This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Assign rule to VPN Profile

On my SG310, the first SSL VPN Profile I created was simply called 'VPN'. As long as you're a member of Active Directory groups "A", "B" or "C", this profile is for you, and you can access the internal networks (There are 2 networks - "main" and "test"). So this policy is pretty open.

Today I created a second VPN profile. Its purpose: if you're a member of AD User Group "D", you'll instead fall into this profile when you connect to the VPN. And this profile needs to be more restrictive in that you can only access a specific computer on the "test" network. Nothing else. Just one computer. And you should have no access to the "main" network.

I created an active directory user "msmith", stuck him into AD security group "D" and connected to the VPN.

When testing I expected that this user, once connected to the VPN, would ONLY be able to connect to this specific computer on the test network. But it turns out he can remote into any computer on the test environment network as well as the main production network.

I assumed that's because there is a firewall rule that allows all "VPN Pool (SSL)" traffic to access "Any-Trusted" networks. And no matter which profile gets assigned to you, you're still within that same VPN Pool. Is that correct?

So, higher up in the list of firewall rules I created a new rule that says Source = Group "D", Services = Any, Destination = main network, Action = Drop. Not 100% what I am trying to achieve but at the very least I now expect that when this user connects to the VPN, he may still have access to multiple computers on the test network but now he should not get ANY access to the main network.

Well this also does not work. Turns out this user can still connect to any computer on the main network, even when moving this rule to the top of the list.

So, how can I restrict user msmith so that when he connects to the VPN, he can ONLY remote into a specific computer on a specific network? Is there a way to assign a firewall rule or restriction to an SSL Remote Access policy? (Probably not, I think policies are additive and this block should be added somewhere higher up in the hierarchy)



This thread was automatically locked due to age.
  • I think I may have just figured it out ...

    All this time while testing, I first connected my laptop to my Public WiFi network and then from there, connected to the VPN.

    Apparently even while connected to the VPN, the public wifi has full access to the internal network. (As a test, I completely disconnected from the VPN and discovered I could still remote straight into any computer on the internal network).

    I tested again, only this time I used my mobile phone as a hotspot. Connected to the VPN and this time got the expected result. In other words, the user can in fact only access a single computer on a single internal network. This is what I was trying to accomplish in the first place.

    So the good news is: my VPN profile worked. Now I'm going to lock down my WiFi!