Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
comas17
New Contributor

[SSL VPN - Split Tunnel] Routing address configuration ?

Hi all I'm trying to configure SSL VPN connection on my new Fortigate 60D (formware 5.2.1) and I want to enable split tunnel SSl VPN is already working (using Forticlient) but users cannot browse internet when connected to the office I select VPN - SSL - Portals - double click on "tunnel-access"; if I check "Enable split tunneling" I need to insert a "routing address" What to I need to insert ? I read some docs (for example : http://docs.fortinet.com/...1/fortigate-sslvpn.pdf but there is no detail about "routing address"...) I have already created the  "static route" with device "ssl.root" and the firewall policy (ssl.root to wan1) but it still does not work so I suppose I need to enable the "split tunneling" Thank you

Corrado

1 Solution
Carl_Wallmark
Valued Contributor

Then you should use "split tunneling".

 

The routed address is the network your corporate is using (or multiple).

 

For example, my work uses 10.46.0.0/20

Then the routed network should be 10.46.0.0/20.

This will tell the SSLVPN client that any traffic to this network should go through the tunnel, all other traffic should go directly and NOT through the tunnel.

FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C

View solution in original post

FCNSA, FCNSP---FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30BFortiAnalyzer 100B, 100CFortiMail 100,100CFortiManager VMFortiAuthenticator VMFortiTokenFortiAP 220B/221B, 11C
4 REPLIES 4
Dipen
New Contributor III

Enable Split Tunnel - When a user connects to VPN the normal Internet traffic is "NOT" routed over VPN Tunnel to corporate Network.

Disable Split Tunnel - When a user connects to VPN the normal Internet traffic "is also" routed over VPN Tunnel to corporate Network.

 

So Dude whats your requirement?

Ahead of the Threat. FCNSA v5 / FCNSP v5

Fortigate 1000C / 1000D / 1500D

 

Ahead of the Threat. FCNSA v5 / FCNSP v5 Fortigate 1000C / 1000D / 1500D
comas17
New Contributor

Hi Dipen

thank you

I want than when a user connects to VPN the normal Internet traffic is "NOT" routed over VPN Tunnel to corporate Network.

When I check "Enable split tunneling" it asks for a "routing address" and I don't know which address is necessary to insert. I did not find any help on this on the documentation. Is it a new feature of firmware 5.2.1 ?

Thank you

Carl_Wallmark
Valued Contributor

Then you should use "split tunneling".

 

The routed address is the network your corporate is using (or multiple).

 

For example, my work uses 10.46.0.0/20

Then the routed network should be 10.46.0.0/20.

This will tell the SSLVPN client that any traffic to this network should go through the tunnel, all other traffic should go directly and NOT through the tunnel.

FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C

FCNSA, FCNSP---FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30BFortiAnalyzer 100B, 100CFortiMail 100,100CFortiManager VMFortiAuthenticator VMFortiTokenFortiAP 220B/221B, 11C
Mahmoud_Reda

it is a very old post but still helpful . Thank you :ThumbsUp:

Labels
Top Kudoed Authors