Hi,
and welcome to the forums.
Maybe you could enlighten me why you chose port 80 for the SSL VPN. As this is _the_ best known port on the net you have to expect connection attempts here. Your users don' t benefit from it at all, as they have to specify the port anyway, like in ' https://my.domain.com:80' . It' s for a reason that the default SSL VPN port is in the high 10.000' s.
OK, some locations block outgoing traffic on high ports...and you might need port 443 for remote management. Anyway -
From the logs I basically read that some host tried to connect to port 80, and the SSL VPN daemon responded with an error exit. Nothing to worry about much as I don' t see any other way to prevent this. Of course, you could install an IPS signature to block the source IP address after xxx attemps in yyy seconds for zzz minutes. That' s what I did. If you create a DoS policy (which binds filters to an interface, not a specific policy) and insert the IPS rate signature the FGT can handle this very efficiently.
Please search the posts on all forums in the last 2-3 weeks, this has been discussed with references on the details.
Ede Kernel panic: Aiee, killing interrupt handler!