- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Configuring a profile to allow or block endpoint from VPN tunnel connection based on the applied sec
Dear,
Following the guide (https://docs.fortinet.com/document/forticlient/7.4.0/ems-administration-guide/701440/configuring-a-p... i'm trying to create rules in order to block for i.e:endpoint with critical vulnerabilities to connect vpn.
But in my console i do not have the option like showing in the link:
Link console:
My console:
Solved! Go to Solution.
- Labels:
-
FortiClient EMS
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I found it. In the new console version 7.4.0 the option is this one, after you have created the rule logic:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That document references a 'security posture tag', which needs to be configured first before it is selected. You can make it by following this guide:
https://docs.fortinet.com/document/forticlient/7.4.0/ems-administration-guide/142/adding-a-security-...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I understand. I followed the link and i learned that i can create 2-3 ore more rules in one. But still i cannot find how to apply this rule in order to say that if EndpointXY is not fulfilling this conditions do not connect
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I would rewrite the rule to only apply the tag to the client if they are meeting your requirements. You can then only allow the user to connect if that tag is there.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I found it. In the new console version 7.4.0 the option is this one, after you have created the rule logic:
![](/skins/images/EC12350B26E3A30E8BDB0075C9F4DA72/responsive_peak/images/icon_anonymous_message.png)