FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
hbac
Staff
Staff
Article Id 275443
Description

This article describes how to configure split and non-split SSL VPN portals at the same time using realms.

This will allow users to choose to connect to a split or non-split tunnel.

Scope FortiGate.
Solution

In this example, the default realm is used for the split tunnel, and it is necessary to create a new realm named 'non-split' for non-split tunnel.

 

  1. Configure two SSL-VPN portals. One with Split tunneling enabled and one with Split tunneling disabled:

 

                    vpn portal.PNG

 

  1.  Enable ‘SSL-VPN Realms’ on the GUI from System -> Feature Visibility -> SSL VPN Realms.

 

                                          vpn realms.PNG

 

  1. Create a new ‘SSL-VPN Realms’ on the GUI from VPN -> SSL-VPN Realms -> Create New -> URL Path = non-split.

 

                                           realmm.PNG

 

Under VPN -> SSL-VPN Settings -> Authentication/Portal Mapping, map Users/Groups to the corresponding Realms and Portals.

 

Note:

It is not possible to map the same group to different realms. If the same group needs to be used, it is possible to clone that group and give it a different name. In this example, ‘Guest-group’ is used for the split tunnel, and ‘Guest-group-non-split’ is used for non-split. ‘Guest-group-non-split’ was cloned from ‘Guest-group’.

It is also possible to map different groups to different realms and portals.:

 

                                                    mapping.PNG

 

  1. Create a Firewall Policy to allow traffic from the SSLVPN interface (ssl.root) to the internal interface (port2) for ‘Guest-group’ and ‘Guest-group-non-split’ to access the internal network. In this example, port2 is the internal interface.

 

                                              policy2.PNG

 

  1. Create a Firewall Policy to allow traffic from the SSLVPN interface (ssl.root) to the external interface (port1) for ‘Guest-group-non-split’ to access the Internet. In this example, port1 is the Internet-facing interface (WAN).

 

                                            wan1.PNG

 

  1. On the FortiClient, create two VPN connections. One for split and one for non-split. To connect to the non-split realm, it is necessary to add the realm name to the URL. In this example, it is https://192.168.3.1:8443/non-split

 

                   split.PNGclient.PNG

 

After that, users will be able to choose which VPN connection to connect (split or non-split). 

Contributors