Description |
This article describes that sometimes, there are some issues where some SSL VPNs users report slowness issues. In such cases, there is a dynamic tunnel link monitoring option available from 7.2.0 FortiOS. |
Scope | FortiGate, v7.2.x, Link-monitor, Dynamic tunnel. |
Solution |
Example of the SSL VPN connection:
Refer to the below guide for the SSL VPN configuration:- https://docs.fortinet.com/document/fortigate/7.2.5/administration-guide/371626/ssl-vpn
2. Now configure the ssl.root interface for link-monitor:
config system link-monitor edit ssl_vpn set srcintf "ssl.root" set server-type dynamic next end
Note: In this case, server-type is dynamic
For a static server-type link monitor refer to the below link: https://community.fortinet.com/t5/FortiGate/Technical-Tip-Link-monitor/ta-p/197504
3. Connect to the SSL VPN client from the test PC:
Use the below command for the SSL VPN user monitor *
get vpn ssl monitor Note:
It is also possible to see the connected user detail from the dashboard SSL-VPN monitor.
Verify the SSL VPN health status:
diagnose sys link-monitor tunnel al 10.212.134.200 (1): state=alive, peer=10.212.134.200, create_time=2023-07-12 12:01:41, srcintf=ssl.root, latency=2.152, jitter=0.535, pktloss=0.000%
In link-monitor SSL VPN assigned IP address 10.212.134.200 will get monitored. From the above output, it is possible to validate the latency, jitter, and packet loss detail.
Note: SSL VPN link monitor supports ICMP and IPv4 monitoring protocol.
Make sure that on the test PC ping is not blocked by the endpoint firewall.
The below command can be useful while checking SSL VPN users:
diagnose vpn ssl list
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.