Hi Alelieveld, I agree with Scott that there's already good limitation. You might want to look at two-factor authentication using OTP (One-Time Passwords). However, there is a way to do what you want...
Refer to #2 in Rulz. Create the two following NAT rules, in order:
DNAT : Internet -> {SSL VPN service} -> External (Address) : to {non existent IP}
Today, my preferred {SSL VPN service} for the SSL VPN is UDP 443. In any case, you don't want to use the preceding technique with UDP or TCP 443. In this case, you might want to use 1394 (OpenVPN) or 1443. Again with preference for UDP because it make the VPN faster.
Cheers - Bob
Sophos UTM Community Moderator Sophos Certified Architect - UTM Sophos Certified Engineer - XG Gold Solution Partner since 2005
Hi Alelieveld, I agree with Scott that there's already good limitation. You might want to look at two-factor authentication using OTP (One-Time Passwords). However, there is a way to do what you want...
Refer to #2 in Rulz. Create the two following NAT rules, in order:
DNAT : Internet -> {SSL VPN service} -> External (Address) : to {non existent IP}
Today, my preferred {SSL VPN service} for the SSL VPN is UDP 443. In any case, you don't want to use the preceding technique with UDP or TCP 443. In this case, you might want to use 1394 (OpenVPN) or 1443. Again with preference for UDP because it make the VPN faster.
Cheers - Bob
Sophos UTM Community Moderator Sophos Certified Architect - UTM Sophos Certified Engineer - XG Gold Solution Partner since 2005