Created on 06-05-2017 08:49 AM Edited on 02-07-2024 10:52 PM By Jean-Philippe_P
Description
This article shows the configuration to protect a server from attacks from countries the user has no business with.
Scope
FortiGate.
Solution
First, create an address object:
Go to Policy&Object -> addresses and then select 'create' and 'new address'.
If there is even 1 VIP policy on the FortiGate then this policy will not work as expected. To make this work ensure that in the policy itself add a command to match it to the VIP or add the destination as all The VIPs present in the destination instead of 'all'.
config firewall policy
edit <policy-id> <----- Here the policy ID would be of the 'Block Geolocation Traffic' as seen in the screenshot above.
set match-vip enableGeolocation also contains the Reserved option (ZZ) which denotes the addresses that are not assigned publicly.
Related articles:
Technical Note: How FortiGate can block Duolingo in different ways. Blocks web application.
Technical Note: Disconnecting a member from a cluster
Technical Tip: Commands to verify GeoIP information and troubleshoot GeoIP database
Technical Tip: How to block by country or geolocat... - Fortinet Community
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.