Ultraviolet Networks - Use case explorer - Terminating SSLVPN to a loopback interface

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024

Комментарии • 26

  • @ITGuyGary
    @ITGuyGary 4 месяца назад

    FYI - at 10:46, your Public IP is visible at the bottom of the "Your connections is not private" page

  • @yawnyame981
    @yawnyame981 6 месяцев назад +1

    I have followed the process where but it is not working. Connecting stuck at 10% with vpn unreachable gateway

  • @blakman1984
    @blakman1984 Год назад

    Top tier as always! Thank you for the enlightening video!

    • @mattsherif9141
      @mattsherif9141  Год назад

      Thank you for watching! I hope you have a Happy New Year!

  • @bytes86
    @bytes86 Год назад

    Thanks Matt, love your videos, learning from you a lot!🙏

  • @scatpack1017
    @scatpack1017 Год назад

    Awesome video and super helpful. You can actually use external threat feeds with local-in policies. They can be used with a negate source option like any other address object.

    • @capricornnnn
      @capricornnnn 11 месяцев назад

      any implementation doc with some example?

  • @osmanardanan86
    @osmanardanan86 Год назад +1

    Hey Matt, aren't the security profiles on the vip policy useless? I mean the traffic is not inspected bei virtual server and is completely encrypted anyway, isn't it?

    • @mattsherif9141
      @mattsherif9141  Год назад +1

      Hey Osman, not necessarily. This is to mitigate against known SSL VPN attacks, it also allows you to specify more inspection types vs. local in policy.

  • @JustinHoMi
    @JustinHoMi 6 месяцев назад +1

    FYI, ya forgot to censor your public IP one time.

  • @randada1
    @randada1 Год назад

    there's something we aint seeing here. this configuration doesnt work as the SSL Loopback interface is unreachable even after doing the VIPs and fw policies. i went thru the community forum and folks pointed out this video too but ultimately is missing a few configurations

    • @mattsherif9141
      @mattsherif9141  Год назад

      I can assure you that’s not the case. Where are you getting stuck?

    • @mattsherif9141
      @mattsherif9141  Год назад

      Hi @randada1 did you manage to find your answer?

  • @user-iu2nc5pj3m
    @user-iu2nc5pj3m Год назад

    Hey Matt, I've had a go at setting this up... It's working and I'm getting lots of hit on the FW policy. But no logs are showing up when I look for matching logs? Any ideas?

    • @mattsherif9141
      @mattsherif9141  Год назад

      Yes - check under the local traffic logs instead of forward traffic logs. Despite the policy being for "forwarded traffic" FGT is smart enough to know this traffic will actually terminate on it.

  • @oinkersable
    @oinkersable Год назад

    Cheers Matt, any cpu performance concerns when using the virtual interface, does offloading still happen for loopbacks, sslvpn isnt offloadad afaik but in general like ipsec on a loopback?

    • @mattsherif9141
      @mattsherif9141  Год назад +1

      No, due to SSL VPN sessions not being offloaded, it makes very little difference. Fast Path requirements don’t state that you need a physical interface to originate the traffic for Fast Path to take place:
      docs.fortinet.com/document/fortigate/7.0.9/hardware-acceleration/149012/np6-session-fast-path-requirements

    • @oinkersable
      @oinkersable Год назад

      @@mattsherif9141 Thanks and happy new year, looking forward to more of your great content in 2023!

    • @mattsherif9141
      @mattsherif9141  Год назад

      @@oinkersable Happy New Year to you too! Thank you for watching! If there’s anything you want to see, let me know.

  • @capricornnnn
    @capricornnnn 11 месяцев назад

    Thanks. How do you deny the bad IP addresses from reaching to SSL VPN?

    • @mattsherif9141
      @mattsherif9141  11 месяцев назад

      Great question! You can pin the SSL vpn instance to a loopback. Allowing you to use threat feeds and other handy features. Thats explained here:
      ruclips.net/video/T_l-do_oci8/видео.htmlsi=eskibN__w7Wsp1zx

    • @capricornnnn
      @capricornnnn 11 месяцев назад

      @@mattsherif9141 Thanks. I think its the same video but I just heard you saying that you can use ISDB but not much explanation. Sorry if I have missed it. "You can pin the SSL vpn instance to a loopback": can you explain this more? I have followed your instruction and SSL VPN works on Loopback interface but If I try to use ISDB of malicious IP addresses and put a Deny that it doesn't work.

    • @mattsherif9141
      @mattsherif9141  11 месяцев назад

      @@capricornnnn You don't want the ISDB in this case, you want to either come up with your own threat feed and use that a source and deny anything coming from that. You could also use GEO IP adddress objects and block those as well. ISDB doesn't apply in this scenario.

    • @capricornnnn
      @capricornnnn 11 месяцев назад

      @@mattsherif9141 So what you are saying is that its not possible to use ISDB with SSL VPN terminating to loopback interface? I am testing because what my understanding is that in order to use ISDB then I have to use Loopback interface and its not possible to use ISDB with local in policy.
      Threat feed can be used with local in policy. If Threat feed is the only way then I am thinking to stick with my current setup and use threat feed using
      local in policy. Do you have some doc or youtube video how to setup external threat feed. I heard that Talos is free but not sure how to use it.

    • @mattsherif9141
      @mattsherif9141  11 месяцев назад

      @@capricornnnn I am not saying that, I am saying your best bet is a threat feed. Here's the doc on configuring a threat feed docs.fortinet.com/document/fortigate/7.2.6/administration-guide/379433/configuring-a-threat-feed