Fortigate SSLVPN
Fortigate SSLVPN
Fortigate SSLVPN
VERSION5.2.3
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com
FORTINETVIDEOGUIDE
http://video.fortinet.com
FORTINETBLOG
https://blog.fortinet.com
CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com
FORTIGATECOOKBOOK
http://cookbook.fortinet.com
FORTINETTRAININGSERVICES
http://www.fortinet.com/training
FORTIGUARDCENTER
http://www.fortiguard.com
ENDUSER LICENSE AGREEMENT
http://www.fortinet.com/doc/legal/EULA.pdf
FEEDBACK
Email: [email protected]
June-03-15
FortiOS Handbook - SSLVPN
01-520-112804-20140807
TABLEOFCONTENTS
Change Log
Introduction
Introduction to SSL VPN
SSL VPN modes of operation
Web-only mode
Tunnel mode
Port forwarding mode
Application support
Antivirus and firewall host compatibility
Traveling and security
Host check
Cache cleaning
SSL VPN and IPv6
Basic configuration
User accounts and groups
Authentication
MAC host check
IP addresses for users
Authentication of remote users
Configuring SSL VPN web portals
SSL connection configuration
Portal configuration
Personal bookmarks
SSL VPN Realms
Tunnel mode and split tunneling
Configuring security policies
Firewall addresses
Create an SSL VPN security policy
Create a tunnel mode security policy
Split tunnel Internet browsing policy
Enabling a connection to an IPsec VPN
Configuring encryption key algorithms
Additional configuration options
Routing in tunnel mode
6
7
8
9
9
10
11
11
12
13
13
13
13
14
14
15
15
16
16
18
19
20
23
23
24
25
25
26
27
29
29
31
32
32
Setup examples
Secure Internet browsing
Creating an SSL VPN IP pool and SSL VPN web portal
Creating the SSL VPN user and user group
Creating a static route for the remote SSL VPN user
Creating security policies
Configuring authentication rules
Results
Split Tunnel
Creating a firewall address for the head office server
Creating the SSL VPN user and user group
32
33
33
33
34
34
35
36
37
37
38
38
38
39
40
41
41
41
43
43
43
45
47
48
49
50
50
51
55
56
57
58
58
59
59
59
60
60
60
61
61
62
Results
Multiple user groups with different access permissions
General configuration steps
Creating the firewall addresses
Creating the tunnel client range addresses
Creating the web portals
Creating the user accounts and user groups
Creating the security policies
Configuring authentication rules
Create the static route to tunnel mode clients
63
63
64
64
65
65
66
66
67
68
Change Log
Date
Change Description
2015-01-05
2014-08-07
2014-06-03
2013-10-30
2013-09-16
Added RFCs 2246, 4346, 5246, 6101, and 6176 for SSL and TLS support.
2012-11-02
Introduction
This document provides a general introduction to SSL VPN technology, explains the features available with SSL
VPN and gives guidelines to decide what features you need to use, and how the FortiGate unit is configured to
implement the features.
The following chapters are included in this document:
Introduction to SSL VPN provides useful general information about VPN and SSL, how the FortiGate unit
implements them, and gives guidance on how to choose between SSL and IPsec.
Basic configuration explains how to configure the FortiGate unit and the web portal. Along with these
configuration details, this chapter also explains how to grant unique access permissions, how to configure the
SSL encryption key algorithm, and describes the SSL VPN OS Patch Check feature that allows a client with a
specific OS patch to access SSL VPN services.
The SSL VPN client provides an overview of the FortiClient software required for tunnel mode, where to obtain
the software, how to install it, and the configuration information required for remote users to connect to the
internal network.
The SSL VPN web portal provides an overview of the SSL VPN web portal, with explanations of how to use and
configure the web portal features.
Setup examples explores several configuration scenarios with step-by-step instructions. While the information
provided is enough to set up the described SSL VPN configurations, these scenarios are not the only possible SSL
VPN setups.
Version
RFC
SSL 2.0
RFC 6176
SSL 3.0
RFC 6101
TLS 1.0
RFC 2246
TLS 1.1
RFC 4346
TLS 1.2
RFC 5246
Web-only mode
Web-only mode provides remote users with a fast and efficient way to access server applications from any thin
client computer equipped with a web browser. Web-only mode offers true clientless network access using any
web browser that has built-in SSL encryption and the Sun Java runtime environment.
Support for SSL VPN web-only mode is built into FortiOS. The feature comprises of an SSL daemon running on
the FortiGate unit, and a web portal, which provides users with access to network services and resources
including HTTP/HTTPS, Telnet, FTP, SMB/CIFS, VNC, RDP, and SSH.
In web-only mode, the FortiGate unit acts as a secure HTTP/HTTPS gateway and authenticates remote users as
members of a user group. After successful authentication, the FortiGate unit redirects the web browser to the
web portal home page and the user can access the server applications behind the FortiGate unit.
When the FortiGate unit provides services in web-only mode, a secure connection between the remote client and
the FortiGate unit is established through the SSL VPN security in the FortiGate unit and the SSL security in the
web browser. After the connection has been established, the FortiGate unit provides access to selected services
and network resources through a web portal.
FortiGate SSL VPN web portals have a 1- or 2-column page layout and portal functionality is provided through
small applets called widgets. Widget windows can be moved or minimized. The controls within each widget
depend on its function. There are predefined web portals and the administrator can create additional portals.
Configuring the FortiGate unit involves selecting the appropriate web portal configuration in the user group
settings. These configuration settings determine which server applications can be accessed. SSL encryption is
used to ensure traffic confidentiality.
The following table lists the operating systems and web browsers supported by SSL VPN web-only mode.
Web Browser
Operating System
Web Browser
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
Tunnel mode
Tunnel mode offers remote users the freedom to connect to the internal network using the traditional means of
web-based access from laptop computers, as well as from airport kiosks, hotel business centers, and Internet
cafs. If the applications on the client computers used by your user community vary greatly, you can deploy a
dedicated SSL VPN client to any remote client through its web browser. The SSL VPN client encrypts all traffic
from the remote client computer and sends it to the FortiGate unit through an SSL VPN tunnel over the HTTPS
link between the web browser and the FortiGate unit. Another option is split tunneling, which ensures that only
the traffic for the private network is sent to the SSL VPN gateway. Internet traffic is sent through the usual
unencrypted route. This conserves bandwidth and alleviates bottlenecks.
In tunnel mode, remote clients connect to the FortiGate unit and the web portal login page using Microsoft
Internet Explorer, Firefox, Chrome, MacOS, or Linux. The FortiGate unit acts as a secure HTTP/HTTPS gateway
and authenticates remote users as members of a user group. After successful authentication, the FortiGate unit
redirects the web browser to the web portal home page dictated by the user group authentication settings. If the
user does not have the SSL VPN client installed, they will be prompted to download the SSL VPN client (an
ActiveX or Java plugin) and install it using controls provided through the web portal. SSL VPN tunnel mode can
also be initiated from a standalone application on Windows, MacOS X, and Linux (see below).
SSL VPN Tunnel client standalone installer (build 2300) supported operating systems
Operating System
Release
Microsoft Windows
8.1 (32-bit & 64-bit), 8 (32-bit & 64-bit), 7 (32-bit & 64-bit), and XP SP3 in
.exe and .msi formats
Linux
Mac OS X
Virtual Desktop
When the user initiates a VPN connection with the FortiGate unit through the SSL VPN client, the FortiGate unit
establishes a tunnel with the client and assigns the client a virtual IP address from a range of reserved addresses.
The client uses the assigned IP address as its source address for the duration of the connection. After the tunnel
has been established, the user can access the network behind the FortiGate unit.
Configuring the FortiGate unit to establish a tunnel with remote clients involves enabling the feature through SSL
VPN configuration settings and selecting the appropriate web portal configuration for tunnel-mode access in the
user group settings. The security policy and protection profiles on the FortiGate unit ensure that inbound traffic is
screened and processed securely.
10
The user account used to install the SSL VPN client on the remote computer must
have administrator privileges.
If you are using Windows Vista, you must disable UAC (User Account Control) before
installing the SSL VPN tunnel client. IE7 in Windows Vista runs in Protected Mode by
default. To install SSL VPN client ActiveX, you need to launch IE7 by using 'Run as
administrator' (right-click the IE7 icon and select 'Run as administrator').
For information about client operating system requirements, see the Release Notes for your FortiGate firmware.
For information on configuring tunnel mode, see Basic configuration on page 14.
Application support
With Citrix application servers, the server downloads an ICA configuration file to the users PC. The client
application uses this information to connect to the Citrix server. The FortiGate unit will read this file and append a
SOCKS entry to set the SOCKS proxy to localhost. The Citrix client will then be able to connect to the SSL VPN
11
port forward module to provide the connection. When configuring the port forwarding module, a selection is
available for Citrix servers.
For Windows Remote Desktop Connections, when selecting the RDP option, the tunnel will launch the RDP client
and connect to the local loopback address after the port forward module has been initiated.
Antivirus
Firewall
Antivirus
Firewall
12
Host check
You can enable a host integrity checker to scan the remote client. The integrity checker probes the remote client
computer to verify that it is safe before access is granted. Security attributes recorded on the client computer (for
example, in the Windows registry, in specific files, or held in memory due to running processes) are examined and
uploaded to the FortiGate unit. For more information, see Basic configuration on page 14.
Host Check is applicable for both SSLVPN Web Mode and SSLVPN Tunnel mode.
Cache cleaning
You can enable a cache cleaner to remove any sensitive data that would otherwise remain on the remote
computer after the session ends. For example, all cache entries, browser history, cookies, encrypted information
related to user authentication, and any temporary data generated during the session are removed from the
remote computer. If the clients browser cannot install and run the cache cleaner, the user is not allowed to
access the SSL-VPN portal. For more information, see Basic configuration on page 14.
FTP applications
SMB
In essentially any of the following instructions, replace IPv4 with IPv6 to achieve the same desired results, but for
IPv6 addresses and configurations.
13
Basic configuration
Configuring SSL VPN involves a number of configurations within FortiOS that you need to complete to make it all
come together. This chapter describes the components required, and how and where to configure them to set up
the FortiGate unit as an SSL VPN server. The configurations and steps are high level, to show you the procedures
needed, and where to locate the options in FortiOS. For real-world examples, see Setup examples on page 58.
There are three or four key steps to configuring an SSL VPN tunnel. The first three in the points below are
mandatory, while the others are optional. This chapter outlines these key steps as well as additional
configurations for tighter security and monitoring.
The key steps are:
l
Create user accounts and user groups for the remote clients.
(Basic configuration on page 14)
Create a web portal to define user access to network resources.
(Basic configuration on page 14)
Configure the security policies.
(Basic configuration on page 14)
For tunnel-mode operation, add routing to ensure that client tunnel-mode packets reach the SSL VPN interface.
(Basic configuration on page 14)
Setup logging of SSL VPN activities.
(Basic configuration on page 14)
In the web-based manager, go to User & Device > User > User Definition, and select Create New.
All users accessing the SSL tunnel must be in a firewall user group. User names can be up to 64 characters long.
14
Basic configuration
In the web-based manager, go to User & Device > User > User Groups and select Create New.
Authentication
Remote users must be authenticated before they can request services and/or access network resources through
the web portal. The authentication process can use a password defined on the FortiGate unit or optionally use
established external authentication mechanisms such as RADIUS or LDAP.
To authenticate users, you can use a plain text password on the local FortiGate unit, forward authentication
requests to an external RADIUS, LDAP or TACACS+ server, or utilize PKI certificates.
For information about how to create RADIUS, LDAP, TACACS+ or PKI user accounts and certificates, see the
Authentication Guide.
FortiOS supports LDAP password renewal notification and updates through SSL VPN.
Configuration is enabled using the CLI commands:
config user ldap
edit <username>
set password-expiry-warning enable
set password-renewal enable
end
For more information, see the Authentication Guide.
15
Basic configuration
16
Basic configuration
You can also set the idle timeout for the client, to define how long the user does not access the remote resources
before they are logged out. For information see User accounts and groups on page 14.
17
Basic configuration
If your SSL VPN clients require strong authentication, the FortiGate unit must offer a CA certificate that the client
browser has installed.
In the FortiGate unit SSL VPN settings, you can select which certificate the FortiGate offers to authenticate itself.
By default, the FortiGate unit offers its factory installed (Fortinet_CA_SSLProxy) certificate from Fortinet to
remote clients when they connect. If you leave the default setting, a warning appears that recommends you
purchase a certificate for your domain and upload it for use.
FortiOS will check the server certificate to verify that the certificate is valid. Only valid
server certificates should be used.
18
Basic configuration
FortiOS supports LDAP password renewal notification and updates through SSL VPN.
Configuration is enabled using the CLI commands:
config user ldap
edit <username>
set password-expiry-warning enable
set password-renewal enable
end
For more information, see the Authentication Guide.
This step in the configuration of the SSL VPN tunnel sets up the infrastructure; the addressing, encryption, and
certificates needed to make the initial connection to the FortiGate unit. This step is also where you configure
what the remote user sees with a successful connection. The portal view defines the resources available to the
remote users and the functionality they have on the network.
Define the interface which the FortiGate will use to listen for SSL VPN tunnel requests. This is generally your external interface.
Listen on Port
Restrict Access
Server Certificate
Select the signed server certificate to use for authentication. If you leave
the default setting (Fortinet_CA_SSLProxy), the FortiGate unit offers its
built-in certificate from Fortinet to remote clients when they connect. A
warning appears that recommends you purchase a certificate for your
domain and upload it for use.
Select to use group certificates for authenticating remote clients. When the
remote client initiates a connection, the FortiGate unit prompts the client
for its client-side certificate as part of the authentication process.
For information on using PKI to provide client certificate authentication,
see the Authentication Guide.
Idle Logout
Type the period of time (in seconds) that the connection can remain inactive before the user must log in again. The range is from 10 to 28800
seconds. Setting the value to 0 will disable the idle connection timeout.
This setting applies to the SSL VPN session. The interface does not time
out when web application sessions or tunnels are up.
19
Basic configuration
Address Range
DNS Server
Specify WINS Servers
Portal configuration
The portal configuration determines what the remote user sees when they log in to the portal. Both the system
administrator and the user have the ability to customize the SSL VPN portal.
To view the portals settings page, go to VPN > SSL > Portals.
There are three pre-defined default portal configurations available:
l
full-access
tunnel-access
web-access
Each portal type includes similar configuration options. Select between the different portals by double-clicking
one of the default portals in the list. You can also create a custom portal by selecting the Create New option at
the top.
Name
If your web portal provides tunnel mode access, you need to configure the
Tunnel Mode widget. These settings determine how tunnel mode clients
are assigned IPv4 addresses.
Select so that the VPN carries only the traffic for the networks behind the
FortiGate unit. The users other traffic follows its normal route.
If you enable split tunneling, you are required to set the Routing
Address, which is the address that your corporate network is using. Traffic
intended for the Routing Address will not be split from the tunnel.
Source IP Pools
20
Basic configuration
If your web portal provides tunnel mode access, you need to configure the
Tunnel Mode widget. These settings determine how tunnel mode clients
are assigned IPv6 addresses.
Select so that the VPN carries only the traffic for the networks behind the
FortiGate unit. The users other traffic follows its normal route. This applies
only to IPv6 tunnels.
Save Password - When enabled, if the user selects this option, their password is stored on the users computer and will automatically populate each
time they connect to the VPN.
Client Options
Auto Connect - When enabled, if the user selects this option, when the
FortiClient application is launched, for example after a reboot or system
startup, FortiClient will automatically attempt to connect to the VPN tunnel.
Always Up (Keep Alive) - When enabled, if the user selects this option,
the FortiClient connection will not shut down. When not selected, during
periods of inactivity, FortiClient will attempt to stay connected every three
minutes for a maximum of 10 minutes.
Enable Web Mode
Portal Message
This is a text header that appears on the top of the web portal.
Theme
Page Layout
Select one column or two column layouts for the widgets that appear on the
web portal page.
Select to display the Status Information widget on the portal page. The
Status Information widget displays the login name of the user, the
amount of time the user has been logged in, and the inbound and outbound traffic statistics.
21
Basic configuration
Select to display the Connection Tool widget on the portal page. Use the
Connection Tool widget to connect to a internal network resource without
adding a bookmark to the bookmark list. You select the type of resource
and specify the URL or IP address of the host computer.
Select to include the FortiClient Download option in the web portal. This
is enabled by default.
If a remote user is using a web browser to connects to the SSL VPN in web
mode, they are prompted to download the FortiClient application. The
remote user can accept or reject the notification. If the user accepts, they
are redirected to the FortiClient web site.
You can set the SSL VPN tunnel such that each user can only log into the
tunnel one time concurrently per user per login. That is, once logged into
the portal, they cannot go to another system and log in with the same credentials again. This option is disabled by default.
If your network configuration does not contain a default SSL VPN portal, you might
receive the error message Input value is invalid when you attempt to access VPN >
SSL > Portals.
Adding bookmarks
A web bookmark can include login credentials to automatically log the SSL VPN user into the website. When the
administrator configures bookmarks, the website credentials must be the same as the users SSL VPN
credentials. Users configuring their own bookmarks can specify alternative credentials for the website.
22
Basic configuration
Category
Select a category, or group, to include the bookmark. If this is the first bookmark added, you will be prompted to add a category. Otherwise, select
Create from the drop-down list.
Name
Type
Select the type of link from the drop-down list. Telnet, VNC, and RDP
require a browser plugin. FTP and Samba replace the bookmarks page with
an HTML file-browser.
URL
Description
Single Sign-On
Enable if you wish to use Single Sign-On (SSO) for any links that require
authentication.
When including a link using SSO, be sure to use the entire URL. For
example, http://10.10.1.0/login, rather than just the IP address.
3. Select OK.
For more configuration options, see Configuring SSL VPN web portals on page 18.
Personal bookmarks
The administrator has be ability to view bookmarks the remote client has added to their SSL VPN login in the
bookmarks widget. This enables the administrator to monitor and, if needed, remove unwanted bookmarks that
do not meet with corporate policy.
To view and maintain remote client bookmarks, go to VPN > SSL > Personal Bookmarks.
On mid-range and high-end FortiGate units, this feature is enabled by default. On low-end FortiGate units, it
must be enabled.
23
Basic configuration
Before you begin, copy the default login page text to a separate text file for safe-keeping. Afterward, if needed, you can restore the text to the original version.
Variable
Description
Default
edit <url-path>
No
default.
login-page <content_str>
max-concurrent-user <int>
No
default.
virtual-host <hostname_str>
No
default.
24
Basic configuration
CLISyntax:
config vpn ssl web portal
edit "full-access"
set tunnel-mode enable
set web-mode enable
set mac-addr-check enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set split-tunneling-routing-address "Internal_subnet"
Port forwarding
Port forwarding provides a method of connecting to application servers without configuring a tunnel mode
connection, and requiring the installation of a tunnel mode client. Set up the portal as described at Configuring
SSL VPN web portals on page 18. To configure the application, create a bookmark with the Type field set to Port
Forward.
Ensure that Port Forward is enabled in the Applications list.
Firewall addresses
Before you can create security policies, you need to define the firewall addresses you will use in those policies.
For both web-only and tunnel mode operation, you need to create firewall addresses for all of the destination
networks and servers to which the SSL VPN client will be able to connect.
For tunnel mode, you will already have defined firewall addresses for the IP address ranges that the FortiGate
unit will assign to SSL VPN clients.
The source address for your SSL VPN security policies will be the predefined all address. Both the address and
the netmask are 0.0.0.0. The all address is used because VPN clients will be connecting from various
addresses, not just one or two known networks. For improved security, if clients will be connecting from one or
two known locations you should configure firewall addresses for those locations, instead of using the all
address.
25
Basic configuration
To create a firewall address, in the web-based manager, go to Policy & Objects > Objects > Addresses, and
select Create New.
The SSL VPN user groups that can use the security policy.
The times (schedule) and types of services that users can access.
The UTM features and logging that are applied to the connection.
Do not use ALL as the destination address. If you do, you will see the Destination
address of Split Tunneling policy is invalid error when you enable Split Tunneling.
Source Address
Select all.
Source User(s)
Outgoing Interface
Select the FortiGate network interface that connects to the protected network.
Destination Address
Select the firewall address you created that represents the networks and
servers to which the SSL VPN clients will connect.
If you want to associate multiple firewall addresses or address groups with
the Destination Interface/Zone, from Destination Address, select the
plus symbol. In the dialog box, move the firewall addresses or address
groups from the Available Addresses section to the Members section,
then select OK.
26
Basic configuration
Service
Select services in the left list and use the right arrow button to move them
to the right list. Select the ALL service to allow the user group access to all
services.
Action
Select Accept.
Your identity-based policies are listed in the security policy table. The FortiGate unit searches the table from the
top down to find a policy to match the clients user group. Using the move icon in each row, you can change the
order of the policies in the table to ensure the best policy will be matched first. You can also use the icons to edit
or delete policies. Furthermore, you can drag and drop policies in the policy list to rearrange their order.
Source Address
Select the firewall address you created that represents the IP address
range assigned to SSL VPN clients, such as SSL_VPN_tunnel_users.
Source User(s)
Outgoing Interface
Select the FortiGate network interface that connects to the protected network.
27
Basic configuration
Destination Address
Select the firewall address that represents the networks and servers to
which the SSL VPN clients will connect.
To select multiple firewall addresses or address groups, select the plus sign
next to the drop-down list.
Service
Select services in the left list and use the right arrow button to move them
to the right list. Select the ALL service to allow the user group access to all
services.
Action
Select Accept.
Enable NAT
This policy enables the SSL VPN client to initiate communication with hosts on the protected network. If you want
to enable hosts on the protected network to initiate communication with the SSL VPN client, you should create
another Accept policy like the preceding one but with the source and destination settings reversed.
You must also add a static route for tunnel mode operation.
28
Basic configuration
end
Source Address
Select the firewall address you created that represents the IP address
range assigned to SSL VPN clients.
Outgoing Interface
Destination Address
Select All.
Action
Select Accept.
Enable NAT
Select Enable.
29
Basic configuration
Route-based connection
To configure interconnection with a route-based IPsec VPN - web-based manager:
1. Go to Policy & Objects > Policy > IPv4 and select CreateNew.
2. Enter the following information and select OK.
Incoming Interface
Source Address
Select the firewall address that represents the IP address range assigned
to SSL VPN clients.
Outgoing Interface
Destination Address
Action
Select ACCEPT.
Enable NAT
Enable.
Policy-based connection
To configure interconnection with a policy-based IPsec VPN - web-based manager:
1. Go to Policy & Objects > Policy > IPv4 and select CreateNew.
2. Enter the following information and select OK.
Incoming Interface
Source Address
Select the firewall address that represents the IP address range assigned
to SSL VPN clients.
Outgoing Interface
Destination Address
30
Basic configuration
Variable
Description
low
medium
high
Note that the algorithm <cipher_suite> syntax is only available when the sslvpn-enable attribute is
set to enable.
31
Basic configuration
32
Basic configuration
config global
config system global
set sslvpn-sport 10443
end
SSL offloading
To configure SSL offloading, which allows or denies client renegotiation, you must use the CLI. This helps to
resolve the issues that affect all SSL and TLS servers that support renegotiation, identified by the Common
Vulnerabilities and Exposures system in CVE-2009-3555. The SSL offloading renegotiation feature is considered
a workaround until the IETF permanently resolves the issue.
The CLI command is ssl-client-renegotiation and is found under the config firewall vip
syntax.
Host check
When you enable AV, FW, or AV-FW host checking in the web portal Security Control settings, each client is
checked for security software that is recognized by the Windows Security Center. As an alternative, you can
create a custom host check that looks for security software selected from the Host Check list. For more
information, see Additional configuration options on page 32.
The Host Check list includes default entries for many security software products.
Host integrity checking is only possible with client computers running Microsoft Windows platforms.
To configure the full-access portal to perform a custom host check for FortiClient Host Security AV and firewall
software, you would enter the following:
config vpn ssl web portal
edit full-access
set host-check custom
set host-check-policy FortiClient-AV FortiClient-FW
end
33
Basic configuration
If known, enter the Globally Unique Identifier (GUID) for the host check application. Windows uses GUIDs to
identify applications in the Windows Registry. The GUID can be found in the Windows registry in the HKEY_
CLASSES_ROOT section.
To obtain the exact versioning, in Windows, right-click on the .EXE file of the application and select Properties,
then select the Version tab.
Host Check is applicable for both SSLVPN Web Mode and SSLVPN Tunnel mode.
Windows OS check
The Windows patch check enables you to define the minimum Windows version and patch level allowed when
connecting to the SSL VPN portal. When the user attempts to connect to the web portal, FortiOS performs a
query on the version of Windows the user has installed. If it does not match the minimum requirement, the
connection is denied. The Windows patch check is configured in the CLI.
The following example shows you how to add an OS check to the g1portal web portal. This OS check accepts all
Windows XP users and Windows 2000 users running patch level 3.
To specify the acceptable patch level, you set the latest-patch-level and the tolerance. The lowest
acceptable patch level is latest-patch-level minus tolerance. In this case, latest-patch-level is
3 and tolerance is 1, so 2 is the lowest acceptable patch level.
config vpn ssl web portal
edit g1portal
set os-check enable
config os-check-list windows-2000
set action check-up-to-date
set latest-patch-level 3
set tolerance 1
end
34
Basic configuration
KeyName: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile
ValueName: EnableFirewall
In FortiOS, use the registry-value-check feature to define the Windows Firewall software by entering the following
in the CLI:
config vpn ssl web host-check-software
edit "Microsoft-Windows-Firewall"
config check-item-list
edit 1
set target
"HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\Firew
allPolicy\\StandardProfile:EnableFirewall==1"
set type registry
next
edit 2
set target
"HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\Firew
allPolicy\\PublicProfile:EnableFirewall==1"
set type registry
next
edit 3
set target
"HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\Firew
allPolicy\\DomainProfile:EnableFirewall==1"
set type registry
next
end
set type fw
next
set host-check custom
set host-check-policy Microsoft-Windows-Firewall
The cache cleaner is effective only if the session terminates normally. The cache is not
cleaned if the session ends due to a malfunction, such as a power failure.
35
Basic configuration
Cache cleaning requires a browser plugin. If the user does not have the plugin, it is automatically downloaded to
the client computer.
It should be noted that virtual desktop was only tested on Internet Explorer 8.0 and
may not work on newer browsers. Furthermore, there are currently no plans to update
virtual desktop support for newer browsers.
36
Basic configuration
Allow the client access only if the operating system has been updated to a specified patch (service pack) version.
To configure OS Check:
OS Check is configurable only in the CLI.
config vpn ssl web portal
edit <portal_name>
set os-check enable
config os-check-list {windows-2000|windows-xp |windows-vista|windows-7}
set action {allow | check-up-to-date | deny}
set latest-patch-level {disable | 0 - 255}
set tolerance {tolerance_num}
end
end
37
Basic configuration
38
Basic configuration
Troubleshooting
Here is a list of common SSL VPN problems and the likely solutions:
No response from SSL VPN URL.
The SSL VPN security policy uses the ALL address as its
destination. Specify the address of the protected network
instead.
39
Basic configuration
40
Web mode requires nothing more than a web browser. Microsoft Internet Explorer, Firefox, and Apple Safari
browsers are supported. For detailed information about supported browsers, see Introduction to SSL VPN on page
8.
Tunnel mode establishes a connection to the remote protected network that any application can use. If the client
computer runs Microsoft Windows, they can download the tunnel mode client from the web portal Tunnel Mode
widget. After installing the client, they can start and stop tunnel operation from the Tunnel Mode widget, or open
the tunnel mode client as a standalone application. The tunnel mode client is available on the Start menu at
AllPrograms > FortiClient > FortiClientSSLVPN .
If the client computer runs Linux or Mac OSX, the user needs to download the tunnel mode client application from
the Fortinet Support web site. See the Release Notes for your FortiOS firmware for the specific operating system
versions that are supported. On Linux and Mac OSX platforms, tunnel mode operation cannot be initiated from the
web portal Tunnel Mode widget. The remote user must use the standalone tunnel client application.
The virtual desktop application creates a virtual desktop on a user's PC and monitors the data read/write activity of
the web browser running inside the virtual desktop. When the application starts, it presents a virtual desktop to the
user. The user starts the web browser from within the virtual desktop and connects to the SSL VPN web portal. The
browser file/directory operation is redirected to a new location, and the data is encrypted before it is written to the
local disk. When the virtual desktop application exits normally, all the data written to the disk is removed. If the
session terminates abnormally (power loss, system failure, etc.), the data left behind is encrypted and unusable to
the user. The next time you start the virtual desktop, the encrypted data is removed.
FortiClient
Remote users can use the FortiClient software to initiate an SSL VPN tunnel to connect to the internal network.
FortiClient uses local port TCP 1024 to initiate an SSL encrypted connection to the FortiGate unit, on port TCP
443. When connecting using FortiClient, the FortiGate unit authenticates the FortiClient SSL VPN request based
on the user group options. The FortiGate unit establishes a tunnel with the client and assigns a virtual IP address
to the client PC. Once the tunnel has been established, the user can access the network behind the FortiGate
unit.
FortiClient software is available for download at www.forticlient.com and is available for Windows, Mac OS X,
Apple iOS, and Android.
41
Connection Name
Remote Gateway
Enter the IP address or FQDN of the FortiGate unit that hosts the SSL
VPN.
Username
Client Certificate
Select the required certificate from the drop-down list. The certificate must
be installed in the Internet Explorer certificate store.
42
3. Select Login.
The FortiGate unit will redirect your web browser to the FortiGate SSL VPN web portal home page automatically.
43
Session Information displays the elapsed time since login and the volume of HTTP and HTTPS traffic, both
inbound and outbound.
Tunnel Mode connects and disconnects the tunnel mode SSL connection to the FortiGate unit. While the tunnel is
active, the widget displays the amount of data that is sent and received. For more information, see Web portal
overview on page 43.
Tunnel mode requires a downloadable client application. If your computer is running Microsoft Windows, the
Tunnel Mode widget provides a download link if you need to install the client on your computer. If you are using
Macintosh or Linux, you can obtain and install an appropriate client application from the Fortinet Support site.
Connection Tool enables you to connect to network resources without using or creating a bookmark.
FortiClient Download provides access to the FortiClient tunnel application for various operating systems.
My Bookmarks provides links to network resources. You can use the administrator-defined bookmarks and you
can add your own bookmarks. See Web portal overview on page 43.
Depending on the web portal configuration and user group settings, some widgets might not be present. For
example, the predefined web-access portal contains only the Session Information and Bookmarks widgets.
While using the web portal, you can select the Help button to get information to assist you in using the portal
features. This information displays in a separate browser window.
When you have finished using the web portal, select the Logout button in the top right corner of the portal
window.
After making any changes to the web portal configuration, be sure to select Apply.
44
Portal configuration
The SSL VPN Service portal enables users to access network resources through a secure channel using a web
browser. Fortinet administrators can configure log in privileges for system users and which network resources are
available to the users.
The portal configuration determines what the user sees when they log in to the portal. Both the system
administrator and the user have the ability to customize the SSL VPN portal.
There are three pre-defined default web portal configurations available:
l
full-access: Includes all widgets available to the user - Session Information, Tunnel Mode, Connection Tool,
FortiClient Download, Remote Desktop, and My Bookmarks.
You can also create your own web portal to meet your corporate requirements.
This topic includes the following:
l
Portal settings
Portal widgets
Portal page
Create New
Edit
Select a portal from the list to enable the Edit option, and modify the portal
configuration.
Removes a portal configuration.
Delete
Name
To remove multiple portals from the list, select the check box beside the
portal names, then select Delete.
The name of the web portal.
45
Displays the number of times the object is referenced in other configurations on the FortiGate unit, such as security policies.
To view the location of the referenced object, select the number in Ref.
column.
To view more information about how the object is used, select one of:
Ref.
View the list page for these objects automatically redirects you to the
list page where the object is referenced at.
Edit this object modifies settings within that particular setting that the
object is referenced with.
View the details for this object similar to the log viewer table, contains
information about what settings are configured within that particular setting
that the object is referenced with.
Settings
Provides general, virtual desktop and security control settings for the SSL
VPN Service portal page. This window appears when you select Settings.
This window also appears whenever you select Create New and are automatically redirected to the Portal Settings page. For more information, see
Portal settings on page 47.
Select to edit the settings for the SSL VPN web portal. See Portal configuration on page 45.
Widgets
The widgets that will appear on the SSL VPN Service page. You can add
widgets from the Add Widgets drop-down list. For more information, see
Portal widgets on page 48.
Add Widget
Session Information
Displays basic information of the current session of the logged in user. For
more information, see Session Information on page 49.
Bookmarks
Connection Tool
Tunnel Mode
46
Portal settings
A web portal defines SSL VPN user access to network resources. The portal configuration determines what SSL
VPN users see when they log in to the unit. Both the Fortinet administrator and the SSL VPN user have the ability
to customize the web portal settings. Portal settings are configured in VPN > SSL > Portals.
The Settings Window provides settings for configuring general, virtual desktop and security console options for
your web portal.
The virtual desktop options, available for Windows XP and Windows Vista client PCs, are configured to
completely isolate the SSL VPN session from the client computers desktop environment. All data is encrypted,
including cached user credentials, browser history, cookies, temporary files, and user files created during the
session. When the SSL VPN session ends normally, the files are deleted. If the session ends unexpectedly, any
files that may remain will be encrypted.
Virtual desktop requires the Fortinet host check plugin. If the plugin is not present, it is automatically downloaded
to the client computer.
Security control options provide cache cleaning and host checking to the clients of your web portal. Cache
cleaning clears information from the client browser cache just before the SSL VPN session ends. The cache
cleaner is effective only if the session terminates normally. The cache is not cleaned if the session ends
unexpectedly.
Host checking enforces the clients use of antivirus or firewall software. Each client is checked for security
software that is recognized by the Windows Security Center. As an alternative, you can create a custom host
check that looks for specific security software selected from the Host Check list. For more information, see Basic
configuration on page 14.
Applications
Portal Message
Enter the caption that appears at the top of the web portal home
page when the user logs in.
Theme
Select the color scheme for the web portal home page.
Page Layout
Select the one or two page column format for the web portal home
page.
Redirect URL
Enter the URL that the web portal displays when the web portal
home page is displayed.
47
Allow printing
Select to have the virtual desktop close and log the user out of the
current session whenever the browser is closed.
Interval
Policy
Enter how often to recheck the host for updates and changes in
seconds.
This is available when the Host Check selection is Custom.
Select the specific host check software to look for.
Select Edit to modify the policy settings.
Portal widgets
Portal widgets are widgets hold the content the user logging into the portal will see.
48
Session Information
The Session Information widget displays the login name of the user, the amount of time the user has been
logged in and the inbound and outbound traffic statistics.
Bookmarks
Bookmarks are used as links to specific resources on the network. When a bookmark is selected from a bookmark
list, a pop-up window appears with the requested web page. Telnet, VNC, and RDP all pop up a window that
requires a browser plug-in. FTP and Samba replace the bookmarks page with an HTML file-browser.
A web bookmark can include login credentials to automatically log the SSL VPN user into the web site. When the
administrator configures bookmarks, the web site credentials must be the same as the users SSL VPN
credentials. Users configuring their own bookmarks can specify alternative credentials for the web site.
Connection Tool
Use the Connection Tool widget to connect to a network resource without adding a bookmark to the bookmark
list. You select the type of resource and specify the URL or IP address of the host computer.
Tunnel Mode
If your web portal provides tunnel mode access, you need to configure the Tunnel Mode widget. These settings
determine how tunnel mode clients are assigned IP addresses. You can also enable a split tunneling
configuration so that the VPN carries only the traffic for the networks behind the unit. The users other traffic
follows its normal route.
Ping enables you to test whether a particular server or host is reachable on the network.
Telnet (Teletype Network emulation) enables you to use your computer as a virtual text-only terminal to log in to a
remote host.
SSH (Secure Shell) enables you to exchange data between two computers using a secure channel.
FTP (File Transfer Protocol) enables you to transfer files between your computer and a remote host.
SMB/CIFS implements the Server Message Block (SMB) protocol to support file sharing between your computer
and a remote server host.
VNC (Virtual Network Computing) enables you to remotely control another computer, for example, accessing your
work computer from your home computer.
RDP (Remote Desktop Protocol), similar to VNC, enables you to remotely control a computer running Microsoft
Terminal Services.
Some server applications may prompt you for a user name and password. You must have a user account created
by the server administrator so that you can log in.
49
My Bookmarks widget
The FortiGate unit forwards client requests to servers on the Internet or internal network. To use the web-portal
applications, you add the URL, IP address, or name of the server application to the My Bookmarks list. For more
information, see Adding bookmarks on page 50.
If you want to access a web server or telnet server without first adding a bookmark to
the My Bookmarks list, use the Connection Tool instead. For more information, see
Using the My Bookmarks widget on page 50.
Adding bookmarks
You can add frequently used connections as bookmarks. Afterward, select any hyperlink from the Bookmarks list
to initiate a session.
To add a bookmark
1. In the Bookmarks widget, select Add.
2. Enter the following information:
Name
Type
Location
Description
50
SSO
account number) to a web site that uses an HTML form for authentication.
You provide a list of the form field names and the values to enter into them.
This method does not work for sites that use HTTP authentication, in which
the browser opens a pop-up dialog box requesting credentials.
SSO fields
SSO Credentials
Username
Password
Field Name
Value
Add
51
Except for ping, these services require that you have an account on the server to which you connect.
When you use the Connection Tool, the FortiGate unit may offer you its self-signed
security certificate. Select Yes to proceed. A second message may be displayed to
inform you of a host name mismatch. This message is displayed because the
FortiGate unit is attempting to redirect your web browser connection. Select Yes to
proceed.
52
4. Enter your user name and password and then select Login.
You must have a user account on the remote host to log in.
5. Manipulate the files in any of the following ways:
l
To access a subdirectory (Type is Folder), select the link in the Name column.
To delete a file or subdirectory from the current directory, select its Delete icon.
To upload a file to the current directory from your client computer, select Upload.
When the current directory is a subdirectory, you can select Up to access the parent directory.
To access a subdirectory (Type is Folder), select the file link in the Name column.
To delete a file or subdirectory from the current directory, select its Delete icon.
To upload a file from your client computer to the current directory, select Upload.
When the current directory is a subdirectory, you can select Up to access the parent directory.
6. To end the SMB/CIFS session, select Logout and then close the SMB/CIFS window.
53
RDP options
When you specify the RDP server address, you can also specify other options for your remote desktop session.
Screen resolution
-f
Use this command to make the RDP window full screen or a specific the window
size.
-g <width>x<height>
Make RDPfull-screen
Authentication
Use these options to send your authentication credentials with the connection
request, instead of entering them after
the connection is established.
-u <username>
-p <password>
-d <domain>
54
-m <locale>
The supported values of <locale> are:
Locale/Keyboard
Use this option if the remote computer
might not use the same keyboard layout
as your computer. Select the locale code
that matches your computer.
ar
da
de
de-ch
en-gb
en-uk
en-us
es
fi
fr
fr-be
fr-ca
fr-ch
hr
hu
Arabic
Danish
German
Swiss German
British English
UK English
US English
Spanish
Finnish
French
Belgian French
Canadian French
Swiss French
Croatian
Hungarian
it
ja
lt
lv
mk
no
pl
pt
pt-br
ru
sl
sv
tk
tr
Italian
Japanese
Lithuanian
Latvian
Macedonian
Norwegian
Polish
Portuguese
Brazilian Portuguese
Russian
Slovenian
Sudanese
Turkmen
Turkish
Tunnel-mode features
For Windows users, the web portal Tunnel Mode widget provides controls for your tunnel mode connection and
also provides status and statistics about its operation. You can also control and monitor tunnel mode operation
from the standalone client application.
55
Connect
Initiate a session and establish an SSL VPN tunnel with the FortiGate unit.
Disconnect
End the session and close the tunnel to the FortiGate unit.
Refresh
Link Status
Up an SSL VPN tunnel with the FortiGate unit has been established.
Down a tunnel connection has not been initiated.
Bytes Sent
Bytes Received
The number of bytes of data transmitted from the client to the FortiGate
unit since the tunnel was established.
The number of bytes of data received by the client from the FortiGate unit
since the tunnel was established.
56
When you have finished working with the virtual desktop, right-click the SSL VPN Virtual Desktop icon in the
taskbar and select Exit. Select Yes to confirm. The virtual desktop closes and your regular desktop is restored.
Using FortiClient
Remote users can use FortiClient Endpoint Security to initiate an SSL VPN tunnel to connect to the internal
network. FortiClient uses local port TCP 1024 to initiate an SSL encrypted connection to the FortiGate unit, on
port TCP 10443. When connecting using FortiClient, the FortiGate unit authenticates the FortiClient SSL VPN
request based on the user group options. the FortiGate unit establishes a tunnel with the client and assigns a
virtual IP address to the client PC. Once the tunnel has been established, the user can access the network behind
the FortiGate unit.
For information on configuring the FortiGate unit for SSL VPN connectivity, see Basic configuration on page 14.
For details on configuring FortiClient for SSL VPN connections, see the FortiClient documentation.
57
Setup examples
The examples in this chapter demonstrate the basic configurations needed for common connections to the SSL
VPN tunnel and portals, applying the steps outlined in Basic configuration on page 14.
The following examples are included:
Secure Internet browsing
Split Tunnel
Multiple user groups with different access permissions
U
10 ser
.2 Lo
12 g
.1 in
34
.2
00
VP
L
S
er
s
NU
ote
m
Re
n1
wa .136
120
.
0
.2
Fo
172
ot
.ro wsing
l
s
s ro
b
rt
iG
at
e
U
ni
t
Using SSL VPN and FortiClient SSL VPN software, you create a means to use the corporate FortiGate to browse
the Internet safely.
58
Setup examples
twhite
Password
password
3. Select OK.
4. Go to User & Device > User > User Groups and select Create New to add twhite to a group called SSL
VPN:
Name
SSLVPN
Type
Firewall
10.212.134.0/255.255.255.0
Device
ssl.root
The Destination IP/Mask matches the network address of the remote SSL VPN user.
2. Select OK.
59
Setup examples
wan1
Source Address
all
Outgoing Interface
ssl.root
3. Select Create New to add a security policy that allows remote SSL VPN users to connect to the Internet:
Incoming Interface
ssl.root
Source Address
all
Outgoing Interface
wan1
Destination Address
all
Schedule
always
Service
ALL
Action
ACCEPT
4. Select OK.
Tunnel
Portal
tunnel-access
Results
Using the FortiClient SSLVPN application, access the VPN using the address
https://172.20.120.136:443/ and log in as twhite. Once connected, you can browse the Internet.
From the FortiGate web-based manager, go to VPN > Monitor > SSL-VPN Monitor to view the list of users
connected using SSL VPN. The Subsession entry indicates the split tunnel which redirects to the Internet.
60
Setup examples
Split Tunnel
In this configuration, remote users are able to securely access the head office internal network through the head
office firewall, yet browse the Internet without going through the head office FortiGate. Split tunneling is enabled
by default for SSLVPN on FortiGate units.
The solution below describes how to configure FortiGate SSL VPN split tunneling using the FortiClient SSL VPN
software, available from the Fortinet Support site.
Without split tunneling, all communication from remote SSL VPN users to the head office internal network and to
the Internet uses an SSL VPN tunnel between the users PC and the head office FortiGate unit. Connections to
the Internet are routed back out the head office FortiGate unit to the Internet. Replies come back into the head
office FortiGate unit before being routed back through the SSL VPN tunnel to the remote user.
In short, enabling split tunneling protects the head office from potentially harmful access and external threats that
may occur as a result of the end user's indiscretion while browsing the Internet. By contrast, disabling split
tunneling protects the end user by forcing all their Internet traffic to pass through the FortiGate firewall.
Address
Name
Type
Subnet
Subnet / IP Range
192.168.1.12
Interface
Internal
2. Select OK.
Enable
Enable
Routing Address
Source IP Pools
Internal
SSLVPN_TUNNEL_ADDR1
3. Select OK.
61
Setup examples
twhite
Password
password
2. Select OK.
3. Go to User & Device > User > User Groups and select Create New to add the new user to the SSL VPN user
group:
Name
Tunnel
Type
Firewall
10.212.134.0/255.255.255.0
Device
ssl.root
3. Select OK.
wan1
Source Address
all
Outgoing Interface
internal
Destination Address
62
Setup examples
3. Select OK.
4. Add a security policy that allows remote SSL VPN users to connect to the Internet.
5. Select Create New.
6. Complete the following and select OK:
Incoming Interface
ssl.root
Source Address
all
Outgoing Interface
wan1
Destination Address
all
Schedule
always
Service
ALL
Action
ACCEPT
Tunnel
Portal
tunnel-access
Results
Using the FortiClient SSL VPN application on the remote PC, connect to the VPN using the address
https://172.20.120.136:443/ and log in with the twhite user account. Once connected, you can
connect to the head office server or browse to web sites on the Internet.
From the web-based manager, go to VPN > Monitor > SSL-VPN Monitor to view the list of users connected
using SSL VPN. The Subsession entry indicates the split tunnel which redirects SSL VPN sessions to the
Internet.
63
Setup examples
You could easily add more users to either user group to provide them access to the user groups assigned web
portal.
Two tunnel-mode policies to allow each group of users to reach its permitted destination network.
6. Create the static route to direct packets for the users to the tunnel.
Subnet_1
Type
Subnet
Subnet/IPRange
10.11.101.0/24
Interface
port2
Subnet_2
Type
Subnet
Subnet/IPRange
10.11.201.0/24
Interface
port3
64
Setup examples
Tunnel_group1
Type
IPRange
Subnet/IPRange
10.11.254.[1-50]
Interface
Any
Tunnel_group2
Type
IPRange
Subnet/IPRange
10.11.254.[51-100]
Interface
Any
65
Setup examples
group1
Type
Firewall
3. From the Available list, select User1 and move it to the Members list by selecting the right arrow button.
4. Select OK.
5. Repeat steps 2 through 4 to create Group2, assigned to Portal2, with User2 as its only member.
An SSL VPN policy enables clients to authenticate and permits a web-mode connection to the destination network.
In this example, there are two destination networks, so there will be two SSL VPN policies. The authentication
ensures that only authorized users can access the destination network.
A tunnel-mode policy is a regular ACCEPT security policy that enables traffic to flow between the SSL VPN tunnel
interface and the protected network. Tunnel-mode policies are required if you want to provide tunnel-mode
connections for your clients. In this example, there are two destination networks, so there will be two tunnel-mode
policies.
port1
Source Address
All
Outgoing Interface
port2
Destination Address
Subnet_1
66
Setup examples
3. Select CreateNew.
4. Enter the following information:
Incoming Interface
port1
Source Address
All
Outgoing Interface
port3
Destination Address
Subnet_2
5. Click OK.
Group1
Portal
Portal1
Group2
Portal
Portal2
Source Address
Tunnel_group1
Outgoing Interface
port2
Destination Address
Subnet_1
Action
ACCEPT
Enable NAT
Enable
3. Select CreateNew.
4. Enter the following information, and select OK:
67
Setup examples
Incoming Interface
Source Address
Tunnel_group2
Outgoing Interface
port3
Destination Address
Subnet_2
Action
ACCEPT
Enable NAT
Enable
10.11.254.0/24
This IP address range covers both ranges that you assigned to SSL VPN
tunnel-mode users. See Creating the tunnel client range addresses on
page 65.
Device
In this example, the IPPools field on the VPN > SSL > Settings page is not used
because each web portal specifies its own tunnel IP address range.
68
Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinets General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.