Hey everyone,
I have an issue that might seem dumb, but I cant Come up with a solution for this.
One of our customers use conditionnal Access on his azure environment, which makes it that if he is outside of his main site MFA will asks reauthent more often than if he access 365 on premise. This part works fine.
What we tried to do After this IS doing the same for vpn ssl remote workers, and this is the issue : i cant route via policy everything that is azure related to make remote workers show on premise IP, and disabling Split tunneling isnt possible here, has anyone encountered this please ?
Thanks everyone,
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @nehir
Thanks for your post.
+ As per your update in the forum I can see you wanted to enabled the 2MFA for the azure environment with the users connecting with SSL VPN
+ In order to route the azure related traffic for the SSL VPN users you can use ISDB based policies for traffic coming in via ssl.root
+ You can enable the SPLIT tunnel and configure policy based on ISDB in the destination
Reference DOC
------------------------
Regards
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1527 | |
1020 | |
749 | |
443 | |
209 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.