Hi,
I am trying to migrate IKEv1 to IKEv2 Dial-UP VPN tunnels for devices that use Forticlient and that do not use Forticlient(e.g. MacOS).
The configuration includes a split tunnel setup.
When a Forticlient enabled client attempts an IPSec connection the client acquires a split tunnel VPN session.
I can see the following few lines in the debug session that indicate routes will be installed in the routing table of the device.
However, when a MacOS client connects with the Fortigate, using the Native Mac-OS client, the client does not acquire a split tunneling configuration and only receives an default route.
In the following KB there's an explanation how to configure IPSec VPN using IKEv2 using Native MAC-OS client:
However, the "Configuration Attribute Internal IP Subnet" is nowhere to be found.
Is there a possibility to have a functioning IKEv2 setup without running Forticlient? IKEv1 works just fine with split tunneling.
Solved! Go to Solution.
hi,
have a look at ~/Library/Preferences/com.apple.networkextension.plist and the attribute UseConfigurationAttributeInternalIPSubnet
Created on ā12-04-2025 07:22 AM Edited on ā12-04-2025 07:24 AM
well, when you connect to the VPN do the DNS servers configured under Phase-1 on the FGT , can you see them in /etc/resolv.conf installed ?
if they are, make sure that you have a firewall rule that allows DNS service for this traffic, if not then it's another thing to investigate why at connect they dont get pushed to the system.
maybe the you have to follow https://docs.fortinet.com/document/forticlient/7.4.3/macos-release-notes/223986
L.E. i just read more carefully your previous post and saw that they are present so make sure that the firewall rules are in place to be able to access them to resolve DNS queries.
If the firewall rules weren't in place, DNS queries with using @ would not work either.
| User | Count |
|---|---|
| 2878 | |
| 1446 | |
| 843 | |
| 822 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.