SSL or Client VPNs are used to grant VPN access to users without an enterprise firewall, such as remote workers or employees at home. This article details an example SSL VPN configuration that will allow a user to access internal network infrastructure while still retaining access to the open internet.
Connect to the FortiGate VM using the Fortinet GUI. To configure the network interfaces:
- Go to Network > Interfaces and edit the wan1 interface.
- Set IP/Network Mask to 172.20.120.123/255.255.255.0.
- Edit port1 interface (or an interface that connects to the internal network) and set IP/Network Mask to 192.168.1.99/255.255.255.0.
- Click OK.
- Go to Policy & Objects > Address and create an address for internal subnet 192.168.1.0
Configure user and user group:
- Go to User & Device > User Definition to create a local user sslvpnuser1.
- Go to User & Device > User Groups to create a group sslvpngroup with the member sslvpnuser1.
Configure SSL VPN web portal (optional):
- Go to VPN > SSL-VPN Portals to create a tunnel mode only portal my-split-tunnel-portal.
- Enable Split Tunneling.
- Select Routing Address to define the destination network that will be routed through the tunnel. Leave undefined to use the destination in the respective firewall policies.
Configure SSL VPN settings:
- Go to VPN > SSL-VPN Settings.
- For Listen on Interface(s), select wan1.
- Set Listen on Port to 10443.
- Optionally, set Restrict Access to Limit access to specific hosts, and specify the addresses of the hosts that are allowed to connect to this VPN.
- Choose a certificate for Server Certificate. The default is Fortinet_Factory.
- In Authentication/Portal Mapping All Other Users/Groups, set the Portal to tunnel-access.
- Create new Authentication/Portal Mapping for group sslvpngroup mapping portal my-split-tunnel-portal.
Configure SSL VPN firewall policy:
- Go to Policy & Objects > IPv4 Policy.
- Fill in the firewall policy name. In this example, sslvpn split tunnel access.
- Incoming interface must be SSL-VPN tunnel interface(ssl.root).
- Choose an Outgoing Interface. In this example, port1.
- Set the Source to SSLVPN_TUNNEL_ADDR1 and group to sslvpngroup. The source address references the tunnel IP addresses that the remote clients are using.
- In this example, the Destination is 192.168.1.0.
- Set Schedule to always, Service to ALL, and Action to Accept.
- Click OK.
Connecting as a User
To connect to the FortiGate SSL VPN as a user, first download the client from https://www.forticlient.com/downloads. Then, set the FortiGate’s external IP as your connection point and enter your user credentials. Note that the above instructions configure the SSL VPN in split-tunnel mode, which will allow the user to browse the internet normally while maintaining VPN access to corporate infrastructure.