{"id":2633,"date":"2017-08-23T07:01:57","date_gmt":"2017-08-23T07:01:57","guid":{"rendered":"http:\/\/pariswells.com\/blog\/?p=2633"},"modified":"2017-08-23T07:01:57","modified_gmt":"2017-08-23T07:01:57","slug":"how-to-add-a-routable-subnet-to-a-fortigate-vpn-connection","status":"publish","type":"post","link":"https:\/\/pariswells.com\/blog\/research\/how-to-add-a-routable-subnet-to-a-fortigate-vpn-connection","title":{"rendered":"How to add a routable subnet to a Fortigate VPN connection"},"content":{"rendered":"<p>When a user VPN into a Fortigate Router , make sure they can access all Subnet available to the router not just the local one :<\/p><ol><li>Added security policy \u2013 allow from SSL VPN interface to IPsec VPN \u00a0<\/li><\/ol><p style=\"padding-left: 60px;\"><strong>Name :<\/strong>\u00a0SSL VPN to New Subnet<\/p><p style=\"padding-left: 60px;\"><strong>Incoming Interface :<\/strong> SSL-VPN tunnlel Interface ( ssl.root )\u00a0<\/p><p style=\"padding-left: 60px;\"><strong>Outgoing Interface<\/strong> &#8211; %Interface of Site to Site VPN for Remote Site%<\/p><p style=\"padding-left: 60px;\"><strong>Source :<\/strong> SSL VPN Client Range \/ SSLVPN_Users<\/p><p style=\"padding-left: 60px;\">Destination Address : %new subnet%<\/p><p style=\"padding-left: 60px;\">Schedule : Always<\/p><p style=\"padding-left: 60px;\">Service : ALl<\/p><p style=\"padding-left: 60px;\">Action : Accept<\/p><p style=\"padding-left: 60px;\">Nat : Enabled (\u00a0 to traverse IPsec VPN as local address (192.168.0.x) as opposed to SSL VPN client range (192.168.1.x)\u00a0<\/p><p style=\"padding-left: 60px;\">IP Pool Configuration : Use<strong> Dymanic IP Pool<\/strong> and\u00a0<strong>NAT Pool for SSL VPN Clients<\/strong><\/p><p style=\"padding-left: 60px;\">\u00a0<\/p><p id=\"ZaKJYWr\">2. \u00a0Make you have DHCP NAT pool\u00a0Range excluded from your onsite DHCP\u00a0<\/p><p>3.<strong>Added New Subnet to routing address in SSL VPN portal \u2013 tunnel mode<\/strong><\/p><p style=\"padding-left: 30px;\">VPN &#8211; &gt; SSL VPN Portals<\/p><p style=\"padding-left: 30px;\">Tunnel Mode -&gt; Enable Split Tunnelings -&gt; Routing Address\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>When a user VPN into a Fortigate Router , make sure they can access all Subnet available to the router not just the local one :Added security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1527,1],"tags":[2052,2053,2049,1251,1250,2050,2051,1351],"class_list":["post-2633","post","type-post","status-publish","format-standard","hentry","category-networking","category-research","tag-access-second-subnet","tag-access-subnet-via-site-to-site-vpn","tag-dymanic-ip-pool","tag-fortigate","tag-fortinet","tag-nat-pool-for-ssl-vpn-clients","tag-routable","tag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/2633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/comments?post=2633"}],"version-history":[{"count":2,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/2633\/revisions"}],"predecessor-version":[{"id":2706,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/2633\/revisions\/2706"}],"wp:attachment":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/media?parent=2633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/categories?post=2633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/tags?post=2633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}