This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.
I've successfully configured remote vpn on my fortigate for my forticlient users. Then I get a new requirement, some forticlient users want only Intranet to go through VPN, I think I should configure split tunnel for them. But the others want all communications to go through VPN. I can't find how to configure for this case from fortigate configuration guide. Could anyone help me? Thanks.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
To configure split tunneling you need to indicate what networks are from you intranet. For that, you can create an object like I called ip-intranet.
config vpn ipsec phase1-interface
edit "group1"
set type dynamic
set interface "vpninterface"
set mode aggressive
set peertype one
set mode-cfg enable
set ipv4-dns-server1 x.x.x.x
set ipv4-dns-server2 x.x.x.y
set proposal aes128-sha1 aes128-sha256
set localid "group1"
set localid-type keyid
set dhgrp 5
set wizard-type dialup-forticlient
set xauthtype auto
set authusrgrp "GroupRadius"
set peerid "group1"
set assign-ip-from usrgrp
set ipv4-split-include "ip-intranet"
set domain "internal.domain"
set include-local-lan enable
set save-password enable
set client-keep-alive enable
set psksecret pskpassword
set keepalive 60
next
To configure split tunneling you need to indicate what networks are from you intranet. For that, you can create an object like I called ip-intranet.
config vpn ipsec phase1-interface
edit "group1"
set type dynamic
set interface "vpninterface"
set mode aggressive
set peertype one
set mode-cfg enable
set ipv4-dns-server1 x.x.x.x
set ipv4-dns-server2 x.x.x.y
set proposal aes128-sha1 aes128-sha256
set localid "group1"
set localid-type keyid
set dhgrp 5
set wizard-type dialup-forticlient
set xauthtype auto
set authusrgrp "GroupRadius"
set peerid "group1"
set assign-ip-from usrgrp
set ipv4-split-include "ip-intranet"
set domain "internal.domain"
set include-local-lan enable
set save-password enable
set client-keep-alive enable
set psksecret pskpassword
set keepalive 60
next
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.