Hello,
I am currently setting up an IPSec VPN tunnel on our FortiGate firewall, authenticated via Entra ID (formerly Azure AD), and I am encountering issues restricting access to specific VLANs based on Entra ID user groups.
We have successfully configured an IPSec VPN tunnel that allows users to connect and access our internal network (192.168.0.0/16) and VLAN 10 (10.10.0.0/16). However, we want to achieve the following:
IPSec Tunnel Configuration:
Address Object Creation:
Firewall Policies Configured:
Rule 1: VPN_to_VLAN20
Rule 2: VLAN20_to_VPN (Return traffic)
Routing Configuration:
Any assistance or guidance would be greatly appreciated.
Thank you in advance for your support.
.
Hello Gaetan,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hello,
We are still looking for someone to help you.
We will come back to you ASAP.
Regards,
hi,
as per my understanding, you would like to separate access for different users/groups to different resources.
you could basically achieve that by create multiple groups on the FortiGate which will match a Entra ID security group where each user would be part of.
FortiGate can optionally map users to specific groups based on the returned SAML user.groups attribute. The example shows group matching based on Entra ID Group ObjectId, using the set group-name command
Then in the firewall rules you just specify which group to have access to which resources and it should work in theory, havent gotten a chance to test it yet.
| User | Count |
|---|---|
| 2686 | |
| 1412 | |
| 810 | |
| 704 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.