Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. HOWTOs
  3. FortiGate SSL VPN Setup: Secure Remote Access Configuration
FortiGate SSL VPN Setup: Secure Remote Access Configuration
HOWTOIntermediate

FortiGate SSL VPN Setup: Secure Remote Access Configuration

Configure FortiGate SSL VPN for secure remote user access. Covers portal setup, user authentication, firewall policies, and FortiClient configuration.

Security Team

Security Engineering

February 3, 2026
7 min read

Prerequisites

  • FortiGate firewall with SSL VPN license
  • Public IP or DDNS hostname
  • Administrator access to FortiGate

Overview

SSL VPN provides secure encrypted connectivity for remote users to access corporate resources over the internet using standard HTTPS. Unlike IPsec site-to-site VPNs, SSL VPN is designed for individual user connections supporting both full tunnel and split tunnel configurations.

Who Should Use This Guide:

  • Network administrators enabling remote workforce access
  • Security engineers implementing secure connectivity
  • IT teams replacing legacy VPN solutions
  • Organizations supporting work-from-home users

SSL VPN vs IPsec VPN:

FeatureSSL VPNIPsec VPN
Use CaseRemote user accessSite-to-site connectivity
ProtocolHTTPS (TCP/443)ESP/AH (IP Protocol 50/51)
ClientFortiClient softwareFortiGate or third-party
NAT TraversalNative (HTTPS)Requires NAT-T
Firewall FriendlyYes (standard HTTPS)May require special rules

Requirements

System Requirements:

ComponentRequirement
FortiGateFortiOS 6.4 or later
LicenseSSL VPN license (included in most bundles)
Public IPStatic IP or DDNS hostname
CertificateValid SSL certificate (recommended)

Network Planning:

ItemExample Value
VPN Portal URLhttps://vpn.example.com
VPN Client IP Pool10.99.0.0/24
Internal Subnets10.0.0.0/8 (for split tunnel)
DNS ServersInternal DNS server IPs

Architecture

                Internet
                    │
                    ▼
         ┌──────────────────┐
         │    FortiGate     │
         │   SSL VPN Portal │
         │   (TCP/443)      │
         └────────┬─────────┘
                  │
         ┌────────┴────────┐
         │                 │
         ▼                 ▼
    ┌─────────┐      ┌─────────┐
    │ Remote  │      │Corporate│
    │ Users   │      │ Network │
    │(FortiClient)   │10.0.0.0/8│
    └─────────┘      └─────────┘

Process

Step 1: Configure SSL Certificate

Upload or generate an SSL certificate for the VPN portal.

Upload Commercial Certificate (Recommended):

  1. Navigate to System → Certificates
  2. Click Import → Certificate
  3. Select Local Certificate
  4. Upload certificate and key files
  5. Click OK

CLI Method:

# Import certificate via CLI
config vpn certificate local
    edit "vpn-cert"
        set certificate "-----BEGIN CERTIFICATE-----..."
        set private-key "-----BEGIN PRIVATE KEY-----..."
    next
end

Verification: Certificate appears in System → Certificates with valid dates.


Step 2: Create User Accounts

Set up user authentication for VPN access.

Create Local Users:

  1. Navigate to User & Authentication → User Definition
  2. Click Create New → Local User
  3. Configure:
    • User Name: <username>
    • Password: Strong password
    • Two-Factor Authentication: Enable if required
  4. Click OK

Create User Group:

  1. Navigate to User & Authentication → User Groups
  2. Click Create New
  3. Configure:
    • Name: SSL-VPN-Users
    • Type: Firewall
    • Members: Select created users
  4. Click OK

CLI Method:

# Create local user
config user local
    edit "<username>"
        set type password
        set passwd "<strong-password>"
    next
end
 
# Create user group
config user group
    edit "SSL-VPN-Users"
        set member "<username>"
    next
end

Step 3: Configure IP Address Pool

Define the IP range assigned to VPN clients.

Create Address Object:

  1. Navigate to Policy & Objects → Addresses
  2. Click Create New → Address
  3. Configure:
    • Name: SSL-VPN-IP-Pool
    • Type: IP Range
    • Start IP: 10.99.0.10
    • End IP: 10.99.0.250
  4. Click OK

CLI Method:

config firewall address
    edit "SSL-VPN-IP-Pool"
        set type iprange
        set start-ip 10.99.0.10
        set end-ip 10.99.0.250
    next
end

Step 4: Configure SSL VPN Settings

Set up the SSL VPN portal and tunnel settings.

Navigate to: VPN → SSL-VPN Settings

Portal Configuration:

SettingValue
Listen on InterfaceWAN interface (e.g., port1)
Listen on Port443
Server CertificateSelect uploaded certificate
Tunnel Mode Client Address RangeSSL-VPN-IP-Pool
DNS Server 1Internal DNS IP
DNS Server 28.8.8.8 (fallback)

Split Tunnel Configuration:

SettingDescription
Enable Split TunnelingON (recommended for performance)
Routing AddressInternal subnets only through VPN

CLI Method:

config vpn ssl settings
    set servercert "<certificate-name>"
    set tunnel-ip-pools "SSL-VPN-IP-Pool"
    set source-interface "port1"
    set source-address "all"
    set default-portal "full-access"
    set dns-server1 10.0.0.10
    set dns-server2 8.8.8.8
    set split-tunneling enable
    set split-tunneling-routing-address "Internal-Networks"
    set idle-timeout 600
    set dtls-tunnel enable
end

Step 5: Create Firewall Policy

Allow SSL VPN traffic to access internal resources.

Create Policy:

  1. Navigate to Policy & Objects → Firewall Policy
  2. Click Create New
  3. Configure:
    • Name: SSL-VPN-to-Internal
    • Incoming Interface: ssl.root
    • Outgoing Interface: LAN interface
    • Source: All or specific addresses
    • Destination: Internal networks
    • Service: ALL (or restrict as needed)
    • Action: ACCEPT
    • NAT: Disable
    • User Groups: SSL-VPN-Users
  4. Click OK

CLI Method:

config firewall policy
    edit 0
        set name "SSL-VPN-to-Internal"
        set srcintf "ssl.root"
        set dstintf "port2"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set service "ALL"
        set schedule "always"
        set groups "SSL-VPN-Users"
        set logtraffic all
    next
end

Step 6: Configure FortiClient VPN

Set up the VPN client for remote users.

Download FortiClient:

  • Official download: https://www.fortinet.com/support/product-downloads
  • Select "FortiClient VPN" (free) or full FortiClient

Configure VPN Connection:

  1. Open FortiClient → Remote Access
  2. Click Configure VPN
  3. Add new connection:
    • Connection Name: Company VPN
    • Remote Gateway: vpn.example.com
    • Port: 443
    • Client Certificate: (if using certificate auth)
  4. Save configuration

Connect to VPN:

  1. Select VPN connection
  2. Enter username and password
  3. Click Connect
  4. Verify connection status shows "Connected"

Step 7: Test and Verify

Confirm VPN connectivity and access.

From Connected Client:

# Check VPN IP assignment
ipconfig /all
# Look for FortiClient SSL VPN adapter
 
# Test internal connectivity
ping <internal-server-ip>
 
# Test DNS resolution
nslookup <internal-hostname>

On FortiGate - Monitor Sessions:

# List active SSL VPN sessions
diagnose vpn ssl list
 
# View session details
diagnose vpn ssl statistics

GUI Monitoring:

Navigate to Monitor → SSL-VPN Monitor to view:

  • Connected users
  • Assigned IP addresses
  • Login time
  • Data transferred


Troubleshooting

Common Issues:

SymptomPossible CauseSolution
Connection failedDNS not resolvingVerify DNS A record points to FortiGate WAN IP
Certificate warningSelf-signed or expired certInstall valid commercial certificate
Authentication failedWrong credentialsTest user auth in console; check user group membership
Connected but no accessFirewall policy missingVerify policy from ssl.root to internal interfaces
Split tunnel not workingRouting address misconfiguredCheck split-tunneling-routing-address setting

Diagnostic Commands:

# Verify SSL VPN configuration
show vpn ssl settings
 
# Check firewall policies
show firewall policy | grep ssl.root
 
# Test authentication
diagnose test authserver ldap <server-name> <username> <password>
 
# Debug SSL VPN connections
diagnose debug application sslvpn -1
diagnose debug enable
 
# Packet capture
diagnose sniffer packet any 'host <client-ip> and host <server-ip>' 4 0 l

Security Hardening

Enable Two-Factor Authentication:

config user local
    edit "<username>"
        set two-factor fortitoken
        set fortitoken "<token-serial>"
    next
end

Restrict Source IPs (Geo-blocking):

config vpn ssl settings
    set source-address "Allowed-Countries"
end

Session Timeouts:

config vpn ssl settings
    set idle-timeout 600
    set auth-timeout 28800
end

Verification Checklist

Configuration:

  • SSL certificate installed and valid
  • User accounts created and grouped
  • IP pool configured (non-overlapping)
  • SSL VPN settings configured
  • Firewall policy allows ssl.root traffic

Testing:

  • FortiClient connects successfully
  • VPN client receives IP from pool
  • Internal resources accessible
  • DNS resolution works
  • Split tunnel routing correct (if enabled)

Security:

  • Strong password policy enforced
  • Two-factor authentication enabled (recommended)
  • Session timeouts configured
  • Logging enabled on firewall policy

References

  • FortiGate SSL VPN Administration Guide
  • FortiClient Downloads
  • FortiGate CLI Reference

Last Updated: February 2026

#Fortinet#FortiGate#VPN#SSL VPN#Remote Access#Network Security

Related Articles

FortiGate IPsec VPN: Site-to-Site with Azure

Configure IPsec site-to-site VPN between FortiGate firewall and Azure VPN Gateway. Covers IKE configuration, routing, BGP, and high availability.

13 min read

FortiGate Security Hardening: Best Practices for Enterprise

Complete FortiGate hardening guide covering admin access lockdown, firmware management, interface hardening, DNS/NTP security, certificate management,...

31 min read

FortiGate Performance Optimization: Tuning Guide for

Optimize FortiGate performance with NP/CP offloading, session table tuning, UTM profile optimization, SD-WAN performance rules, conserve mode prevention,...

40 min read
Back to all HOWTOs