![]() ![]() Below are the relevant firewall policies we have in place (appreciate they not much help as just the names, just trying to show what we have setup). Use the 'Enable VPN firewall' switch to turn the firewall on or off. Click 'Firewall' > 'Policy' > 'VPN Policy' to open the settings interface: By default, the VPN firewall is disabled. You can also create and manage VPN traffic rules from this interface. Looking for pointers, is it some additional routing I need to setup for the VPN after setting up VLANs. The VPN firewall can be enabled in the 'VPN policy' interface. I have also set it to use the client's system DNS and it gives them their home router DNS but again internet doesn't work for those users. Initially we had the VPN give out our internal DNS server (which is on a separate vlan) but this didn't work. However since doing these changes, the VPN is playing up a bit.Įveryone can connect to the VPN and get an internal IP, some users work fine with internet access but others cant get internet access whilst on the VPN and only an internal IP. ![]() The VLAN side works fine and as expected, even the routes from laptops to server DNS, DC, File Shares, etc is working. I have a Fortigate 60E for our small network and created some VLANs to separate the VOIP, CCTV, Servers, Laptops, etc. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |