Hello everyone
Is it possible to identify incoming VPN connection(s)?
What I mean by that is, I have AD integrated VPN server (Win 2003 RRAS Server) behind the router. Router just forwards everything VPN related (PPTP & L2TP ie TCP:1723, gre, UDPs 1701, 500 and 4500, ipsec-esp and ipsec-ah) to RRAS server which handles things from there. Setup works just fine, what I’ve noticed lately is quite an increased number of incoming connections on mentioned ports. Checking RRAS server logs there is nothing out of the ordinary. Number of successful connections is pretty much the same, even authentication failures (my users mistyping their usernames/passwords) are within the normal.
So, I’m guessing, incoming connections are not being recognized by the RRAS server because they are not (properly formatted) VPN traffic. Someone is “knocking“ on my VPN ports.
These connections (with very few exceptions) come from wide variety of IP addresses and with only couple of attempts from the same address, before hopping to the next address. So I cannot block them with address list. Drop rule with something like “drop incoming connections with 5 attempts in 3 seconds“ does not do the job and lowering attempt number just ends up blocking genuine users.
I was wondering, is it possible to somehow identify proper incoming VPN connections in order to block everything else? Something like L7 filter for VPN. Searching the Forum I’ve stumbled upon “can mikrotik in L7 filter work on VPN services (PPTP, L2TP)” topic which says L7 mechanism is of no use in this situation.
Is there something else I could use? Anyone has any suggestion maybe?
Thanks in advance