Fortinet black logo

Cookbook

Configuring a policy to allow users access to allowed network resources

Copy Link
Copy Doc ID 52c06fe2-eb01-11eb-97f7-00505692583a:108485
Download PDF

Configuring a policy to allow users access to allowed network resources

To configure a policy:
  1. Go to Policy & Objects > Firewall Policy and select Create New.
  2. Enter a name for the policy.
  3. In Incoming Interface, select SSL-VPN tunnel interface (ssl.root).
  4. In Outgoing Interface, select a destination interface.
  5. In Source:
    1. Select + to open the Selected Entries window.
    2. In User, search and select the SAML user group created in Creating a SAML group and the SSL VPN pool range object.
    3. Select Close.
  6. In Destination:
    1. Select + to open the Selected Entries window.
    2. In Address, search and select the destination address.
    3. Select Close.
  7. In the Schedule dropdown, select always.
  8. In Service:
    1. Select + to open the Selected Entries window.
    2. Search and select ALL.
    3. Select Close.
  9. Optionally, in the Security Profiles pane, select the required options.
  10. Click OK.

    If more policies are required, modify the above steps as needed.

Configuring a policy to allow users access to allowed network resources

To configure a policy:
  1. Go to Policy & Objects > Firewall Policy and select Create New.
  2. Enter a name for the policy.
  3. In Incoming Interface, select SSL-VPN tunnel interface (ssl.root).
  4. In Outgoing Interface, select a destination interface.
  5. In Source:
    1. Select + to open the Selected Entries window.
    2. In User, search and select the SAML user group created in Creating a SAML group and the SSL VPN pool range object.
    3. Select Close.
  6. In Destination:
    1. Select + to open the Selected Entries window.
    2. In Address, search and select the destination address.
    3. Select Close.
  7. In the Schedule dropdown, select always.
  8. In Service:
    1. Select + to open the Selected Entries window.
    2. Search and select ALL.
    3. Select Close.
  9. Optionally, in the Security Profiles pane, select the required options.
  10. Click OK.

    If more policies are required, modify the above steps as needed.