Is your feature request related to a problem? Please describe.
Currently the AllowedIPs is applied to all devices that connect.
It could be useful to allow for a more selective routing, based on the configured ACLs.
We have a large list of subnets, but not every user/group should get these.
Some users/groups should only get access to a specific set of resources.
We can of course restrict/customize this with ACLs, but it could be seen as a security issue to push these routes anyhow, and the user(s) would only expect a certain set of resources to be routed over the VPN, instead of all our subnets.
Describe the solution you'd like
A setting which allows to not provision the AllowedIPs (from location settings) on user/group level, but instead set the AllowedIPs to what is configured in the ACL for that user/group.
Describe alternatives you've considered
Work with multiple defguard locations for each set of AllowedIPs
Keep current solution for those users/groups (Fortigate SSLVPN with Split tunneling Enabled Based on Policy Destination)
Is your feature request related to a problem? Please describe.
Currently the AllowedIPs is applied to all devices that connect.
It could be useful to allow for a more selective routing, based on the configured ACLs.
We have a large list of subnets, but not every user/group should get these.
Some users/groups should only get access to a specific set of resources.
We can of course restrict/customize this with ACLs, but it could be seen as a security issue to push these routes anyhow, and the user(s) would only expect a certain set of resources to be routed over the VPN, instead of all our subnets.
Describe the solution you'd like
A setting which allows to not provision the AllowedIPs (from location settings) on user/group level, but instead set the AllowedIPs to what is configured in the ACL for that user/group.
Describe alternatives you've considered
Work with multiple defguard locations for each set of AllowedIPs
Keep current solution for those users/groups (Fortigate SSLVPN with Split tunneling Enabled Based on Policy Destination)