Hello everyone,
FWF-60C, 5.2.4 (I know, 4 is recommended) 3 networks directly attached:
Internet - WAN1 interface (DHCP)
LAN - internal interface (172.17.31.0/24)
Wifi - Wifi interface (172.17.30.0/24)
My SSL VPN IP range is 172.17.29.0/24. Normal browsing from LAN works, Wifi is currently not used.
I can configure a portal for tunnel mode correctly. The trouble I have is when I try to enable split-tunneling. Whenever I choose the address object for my LAN, the GUI throws a "Entry not found" error.
When I go into the CLI, a ? after "set split-tunneling-routing-address" only shows address objects that are in the same network as my VPN IP range.
I have a Fortigate 800C at work that has a portal configured with my LAN address objects as Routing Addresses and functions correctly.
I tried to replicate the configuration from the 800C as close as I could on the 60C, and have tried everything I could think of.
Is this a limitation of the FWF-60C, or maybe a bug in the firmware? Can somebody help me?
Thanks
Hello again,
From my experimenting, I think it might be a "requirement". I'm not sure though.
I've looked again at my configuration at work, and determined that one of the address objects in the "Routing address" field contains the VPN IP range. So that would explain why it works.
Now, on my FWF-60C, I've added an address object that describes the network 172.17.16.0/20 and used it as "routing address" and now split-tunneling works as it should. I'm not fond of the fact I have to describe a little more addresses than I wanted to make it work, but hey... :)
Now, as long as you have an address object like this in the "routing address" field, all other address objets you add don't have to match with your VPN IP range, only one is needed from what I can observe.
Hope this help somebody.
YanisSauve wrote:Do you have any policies going from SSL.root to destiation "ALL"?I can configure a portal for tunnel mode correctly. The trouble I have is when I try to enable split-tunneling. Whenever I choose the address object for my LAN, the GUI throws a "Entry not found" error.
No I don't. I only have policies to permit traffic from the ssl.root interface to all my inside networks.
YanisSauve wrote:I don't mean the destiation interface, I mean the destination addressNo I don't. I only have policies to permit traffic from the ssl.root interface to all my inside networks.
Sorry, forgot to mention that the outgoing interface is set to any.
What I meant is that the destination address of the policy is an address object describing my internal scopes.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.