So, I have an E61 firewall and it's got a nice SSL VPN on it for my 10 or so users who are in other countries. These users connect and we are using an LDAP integration for authentication.
Today, I found out that people are trying to access the SSL VPN using real usernames from the org, and when they enter the wrong password three times, the user is locked out of Active Directory.
For now, the SSL VPN is disabled.
I need a solution for this.
My first thought is to get some tokens and enable 2FA.
Can some of you experts make some suggestions about how to best mitigate this?
Thanks
Solved! Go to Solution.
I opened a ticket with FG and they recommended the dialup SSL VPN using a preshared key.
I opted for 40 tokens and turning on 2FA.
This is Googles answer when I searched with "windows AD lockout after three failed attempts". You can get the same yourself.
Security measure:
Considerations:
Toshi
Thank you Toshi.
I opened a ticket with FG and they recommended the dialup SSL VPN using a preshared key.
I opted for 40 tokens and turning on 2FA.
User | Count |
---|---|
2567 | |
1358 | |
796 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.