Enabling Multi-VDOM resources Access for SSL VPN users

92743f5d-3dd6-4355-9bb9-b6dba5478db3.jpg

To make this work, follow these steps:

  1. Setup SSL VPN on VDOM_A: Setup SSL VPN portal on VDOM_A and add the subnet of the file server from VDOM_B to the routing override address along with the desired local LAN subnet.

8fb91340-1976-4ff8-9499-0ea060bab22d.jpg

 

  1. Setting up SSL VPN in VDOM_A: Designate the interface on VDOM_A that will handle SSL VPN traffic. In this scenario, configure Port 9 as the WAN interface to listen for SSL VPN connections.

 

935e2515-5bc5-44a5-b8e3-a2a120d50375.jpg

 

  1. Routing configuration at VDOM_A: Ensure static routes or appropriate dynamic routing protocols are configured to connect the VDOMs and allow traffic flow between them VDOM_A must have the routes to the file server behind VDOM_B pointing towards the inter-VDOM link.

 

1b2659f9-6649-4345-8b2d-196401a01a1d.jpg

 

  1. Static Routing Configuration at VDOM_B:  VDOM_B must have the SSL VPN subnet in its routing table pointing towards the inter-VDOM link. In VDOM_B, add a static route for the SSL VPN client subnet, directing it towards the inter-VDOM link.

aa9e2ac4-1520-4c6e-a630-9b45013df10b.jpg

 

  1. Firewall policy on VDOM_A: VDOM_A must have a firewall policy to allow the SSL VPN subnet and user group to access File Sever in VDOM_B through an inter-VDOM link. Specify the user group to which the SSL VPN user belongs.

 

a988ebef-244d-4848-a732-6faa5dedc1a4.jpg

 

  1. Firewall policy on VDOM_B: VDOM_B must have a firewall policy to allow incoming traffic from the SSL VPN subnet of VDOM_A to access the File server on Port 6. Here the incoming interface should be the inter-VDOM link.

 

f521a1e3-ab8d-4355-b36f-1bfffe63ac52.jpg

183 total views, 2 views today