- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SSL VPN Loopback Address
Hello All,
I am trying to gather as much information as I can prior to making a change to my firewall. I was attempting last week to create an automation stitch. This would place IP addresses associated with SSL VPN brute force attempts, onto a blocked IP address list. I found that this apparently cant be done if your SSL VPN is bound to your WAN interface. I began researching this but cant find a clear answer as to why this is required. I would also like to make sure I understand all of the steps involved in doing this as well as any implications it might have on functionality (pro or con). From what I can tell, it is a matter of creating the interface, assigning some random IP to the interface then creating a VIP that forwards traffic incoming on the SSL VPN IP and port, to the loopback interface. Are you required to change the actual policies that permit the traffic since the interface is addressed as sslvpnroot and not as an IP? Any information/assistance is greatly appreciated.
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Try this solution instead How to permanently block SSL VPN failed l... - Fortinet Community
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Moving VPN SSL from WAN to Loopback:
- Create Loopback interface with internal IP
- Change SSL VPN Settings to listen on this Loopback interface
- Create VIP portforwarding for SSL VPN port
- Create policy WAN -> Loopback allowing SSL VPN port by using the created VIP
- Create policy from ssl.root (if not present already) to LAN/DMZ as needed to allow VPN clients access to resources.
Adding failed logins to the block list in a rule - @Renante_Era already mentioned how, BUT - important to understand that Automation Stitches do NOT have the ability to count number of failed attempts, so using such stitch will block SSL VPN user on their first failed attempt, which is IMO kinda bad service to your users and more work to you on releasing users who did mistake on 1st login.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you all very much for your replies. I think I am going to have to start looking for another way to do remote access. I appreciate your time and help!!
