I have a lot of IPSEC VPN tunnels that are sourcenatting (hiding) our network from the remote sites. This is working fine with no issues. But now I would like to add SSL VPN funtionality so that we can connect to our firewall and have access to both internal networks as well as IPSEC sites. Internal networks are working fine but I' m unable to create a VPN policy that allows traffic from SSL VPN Users group to IPSEC site while still sourcenatting (hiding) our subnet. EG. In this case hiding the SSL VPN Address pool from the remote IPSEC sites. When I create the policy and chose VPN no sourcenatting options are available. My number one wish was to use one single tunnel interface for the IPSEC tunnels so that I didn' t have to add seperate policies to internal and ssl vpn users. Can someone shed some light on this problem. Here' s the link to a thread with a drawing of my network before I started implemting SSL VPN: https://forum.fortinet.com/FindPost/104484 Any help is appreciated. Thanks in advance. /Martin
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
ORIGINAL: Atomizer They are route based IPSEC VPN' s and have each their own tunnel interface as I haven' t yet found a way to create one tunnel interface and attaching multiple IPSEC VPNs to this one tunnel interface.Since the IPSec tunnels are interfaces, put them into a zone.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
So are you allowing all traffic into the SSLVPN tunnel-mode clients? When you do a traceroute from the client or look at the route table do you see the destinations of the remote-ipsec tunnel networks?No, I' m using splittunnel only traffic for the private networks is going through the SSLVPN tunnel. The rest is going directly to the ISP router. All remote IPSEC networks are tunneled through the SSL-VPN.
Also, just reading out loud, you will probably need to SNAT the SSLVPN pool into your policies for the IPSEC destinations.I agree but the problem is that it' s not possible to craft the policies to allow this. Or at least I' m too stupid to figure it out. :)
So I would start with the traceroute 1st, look at the policies allowing the SSLVPN clients and then if you think that' s good, diag debug flow is you friend.Before this, I will need to create the nessesary policies.
FWIW: SNAT might be a good option, since the remote devices don' t have to have routes to your SSLVPN ip-pool-addresses imhoI' m already doing this and that is what is preventing me from creating the right policy. I' m SNAT' ing all traffic that goes into the IPSEC tunnels with a unused Public from our public address scope. This works fine for clients on the internal network. But my problem is that when I create the policy to allow SSL VPN users to a network behind a IPSEC tunnel this type of policy (Policy-Type SSL-VPN) cannot do SNAT and so will not hide the VPN pool we use for the SSL VPN users.
Since the IPSec tunnels are interfaces, put them into a zone.But how? I haven' t found anywhere in the firewall where I can create zones myself. The firewall is a 60D.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1110 | |
759 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.