We have a scenario in which we need an ssl vpn to our local network. The topology consists of two FortiGate FG-100F (HA) connected to two FortiSwitch FS-124F on port X1 and X2 of the Fortigates to SFP ports of the fortiSwitches. The fortiswitches are connected to each other on two MCLAG ports as well. We have a VLAN120 (10.60.100.0/24).
The ports X1 and X2 are under a fortilink interface. All local VLANs have been created under the FortiLink interface. We also setup SSL VPN (IP range 10.60.101.0/24). We have Policy to allow incoming traffic from ssl.root interface to VLAN 120. The users can successfully connect to the SSL VPN using FortiClient, and they receive ip from 10.60.101.0/24 range, however they can not ping a resource under VLAN120. FortiClient also shows zero Receive but it has sent traffic. I can confirm that traffic hit the firewall policy.
diag debug flow filter addr 10.60.101.x (IP addr of the VPN client)
diag debug flow show function-name enable
diag debug flow show iprope enable
diag debug console timestamp enable
diag debug flow trace start 500
diag debug enable
Then share the debug output.
| User | Count |
|---|---|
| 2926 | |
| 1456 | |
| 862 | |
| 826 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.