Created on 02-03-2020 05:51 AM Edited on 05-09-2023 09:43 PM By Anthony_E
Description
This article explains how to access the IPSec remote resources via SSLVPN webportal.
Network topology:
SSLVPN Webmode <-> FotiGate1<- IPSec Tunnel -> FortiGate2<-> Internal LAN.
Solution
Configure IPSec Site-to-Site VPN on FortiGate1.
Configure IPSec Site-to-Site VPN on FortiGate1.
SSLVPN subnet also need to be part of the IPsec phase 2 selector as well as your SSLVPN to IPsec policies.
# Diag debug resetThe source address as 20.20.20.20 which is ipsec vpn interface, if the interface IP address IPSec is not configured it will take the management interface IP address, if that IP range is not added in phase2 quick mode selectors we will get the error message 'No matching IPsec selector, drop'.
# Diag debug disable
# Diag debug flow filter addr 10.40.9.78
#Diag debug flow filter dport 80
# Diag debug flow trace start 400
# Diag debug enable
id=20085 trace_id=897 func=print_pkt_detail line=5430 msg="vd-root:0 received a packet(proto=6, 20.20.20.20:19759->10.40.9.78:80) from local. flag [S], seq 1114552580, ack 0, win 65535"
id=20085 trace_id=897 func=init_ip_session_common line=5595 msg="allocate a new session-000f4075"
id=20085 trace_id=897 func=ipsecdev_hard_start_xmit line=759 msg="enter IPsec interface-ipsec"
id=20085 trace_id=897 func=esp_output4 line=904 msg="IPsec encrypt/auth"
id=20085 trace_id=897 func=ipsec_output_finish line=622 msg="send to 10.5.22.168 via intf-port1"
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.