Created on
07-27-2024
06:07 AM
Edited on
06-29-2025
01:33 PM
By
Jean-Philippe_P
Description |
This article describes how to use an SSL VPN connection to a Loopback Interface using Virtual IP and some SSL VPN hardening recommendations. |
Scope | FortiGate. |
Solution |
CLI Reference:
Configure Virtual IP using External IP address (port2) and loopback Interface and Port forwarding to VPN port.
CLI Reference:
config firewall VIP
Configure SSL VPN using Loopback Interface.
CLI Reference:
config vpn ssl settings
Configure the Firewall policy for VIP access from outside.
CLI Reference:
config firewall policy
Configure the Firewall policy for SSL VPN users.
CLI Reference:
To harden the SSL VPN service to protect against failed login attempts, further restrictions can be put on the source on the WAN to the Loopback policy to specify allowed Geographical locations.
CLI Reference:
Connect to the SSL VPN using the Virtual IP.
In some cases, if a user is required to connect to VPN through an internal network or Wi-Fi connection while both are behind the firewall, then one more policy is required that from the LAN or the Wi-Fi interface to the SSL VPN loopback interface.
SSL VPN user list: Note: Even with this setup, the Banned-IP or Quarantine IP feature will not be able to block SSL VPN connection attempts. Banned-IP or Quarantine IP feature is only applied to real forwarding traffic, traffic that goes through FortiGate. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.