- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to Drop known external traffic into WAN interface without logging
Hi everyone,
I`m new to forum :)
My question is:
Is there a way to drop (not block) external traffic into my WAN without logging it?
By country or by IP range or single IP?
The goal is to block certain IPs so they can't even port scan my firewall.
I can`t find too much apart from Deny ipv4 policy which still logs everything.
I have Fortigate 60F.
Thanks
Solved! Go to Solution.
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
For traffic destined directly to a FGT interface, which logs you can see in Local traffic menu, you can go to Log Settings > Local traffic logging and disable log denied unicast traffic.
If it's for traffic destined to a VIP or some other host behind the FW, logs being visible in Forward Traffic, then you would need to disabled logs in the firewall rules for it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello
Please refer to the document to block traffic using local in policy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
Thank you for your response.
I set up Local in policy to block some countries, but how can I turn off logging violation traffic for local in policy?
Regards.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
For traffic destined directly to a FGT interface, which logs you can see in Local traffic menu, you can go to Log Settings > Local traffic logging and disable log denied unicast traffic.
If it's for traffic destined to a VIP or some other host behind the FW, logs being visible in Forward Traffic, then you would need to disabled logs in the firewall rules for it.
![](/skins/images/314F488D15A2016126B094729A0E57E8/responsive_peak/images/icon_anonymous_message.png)