click on the Next button.

  • Select the time period when the rule will run.

    • All: The rule will run every day.

    • Recurring: The rule will run on the specified days and times.

    • One Time: The rule will run within the date range you specify.

  • After selecting, click on the Next button.

  • Specify whether the user or group will be granted access based on the rule in the Action field.

  • Select the authentication provider to which the rule will apply from the Auth Method dropdown list.

  • Select the attribute type as "FortigateGroupName" from the Attribute Type dropdown list.

  • Enter the group to be granted authorization in the Value field. Please make sure that the value is the same as the group name you specify in Fortigate.

  • Click on Save to confirm the settings.

Test the Integration

To validate the integration between Mirket and your configured Fortinet Firewall, perform authentication using a Mirket MFA app on your mobile device. For RADIUS resources, available authentication methods include Approve/Deny authentication.

In this example, we illustrate the use of the approve/deny authentication method.

  • Launch FortiClient.

  • Select Configure VPN.

  • Enter a name for this connection in the Connection Name field.

  • Enter a description in the Description field.

  • Input the IP address of the listen on interface in Fortinet in the Remote Gateway field.

  • Tick the Customize port option and enter 10443(specified port).

  • Then, click on Save.

  • Enter your Mirket username in the Username field.

  • Enter your password in the Password field.

  • Click on Connect.

  • Then, select the 'Approve' option(found in the Mirket mobile app) immediately and make sure it doesn't time out.

Related Topics

Select the Radius User Group you created in the section from the Users/Groups dropdown list.

If it is preferred to use LDAP users, the priority External Source is created by pulling users from Active Directory or OpenLDAP in Mirket. Note: Before proceeding, ensure that you have installed Mirket LDAP Gateway. ()

Mirket Installation Steps
Create a Local Group to add users manually.
Add local Mirket users manually.
Refer to create LDAP Gateway.
Create an External Source to include LDAP users.
Sync users from an external user database.
user group configuration