You are not logged in.
Pages: 1
Hi there,
in my company we are using the forticlient vpn with ipsec.
The AUR/community packages for the forticlient are only available with SSL vpn and not with ipsec.
Does anyone know an alternative ipsec vpn? It must provide an option for 2FA.
Thanks!
Last edited by John_H_Smith (2021-12-09 11:24:07)
Offline
I have used Cisco AnyConnect on Windows in a couple of different companies, and both places it has worked quite well.
I noticed there is a package in AUR: https://aur.archlinux.org/packages/cisco-anyconnect/
Also here's some more info:
Cisco product page: https://www.cisco.com/c/en/us/products/ … index.html
Install guide for Ubuntu: https://www.cisco.com/c/en/us/support/d … buntu.html
Offline
I have used Cisco AnyConnect on Windows in a couple of different companies, and both places it has worked quite well.
I noticed there is a package in AUR: https://aur.archlinux.org/packages/cisco-anyconnect/
Also here's some more info:
Cisco product page: https://www.cisco.com/c/en/us/products/ … index.html
Install guide for Ubuntu: https://www.cisco.com/c/en/us/support/d … buntu.html
Thanks for your suggestion.
I checked, there are 2 packages, aur/cisco-anyconnect and aur/cisco-anyconnect-runit. Both of them can not be installed because of invalid URLs in the packages.
Also, you need to have a license for anyconnect to get it installed on ubuntu.
Offline
Any other ideas?
Offline
Openswan or Strongswan ?
Both have pages in our wiki.
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
Openswan or Strongswan ?
Both have pages in our wiki.
Thank you!
I just checked the wikis, seems like would work for me.
Only thing doesn't mentioned is if they support 2FA... Do you know about it?
Offline
I think we may have a miscommunication here.
IPSEC is typically used for network to network tunneling and uses digital certificates to authenticate devices.
Client certificates are unique and generated on the server. The certificate is then installed on the client.
This all happens on network level. 2FA usually refers to user authentication which is something entirely different.
Systems for remote access like citrix do use vpn/ipsec & certifcates to establish secure connections with client devices.
They also add a user login on top of it, that user login could use 2FA .
Is that the kind of setup you're looking for ?
Last edited by Lone_Wolf (2021-12-17 20:27:40)
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
I think we may have a miscommunication here.
IPSEC is typically used for network to network tunneling and uses digital certificates to authenticate devices.
Client certificates are unique and generated on the server. The certificate is then installed on the client.This all happens on network level. 2FA usually refers to user authentication which is something entirely different.
Systems for remote access like citrix do use vpn/ipsec & certifcates to establish secure connections with client devices.
They also add a user login on top of it, that user login could use 2FA .Is that the kind of setup you're looking for ?
Ah, I see!
My goal is to connect to our fortigate for homeoffice.
Windows and Mac Users are using the FortiClient VPN (ipsec), which provides 2FA for the connection.
But as the FortiClient is not working with unix systems, I am searching for an replacement for my arch system.
Offline
Have you tried https://aur.archlinux.org/packages/forticlient-vpn/ ?
According to https://www.fortinet.com/support/product-downloads the file it downloads should support both vpn and ipsec .
Or is the company server not compatible with forticlient 7.x.y ?
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
Have you tried https://aur.archlinux.org/packages/forticlient-vpn/ ?
According to https://www.fortinet.com/support/product-downloads the file it downloads should support both vpn and ipsec .
Or is the company server not compatible with forticlient 7.x.y ?
Yeah, I've tried it. But the aur package only supports the ssl-vpn, not the ipsec.
I already flagged it as out of date. The official download from the fortinet website is working fine on windows.
Offline
I suggest to try the linux client on one of the supported distros to verify if this is a packaging issue or not.
Looks like CentOS 7, RHEL 7 , Fedora 27 , Ubuntu 16.04 , 18.04 and 20.04 are supported for forticlient 6.4 .
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
I suggest to try the linux client on one of the supported distros to verify if this is a packaging issue or not.
Looks like CentOS 7, RHEL 7 , Fedora 27 , Ubuntu 16.04 , 18.04 and 20.04 are supported for forticlient 6.4 .
Yeah, I tested on Ubuntu 20.04, same problem as for the aur package: no ipsec section available
Offline
Then it seems the problem may be with upstream .
Forticlient vpn doesn't appear to come with support, does the company have a license/support contract for forticlient ZTNA or EPP/APT edition ?
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
Then it seems the problem may be with upstream .
Forticlient vpn doesn't appear to come with support, does the company have a license/support contract for forticlient ZTNA or EPP/APT edition ?
Sorry for the late reply, I had holidays and was not in the office.
No, my company has a VPN free license.
Offline
That suggests you have a few choices :
- Convince IT to allow ssl vpn for linux fortinet clients
- Convince the company to switch to systems that do support ipsec on all platforms (like strongswan) and use a 2nd layer for the user login 2FA part
(would improve security by a lot)
- use a device where ipsec fortinet works
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
try NetworkManager-fortisslvpn or one of the more generic ipsec nm plugins
edit: hmm ipsec support never got merged in
Last edited by Mr.Elendig (2022-01-03 13:58:58)
Evil #archlinux@libera.chat channel op and general support dude.
. files on github, Screenshots, Random pics and the rest
Offline
try NetworkManager-fortisslvpn or one of the more generic ipsec nm plugins
edit: hmm ipsec support never got merged in
Yeah, so I should check some of the ipsec nm plugins?
Offline
Pages: 1