Description |
This article describes a couple of issues related to SSL VPN Full Tunnel configuration that may arise after upgrading the firmware to versions 7.2.5 or 7.4.0. If there are any SSL VPN portals with the option ‘Split tunneling’ enabled, and they are applied to any ‘Authentication/Portal Mapping’ under SSL VPN Settings, an error message will be presented while creating a new SSL VPN firewall policy with destination address set to ‘all’ even though the group applied to this new policy is mapped to an SSL VPN portal with the option ‘Split tunneling’ disabled.
Destination address of split tunneling policy is invalid.
The expected behavior is to be able to configure an SSL VPN firewall policy with destination address ‘all’ when the user group is mapped to an SSL VPN portal in which the ‘Split tunneling’ option is disabled.
Issue 2: Destination address object removed upon reboot.
Upon a firewall reboot, while running FortiOS 7.2.5 or 7.4.0, any existing SSL VPN firewall policy with the destination address set to ‘all’ will have the address object removed, which may cause traffic to fail.
|
Scope | FortiGate v7.2.5 and v7.4.0. |
Solution |
This is a known issue has been addressed in FortiOS versions 7.2.8 and 7.4.2 (IDs 879329 and 930275). Workaround for the issue affecting the creation of firewall policies.
Method 1.
Workaround for the issue affecting firewall policies upon firewall reboot.
Workarounds to avoid running into the reboot issue (Issue 2):
These workarounds can ensure that the issue is not seen again, after a reboot (bug 879329). |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.