Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
8. Created Policy for WAN1->SSL.ROOT, Allowed all source addresses, destination addresses are SSLVPN range, action as SSL-VPN, added user group with all services allowedYou need to add the internal network as destination address object too. The destination addresses you enter in the policy with action SSL-VPN are propagated to the routing table of the virtual ssl-vpn adapter of the client. Hope that helps, Oliver
ORIGINAL: oheigl Hello Drkrieger, this step is not complete:Actually, step 9 covers the internal entities. In step 8 though, the destination should not be the SSL VPN IP addresses, rather it should be the destination hosts that you' re trying to reach from the outside. One missing step is the static route back to the SSL VPN interface with a distance lower than that of the default gateway.8. Created Policy for WAN1->SSL.ROOT, Allowed all source addresses, destination addresses are SSLVPN range, action as SSL-VPN, added user group with all services allowedYou need to add the internal network as destination address object too. The destination addresses you enter in the policy with action SSL-VPN are propagated to the routing table of the virtual ssl-vpn adapter of the client. Hope that helps, Oliver
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Actually, step 9 covers the internal entities. In step 8 though, the destination should not be the SSL VPN IP addresses, rather it should be the destination hosts that you' re trying to reach from the outside.So if I change the ' Destination Address' under the Destination Interface/Zone to the address range of my internal network, in theory it should be able to see it? Like this: Also, I' m not sure how to do this:
One missing step is the static route back to the SSL VPN interface with a distance lower than that of the default gateway.I' m guessing that I would add in an item into the Router->Static->Static Route menu, but what exactly would I put in? I' ve already got the IP Range for the SSL VPN users linked to the ssl.root, not sure if that was all that is needed. Edit: I' ll get a Route Print up shortly
ORIGINAL: Drkrieger I' m guessing that I would add in an item into the Router->Static->Static Route menu, but what exactly would I put in? I' ve already got the IP Range for the SSL VPN users linked to the ssl.root, not sure if that was all that is needed.That' s all you should need in the routing area.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1710 | |
1093 | |
752 | |
446 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.