Description
This article describes how to enable/disable split tunnel for IPsec dial-up VPN.
Scope
FortiGate.
Solution
Enable this feature while configuring the VPN tunnel via wizard as shown below.

Go to VPN -> IPSec Tunnels, edit the respective tunnel under 'Network', select the 'Enable IPv4 Split Tunnel' checkbox and specify the internal subnet under 'Accessible Network'.
- The 'Accessible Networks' Address needs to be of the subnet type - using an IP range is not supported and will ignore the split tunnel enable settings by adding a default route instead of the range. (If only one PC needs to be configured here, use /32 as the network mask.)
IKE debug will contain the following error when using IP ranges:
mode-cfg ignoring range 0:10.0.1.240-10.0.1.254:0, only ip/subnet supported
- If more than one local network needs to be allowed or just specific servers, an address group can be used instead of the address object.
- Make sure the group object set in 'Accessible Networks' includes the specific local network that the VPN client needs to reach instead of 'all'. If 'all' is included in that group, the VPN client will inject the default route 0.0.0.0 to the client machine and pass all traffic through the VPN tunnel.
Accessing FQDN via IPsec Split tunnel:
IPsec Split tunnel does not have a direct option to push FQDN networks to VPN users. It has the option to push network subnets only.
To get access to FQDN via the IPsec Split tunnel, the network IPs of the FQDN need to be manually added to the accessible network of IPsec tunnel configuration.
Note:
Configuring changes in the IPsec VPN while a user/s is connected, will disconnect them and will need to reconnect.
Related articles: