101 Remote Access SSL Tunnel VPN
101 Remote Access SSL Tunnel VPN
Go to VPN > SSL-VPN Settings and set Listen on Interface(s) to WAN. To avoid port conflicts, set
Listen on Port to 4433. Set Restrict Access to Allow access from any host. In my case the
Fortinet_Factory certificate is used as the Server Certificate.
Under Authentication/Portal Mapping, add the SSL VPN user group and map it to the Web-
access portal. If necessary, map a portal for All Other Users/Groups.
Security Policy:
Go to Policy & Objects > Firewall Policy. Add a security policy allowing access to the DMZ
network through the VPN tunnel interface. Set Incoming Interface to ssl.VPN tunnel interface
and Outgoing Interface to the DMZ-Zone interface. Select Source and set Address to all and
Source User to the SSL-VPN user group. Set Destination Address to the DMZ address, Service to
ALL, and enable NAT. Configure any remaining firewall and security options as desired.
External Host:
Add new node Windows 10 to the topology and connect to external Internet cloud, set the IP
Address in 172.29.129.0 range while set the default Gateway to 172.29.129.182
Leave the default settings as they are for the Destination Folder and click Next. Click Install.
Open the FortiClient VPN application. You will be prompted to acknowledge that the software
does not come with any product support. Check the box and click I accept.
In this window, you will configure the VPN connection. In the Connection Name field, I chose to
name this connection “SSL-T-VPN”. For the Remote Gateway field, type in 192.168.1.1. tick
Customize port to 4433. You can leave all the other fields as they are. Click Save.
On the FortiGate, go to Log & Report>Events>VPN Events. To Verify the logs related to VPN.