FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
ChrisTan
Staff
Staff
Article Id 223709
Description This article describes how to allow SSL VPN access to multiple VDOMs.
Scope FortiGate.
Solution MicrosoftTeams-image (2).png

 

In this example, VDOM-A, VDOM-B and VDOM-C all have the internet connection via vdomlinks through the Root VDOM.

The requirement is to allow specific user groups to access the VDOM internal subnets via SSL VPN separately.

 

To make this work, follow these steps:

 

  1. Setup SSL VPN on each internal VDOM:

 

2022-09-14_10h07_58.png

Set up the Vdomlink interfaces as Listen On Interface and set different ports separately.

For example, VDOM-A on port 6443, VDOM-B on port 5443 and VDOM-C on port 4443.

Create the SSL VPN policy accordingly.


Note:
From 7.4.1 and above, SSL VPN is disabled by default. Refer to FortiGate 7.4.0 new features - FortiGate documentation for more information.

  1. On the Root VDOM, create a VIP for each vdomlink:

 

2022-09-14_10h12_09.png

  1. On the Root VDOM, create a VIP policy for each SSL VPN VDOM:

     

2022-09-14_10h39_26.png

Now, users can access the VDOM via SSL VPN.

2022-09-14_11h01_33.png