Description This article describes how to create policies to block
potentially malicious traffic using a simple incoming and/or outgoing
policy with the supplied Internet Service Database Objects listed in the
IP Reputation Database. Scope FortiOS 6....
You can try to go through the steps in the following article:
If that doesn't work, create a support ticket and we will be happy to
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.