Isca Labs Fortinet FortiGate IPSEC Report
Isca Labs Fortinet FortiGate IPSEC Report
Fortinet
FortiGate Consolidated Security Platforms
Table of Contents
IPSEC-FORTINET-2021-0810-01 Page i of i
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
Executive Summary
Introduction
The goal of ICSA Labs certification testing is to significantly increase user and enterprise trust in information
security products and solutions. For 30 years, ICSA Labs, an independent division of Verizon, has been
providing credible, independent, 3rd party security product testing and certification for many of the world’s
top security product developers and service providers. Enterprises worldwide rely on ICSA Labs to set and
apply objective testing and certification criteria for measuring product compliance and performance.
Product Overview
With models ranging from those suited for small businesses to models designed for large enterprises,
service providers and carriers, FortiGate Consolidated Security Platforms combine the FortiOS™ security
operating system with FortiASIC processors and other hardware to provide a comprehensive and high-
performance array of security and networking functions.
FortiGate Consolidated Security Platforms provide cost-effective, comprehensive protection against
network, content, and application-level threats - including complex attacks favored by cybercriminals -
without degrading network availability and uptime. FortiGate platforms incorporate sophisticated networking
features, such as high availability (active/active, active/passive) for maximum network uptime, and virtual
domain capabilities to separate various networks requiring different security policies.
Scope of Assessment
The ICSA Labs IPSEC Product Certification Program has the objective to make available to the end user
community an ever-increasing selection of IPSEC products that are interoperable and that provide the
security services of authentication, data integrity, and confidentiality. The IPSEC Product Certification
Criteria, Version 3.1 is based on the Internet Key Exchange version 2 (IKEv2), and IPSEC protocols. ICSA
Labs tested the product against both its “BASIC” and “ENHANCED” requirements. These sets of
requirements are summarized below.
The following is a summary of the IPSEC 3.1 BASIC requirements against which the product was tested:
The Candidate IPSEC Product must be a generally available product and must be interoperable
(negotiation, establishment, and rekeying of SAs) with other independent implementations.
The Candidate IPSEC Product must be in compliance with a specific subset of requirements
defined in the IETF IPSEC related RFCs.
The Candidate IPSEC Product must be in compliance with a specific subset of requirements
defined in the IETF IKEv2 related RFCs.
The Candidate IPSEC Product must implement cryptographic algorithms without fatal or security-
degrading mistakes.
The Candidate IPSEC Product must not be vulnerable to an evolving set of remotely executable
exploits related to the IKEv2/IPSEC implementation that is known to the Internet community.
The Candidate IPSEC Product must have the ability to log the required data for IKEv2 negotiation
failures and other administrative changes.
The Candidate IPSEC Product must provide cryptographically-protected remote administration.
IPSEC-FORTINET-2021-0810-01 Page 1 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
The following is a summary of the IPSEC 3.1 ENHANCED requirements against which Fortinet additionally
opted to be tested:
The Candidate IPSEC Product must support RSA Signature authentication.
The Candidate IPSEC Product must support a secure mechanism for installation of X.509
certificates.
The Candidate IPSEC Product must properly execute certificate validation and provide for
automatic retrieval of certificate revocation information.
The Candidate IPSEC Product must interoperate with dynamically addressed peers with the use
of digital certificate based authentication.
Summary of Findings
With the successful testing of the FotiGate 101F model, the FortiGate Consolidated Security Plaforms
satisfied all of the mandatory certification testing requirements to retain
ICSA Labs IPSEC Version 3.1 IKEv2 ENHANCED Certification.
Certification Maintenance
The Candidate IPSEC Product will remain certified on this and future released versions of the product for
the length of the testing contract. Future versions continue to be certified since the product is continuously
deployed at ICSA Labs and may be subjected to periodic testing on the most current product version.
Three circumstances will cause the Candidate IPSEC Product to have its certification revoked:
1. The Candidate IPSEC Product vendor withdraws from the ICSA Labs IPSEC Certification Program.
2. The product fails periodic testing and the Candidate IPSEC Product vendor subsequently fails to
provide an adequate fix within a prescribed length of time.
3. The product fails to meet the next full test cycle against the current version of the criteria.
Product Description
The term Candidate IPSEC Product refers to the complete system submitted by the vendor for certification
testing including all documentation, hardware, firmware, software, operating systems, and management
systems. Common network services such as Syslog, DNS, NTP, etc. are provided by ICSA Labs and are
not considered part of the Candidate IPSEC Product, unless otherwise noted.
Hardware
Fortinet Networks provided the following product for testing:
FortiGate 101F
Software
Testing was successfully completed with version 6.4.5 Build 5651 (GA).
IPSEC-FORTINET-2021-0810-01 Page 2 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
The vendor designs and maintains control over the entire set of hardware, firmware, and software
for each member of the product family.
The vendor software, including but not limited to the functional software and the operating system
software, is uniform across the product family.
The management interface(s) for the members of the product family are uniform and completely
consistent.
Each member in the product family has an equivalent set of functionality (in terms of security).
The functional, integration, and regression testing conducted by the vendor is uniform and
consistent across the product family.
The most up-to-date list of IPSEC-certified FortiGate Consolidated Security Platforms are on the ICSA Labs
Website at the URL below:
https://www.icsalabs.com/product/fortigate-multi-threat-security-platforms
Test Configuration
ICSA Labs installed and configured the Candidate IPSEC Product according to the vendor supplied
documentation. Any special configurations or deviations from the vendor supplied documentation that were
necessary to execute a test or meet a requirement are documented in this section.
The following is a list of parameters that were the basis for the initial IKEv2 tests.
IKEv2 SA parameters:
IPSEC-FORTINET-2021-0810-01 Page 3 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
AES-CBC-256 encryption
HMAC-SHA-2 authentication/integrity
DH Group 14 key exchange
Preshared Key authentication
Child SA parameters:
ESP tunnel mode
AES-256 encryption
HMAC-SHA-2 authentication/integrity
Configuration Notes:
ICSA Labs performed the initial IPsec VPN configuration following the steps provided in the
adminstratraion guide found at:
o https://docs.fortinet.com/product/fortigate/6.4
IPSEC-FORTINET-2021-0810-01 Page 4 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
Destination = Subnet (or Named Address if Addresses Object was created with
Show route configuration option enabled), enter Remote subnet
Interface = <IPsec Tunnel created above>
OK
Create New route with Interface = Blackhole and Administrative Distance =
255 (prevents traffic passing through FG when VPN is down)
Detailed Findings
IKEv2/IPSEC Interoperability
The Candidate IPSEC Product was configured to establish IKEv2 and IPSEC Security Associations (SAs)
with the peers in the table below. SAs were maintained following numerous successful rekey operations
with traffic flowing in each direction.
Cryptography
ICSA Labs verified the following algorithms, all of which are supported by the Candidate IPSEC Product:
AES-CBC-256
SHA2-256 authentication/integrity
DH Group 14 key exchange
Administration
ICSA Labs verified that secure remote access was supported. Administration was performed using a web
browser via HTTPS access. ICSA Labs confirmed the use of strong ciphers for remote administrative traffic.
Configuration notes:
To configure management connections to secure TLS versions:
o #config system global
o (global)# set admin-https-ssl-versions tlsv1-2
o (global)# end
Logging
ICSA Labs verified the required log data was captured for logging IKE negotiation failures and
administrative events.
ICSA Labs analysts viewed detailed log entries using the web GUI. The steps used to enable and view
VPN related logs are listed below:
IPSEC-FORTINET-2021-0810-01 Page 5 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
Below is an example of how the tested FortiGate 101F logs an IKE failure due to a proposal mismatch:
Enhanced
In addition to the BASIC requirements that must be met by all ICSA Labs certified IPSEC products, the
FortiGate Consolidated Security Platforms additionally met the ENHANCED requirements as well.
The FortiGate model tested supports RSA Signature IKE authentication.
The FortiGate model tested supports a secure method for installing an X.509 certificate from an
external Certification Authority.
Certificates were installed using a manual enrollment method.
The FortiGate model tested supports methods to retrieve certificate revocation list (CRL)
information. CRL retrieval via HTTPS was verified.
The FortiGate model tested properly validates peer certificates and CRLs. In addition to valid
scenarios, proper behavior in the following cases was verified:
o The peer was configured with an expired certificate
o The peer was configured with a revoked certificate
o The peer sent a certificate with an invalid signature
o The retrieved CRL had expired, i.e. Next Update field was in the past
o The retrieved CRL had an invalid signature
IPSEC-FORTINET-2021-0810-01 Page 6 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
Configuration Notes:
A summary to install certificates and CRL:
Install CA certificate
o Navigate to: System > Certificates
o Select: Import > CA Certificate
o Upload CA certificate
Generate certificate request and install local certificate
o Navigate to: System > Certificates
o Select: + Generate
o Enter values and OK
o Select newly created certificate request and download
o Import > Local Certificate
Configure CRL
o Navigate to: System > Certificates
o Import > CRL
Security Testing
The Candidate IPSEC Product demonstrated resistance to a suite of IKEv2/IPSEC related attacks including
some acquired and others developed by ICSA Labs such as traffic with malformed packets, spoofed and
unprotected IKEv2 messages, and denial of service (DoS) attacks.
No configuration changes or fixes were required to protect the product under test from these security-related
attacks.
IPSEC-FORTINET-2021-0810-01 Page 7 of 8
Copyright © 2021 ICSA Labs. All rights reserved.
Fortinet – FortiGate Consolidated Security Platforms
IPSEC Enhanced Certification Testing Report
Authority
This report is issued by the authority of the General Manager, ICSA Labs. Tests are performed under
normal operating conditions.
www.icsalabs.com fortinet.com
IPSEC-FORTINET-2021-0810-01 Page 8 of 8
Copyright © 2021 ICSA Labs. All rights reserved.