The content you are looking for has been archived. View related content below.
Created on
03-14-2022
11:27 PM
Edited on
09-08-2023
01:39 AM
By
Jean-Philippe_P
Description | This article describes how to block certain IP addresses from connecting to SSL VPN, not by using local-in policy, or specific geolocation restrictions. |
Scope | The simulation was done using: FortiOS version 6.4.8 (applies to newer versions too 7.0,7.2,7.4). FortiClient version 6.4.7. |
Solution |
There is an option on SSL VPN setting via CLI to enable 'source-address-negate'.
This way, FortiGate will only block connection attempts from this address object. Other IPs will be allowed.
config firewall address
config vpn ssl setting set source-address "Block_SSLVPN" end
When the user tries to connect from the 10.47.2.111 machine, the SSL VPN will be rejected.
On FortiGate, it is possible to see that this machine is trying to connect, but FortiGate does not respond:
dia sniffer packet any "host 10.47.2.111 and port 10443" 4
Connecting from the different machines will be allowed and connections established.
get vpn ssl monitor SSL-VPN sessions:
The blocks will be visible in the 'Local Traffic' logs. Enable Local Traffic Log from under Log & Report -> Log Settings.
Note: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.