This article describes how to leverage FortiAnalyzer event handlers and FortiGate automation capabilities to block remote IP addresses that are probing the SSL VPN via authentication attempts.
FortiGate v7.0.X, v7.2.X, v7.4.X and FortiAnalyzer v7.4.X.
Solution
Topology:
Prerequisites:
Configure an Event Handler in FortiAnalyzer to detect multiple failed SSL VPN attempts from an IP address:
In this example, the event handler activates upon detection of a VPN event log, indicating the 'ssl-login-fail' action, with events grouped by Remote IP (i.e., the initiating IP address for SSL VPN connections). It specifically triggers when there are two SSL VPN failed login attempts from an IP address within a one-minute timeframe. Make sure to enable the option 'Automation Stitch'.
Configuring an Automation Stitch on FortiGate:
Configure an Automation Stitch with the previously created components:
Create a Local-In Policy to block SSL VPN attempts as shown below:
If there are any local-in policies already configured, make sure to move this policy to the top of the list using the command 'move <policy_id> before <policy_id>' (example: move 2 before 1).
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.