Description |
This article describes how to restrict HTTPS access from certain countries to the WAN interface by configuring local-in Policy. |
Scope | FortiGate. |
Solution |
Note. Pre-configuration on WAN interface Administrative Access.
# config system interface
Configure the Firewall address object.
1) Go to Policy & Object -> Addresses and create new Address. - Select Type as Geography. - Select Country/Region.
Firewall Address Object Cli Configuration.
# config firewall address
2) To configure a local-in policy from CLI (Local-in policies can only be created or edited from CLI).
# config firewall local-in-policy
To test the HTTPS access.
1) Test access from blocked country:
telnet x.x.x.x 443
2) On the FortiGate, enable debug flow.
# diagnose debug flow filter dport 443
3) Output Of the debug flow shows that traffic is dropped by local-in policy 1.
id=20085 trace_id=1 func=print_pkt_detail line=5746 msg="vd-root:0 received a packet(proto=6, 1.1.1.1:55105->192.168.2.104:443) from wan1. flag [S], seq 2359949110, ack 0, win 65535"
4) To verify the logs, navigate Log & Report -> Local Traffic. Filter by service 'HTTPS'.
Related Article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.