FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
ekrishnan
Staff
Staff
Article Id 419934
Description This article explains the complete configuration required for SSL VPN split tunneling to work.
Scope FortiGate.
Solution

The setup will involve the following configurations:

  1. Enable SSL VPN.
  2. Security policy (Firewall policy).
  3. SSL Inspection and Authentication policy.

 

Note: Central SNAT policy for the SSL VPN interface, as the incoming interface is not required, as this is a split-tunnel configuration.

 

Step 1:

SSL VPN settings and portal configuration:

 

The example below exhibits the enablement of SSL VPN under VPN -> SSL VPN Settings.

 

TCP port 8443 is the listening port, and Port1 is the internet-facing interface.

 

image.png

 

Split tunnel is enabled to match Policy destinations.

 

image.png

 

Step 2:

  • Creating a security policy.

 

image.png

 

  • Port3 is the internal interface.
  • The Destination 'Split' is nothing but the internal address subnet for which the users will need access.
  • 'test123' is the user account.

 

Note: Ensure to specify the specific subnet and do not specify 'ALL'.

 

Step 3:

SSL Inspection and Authentication policy

 

This step is important because only after this configuration will the Internet-facing interface (port1) allow traffic on the defined SSL VPN port (TCP 8443).


image.png

 

Before configuring this policy, the local in policy will not show the SSL VPN port (in this example: TCP 8443) as an accepted parameter, as per below:

 

image.png

 

After configuring and enabling the SSL Inspection and Authentication policy:

 

image.png

 

Note: Another criteria to take note is that the 'SSL Inspection and Authentication' policy should also be defined with the specific subnet as destination, specifying 'ALL' as the destination will push the default route 0.0.0.0/0 to the user machine via FortiClient after connection and as a result SSL VPN user internet traffic will be sent to the FortiGate and split tunneling will not take effect.

 

  • Finally, configure the FortiClient with the relevant gateway settings to establish the connection.