FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
cborgato_FTNT
Article Id 195104
Description
This article explains how to create different SSL VPN access portal and filter access by Client public IP and usergroup/user at the same time on 5.2.

On 5.0 it was possible to filter by specific couple of usergroup (or user) and public IP allowing access to a particular SSL VPN web portal only using the identity policy based concept.

All other combination of usergroup and public IP could not access to that specific SSL VPN web portal.

On 5.2 identity policy based is not anymore available and the way to configure the SSLVPN has drastically changed.

Solution
For the following example a configuration template will be explained:
  • User1 of usergroup1 from PC1 with pubIP1 can connect to ssl_vpn_web_portal_1 only.
  • User2 of usergroup2 from PC2 with pubIP2 can connect to ssl_vpn_web_portal_2 only.
  • Standalone sslvpn and FortiClient software are both working.

All the other combination are not allowed:
  • User1 from pubIP2 cannot reach any ssl_vpn_web_portal
  • User2 from pubIP1 cannot reach any ssl_vpn_web_portal

Network Diagram

cborgato_FD38710_tn_FD38710-1.jpg

Configuration Steps

Note that almost all the steps indicated, unless specified, can be done via WebGUI and CLI, but only WebGUI is shown.

Step 1 Users and usergroups configuration

In this example the usergroup is local, but it could have been also LDAP or RADIUS.

-    Go to User & Device > User

-    Configure usergroup ‘ssl-vpnGroup1’ with user ‘user1’

cborgato_FD38710_tn_FD38710-2.jpg

-    Configure usergroup ‘ssl-vpnGroup2’ with user ‘user2’ in similar way

Step 2 Firewall Addresses configuration

NOTE possible to user external interface or any for the following addresses.

-    Go to Policy & Objects > Objects > Address

-    Configure firewall address with public IP ‘Pub_Source_IP_1’ and ‘Pub_Source_IP_2’

cborgato_FD38710_tn_FD38710-3.jpg

-    Configure firewall address range ‘SSLVPN_TUNNEL_ADDR1’ and ‘SSLVPN_TUNNEL_ADDR2’

cborgato_FD38710_tn_FD38710-4.jpg

Step 3 Create Dedicated SSL-VPN Portal

Both portals have Tunnel Mode enabled and Split Tunneling disabled, but it is not mandatory for the purpose of the template.

-   Go to VPN > SSL > Portals

-   Configure portals ‘full-access-1’ and ‘full-access-2’ assigning respectively ‘SSLVPN_TUNNEL_ADDR1’ and ‘SSLVPN_TUNNEL_ADDR2’ as IP Pools for Tunnel Mode

cborgato_FD38710_tn_FD38710-5.jpg

Step 4 Configure SSLVPN Connection Settings

NOTE this is the mainly part on which is possible to assign user/usergroup, addresses, address ranges to specific web SSL-VPN Portals and for the purpose of this article it requires also an CLI ‘only’  configuration

-    Go to VPN > SSL > Settings

-    Select the listen external interface (port1 in this case), listen port (10443)

-   Restrict the access to SSLVPN to the public IP previously defined  (‘Pub_Source_IP_1’ and ‘Pub_Source_IP_2’)

-    Specify the IP Ranges to give to Clients for the TunnelMode (‘SSLVPN_TUNNEL_ADDR1’ and ‘SSLVPN_TUNNEL_ADDR2’)

-    Associate User/Group to SSLVPM Portals

tn_FD38710-6.jpg
NOTE so far the addressgroups have been associated to the portal, but there is not an exclusive restriction yet by the publicIP: user1 can access from both ‘Pub_Source_IP_1’  and ‘Pub_Source_IP_1’ .

Following CLI only config on autherntication-rule under vpn ssl setting provide the behavior request

-    Go to CLI via ssh and specify source-int (port1 only in this case) and source-address per authentication rule

config vpn ssl settings
       config authentication-rule
            edit 1
                set source-interface "port1"
                set source-address "Pub_Source_IP_1"
                set groups "ssl-vpnGroup1"
                set portal "full-access-1"
            next
            edit 2
                set source-interface "port1"
                set source-address "Pub_Source_IP_2"
                set groups "ssl-vpnGroup2"
                set portal "full-access-2"
            next
        end
end

Step 5 Configure Policy to active SSLVPN and allow access to researches

NOTE specific usergroup must be set on both kind of policy.

-    Go to Policy & Objects-> Policy -> IPv4

-    Configure firewall policies from ssl.root interface to the listening one (port1 in this case) to activate the SSLVPN portal for user/usergroup specified in source user list

-    Configure firewall policies from ssl.root interface to the internal network (port2 in this case) to allow access to internal resources (possible to restric access to destinationIP ans services as norma policy)

cborgato_FD38710_tn_FD38710-7.jpg

Test 1 Try to login from PC1 with user1 and user2

cborgato_FD38710_tn_FD38710-8.jpg

cborgato_FD38710_tn_FD38710-9.jpg

Test 2 Try to login from PC2 with user1 and user2

cborgato_FD38710_tn_FD38710-10.jpg

cborgato_FD38710_tn_FD38710-11.jpg

Related Articles

Technical Note: SSL VPN source-interface setting in authentication rule taking precedence

Technical Tip: SSL VPN with multiple links not able to login Error: Permission Denied

Contributors