Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
kevin_debacker
New Contributor

SSL VPN issue - SSL connected, but 0 received bytes

We've replaced our Fortigate 80C with a Fortigate 92D.

On the 92D we've installed FortiOS 5.4.

 

I'm having issues with the SSL vpn, as for as i can see i've setup everything fine.

The FortiClient can make a SSL connection, but no traffic is possible to the corporate network.

The received bytes stay at 0.

 

My config:

config firewall address

 edit "SSL-pool"         set uuid 4f4588c4-d3d1-51e5-6016-04f9919dd93a         set type iprange         set start-ip 10.20.30.1         set end-ip 10.20.30.20     next

end

config user group

edit "SSLfullaccess"         set member "domain.local"         config match             edit 1                 set server-name "domain.local"                 set group-name "CN=grpSSLaccess,OU=groepen,DC=DOMAIN,DC=local"             next         end     next end

config vpn ssl web portal     edit "full-access"         set tunnel-mode enable         set ip-pools "SSL-pool"         set split-tunneling disable     next     edit "web-access"         set web-mode enable     next     edit "tunnel-access"         set tunnel-mode enable         set ipv6-tunnel-mode enable         set ip-pools "SSLVPN_TUNNEL_ADDR1"         set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"     next end config vpn ssl settings     set servercert "Fortinet_Factory"     set tunnel-ip-pools "SSL-pool"     set dns-server1 192.168.1.11     set port 443     set source-interface "wan1"     set source-address "all"     set source-address6 "all"     set default-portal "web-access"     config authentication-rule         edit 1             set groups "SSLfullaccess"             set portal "full-access"         next     end end

config firewall policy

    edit 28         set name "SSL-To-Internal"         set uuid d86e3ea0-d4b4-51e5-1d08-509d7574918c         set srcintf "ssl.root"         set dstintf "internal"         set srcaddr "all"         set dstaddr "all"         set action accept         set schedule "always"         set service "ALL"         set groups "SSLfullaccess"     next

end

config router static

    edit 8         set dst 10.20.30.0 255.255.255.0         set device "ssl.root"     next end

 

 

0 REPLIES 0
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors