Description |
This article describes how to process a brute force attack on SSL VPN login attempts with random users/unknown users and how to protect from SSL VPN brute-force logins. The attacker is trying to use a dynamic IP address and random admin user account to login via SSL VPN. |
Scope | FortiGate. |
Solution |
In this situation, process as follows:
Related documents: Set up FortiToken two-factor authentication Technical Tip: Email Two-Factor Authentication on FortiGate
Related document: Configuring the SSL VPN tunnel
Note: Creating an authentication rule or local-in policy to restrict SS LVPN connections will help to reduce the login and failed attempts seen under Log & Reports -> System Events -> VPN events.
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.