Description |
This article describes unsupported Address Types for Remote Access VPN Split Tunnel. |
Scope | FortiGate. |
Solution |
Example:
In the example above, additional members with FQDN address object types were added by the user manually after referencing the group split tunnel parameter first. Two FQDN addresses that were added into the group (FQDN02 & IPSEC_FQDN_Test). It is to be expected that the FortiGate will not advertise the unsupported address types to the remote user. Observation from the user machine once the dialup tunnel gets formed:
Active Routes:
Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 10.47.15.254 10.47.3.139 16 10.47.0.0 255.255.240.0 On-link 10.47.3.139 271 10.47.3.139 255.255.255.255 On-link 10.47.3.139 271 10.47.15.255 255.255.255.255 On-link 10.47.3.139 271 10.100.0.10 255.255.255.255 On-link 10.100.0.10 257 10.136.0.0 255.255.240.0 10.100.0.11 10.100.0.10 1 -------------> Only route added for split tunnel via dialup.
FortiGate IKE debug:
The output in the scenario above shows that only the subnet type address from the address group is advertised by the FortiGate to the dial-up user. In this scenario, 10.136.0.0/255.255.240.0 is the subnet configured under the 'LAN' address object who is a member of the 'TestDialup_split' address group, which is the expected behavior. |