Description | This article describes accessing specific Internet destinations when remote FortiClient users connect to dialup IPSec with split tunneling enabled. |
Scope | FortiOS, FortiClient. |
Solution |
Split tunneling allows splitting Internet traffic from local traffic. When enabled remote VPN users can access the Internet using local ISP. When disabled remote VPN users can access the Internet using FortiGate to apply the necessary security settings and for log monitoring.
In some cases, it is required to access specific Internet destinations with split tunneling enabled. To allow such access configure the following:
Example:
Assume the configured dialup vpn tunnel name is 'Test', split-tunneling is enabled, addresses group name Test_split, port1 is the public interface, and port3 is the internal interface. The requirement is to only allow the traffic of the Internet destination www.example.com (DNS resolves to: 93.184.215.14) to go via the Test tunnel. All other Internet destinations should go via the local ISP of the remote FortiClient user.
Relevant CLI:
config vpn ipsec phase1-interface edit "Test" set type dynamic next
config firewall addrgrp edit "Test_split" set member "Example.com_Addr" "Internal_Subnets" next
config firewall address edit "Test_SRC_Addresses" set type iprange next set subnet 93.184.215.14 255.255.255.255 next set subnet 192.168.1.0 255.255.255.0 next
config firewall policy edit 3 set name "Dialup_Internal" next set name "Dialup-Internet" next
Note: FQDNs are not allowed in the Test_split addresses group however they are allowed in the relevant firewall policy. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.