FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
sashish
Staff
Staff
Article Id 241128
Description This article describes how to allow/block the ISDB services on basis of GeoIP Database.
Scope FortiGate 7.2.x.
Solution

If there is a requirement to block Zscaler connection based on GeoIP, Zscaler has multiple cloud servers based on GeoIP. 

 

1) Go to Policy & Object -> Internet Service Database -> Internet Services, select 'Create New' -> Geographic Based Internet Services.

 

sashish_0-1672136472962.png

 

2_ Type: Geographic Based. The predefined one is having all the server IP based on the destination. 

 

sashish_1-1672136564470.png

 

3) It is possible to verify the IP's lookup while checking the View/Edit Entries. 

 

sashish_2-1672136629328.png

 

 Copy any of the listed IPs to confirm the GeoIP location which should be matching to India.

 

sashish_3-1672136658539.png

 

4) Go back and select 'IP Address Lookup'.Paste the IP and do the lookup. 

 

sashish_4-1672136826954.png

 

It shows Mumbai, Maharashtra, India. 

From the below snapshot, this IP is also listed under 'Amazon-AWS' and 'Amazon-AWS.EC2'. 

 

5) Create a firewall policy to allow/block Zscsler cloud IP's of India location.

 

sashish_5-1672137058800.png

 

This is will block the connection between the client machine and to Zscaler Client Connector which is connected to zscaler intenet cloud. 

 

If the GeoIP is not updated, follow this related document:

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Commands-to-verify-GeoIP-information-and/t...

Contributors