FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
jiahoong112
Staff
Staff
Article Id 399449

 

Description

This article describes how to configure split-dns for a split-tunnel IPsec dialup vpn with FortiClient on FortiGate to resolve an internal domain.

Scope FortiGate v7.2, v7.4, v7.6.
Solution

Topology:

client –internet-- FGT-kenobi –ipsec-- FGT-A -> server (Internal Domain, win.server.fgt resolves to 10.191.1.231)

 

  • In this topology, there are 2 sets of interfaces that is taken into consideration, the dialup IPsec tunnel and the site-to-site IPsec tunnel that connects FGT-kenobi to FGT-A.

This dialup IPsec configuration is an ikev2 split-tunnel:

 

Sleekshot 2025-07-03 12-29-29.png

 

  • Ensure ipv4-split-include, ipv4-dns-server1 and internal-domain-list are configured.
  • Ipv4-split-include is the split-tunnel destination address. Ensure these destination addresses can be reached by the FortiGate. Check the routing.
  • Ipv4-dns-server1 is the internal DNS server. Ensure this server can be reached by the FortiGate.
  • Internal-domain-list is the name of the domains that are to be resolvable by the FortiClient users that connect to the VPN.

 

  1. Ensure the DNS Database feature is enabled. On the GUI, go to System -> Feature Visibility and Enable DNS Database under Additional Features.
  1. In this configuration, the IP of the site-to-site IPsec tunnel interface is used as the internal DNS server IP because it connects to FGT-A, which then gives us access to our server. Our server’s domain name is win.server.fgt.

 

sleekshot.png

 

  1. The domain wins.server.fgt, which resolves to 10.191.1.231. In Network -> DNS Servers, DNS Database, configure the DNS entry for the internal domain.

 

sleekshot.png

 

  1. Enable DNS Service on both the dialup VPN’s interface and on the site-to-site IPsec’s interface. Even if the site-to-site IPsec is just a regular interface, DNS Service must be configured on it as well as the following – if either of these interfaces is not configured with the DNS Service, ra esolution to the internal domain will not work:

 

sleekshot.png

 

  1. Ensure firewall policies are configured with the Destination address having both resolved IP and DNS IP:

     sleekshot.png

     
  2. The Address Group used for the split-tunnel should look like this: 

 

sleekshot.png

 

Note:

FQDNs are not supported in split-tunnel destinations. If FQDNs have been configured in the split-tunnel address group, it cannot be applied in the (set ipv4-split-include) config of the dialup IPsec.

 

After these steps, FortiGate and the VPN client should be able to ping the internal domain:

 

sleekshot.png

 

sleekshot.png