Fortinet no longer support SSL VPN in FortiOS 7.6. I decided to configure IPSec VPN with IKE2.
IPSec VPN
Match FortiClient to FortiOS.
For new deployments, use IKEv2 for better efficiency.
Use a minimum DH group of 14 for stronger security.
Prefer DH groups 19 or 31 for even better security, provided the peer is compatible.
Use Elliptic Curve Diffie-Hellman (ECDH) groups if both devices support them for better performance and security.
The table only includes the recommended DH groups; it omits DH groups that are not recommended. Any DH groups <15 are not recommended due to low security level. The Brainpool curves (RFC 6954) performs poorly compared to DH group 19, 21, 31, and 32, so they are also omitted. Recommended DH groups are listed for both 128- and 256-bits symmetric key length in prioritized order.
Recommended ECDH groups
Group 19:256-bit elliptic curve, 128 bits of security.
Group 20:384-bit elliptic curve, 192 bits of security.
Group 31:Curve25519, a modern and efficient option.
DH Group
Computation
Asymmetric key length
Symmetric equivalence
Recommended for Phase2 encryption
31
EC
256-bits
128-bits
AES-128-GCM/CBC
19
EC
256-bits
128-bits
AES-128-GCM/CBC
15
MODP
3072-bits
128-bits
AES-128-GCM/CBC
21
EC
521-bits
256-bits
AES-256-GCM/CBC
\(32\)
EC
448-bits
224-bits
AES-256-GCM/CBC
AES256-GCM is a powerful encryption standard that combines the AES-256 cipher with the Galois/Counter Mode (GCM) to provide both data confidentiality and integrity. It uses a 256-bit key and a nonce to encrypt data, and then generates an authentication tag to ensure that the data hasn’t been tampered with during transmission or storage. This makes AES256-GCM a highly secure and efficient algorithm for protecting sensitive information.
Make sure the IPv4 client address range in the VPN Tunnel matches the Source in the Policy