Created on 11-01-2022 04:11 AM Edited on 11-01-2022 04:51 AM
Description | This article explains how to maintain permanent IP bans and quarantines even after rebooting FortiGate. |
Scope | FortiGate v7.2.1, v7.2.2 and later. |
Solution |
In previous versions of FortiGate, the list of quarantined users was saved in volatile memory. After every reboot or upgrade, banned or quarantined users' IP details were removed from the list. The best practice to create a permanent quarantine was to configure the firewall policy to block the users:
From FortiOS v7.2.1 and above, an option has been added to maintain the banned/quarantined user list even after the device is rebooted. The option is disabled by default. To enable it, run the following in the CLI:
# config firewall global set banned-ip-persistency ? end
Choose one of the following options to fill the space of ?:
To view banned IPs in the GUI, navigate to DHCP Monitor, hover over a device and select Ban IPs from the context menu that appears.
Use the Quarantine dashboard widget to manage and delete IP bans:
To view banned IPs in the CLI, run the following command:
# diagnose user banned-ip list
After a system configured to retain banned IPs reboots, the banned IPs are still maintained in the banned-ip list:
Related Documents:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.