How we can create access list to limit which ip address can be connected to the vpn dialup?
Use local-in policy. Service "IKE" covers both UDP 500 and 4500.
https://docs.fortinet.com/document/fortigate/7.6.3/administration-guide/363127/local-in-policy
<edit> Almost forgot to mention, local-in policy config in GUI started with 7.6.x. If you're running 7.4.x or below, you need to use CLI. </edit>
Toshi
i try to make local policy but there is no tunnel dial-up interface and even no interface of my internet (port1)
Created on ‎08-25-2025 08:06 PM Edited on ‎08-25-2025 08:10 PM
No. The local-in policy works outside of the tunnel. You just need to apply it to the physical incoming interface, port1. Are you using 7.6 GUI or CLI?
If you're using SD-WAN, you might need to use "virtual-wan-link" zone name instead.
Toshi
port1 which connected to the internet is not visible.
just hit
set intf ?
I believe port2 not visible because port1 is member of sdwan. The question now is i have 2 tunnels, one for ipsec vpn site to site and the other is ipsec vpn remote access.
I just only want limit access to the ipsec vpn site, if i create local policy with service 'IKE' then the ipsec remote acess will be limited also, am i right?
Created on ‎08-25-2025 08:50 PM Edited on ‎08-25-2025 08:50 PM
You need to allow those location's public IPs to be able to come in, then deny all others. Below is a part of my local-in policy to limit SSL VPN access to some sources.
config firewall local-in policy
<snip>
edit 5
set intf "virtual-wan-link"
set srcaddr "SSLVPN-allowedSRC"
set dstaddr "all"
set action accept
set service "SSL_VPN"
set schedule "always"
next
edit 9
set intf "any"
set srcaddr "all"
set dstaddr "all"
set service "SSL_VPN"
set schedule "always"
next
<snip>
end
Toshi
For VPN remote access is impossible we can knowing the source ip since the users is can connected from every where so i don't want to limit incoming access for remote access.
For VPN site to site because this for connecting 2 location the for sure i know the public ip. So it's better if we can set interface to 'remote access tunnel' or 'site to site tunnel' as the source becasue we have 2 different tunnel with separate limitation.
The VPN remote access is visible but not for site to site tunnel.
Probably because you put those in SD-WAN zones.
User | Count |
---|---|
2534 | |
1351 | |
795 | |
641 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.