Cybersecurity Forum

This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.

FredQin
New Contributor

How can I set some forticlient users to use split tunnel and the others not to use?

I've successfully configured remote vpn on my fortigate for my forticlient users. Then I get  a new requirement, some forticlient users want only Intranet to go through VPN, I think I should configure split tunnel for them. But the others want all communications to go through VPN. I can't find how to configure for this case from fortigate configuration guide. Could anyone help  me? Thanks.

1 Solution
FernPatz
New Contributor II

To configure split tunneling you need to indicate what networks are from you intranet. For that, you can create an object like I called ip-intranet.

config vpn ipsec phase1-interface
edit "group1"
set type dynamic
set interface "vpninterface"
set mode aggressive
set peertype one
set mode-cfg enable
set ipv4-dns-server1 x.x.x.x
set ipv4-dns-server2 x.x.x.y
set proposal aes128-sha1 aes128-sha256
set localid "group1"
set localid-type keyid
set dhgrp 5
set wizard-type dialup-forticlient
set xauthtype auto
set authusrgrp "GroupRadius"
set peerid "group1"
set assign-ip-from usrgrp
set ipv4-split-include "ip-intranet"
set domain "internal.domain"
set include-local-lan enable
set save-password enable
set client-keep-alive enable
set psksecret pskpassword
set keepalive 60
next

[FirstName]

View solution in original post

[FirstName]
1 REPLY 1
FernPatz
New Contributor II

To configure split tunneling you need to indicate what networks are from you intranet. For that, you can create an object like I called ip-intranet.

config vpn ipsec phase1-interface
edit "group1"
set type dynamic
set interface "vpninterface"
set mode aggressive
set peertype one
set mode-cfg enable
set ipv4-dns-server1 x.x.x.x
set ipv4-dns-server2 x.x.x.y
set proposal aes128-sha1 aes128-sha256
set localid "group1"
set localid-type keyid
set dhgrp 5
set wizard-type dialup-forticlient
set xauthtype auto
set authusrgrp "GroupRadius"
set peerid "group1"
set assign-ip-from usrgrp
set ipv4-split-include "ip-intranet"
set domain "internal.domain"
set include-local-lan enable
set save-password enable
set client-keep-alive enable
set psksecret pskpassword
set keepalive 60
next

[FirstName]
[FirstName]
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.