FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Article Id 257561

This article describes challenges associated with securing SSL VPN access for a distributed user base. It is commonplace that users originate from IP addresses unknown to the Administrator. To help Administrators mitigate the risks unique to their environment, the following comprehensive list of references has been compiled.

Scope All versions of FortiGate.

Authenticating servers:


For networks with many users, integrate the user configuration with existing authentication servers through LDAP, RADIUS, or FortiAuthenticator.

By integrating with existing authentication servers such as Windows AD, there is a lower chance of making mistakes when configuring local users and user groups. Administration effort is also reduced.






General information:


FortiToken (requires FortiToken license purchase)








Using a non-factory SSL certificate:


Limit access to specific hosts:


User source IP, DDNS:




Negate access limits for specific hosts:


Local in policies to deny by geoIP or addresses:




Using host check software (using FortiClient 7.0.3 or higher):





Web portal (if not used):


Most attack attempts use the web portal to try to login, which generates VPN event logs for this attempt.

If web portal is not being utilized, prevent the login page from appearing.


Delete login page from the replacement messages settings:


Web portal or Forticlient (in use):


Use realms:


Control SSL version and cipher suite:


MAC address check:


Limit the count of failed login attempts and ban the user:


Migrating from SSL VPN to ZTNA:


ZTNA can be used to replace VPN-based teleworking solutions to enhance the user experience and to increase security.