One of our branch offices is facing a lot of brute force attempts via SSL-VPN.
For some reason, all these (failed) attempts are also forwarded to our RADIUS server (only used for wireless / wired network authentication via a NAC solution). Other branch offices with the same setup do not forward these brute force attempts to the RADIUS server(s). We have tried to compare the full configuration with each other, however do not notice any differences. Are we missing something here?
We are on FortiOS 7.2.10 on this specific branch office.
Hi,
The only thing that I can think of is that your RADIUS server is assigned to a user group ( in Remote groups ) that is also listed in the SSLVPN settings.
Correct, the RADIUS-server is part of a User Group (Type:Firewall) that is referenced in a 'Switch Controller Setting Security Policy 802-1X' policy.
However, I still don't understand why the RADIUS-server is called during SSL-VPN logins (as this RADIUS server is not suppose to handle / has nothing to do with SSL-VPN sign-ins).
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1743 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.