Description
This article explains how to block some of the specific public IP addresses to enter the internal network of the FortiGate to protect the internal network. This is specific to configurations that already have inbound firewall policies allowing traffic internally to specific subnets that can be routable externally or that have a VIP as a destination. By default, traffic from external is not allowed internally without a firewall policy configured to allow externally initiated sessions.
Scope
FortiGate.
Solution
Step1: Create an address object
Go to Policy & Objects -> Addresses
Click on 'create new' and 'Address'
Note:
If a group of addresses requires to be blocked, select Addresses -> Address Group and select 'Create New'.
Related article:
Troubleshooting Tip: VIP traffic not matching the firewall policy with an 'all' destination
Note:
V5.0 up to v6.4 are out of engineering support. These GUI sections might be different in higher versions.
Consider upgrading the firmware level on the device to a supported version (v7.0 up to v7.6). Check the firmware path and compatibility depending on the hardware.
Note: In case a group of addresses require to be blocked, click on addresses select address group and click on create new:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.