Description
This article describes how to set the geolocation address object to a specific authentication rule in the SSL VPN setting.
Scope
FortiGate.
Solution
Assume the following scenario:
Users connecting SSLVPN from geolocation ABC are assigned with full-access portal and if users connect SSL VPN from any other geolocation address then FortiGate assigns default-portal.
To achieve this, set the source address in the authentication rule. Applying geolocation database in SSL VPN authentication rule is only available via CLI.
Configure the below setting to the respective authentication rule in the SS LVPN setting and test the access.
config vpn ssl setting
config authentication-rule
edit <id>
set source-interface wan1 <----- SSL VPN listening interface.
set source-address <Geo address object>
set portal full-access
next
end
With this settings, when user try to connect the SSLVPN, FortiGate will check the user's public source-address and if it matches the source-address in the authentication rule then only the respective portal will be assigned else default-portal will be assigned.
In case of different restrict access GEO source for a specific user then it can be done by configuring below example:
config vpn ssl settings
config authentication-rule
edit 1
set source-interface "wan1" <----- Interface specified in SSL VPN.
set source-address "Allow group countries" <----- Just use the address group of countries address GEO desires to allow.
set groups "SSLVPN_ test user group " <----- This is the specific user group that desired to have access.
set portal "SSLVPN_ test_portal"
edit 2
set source-interface "wan1" <----- Interface specified in SSL VPN.
set source-address "general Allow countries" <----- Just use the country desired to allow.
set groups "SSLVPN_users" <----- This is the group in the policy of SSL VPN.
set portal "full-access"
end
Related articles: