Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
james_hull
New Contributor

Bot Hammering Our SSL-VPN. Using Spoofed US IPs.

Hello all.

Our VPN is getting hammered with spoofed IP addresses and a brute force attack using some of our old (and a few current) company user names.  This is causing account lockouts for several users.  Our third party guys have put in some IP address blocks, but it's partially effective due to the spoofed IPs/user account combinations, which cause valid users to be blocked intermittently.

 

We have geo blocking turned on and limited to countries we need to be able to access, but some of the spoofed IPs are within those parameters.

 

There hopefully is a solution here at Fortinet somewhere, but throwing this out there in case one of you guys have seen this type of attack and found a good solution to shut it down.  We can't keep adding IP address blocks forever.

 

Thanks!

4 REPLIES 4
hgarara
Staff
Staff

Hello @james_hull,

 

I understand your concern, instead of adding malicious IPs manually, you can make this process dynamic. Please refer to this article which will certainly block the ip address if there is an invalid user connection attempt being made. 

https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-permanently-block-SSL-VPN-failed-lo....

Marthen2
New Contributor II

Hello,

you can try also blocking using ISDB to block services which are not expected to connect to you from like: Malicious-Malicious.Server, Hosting-Bulletproof.Hosting, Tor-Exit.Node, VPN-Anonymous.VPN 

Next groups to block are different hosting providers like: Akamai-Linode.Cloud, Hetzner-Hetzner.Hosting.Service, OVHcloud-OVHcloud, ColoCrossing-ColoCrossing.Hosting.Service, Microsoft-Azure, DigitalOcean-DigitalOcean.Platform, Alibaba-Alibaba.Cloud, Google-Google.Cloud

 

When you are blocking IPs first lookup in ISDB if it's not members of another categories you can block also.

 

It will not stop connections but block lot of them. 

Or if it's such big problem switch to IPSEC VPN and disable SSLVPN like it's suggested in latest Forti products versions.

 

james_hull
New Contributor

Thanks to both of you for the suggestions.

As an update--we have set up dynamic add of malicious IP addresses, and this works, but were just looking for a more permanent solution as the IP blocks eventually fill up on the FG and a new one has to be created.  The issue has dropped off considerably, but I appreciate any and all suggestions.  FG isn't my area of expertise, so thanks for your help.

SonaMuvv

Hello,

The best option in this case is to create an automation to monitor failed attempts and add that to the block list, which you have already implemented.

I would also want to let you know that Fortinet does maintain a Threat Intelligence Feed which is described as follows (https://www.fortiguard.com/premium-services).

However, this is a premium service and wanted to let you know incase if you want to explore more in this direction.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors