Description This article describes how to create policies to block
potentially malicious traffic using a simple incoming and/or outgoing
policy with the supplied Internet Service Database Objects listed in the
IP Reputation Database. Scope FortiOS 6....