FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
dbabic
Staff
Staff
Article Id 192904

Description

 

This article describes how to enable 2 SSL VPN access using a browser through 2 or more WAN Links available on the infrastructure.

Solution

 
Via GUI configure SSL VPN Access:
 
Go to VPN -> SSL-VPN Settings.
On the field 'Listen on Interface(s)', pick two (or more) required interfaces.
 
 
Now, configure Authentication/Portal mapping:
 
 
Configuration like this will be working.
In case it is required to restrict access (Example: Guest-group will have access only when connected to wan1 interface), adjust the configuration in CLI:
 
config vpn ssl settings
    config authentication-rule
        edit 1
            set source-interface "wan1"
            set source-address "all"
            set groups "Guest-group"
            set portal "full-access"
        next
        edit 2
            set groups "SSLVPN"
            set portal "full-access"
        next
    end
end

 
Final configuration will look like this:
 
Fortigate # show vpn ssl setting
    config vpn ssl settings
        set servercert "Fortinet_Factory"
        set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
        set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
        set dns-suffix "global.local"
        set dns-server1 192.168.0.3
        set dns-server2 192.168.0.11
        set port 444
        set source-interface "port1" "wan1"
        set source-address "all"
        set source-address6 "all"
        set default-portal "web-access"
            config authentication-rule
                edit 1
                    set source-interface "wan1"
                    set source-address "all"
                    set groups "Guest-group"
                    set portal "full-access"
                next
                edit 2
                    set groups "SSLVPN"
                    set portal "full-access"
                next
            end
end
 
Note: In order to let both connections work, they need to be both active in the routing table.
A possible solution is to use the static route with the same distance but a higher priority.
 
config router static
    edit 9
        set priority 20
        set gateway 10.100.0.1
        set device "wan1"
    next
    edit 10
        set gateway 10.10.0.1
        set device "port1"
 
Check the routing table to see if both interfaces are active.
 
get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
 
Routing table for VRF=0
S* 0.0.0.0/0  [10/0] via 10.10.0.1, port1
[10/0] via 10.100.0.1, wan1, [20/0]

 

Related Articles:

Technical Tip: SSL VPN Redundancy.

Technical Tip: SSL VPN with multiple links not able to login Error: Permission Denied.