

Under Client Settings in Tunnel Mode, set IP Ranges to use the default SSLVPN_TUNNEL-ADDR1 IP range.For more information about using certificates, see Avoiding certificate warnings (CA signed certificates). To ensure that the traffic is secure, you should use your own CA signed certificate. In the example, the Fortinet_Factory certificate is used as the server certificate.Optionally, set Restrict Access to Limit access to specific hosts and specify the addresses of the hosts that are allowed to connect to this VPN. Set Restrict Access to allow access from any host.To avoid port conflicts, set Listen on port to 10443. Go to VPN>SSL VPN Settings to configure the SSL VPN tunnel.In the example, the bookmark allows the remote user RDP access to a computer on the internal network. Under Enable Web Mode, create predefined bookmarks for any internal resources that VPN users need to access. Set the source IP address pools to use the default SSLVPN_TUNNEL_ADDR1 IP address range.In Tunnel Mode, disable Enable split tunneling for IPv4 and IPv6 traffic to ensure that all Internet traffic passes through FortiGate.The Full Access Portal allows you to use Tunnel Mode and Web Mode.

