Description |
This article describes how to process a brute force attack on SSL VPN login attempts with random users/unknown users and how to protect from SSL VPN brute-force logins. The attacker is trying to use a dynamic IP address and random admin user account to login via SSL VPN. |
Scope | FortiGate. |
Solution |
In this situation, process as follows:
Related documents: Set up FortiToken two-factor authentication Technical Tip: Email Two-Factor Authentication on FortiGate
Related document: Configuring the SSL VPN tunnel
Note: Creating an authentication rule or local-in policy to restrict SS LVPN connections will help to reduce the login and failed attempts seen under Log & Reports -> System Events -> VPN events.
Related articles: |