This article describes how to block an end user from using third-party VPN services.
FortiOs.
To block the third-party VPNs, set the category 'Proxy' and the signatures, 'IKE' and 'ISAKMP' to Block in application control, this should block most VPNs.
PPTP, L2TP signature falls under proxy category so it will cover VPN using those protocols.
Also make sure to use deep inspection in the firewall policy.
Find the configuration to be done on the FortiGate:
From the GUI:
From the CLI:
config firewall policy
edit 1
set name "Internet-Access"
set uuid 6759f40a-1672-51ed-ecd6-6344b9113347
set srcintf "port2"
set dstintf "port1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set ssl-ssh-profile "deep-inspection"
set application-list "default"
set logtraffic all
set nat enable
next
end
Related links:
For an explanation of the reasons for using deep inspection, refer to the FortiGate documentation's 'Deep inspection' section.
How to import CA certificates into Android devices: Technical Tip: How to import FortiGate CA certificates into Android devices
Technical Tip: Extended logging for SSL traffic.
If any of the VPN signature is not available in the application control signature list, it is then also possible to use a custom application signature. How to implement custom application signature:
Creating IPS and application control signatures
Blocking applications with custom signatures - FortiGate administration guide
Excellent post. I was trying to block a VPN (NordVPN) that some clients were using on their phones to workaround the web filter I had configured. After following the instructions from this post, issue resolved. Thanks a lot!
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.