Description
This article shows the configuration to protect a server from attacks from countries the user has no business with.
Scope
FortiGate.
Solution
First, create an address object:
Go to Policy & Object -> Addresses. and then in the 'address' label, select 'create new'.
config firewall policy
edit <policy-id> <----- Here the policy ID would be of the 'Block Geolocation Traffic' as seen in the screenshot above.
set match-vip enableGeolocation also contains the Reserved option (ZZ) which denotes the addresses that are not assigned publicly.
Note:
Related documents:
Technical Tip: How FortiGate can block Duolingo in different ways. Blocks web application.
Technical Tip: Disconnecting a member from a cluster
Technical Tip: Commands to verify GeoIP information and troubleshoot GeoIP database
Technical Tip: Blocking Inbound Access from Specific Country IP Ranges on FortiGate
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.