So, I have an issue with users connecting to the SSL VPN, while they are in the office.
Is there anyway to block our office public IP addresses from connecting to the SSL VPN? We have one main office running XG210, with remote locations running Red 15's.
We have them install/download the SSL Client and Configuration when in the office, so denying 443 doesn't really work for me.
I'm assuming that the users are originally working remotely (from home or MiFi) connected to the SSL VPN. They then come into the office, and the VPN auto-reconnects.
While this isn't causing any problems, I would prefer that this not be possible.
Thanks
This thread was automatically locked due to age.