This article describes a method that administrators can use to have the FortiGate listen for SSL-VPN connections on two different network ports at the same time. This can be particularly useful when transitioning an SSL-VPN configuration from one network port to a new port (e.g. TCP/UDP/13443 to TCP/UDP/10443), especially if there are deployed FortiClients that are not managed by EMS and also have the configuration with the old listening port.
FortiGates, SSL VPN.
One way to solve this problem is to use Virtual IPs (VIPs). The general premise is to configure a VIP that receives connections on same network interface as the SSL VPN and port-forwards from the new SSL-VPN port to the old one.
In the following example, the SSL VPN is configured to listen on the wan1 interface (IP address: 10.0.0.10). The original SSL-VPN listening port is TCP/13443 and the new listening port will be TCP/10443:
Under Policy & Objects -> Virtual IPs, create a Virtual IP for new port 10443 as shown by the image below:
Note: port-forwarding VIPs can only translate one set of ports/protocols at a time (e.g. translating TCP 13443 to 10443). If DTLS is being used for SSL VPN (e.g. encrypted UDP tunneling), then an additional VIP must be configured to handle the UDP port-forwarding (e.g. translating UDP 13443 to 10443). See here for more information on DTLS with FortiGate SSL VPN: Technical Tip: Using DTLS to improve SSL VPN performance.
Note: If Central SNAT is being utilized, this policy is not required (the VIP will automatically take effect. See Technical Tip: Configure firewall policies for a VIP when Central NAT is enabled).
After completing these steps, users will be able to establish SSL-VPN connections to the original SSL-VPN port (e.g. https://10.0.0.10:13443 ) while also being able to connect to the new SSL-VPN port (https://10.0.0.10:10443).
Related documents:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.