Description | This article describes how to safely remove local-in policies that restrict SSL VPN connections on the FortiGate to specific countries using GEO-IP address objects. It emphasizes the importance of deleting these policies in the correct order to avoid unintentionally blocking all VPN access, including from the approved IP ranges. |
Scope | FortiGate |
Solution |
This article does not focus on the initial setup, which is fully detailed in the article Technical Tip: Restricting/Allowing access to the FortiGate SSL VPN from specific countries or IP ad.... Instead, it explains the correct, risk-free procedure for removing those local-in policies without interrupting active SSL VPN sessions.
Example configuration:
config firewall local-in-policy edit 2
Policy 1: Allows SSL VPN connections on port 10443 only from German IPs.
Why deletion order is important:
Safe deletion procedure:
config firewall local-in-policy
At this point, only the geo-specific policy remains, so connectivity for allowed countries is uninterrupted.
2. Delete the geo-specific policy:
config firewall local-in-policy
With no other local-in policies targeting port 10443, all sources are now allowed. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.