Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Remember, I'm new to Fortinet firewalls. What is the next step? Do I use CLI commands? And if so, can someone display how to use Local In policy to block external IP address using Block_Countries_In address group?
Thanks
config firewall local-in-policy
edit 3
set intf "wan1"
set srcaddr "Kabelnetz"
set dstaddr "all"
set service "ALL"
set schedule "always"
next
edit 1
set intf "wan1"
set srcaddr "VPN_origin_countries"
set dstaddr "all"
set action accept
set service "IKE"
set schedule "always"
next
edit 2
set intf "wan1"
set srcaddr "all"
set dstaddr "all"
set service "IKE"
set schedule "always"
next
end
Here is an example of local-in DENY policies.
1) I deny all connections from "Kabelnetz" which is 37.0.0.0/8.
2) I allow IPsec traffic from _some_ countries, and
3) block it from all other countries.
Whitelisting was easier in my case.
Contrary to regular policies, you cannot negate addresses in local-in policies.
Use "set comment" to your liking.
You will have to use CLI to define your own local-in policies, and they don't show up in the GUI. (Another feature request...)
I've entered the following:
FORTINET1 # sh firewall local-in-policy config firewall local-in-policy edit 1 set intf "wan1" set srcaddr "VPN_Allow_Countries" set dstaddr "all" set action accept set service "IKE" set schedule "always" next edit 2 set intf "wan1" set srcaddr "all" set dstaddr "all" set service "IKE" set schedule "always" next edit 3 set intf "wan1" set srcaddr "Block_Countries_In" set dstaddr "all" set service "ALL" set schedule "always" next end FORTINET1 # FORTINET1 #
It seems to be working so far.
Is there a way, to view this in the "Log & Reports"?
Thanks
Well, boys, I'm up a creek. I've pored over this thread and it's not working.
I've created GEO and IP range groups to block traffic hitting my WAN from CN and Soviet Russia. I've copied and pasted, setting srcint to WAN and dstint to LAN. I set srcaddr to "Block_Countries_In" and several other addresses I created and dstaddr to all.
I put in all the commands suggested by seadave (although I am running 5.2, so it did not take "internet-service disable" or "learning-mode disable").
I put in "set match-vip enable" as TecnetRuss suggested, because "destination = any won't work unless you use the "set match-vip enable" setting as shown in SeaDave's config," as he said.
I enabled the policy and put it at #1.
And despite it all, I still get this.
Some asswipe in China is still trying to get in. My firewall policy, alas, is a miserable failure. He is probably laughing at me.
Why can't I manage to block 1 measly IP address? It's clearly stated in my firewall policy, right there, at #1. Will anyone spare me this shame and embarassment?
Traffic to the FGT itself is controlled by 'Local In' policies, not the regular firewall policies.
Show us what you've configured, from CLI (as text), i.e. "config firewall local-in-policy".
Second, do you use VIPs on your WAN interface at all?
BTW, you could edit your last post and upload a picture...my mouse gets lame from scrolling...
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1660 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.