What is your opinion the base firewall rules everyone should have for traffic inside -> outside
I often see firewall rule just permit any any inside -> outside, no SSL inspection. No bot net / spam filters, no IPS not IDS.
Why is there no good template fortigate provides that recommends anything -> outside
On top I always add a rule to deny access to IP Reputation ISDB (Blockchain, C&C, Proxy, Tor, ...).
Edit: With "Log Violation Traffic" enabled.
i use these for outbound traffic ( LAN > WAN ) and inbound ( WAN > LAN/VIP )
config firewall internet-service-group
    edit "grp_ISDB-Malicious-out"
        set direction destination
        set member "Botnet-C&C.Server" "Malicious-Malicious.Server" "Phishing-Phishing.Server" "Spam-Spamming.Server" "Tor-Exit.Node" "Tor-Relay.Node" "VPN-Anonymous.VPN" "Proxy-Proxy.Server" "Blockchain-Crypto.Mining.Pool"
    next
    edit "grp_ISDB-Malicious-in"
        set direction source
        set member "Botnet-C&C.Server" "Malicious-Malicious.Server" "Phishing-Phishing.Server" "Spam-Spamming.Server" "Tor-Exit.Node" "Tor-Relay.Node" "VPN-Anonymous.VPN" "Shodan-Scanner" "Censys-Scanner" "Stretchoid-Scanner" "InterneTTL-Scanner" "Tenable-Tenable.io.Cloud.Scanner" "NetScout-Scanner" "Recyber-Scanner" "Cyber.Casa-Scanner" "BinaryEdge-Scanner" "UK.NCSC-Scanner" "CriminalIP-Scanner" "Internet.Census.Group-Scanner" "Shadowserver-Scanner" "LeakIX-Scanner" "Proxy-Proxy.Server" "Hosting-Bulletproof.Hosting"
    next
end
					
				
			
			
				I love the idea of the scanners. Thanks Funkylicious.
| User | Count | 
|---|---|
| 2727 | |
| 1416 | |
| 810 | |
| 738 | |
| 455 | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.