Created on 09-28-2023 10:23 PM Edited on 10-20-2024 09:37 PM By Anthony_E
Description |
This article describes a scenario where a user wants to block traffic from certain countries to reach the internal server behind FortiGate Lan. The IP belonging to the GEO block country is still able to reach the internal server.
Below are the config:
|
Scope | FortiGate. |
Solution |
According to packet life in FortiGate, Destination NAT takes effect at the beginning of the packet process. In the FortiGate kernel, packets are processed in the following order:
Local in policy with action deny will not deny traffic allowed by VIP policy because when Local in policy takes effect, the VIP policy already allows the traffic. To resolve the issue, create a VIP deny policy and put it on top of the VIP allow policy to block the source GEO block address.
Note: The destination address of the deny policy should be set to the VIP address, if set to the normal local server IP address, use CLI to enable match-vip 'set match-vip enable' in the deny policy.
The following article explains How to configure block VIP access using GEO location: How to block VIP access using GEO Location
Related documents: Packet flow ingress and egress: FortiGates without network processor offloading Technical Tip: Firewall does not block incoming (WAN to LAN) connection even though deny policy |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.