I am probably misunderstading something here, but here it goes.
Is it possible to deny a SSL VPN user access to a certain VLAN.
Scenario:
I have 3 VLAN's in my network, LAN, MGMT and DMZ
The normal users i want to only be able to access the LAN VLAN when connecting
So i make a test user called TestUser and assign him to the "SSLOnly_LAN" group
Made a SSL-VPN portal - tunnel mode policy destination
Added a Portal Mapping for that specific group
And finally made a policy for the users that allow then access to Vlan134, but denys access to Mgmt(lan)
But still the user are able to access Vlans they are not supposed to ?
What am i missing here ? or what have i misunderstood. ?
Thanks in advance.
Kenneth Karlsson
Denmark
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hey Kenneth,
in your DENY policy, you have source-address 'None', correct?
That means NO traffic can ever match this policy (because no traffic will have source 'None') so the policy would never apply.
You would need to set the proper source address for the users (as if allowing them access), and then instead of setting action 'allow' in policy, set action 'deny'.
The group is also a required source parameter, meaning any traffic that matches the source address, but does NOT come from this group, will not match. Only traffic coming from the source address AND belonging to the group will match into the policy, and thus get denied.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1711 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.