FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
slovepreet
Staff
Staff
Article Id 381600
Description This article explains, with scenarios, how to allow traffic from SSL VPN to IPsec when the remote side is only accepting traffic from a specific subnet or IP address. 
Scope All supported versions of FortiOS.
Solution

Allowing SSL VPN users over IPsec is easily achievable by referring to SSL VPN to IPsec VPN - FortiGate administration guide.

 

Sometimes, the Remote side accepts traffic only from certain IP addresses.

 

Consider the following example:

 

192.168.15.2------FGT(local)-----172.16.1.1----===IPsec====-----FGT(remote)---- 192.168.16.2

 

  • In this scenario, the remote FortiGate only accepts the traffic from 172.16.1.1.
  • So when sending the traffic out from the Local FortiGate to the remote FortiGate, traffic should be NATed.

 

There are two methods to achieve this, and both are explained in Technical Tip: Implement Source-NAT for IPsec interface.

 

In this particular scenario, where the SSL VPN subnet needs access to the resource across the other side of the tunnel, the configuration must be set up differently than in the method explained above. 

 

Follow these steps to allow access:

 

  1. First, configure the Remote IPsec subnet. Policy and objects -> Address -> Create new


IPsec remote subnet.png

 

  1. Configure the SSL VPN portal as shown below. In the routing address override section, configure the remote IPsec subnet. In this example, it is 192.168.16.2/24.

Remote IPsec address.png

 

  1. Map the user group to the portal in SSL VPN settings, as shown below.

SSL VPN to ipsec.png

 

  1. Finally, create a firewall policy from SSL VPN to IPsec VPN tunnel interface with NAT enabled and use the IP pool as shown below.

 

Firewall policy.png

 

Note: In this example, there is no need to specify the selector of the SSL VPN under IPsec Phase-2, as that configuration was taken care of by the IP pool. 

 

Related documents: