We use FortiGate 100E as the company FW & VPN Gateway for remote workers. Within the office we access AWS services with IP based restrictions (office IP is granted access to AWS services).
Now I need to give AWS Services access to remote users will be connected to office VPN on Fortigate 100E.
I do not want to inject default route to VPN users but selectively inject routes which are needed AWS services. Here I have a list of 1800+ different subnets which I obtained from Amazon.
It is not possible to insert them one by one manually over FortiGate web interface.
I think I am not the only person who needed to give access to AWS services over VPN gateway. Does anyone has a better solution proposal (other than injecting default route)?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi tozden,
if possibile i would disable split-tunneling to force routing of all vpn traffic to the office, so it could be forwarded correctly to AWS services without the need to reconfigure all vpn routes client-side
agree with Cudin.
Or, If you need access to Webservices only, you could make use of a Web proxy with a smart proxy.pac script that the VPN clients should use. The script could manage the access a smart way: AWS access through the Web proxy using the IP address of branch office and the rest on the direct way.
BR
Hermann M.
Hello Hermann,
very interesting solution, could you please detail further how to create the web proxy script in that way?
When I need to add a bunch of "the same" stuff to a FGT I will usually
- get a backup configuration
- copy the respective section out of it
- use some advanced search and replace editor, "Notepad++" or "sublime" do it well as example
- get my to be inserted data set into some format that can then be used to search and replace the unneeded content with the
edit 0
set ....
next
edit 0
set ...
next
and so on.
Search your list of IPs for the pattern as text before and after the IP, make it replaceable with some FGT syntax.
Best regards,
Markus
It is easy to use script and fortigate api to create huge address.
if you cannot code, you can try nimble, (https://nimbletext.com/live), you can use list and template to create huge amount address, policy,etc. apply it via firewall script, it is also efficient.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1531 | |
1028 | |
749 | |
443 | |
209 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.