Hi Shamil,
For the first question:
> Have you mentioned the Local LAN address on SSLVPN firewall policy as destination address, and also on SSLVPN respective portal, have selected the same network under 'Routing Address"
Kindly provide the below command output from SSLVPN client (at the command prompt) after connecting the SSLVPN
route print
From the FortiGate CLI kindly provide the below command output
get router info routing-table all
get router info routing-table detail
For the second question:
When you reproducing the issue, kindly collect the packets from the below command and then try to access www.fortinet.com from one of the affected LAN user
diag debug reset diag debug enable diagnose debug flow filter addr x.x.x.x diagnose debug flow filter port 80 diag debug flow show console enable diag debug flow show function-name enable diag debug flow trace start 200
(where x.x.x.x is a www.fortinet.com IP address)
After initiating the above commands on the ssh session then try to browse fortinet.com
Regards,
Somu
Dear Somu,
I here attached the log.
But the 2nd one i didnt get that which address to be there in x.x.x.x (is it host IP or fortinet.com IP address);
"diagnose debug flow filter addr x.x.x.x (where x.x.x.x is a www.fortinet.com IP address)"
Please clarify me. Thank you.
Shamil
Dear Somu,
The issue was rectified with the help of fortinet support call. Actually the issue was due to a wrong WLLB rule was mentioned. Now SSLVPN clients able to connect and succesfully can ping, rdp, etc.
But the second issue still remains;
According the Fortinet, WAN-load-balance must got to use for all the outgoing internet communications.
Also fortinet mentioned that;
I got to use policy route for specified source and destination,
Device group cannot be used to do to policy routing, must use different subnet.
Here in my case my client pc's are in local - which ip's are provided by dhcp - all local client's pc in same subnet.
So.. I came in to decision that I split one pppoe link the WLLB in a thought of using that PPPOE link for a DeviceGroup to communicate with internet. And tried to assigned to a policy. Its failed. Please advice.
Thank you.
Shamil
Hi Shamil,
you can write a Policy Route for your DeviceGroup to route their traffic to one of your wan links.
if it didn't work, take a pic from your routes, and your Policies and post here.
Please rate if it help.
FG100D3G14816093 # get router info routing-table details Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default S* 0.0.0.0/0 [1/0] via 172.16.10.1, wan1, [0/255] [1/0] via 172.16.20.1, wan2, [0/254] [1/0] via 10.233.33.32, ppp1, [0/253] C 10.233.33.32/32 is directly connected, ppp1 C 172.16.10.0/24 is directly connected, wan1 C 172.16.20.0/24 is directly connected, wan2 C 175.138.57.43/32 is directly connected, ppp1 C 192.168.1.0/24 is directly connected, mgmt C 192.168.10.0/24 is directly connected, lan is directly connected, lan C 192.168.11.0/24 is directly connected, WiFi-Aps
which network is for your DeviceGroup?
and you said:
"Device group cannot be used to do to policy routing, must use different subnet"
Why? how Fortigate see your DeviceGroup?
also if in DeviceGroup is not too many Device, you can use /32 Subnet to write Policy route for them.
Hi,
All Degicegroups are in same subnet. Fortinet seeing all device groups as windows devices.
Which subnet is for your DeviceGroup?
What's the subnet?
My subnet is 192.168.10.0/24. all of my devices and devicegroups are under same subnet.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1113 | |
759 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.