Skip to content

Design: AllowedIPs based on ACL #1366

@gstorme

Description

@gstorme

Is your feature request related to a problem? Please describe.
Currently the AllowedIPs is applied to all devices that connect.
It could be useful to allow for a more selective routing, based on the configured ACLs.
We have a large list of subnets, but not every user/group should get these.
Some users/groups should only get access to a specific set of resources.
We can of course restrict/customize this with ACLs, but it could be seen as a security issue to push these routes anyhow, and the user(s) would only expect a certain set of resources to be routed over the VPN, instead of all our subnets.

Describe the solution you'd like
A setting which allows to not provision the AllowedIPs (from location settings) on user/group level, but instead set the AllowedIPs to what is configured in the ACL for that user/group.

Describe alternatives you've considered
Work with multiple defguard locations for each set of AllowedIPs
Keep current solution for those users/groups (Fortigate SSLVPN with Split tunneling Enabled Based on Policy Destination)

Metadata

Metadata

Assignees

No one assigned

    Labels

    featureNew feature or request

    Type

    No type
    No fields configured for issues without a type.

    Projects

    Status

    Refinement ready

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions