Hello,
I’m trying to dip my toes into IPSEC VPN configuration settings ahead of the eventual update to 7.6 since we have a lot of 40F units in production that won’t be able to support SSL VPN.
I’ve got a working IPSEC VPN configuration but I’ve encountered a major annoyance: If the IPSEC VPN is split-tunneled using an address group for the split tunnel, changing the members of the address group immediately drops the VPN connection for any connected users. This is a problem for us since we often have to change the address group during the day.
This is unlike SSL VPN connections where if you change the split-tunnel addresses, users stay connected but must reconnect for the changes to take effect which is a lot easier to handle.
I opened a ticket with Fortinet TAC and they said this is by design. Has anyone with IPSEC VPN connections found a workaround or have a way to manage changes? I can’t imagine this is expected behaviour. My current plan is to change the split-tunnel to simply send all RFC1918 traffic to reduce the number of VPN changes needed, but sometimes I need to hairpin public IP addresses through the VPN which requires a change.