Hello,
I am trying to configure SSL_Portal on dedicated public IP address. Currently wan1 IP is 91.x.x.30/32 and I added vlan interface (vlan id 1) to wan1 physical interface and I configured IP: 91.x.x.25/32. When I change interface in SSL_Portal to 91.x.x.x.25 I can reach vpn web portal from LAN network, but not from public network (internet). Also I added firewall rule in Local-In policy (allow from all source to 91.x.x.x.25) but it does not work. Should I do something else or it is better option to achive this in other way (ssl_vpn on dedicated virtual interface and public IP address)
Best Regards, Mark
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
Try to change the listen port 443 to e.g., 10443. it should work.
Rgds
Rohit
Unfortunetaly it does not help. As I said before I can reach vpn portal from LAN network, so technically it is some problem only from internet.
I guess the first question would be why are you using a VLAN? Does your ISP actually route that IP to you using a tagged VLAN?
Any ideas how to achieve it?
Hello,
I just want to understand your IP addressing. You have assigned some subnet 91.x.x.x/x.
Are you sure that you have public IP 91.x.x.25/32 and 91.x.x.30/32? It seems to me that the subnet is wrong. Or it is some PPPoE or something else?
So you have on your wan interface IP 91.x.x.25 and you created VLAN1 under your wan interface with IP addressing 91.x.x.30?
This is how I understand your topology.
It seems to me that here is some problem with subnets.
Also I would recommend to not use VLAN 1 never ever.
Is the VLAN configured on the BGP router also where your fortigate is connected?
AtiT
I used /32 netmask because while creating vlan on wan1 interface appears invalid subnet. Fortigate is connected to BGP directly (RJ45 without any vlan, BGP reach 91.x.x.x/24 netmask). I am trying to create any type of interface and later choose it in SSL_Portal "Listen on interface". Maybe should I try with loopback interface? So there is no chance and I need set up VIP as follow:
[link]https://forum.fortinet.com/tm.aspx?m=111523[/link]
Summarizing for this moment there is one solution?
ede_pfau wrote:
hi, and welcome to the forums! There is no setting for specifying the IP directly. Instead, you could try to use a VIP with port mapping: Firewall objects > Virtual IP > Create new external IP: one of your WAN IPs external port: say, 20443 mapped to : your primary WAN IP mapped to port: 10443 (default for SSL VPN) Then, create a policy: src IF: WAN src IP: all dst IF: WAN dst IP: your VIP service: custom service for tcp/20443 schedule: ... action: accept NAT: no Give it a try and let us know how it works.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.