Created on 06-01-2022 04:56 AM Edited on 08-02-2024 06:30 AM By Anthony_E
Description | This article describes how to configure SSL VPNs with VRFs in order to achieve traffic segmentation. |
Scope | FortiGate v6.4.10, v7.0.6 and v7.2.0. |
Solution |
For the SSL VPN to be fully operational within a VRF-based topology, it is necessary to configure all the interfaces involved to be on the same VRF ID.
In most common topologies there are three interfaces involved:
For example, in the below topology, SSL-VPN is bound to port1 and the egress interface for remote users to reach local resources is port3. The configuration should look like:
config vpn ssl settings set source-interface "port1"
config firewall policy
config system interface set vrf 10 end
Note: It is not possible to create multiple ssl.root interfaces in a single VDOM. An ssl.root interface can only be tied to a single VRF. Hence Multi VRF is not possible in SSL VPN. The best option is to use multivdom setup in case multi-VRF support is required. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.