SSL VPN multi-realm
This sample shows how to create a multi-realm SSL VPN that provides different portals for different user groups.
Sample topology
Sample configuration
WAN interface is the interface connected to ISP. This example shows static mode. You can also use DHCP or PPPoE mode. The SSL VPN connection is established over the WAN interface.
To configure SSL VPN using the GUI:
- Configure the interface and firewall address. The port1 interface connects to the internal network.
- Go to Network > Interfaces and edit the wan1 interface.
- Set IP/Network Mask to 172.20.120.123/255.255.255.0.
- Edit port1 interface and set IP/Network Mask to 192.168.1.99/255.255.255.0.
- Click OK.
- Go to Firewall & Objects > Address and create an address for internet QA_subnet with subnet 192.168.1.0/24 and HR_subnet with subnet 10.1.100.0/24.
- Configure user and user group.
- Go to User & Device > User Definition to create local users qa-user1 and hr-user1.
- Go to User & Device > User Groups to create separate user groups for web-only and full-access portals:
- QA_group with member qa-user1.
- HR_group with the member hr-user1.
- Configure SSL VPN web portal.
- Go to VPN > SSL-VPN Portals to create portal qa-tunnel.
- Enable Tunnel Mode.
- Create a portal hr-web with Web Mode enabled.
- Configure SSL VPN realms.
- Go to System > Feature Visibility to enable SSL-VPN Realms.
- Go to VPN > SSL-VPN Realms to create realms for qa and hr.
- Configure SSL VPN settings.
- Go to VPN > SSL-VPN Settings.
- For Listen on Interface(s), select wan1.
- Set Listen on Port to 10443.
- Choose a certificate for Server Certificate. The default is Fortinet_Factory.
- In Authentication/Portal Mapping All Other Users/Groups, set the Portal to web-access.
- Create new Authentication/Portal Mapping for group QA_group mapping portal qa-tunnel.
- Specify the realm qa.
- Add another entry for group HR_group mapping portal hr-web.
- Specify the realm hr.
- Configure SSL VPN firewall policy.
- Go to Policy & Objects > IPv4 Policy.
- Create a firewall policy for QA access.
- Fill in the firewall policy name. In this example, QA sslvpn tunnel mode access.
- Incoming interface must be SSL-VPN tunnel interface(ssl.root).
- Choose an Outgoing Interface. In this example, port1.
- Set the Source to all and group to QA_group.
- In this example, the Destination is the internal protected subnet QA_subnet.
- Set Schedule to always, Service to ALL, and Action to Accept.
- Click OK.
- Create a firewall policy for HR access.
- Fill in the firewall policy name. In this example, HR sslvpn web mode access.
- Incoming interface must be SSL-VPN tunnel interface(ssl.root).
- Choose an Outgoing Interface. In this example, port1.
- Set the Source to all and group to HR_group.
- In this example, the Destination is the internal protected subnet HR_subnet.
- Set Schedule to always, Service to ALL, and Action to Accept.
- Click OK.
To configure SSL VPN using the CLI:
- Configure the interface and firewall address.
config system interface edit "wan1" set vdom "root" set ip 172.20.120.123 255.255.255.0 next end
- Configure internal interface and protected subnet, then connect the port1 interface to the internal network.
config system interface edit "port1" set vdom "root" set ip 192.168.1.99 255.255.255.0 next end config firewall address edit "QA_subnet" set subnet 192.168.1.0 255.255.255.0 next edit "HR_subnet" set subnet 10.1.100.0 255.255.255.0 next end
- Configure user and user group.
config user local edit "qa_user1" set type password set passwd your-password next end config user group edit "QA_group" set member "qa_user1" next end config user local edit "hr_user1" set type password set passwd your-password next end config user group edit "HR_group" set member "hr_user1" next end
- Configure SSL VPN web portal.
config vpn ssl web portal edit "qa-tunnel" set tunnel-mode enable set ip-pools "SSLVPN_TUNNEL_ADDR1" set split-tunneling enable set split-tunneling-routing-address "QA_subnet" next end config vpn ssl web portal edit "hr-web" set web-mode enable next end
- Configure SSL VPN realms.
Using the GUI is the easiest way to configure SSL VPN realms.
- Go to System > Feature Visibility to enable SSL-VPN Realms.
- Go to VPN > SSL-VPN Realms to create realms for qa and hr.
- Configure SSL VPN settings.
config vpn ssl settings set servercert "Fortinet_Factory" set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1" set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" set source-interface "wan1" set source-address "all" set source-address6 "all" set default-portal "full-access" config authentication-rule edit 1 set groups "QA_group" set portal "qa-tunnel" set realm qa next edit 2 set groups "HR_group" set portal "hr-web" set realm hr next end
- Configure two SSL VPN firewall policies to allow remote QA user to access internal QA network and HR user to access HR network.
config firewall policy edit 1 set name "QA sslvnpn tunnel access" set srcintf "ssl.root" set dstintf "port1" set srcaddr "all" set dstaddr "QA_subnet" set groups “QA_group” set action accept set schedule "always" set service "ALL" next edit 2 set name "HR sslvpn web access" set srcintf "ssl.root" set dstintf "port1" set srcaddr "all" set dstaddr "HR_subnet" set groups “HR_group” set action accept set schedule "always" set service "ALL" next end
To see the results for QA user:
- Download FortiClient from www.forticlient.com.
- Open the FortiClient Console and go to Remote Access.
- Add a new connection.
- Set VPN Type to SSL VPN.
- Set Remote Gateway to https://172.20.120.123:10443/qa..
- Select Customize Port and set it to 10443.
- Save your settings.
- Use the credentials you've set up to connect to the SSL VPN tunnel.
If the user's computer has antivirus software, a connection is established; otherwise FortiClient shows a compliance warning.
- After connection, traffic to subnet 192.168.1.0 goes through the tunnel.
- In FGT, go to VPN > Monitor > SSL-VPN Monitor to verify the list of SSL users.
- In FGT, go to Log & Report > Traffic Log > Forward Traffic and view the details of the traffic.
To see the results for HR user:
- In a web browser, log into the portal https://172.20.120.123:10443/hr using the credentials you've set up.
- Go to VPN > Monitor > SSL-VPN Monitor to verify the list of SSL users.
- Go to Log & Report > Traffic Log > Forward Traffic and view the details of the traffic.