Created on 10-14-2014 07:39 AM Edited on 08-21-2024 12:09 AM By Jean-Philippe_P
Description
This article describes how to configure SSL VPN with overlapping subnets.
There will be connectivity issues when the remote network subnet (192.168.0.0/24) (for example, the home Wifi network) clashes with the local network subnet connected to FortiGate (192.168.0.0/24) which needs to be accessed by an SSL VPN user.
Scope
FortiGate.
Solution
To resolve the subnet overlapping issue, follow the steps below:
Name: SSLVPN_VIP
Interface: ssl.root
Type: Static NAT
External IP Address/Range: 172.16.0.1 - 172.16.0.254
Mapped IP Address/Range: 192.168.0.1 - 192.168.0.254
Name: SSLVPN-to-Internal
Incoming Interface: ssl.root
Outgoing Interface: port3 (internal port)
Source: all
Destination: SSLVPN_VIP
Schedule: always
Service: ALL
Action: ACCEPT
NAT: Disable
Select 'OK' to save and move this policy to the top.
For setup with Central SNAT enabled: Follow step 1 for the VIP setup, but for the firewall policy configuration, configure the following:
Name: SSLVPN-to-Internal
Incoming Interface: ssl.root
Outgoing Interface: port3 (internal port)
Source: all
Destination: Server_Real_Subnet (i.e. 192.168.0.0/24)
Schedule: always
Service: ALL
Action: ACCEPT
NAT: Disable
Follow step 3 for the testing process.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.