Hello everyone,
Im curious if there is a way to filter inbound IPSec VPN connections by source address per tunnel on Fortigate. So far i saw that you can do it if you use IKE v2 and select the option "set remote-gw-match", but this only allows any, iprange, ipmask or country. Theres no way i can use an Address Group for this? The reason is that i have people that connect to my Fortigate that have 2 (or more) different outbound public addresses that do not belong to the same IP block, so i cant wrap them on a ip range or ipmask without adding unwanted IP addresses.
Thank you in advance!
Hi Infrarium
Local-in-policy should help. But it is global, not per tunnel :(
I already use that, to filter the source address as much as posible. Unfortunately some people are allowed to connect from any IP address on my country, so that makes the scope on the local-in policy to be broader.
just curious about the reasoning of restricting more the access to an ipsec tunnel.
you already have, psk + auth credentials which are required for the user to know in order to connect.
Yes, i know that, but we come from SSL/VPN where this was easily achieved using authentication rules, and we wanted to know if the same could be achieved (somehow) with IPSec VPNs.
Yuri published a nice SSL VPN hardening guide. The idea for you is to create a loopback in order to allow/deny remote sources with a firewall rule.
You can use it for IPsec as well, I believe it should work.
You can start here:
Let us know if it works.
User | Count |
---|---|
2546 | |
1354 | |
795 | |
643 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.