So there is a certain IP that is filling up the logs trying to establish a site-to-site VPN. I trying out how to figure out how to block it I came across Local-In Policies. I set the below rule but still the logs are getting filled with these request:
config firewall local-in-policy edit 1 set intf "wan1" set srcaddr "BadGuy" set dstaddr "WAN1-IP" set service "any" set schedule "always" next end
Is there anything else I need to do or should this work? Doesn't look like it is though.
Assuming you really do not want the baddy addy to connect to your fgt or anything behind it you likely want to set the dest address to all or any.
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Yeah I did that and still the logs fill up with this address trying to establish an IPSEC tunnel. So changed policy to:
config firewall local-in-policy
edit 1 set intf "any" set srcaddr "Bad-Guy" set dstaddr "any" set service "any" set schedule "always" next end
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.