Description | This article describes the behavior and limitations of using geographic address objects on ZTNA Rules/Proxy policies. |
Scope | FortiOS 7.0.x and 7.2.x |
Solution |
Geographic address objects are not supported by ZTNA Rules/Proxy policies and they make FortiGate ignore the policy they are in.
Geographic address objects will be hidden in future releases.
Below are some logs to demonstrate this behavior:
When using the 'all' object as the source, an 'accept' action takes place (policy index = 1):
config firewall address edit "Portugal" set type geography set country "PT" next end config firewall proxy-policy edit 1 set name "GeoTest" set proxy access-proxy set access-proxy "TCP-Forwarding" set srcintf "wan1" set srcaddr "all" set dstaddr "LAB" set action accept set schedule "always" set logtraffic all set groups "SAML_LAB" set utm-status enable set ssl-ssh-profile "certificate-inspection" next end
diagnose firewall iprope list 100017
Upon using the 'Portugal' object as the source, a 'drop' is observed (policy index = 0 - implicit deny):
show firewall proxy-policy 1 config firewall proxy-policy edit 1 set name "GeoTest" set proxy access-proxy set access-proxy "TCP-Forwarding" set srcintf "wan1" set srcaddr "Portugal" set dstaddr "LAB" set action accept set schedule "always" set logtraffic all set groups "SAML_LAB" set utm-status enable set ssl-ssh-profile "certificate-inspection" next end
diag firewall iprope list 100017 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.