Hello,
Is there a way to assign a specific IP to a user rather then taking one from the pool of ips ? So the user can have only a specific IP everytime it connects to the VPS and other users to be able to take IPs from the pool except the dedicated ip assigned for that user.
If additional information is required (like software/hardware version) please let me know.
Welcome to the forums.
Reserve the MAC address in the DHCP scope that gives IPs out to the SSL VPN clients. This way the user will always get the same IP address.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Hi rwpatterson and thank you :)
What if I remotely connect to the VPN from home to the vpn server in the office ? From my basic networking knowledge, the MAC address thing won't help. If it does, excuse my question and I'll try that.
Longstory short, I'm a remote employee which has to connect to a Forti IPSec VPN which is in the office and I need a specific IP each time I login. For example:
The IPs are 89.89.89.201-207. I need to get 89.89.89.201 each time I login and the rest of the employees should get any other IPs 89.89.89.202-207 except 201.
CatalinStefanel wrote:I have my laptop set to have a certain IP address when I log into my Fortigate at home through the SSL VPN. I then have policies that permit my single laptop to get to my servers. At one time, I allowed others to use my SSL VPN to access some other restricted locations, but not my servers. This worked as desired for me.Hi rwpatterson and thank you :)
What if I remotely connect to the VPN from home to the vpn server in the office ? From my basic networking knowledge, the MAC address thing won't help. If it does, excuse my question and I'll try that.
Longstory short, I'm a remote employee which has to connect to a Forti IPSec VPN which is in the office and I need a specific IP each time I login. For example:
The IPs are 89.89.89.201-207. I need to get 89.89.89.201 each time I login and the rest of the employees should get any other IPs 89.89.89.202-207 except 201.
config system dhcp reserved-address edit 1 set ip 192.168.138.20 set mac 21:21:5c:85:ff:d1 next edit 2 set ip 192.168.139.20 set mac 21:21:5c:85:ff:d1 next end
192.168.139.20 is my LAN segment and 192.168.138.20 is my SSL VPN segment. Now you are using IPSec. Your mileage may differ.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
With IPsec VPN, DHCP-over-IPsec is standard. And like with other DHCP scopes you can reserve an IP from the pool for one specific MAC address. I guess the FortiClient will notify the FGT of the client's MAC address in the payload. Haven't tried it myself but surely can do so. Or you could, will take one try to find out...
@Bob: I didn't know that you could combine SSLVPN with DHCP - the wizard will always provide that standard range of addresses from a static pool (which is hidden btw). To get DHCP, do you edit the SSL.root interface then?
The IP pool used in the portal... Pick an IP from there and reserve it.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Keep in mind SSLVPN dhcp and MACOSX is not going to be doable ;)
Setting unique portal with a specific address is a doable and simple to deploy imho.
Ken
PCNSE
NSE
StrongSwan
With certificate you could probably match on the peer-id and CN and assign a address for just that user. This way with CA authentication you can pull up a pool-address for that user & no matter if she/he has multiple devices that they access the vpn from.
Ken
PCNSE
NSE
StrongSwan
hi there,
I suggest you create a new IPSEC policy for your specific IP reservation.
http://cookbook.fortinet.com/ipsec-vpn-forticlient/
At step3, "Routing and policy",specify your own IP. And create 202-207 in another IPSEC later.
User | Count |
---|---|
2570 | |
1362 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.