Description | This article describes how to allow SSL-VPN accesses to multiple VDOMs. |
Scope | FortiGate. |
Solution |
In this example, VDOM-A,VDOM-B and VDOM-C all have the internet connection via vdomlinks through Root VDOM. The requirement is to allow specific user groups to access the VDOM internal subnets via SSL-VPN separately.
To make this work, follow these steps:
1) Setup SSL-VPN on each internal VDOM:
Setup Vdomlink interfaces as Listen On Interface and set different ports separately. For example, VDOM-A on port 6443, VDOM-B on port 5443 and VDOM-C on port 4443. Create the SSL-VPN policy accordingly.
2) On Root VDOM, create a VIP for each vdomlink:
3) On Root VDOM, create a VIP policy for each VDOM SSL-VPN:
Now, users can access the VDOM via SSL-VPN.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.