Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
nehir
New Contributor

Routing conditionnal Access through Ssl vpn

Hey everyone,

I have an issue that might seem dumb, but I cant Come up with a solution for this.

One of our customers use conditionnal Access on his azure environment, which makes it that if he is outside of his main site MFA will asks reauthent more often than if he access 365 on premise. This part works fine.

What we tried to do After this IS doing the same for vpn ssl remote workers, and this is the issue : i cant route via policy everything that is azure related to make remote workers show on premise IP, and disabling Split tunneling isnt possible here, has anyone encountered this please ?

Thanks everyone,

https://xender.vip/
1 REPLY 1
asengar
Staff
Staff

Hi @nehir 

 

Thanks for your post.

+ As per your update in the forum I can see you wanted to enabled the 2MFA for the azure environment with the users connecting with SSL VPN

+ In order to route the azure related traffic for the SSL VPN users you can use ISDB based policies for traffic coming in via ssl.root

+ You can enable the SPLIT tunnel  and configure policy based on ISDB in the destination

Reference DOC
------------------------

https://docs.fortinet.com/document/fortigate/6.4.5/administration-guide/336471/allow-creation-of-isd...

Regards

@bhishek
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors