Created on
08-18-2024
02:31 AM
Edited on
06-01-2025
11:13 PM
By
Anthony_E
Description |
This article describes blocking SSL VPN failed login attempts using an ISDB address object. This article will require changing the SSL VPN configuration and is applicable when the requirement is to block IP addresses of specific ISDB objects failing to authenticate with the SSL VPN service frequently. |
Scope | FortiGate v7.2.0 and later. |
Solution |
Alternatively, to block IP addresses using automation stitches, follow the below guides: Technical Tip: How to permanently block SSL VPN failed logins using an Automation Stitch
Step 1: Identify a list of IP addresses for failed login attempts and associate IP addresses with ISBD objects.
Note down a few key remote IP addresses associated with failed VPN login attempts that are suspected as malicious.
In conclusion, this step identifies the ISDB object associated with multiple failed SSL VPN login attempts. As shown in the above screenshot, most of the attempts in this case were identified from the 'ColoCrossing-ColoCrossing.Hosting.Service' service and 'Hosting-Bulletproof.Hosting'.
Note: If FortiGate does not display a specific ISDB entry for most of the IP addresses, it indicates that these IPs are not part of any specific ISDB object and the subsequent steps outlined in this document will not be applicable.
Step 2: Using ISDB object in firewall policy.
In the source address field, select the ISDB objects with source negate enabled for the allowed policy.
Step 2.1: Configure the FortiGate SSL VPN to listen on a loopback interface.
Configure a loopback interface with a /32 IP address that is not in use, as shown in the below screenshot.
Step 2.2: Listing SSL VPN on the loopback interface instead of the WAN. This setting has to be changed on VPN-> SSL-VPN Settings
Step 2.3: Create a virtual IP address object using a loopback interface. To configure the VIP, set up the 'SSL VPN VIP' as shown in the screenshot below:
Step 2.4: Create a firewall policy from WAN to loopback using a VIP for the SSL VPN port. The GUI method to configure the firewall policy is as follows:
Any further attempts from IP addresses belonging to these ISDB objects will be blocked by the firewall policy, and this will reflect in the VPN event logs as the failed SSL VPN attempt will be reduced. Additional restrictions on SSL VPN login attempts based on geographical IP address objects can also be configured in combination with this method. Follow the steps below link: Technical Tip: Restricting SSL VPN connectivity from certain countries using firewall geography addr...
To create a local-in-policy:
config firewall local-in-policy edit 1 set intf "wan1" set srcaddr "Malicious IP Group" # (or the ISB object) set dstaddr "all" set service "SSLVPN_PORT" # (e.g. SSL-VPN, TCP/443, etc...)) set schedule "always" set action deny set status enable next end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.