One of my customers is complaining they are able to connect to SSL VPN (SAML) from inside their network. Not sure why they're trying to do so but is there an easy way to block this from happening? I've tried running negate from the ssl vpn settings from RFC 1918 addresses but that did not work.
config vpn ssl settings set source-address-negate enable
set source-address "RFC1918"
end
Thanks in advance for any input
Solved! Go to Solution.
Hello,
You may consider to use local-in-policy. Please find more details by following the link below:
https://docs.fortinet.com/document/fortigate/6.2.12/cookbook/363127/local-in-policies
Hello,
You may consider to use local-in-policy. Please find more details by following the link below:
https://docs.fortinet.com/document/fortigate/6.2.12/cookbook/363127/local-in-policies
Thank you! Works perfectly. Appreciate the response.
Apparently this is not working. Folks can still connect to the SSL VPN from inside the Fortigate. They've been told not too and it defeats the purpose, but they don't listen. Has anyone been successful in blocking this ability?
Hello,
Alternatively you may consider to configure source address for incoming traffic:
config vpn ssl settings
set source-address <>
end
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1109 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.