Description | This article describes how to block certain IP addresses from connecting to SSL VPN, not by using local-in policy, or specific geolocation restrictions. |
Scope | FortiGate v6.4.8 (applies to newer versions too v7.0,v7.2,v7.4,v7.6), FortiClient v6.4.7. |
Solution |
There is an option on SSL VPN setting via CLI to enable 'source-address-negate'.
This way, FortiGate will only block connection attempts from this address object. Other IPs will be allowed.
config firewall address
config vpn ssl setting set source-address "Block_SSLVPN" end
When the user tries to connect from the 10.47.2.111 machine, the SSL VPN will be rejected.
On FortiGate, it is possible to see that this machine is trying to connect, but FortiGate does not respond:
dia sniffer packet any "host 10.47.2.111 and port 10443" 4
Connecting from the different machines will be allowed and connections established.
get vpn ssl monitor SSL-VPN sessions:
The blocks will be visible in the 'Local Traffic' logs. Enable Local Traffic Log from under Log & Report -> Log Settings.
Note: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.