Created on
02-06-2024
09:09 PM
Edited on
07-22-2025
01:16 AM
By
Jean-Philippe_P
Description |
This article describes the reason why SSL VPN users are matched to the incorrect portal/authentication rule.
In this example, 2 local users (denice and rejean) are members of the 'SSLVPNGROUP' local user group, but there is additional access provided to the user 'denice'. The behavior is user 'denice' matches the web-access portal, but user 'rejean' matches the expected portal 'full-access' despite being a member of the same group.
Under the SSL VPN setting, the 'full-access' portal is mapped to this group. While the default (All Other Users/Groups) is mapped to 'web-access'.
By default, the 'All Other Users/Group' is authentication rule # 0, while the SSLVPNGROUP is authentication rule # 1. This can also be confirmed via the CLI.
Fortigate # show vpn ssl settings
As shown below, user 'denice' is added directly to policy #4 since additional access was allocated, while the user group 'SSLVPNGROUP' is added to policy #3.
When the user initiates a connection to the SSL VPN, the following two lists will be compiled: List 1: All users and groups used in all SSL VPN firewall policies. List 2: All users and groups used in the matching SSL VPN authentication rules. The user will be authenticated based on the intersection of List 1 and List 2.
User 'rejean' tries to authenticate, it matches the 'authentication-rule' # 1 as expected because she is a member of the SSL VPN group.
But when user 'denice' tries to authenticate and connect via SSL VPN, it matches the authentication-rule #0 and gets mapped to the 'web-mode' portal even if being a member of 'SSLVPNGROUP'.
|
Scope | FortiGate. |
Solution |
To override this behavior, it is recommended to have a matching 'users/group' on both 'firewall policies' and 'authentication-rule'.
In this case, it is either possible to create a new authentication-rule for user 'denice' specifically, or create a separate user group for the user and specify it on the new authentication rule.
Fortigate # show vpn ssl settings set banned-cipher SHA1 SHA256 SHA384 edit 1 set groups "SSLVPNGROUP" next edit 2 <----- set users "denice" set portal "full-access" next end end
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.