Description | This article gives an example of how to block a certain IP address or list of IP addresses from connecting to SSL VPN without using local-in policies. |
Scope | FortiGate v6.4.8 and later. |
Solution |
There is an option on SSL VPN setting to enable 'source-address-negate'.
This way, FortiGate will only block connection attempts from this address object. Other IPs will be allowed.
config firewall address
config vpn ssl setting set source-address "b-10.47.2.111" end
When the user tries to connect from the 10.47.2.111 machine, the SSL VPN will be rejected.
On FortiGate, it is possible to see that this machine is trying to connect, but FortiGate does not respond:
diagnose sniffer packet any "host 10.47.2.111 and port 10443" 4
Connecting from the different machines will be allowed and connections established.
get vpn ssl monitor SSL-VPN sessions:
The blocks will be visible in the 'Local Traffic' logs. Enable Local Traffic Log from under Log & Report -> Log Settings.
If multiple addresses should be blocked, an address group can be used for simplified management.
config firewall address edit "b-10.47.2.111" set subnet 10.47.2.111 255.255.255.255 next edit "b-10.47.2.200" set subnet 10.47.2.200 255.255.255.255 next end
config firewall addrgrp edit "BLOCKED-IP_SSLVPN" set member "b-10.47.2.111" "b-10.47.2.200" next end
config vpn ssl setting set source-address "BLOCKED-IP_SSLVPN" end
To add or remove members from a multi-select object, use the 'append' and 'unselect' keywords.
config firewall addrgrp edit "BLOCKED-IP_SSLVPN" append member "new address to block" unselect member "address to remove from block" next end
In v7.2.9, v7.4.5 and later, IP address blocks can be configured from SSL-VPN GUI. This is done by using 'Limit access to specific hosts' in combination with 'Negate Source'.
|