Step 1: Create Address Objects for SSL VPN
Go to Policy & Objects > Addresses.
Click Create New > Address.
Name:
SSL_VPN_TUNNEL_ADDR1
Type: Subnet
Subnet/IP Range:
10.212.134.200/255.255.255.240
(or any free IP range not conflicting with your internal network)Interface: ssl.root
Click OK
Step 2: Configure the SSL VPN Settings
Go to VPN > SSL-VPN Settings
Under Connection Settings:
Listen on Interface(s): Choose the WAN interface
Listen on Port: Default is 443 (change if needed)
Restrict Access: Select the addresses or leave as All
Server Certificate: Choose the installed certificate or use the default
Tunnel Mode: ✅ Enable
IP Pool: Select the address object created earlier
DNS Server: Enter internal/external DNS as per your network
Scroll to Authentication/Portal Mapping:
Click Create New
User/Group: Select the appropriate user or group
Portal: Select
full-access
(or create a custom one)
Click Apply
Step 3: Create User(s) and User Group
? Create a User:
Go to User & Authentication > User Definition
Click Create New
Username: e.g.
vpnuser
Password: Set a password
Click OK
? Create a User Group:
Go to User & Authentication > User Groups
Click Create New
Group Name:
SSL_VPN_USERS
Add your user (
vpnuser
) to this groupClick OK
Step 4: Create Firewall Policy for SSL VPN to Internal Network
Go to Policy & Objects > Firewall Policy
Click Create New
Name:
SSLVPN to LAN
Incoming Interface:
ssl.root
Outgoing Interface:
lan
(or internal interface)Source:
SSL_VPN_TUNNEL_ADDR1
Destination: Your internal subnet (or specific internal resources)
Schedule: Always
Service: ALL
Action: Accept
Enable NAT
Click OK
Step 5: (Optional) Create Policy for Internal to SSL VPN if Needed
If your internal network needs to initiate communication to SSL VPN clients.
Step 6: Enable SSL VPN Access on WAN Interface
Go to Network > Interfaces
Edit your WAN interface
Under Administrative Access, enable SSL-VPN
Click OK
Step 7: Test the VPN
Open a browser and go to:
https://<Your WAN IP or FQDN>:443
Login with the VPN user credentials
Download and install FortiClient if needed (Tunnel Mode)
✔️ Tips
Use Let’s Encrypt SSL certificates for free HTTPS access (optional).
You can create custom SSL VPN portals under VPN > SSL-VPN Portals for split tunneling, bookmarks, etc.
Monitor connected users under Monitor > SSL-VPN Monitor.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article