Hello,
some of our MacOS users are experiencing issues accessing servers within the office network when connecting via VPN. The problem is that the network range in the office is the same as their home network, like 10.0.0.0/24.
To ensure access to office servers on these users' MacOS devices, routing must be configured correctly, but the address assigned to the VPN client by FGT is dynamic from the specified range.
Another issue is that users are authorized in FGT through their Entra ID accounts (SAML authentication with Entra ID is configured in FGT). It seems this article (https://community.fortinet.com/t5/FortiGate/Technical-Tip-Reserve-SSL-VPN-client-IP-addresses-withou...) is not applicable in this case, since the VPN portal only allows you to specify a local FGT user, either RADIUS or LDAP, but not a user authorized via SAML from the external cloud identity.
Unfortunately, we are currently unable to change the address range of the office network or connect a third-party DHCP server.
Is there another way to assign specific IP addresses to VPN users logging in via SAML?
In FortView they are displayed as VPN users with the correct UPN (like mailbox address or Entra ID login).
Users use FortiClient VPN apps.
hi,
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Assigning-Static-IP-for-SSL-VPN-users/ta-p... . another option would be to also configure realms but this will require multiple applications configured in Entra for each realm/auth portal.
@funkylicious Thank you for your reply.
The problem is that in the SSL VPN settings -> Authentication/Portal Mapping there is no option to select Entra users, only FGT local, LDAP and RADIUS.
At least not through the web interface.
Although inside the FGT it clearly operates with the UPN (or user email addresses), since it indicates them in the logs and FortiView
Created on ‎12-05-2025 06:50 AM Edited on ‎12-05-2025 06:51 AM
you dont select Entra users.
you create User groups that refer to the Entra id groups where specific users are part of , like described here which you use in the mapping
You can try CGNAT range 100.64.0.0/10 for client IPs, which would never conflict those users LAN or the office network.
Toshi
| User | Count |
|---|---|
| 2822 | |
| 1431 | |
| 812 | |
| 785 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.