Ultraviolet Networks - Use case explorer - Terminating SSLVPN to a loopback interface

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ม.ค. 2025

ความคิดเห็น • 26

  • @yawnyame981
    @yawnyame981 10 หลายเดือนก่อน +1

    I have followed the process where but it is not working. Connecting stuck at 10% with vpn unreachable gateway

  • @bytes86
    @bytes86 2 ปีที่แล้ว

    Thanks Matt, love your videos, learning from you a lot!🙏

  • @blakman1984
    @blakman1984 2 ปีที่แล้ว

    Top tier as always! Thank you for the enlightening video!

    • @mattsherif9141
      @mattsherif9141  2 ปีที่แล้ว

      Thank you for watching! I hope you have a Happy New Year!

  • @scatpack1017
    @scatpack1017 ปีที่แล้ว

    Awesome video and super helpful. You can actually use external threat feeds with local-in policies. They can be used with a negate source option like any other address object.

    • @capricornnnn
      @capricornnnn ปีที่แล้ว

      any implementation doc with some example?

  • @ITGuyGary
    @ITGuyGary 8 หลายเดือนก่อน

    FYI - at 10:46, your Public IP is visible at the bottom of the "Your connections is not private" page

  • @osmanardanan86
    @osmanardanan86 2 ปีที่แล้ว +1

    Hey Matt, aren't the security profiles on the vip policy useless? I mean the traffic is not inspected bei virtual server and is completely encrypted anyway, isn't it?

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว +1

      Hey Osman, not necessarily. This is to mitigate against known SSL VPN attacks, it also allows you to specify more inspection types vs. local in policy.

  • @BenHollands-w3o
    @BenHollands-w3o ปีที่แล้ว

    Hey Matt, I've had a go at setting this up... It's working and I'm getting lots of hit on the FW policy. But no logs are showing up when I look for matching logs? Any ideas?

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว

      Yes - check under the local traffic logs instead of forward traffic logs. Despite the policy being for "forwarded traffic" FGT is smart enough to know this traffic will actually terminate on it.

  • @randada1
    @randada1 ปีที่แล้ว

    there's something we aint seeing here. this configuration doesnt work as the SSL Loopback interface is unreachable even after doing the VIPs and fw policies. i went thru the community forum and folks pointed out this video too but ultimately is missing a few configurations

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว

      I can assure you that’s not the case. Where are you getting stuck?

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว

      Hi @randada1 did you manage to find your answer?

  • @oinkersable
    @oinkersable 2 ปีที่แล้ว

    Cheers Matt, any cpu performance concerns when using the virtual interface, does offloading still happen for loopbacks, sslvpn isnt offloadad afaik but in general like ipsec on a loopback?

    • @mattsherif9141
      @mattsherif9141  2 ปีที่แล้ว +1

      No, due to SSL VPN sessions not being offloaded, it makes very little difference. Fast Path requirements don’t state that you need a physical interface to originate the traffic for Fast Path to take place:
      docs.fortinet.com/document/fortigate/7.0.9/hardware-acceleration/149012/np6-session-fast-path-requirements

    • @oinkersable
      @oinkersable 2 ปีที่แล้ว

      @@mattsherif9141 Thanks and happy new year, looking forward to more of your great content in 2023!

    • @mattsherif9141
      @mattsherif9141  2 ปีที่แล้ว

      @@oinkersable Happy New Year to you too! Thank you for watching! If there’s anything you want to see, let me know.

  • @capricornnnn
    @capricornnnn ปีที่แล้ว

    Thanks. How do you deny the bad IP addresses from reaching to SSL VPN?

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว

      Great question! You can pin the SSL vpn instance to a loopback. Allowing you to use threat feeds and other handy features. Thats explained here:
      th-cam.com/video/T_l-do_oci8/w-d-xo.htmlsi=eskibN__w7Wsp1zx

    • @capricornnnn
      @capricornnnn ปีที่แล้ว

      @@mattsherif9141 Thanks. I think its the same video but I just heard you saying that you can use ISDB but not much explanation. Sorry if I have missed it. "You can pin the SSL vpn instance to a loopback": can you explain this more? I have followed your instruction and SSL VPN works on Loopback interface but If I try to use ISDB of malicious IP addresses and put a Deny that it doesn't work.

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว

      @@capricornnnn You don't want the ISDB in this case, you want to either come up with your own threat feed and use that a source and deny anything coming from that. You could also use GEO IP adddress objects and block those as well. ISDB doesn't apply in this scenario.

    • @capricornnnn
      @capricornnnn ปีที่แล้ว

      @@mattsherif9141 So what you are saying is that its not possible to use ISDB with SSL VPN terminating to loopback interface? I am testing because what my understanding is that in order to use ISDB then I have to use Loopback interface and its not possible to use ISDB with local in policy.
      Threat feed can be used with local in policy. If Threat feed is the only way then I am thinking to stick with my current setup and use threat feed using
      local in policy. Do you have some doc or youtube video how to setup external threat feed. I heard that Talos is free but not sure how to use it.

    • @mattsherif9141
      @mattsherif9141  ปีที่แล้ว

      @@capricornnnn I am not saying that, I am saying your best bet is a threat feed. Here's the doc on configuring a threat feed docs.fortinet.com/document/fortigate/7.2.6/administration-guide/379433/configuring-a-threat-feed

  • @JustinHoMi
    @JustinHoMi 10 หลายเดือนก่อน +1

    FYI, ya forgot to censor your public IP one time.