Using the Geo IP block list
The FortiGuard Geo IP service provides a database that maps IP addresses to countries, satellite providers, and anonymous proxies. The database is updated periodically.
The Geo IP block list is a policy that takes the action you specify when the virtual server receives requests from IP addresses in the blocked country’s IP address space.
For Layer 4 virtual servers, FortiADC blocks access when the first TCP SYN packet arrives. For Layer 7 virtual servers, FortiADC blocks access after the handshake, allowing it to redirect the traffic if you have configured it to do so.
Geo IP block list actions lists limitations for Geo IP block list actions.
Action | Profile Limitations | |
---|---|---|
Pass |
IPv4 only |
Not supported for HTTP Turbo, RADIUS. |
Deny |
IPv4 only |
Not supported for HTTP Turbo, RADIUS. |
Redirect |
IPv4 only |
Not supported for HTTP Turbo, RADIUS, FTP, TCP, TCPS, UDP. |
Send 403 Forbidden |
IPv4 only |
Not supported for HTTP Turbo, RADIUS, FTP, TCP, TCPS, UDP. |
Basic Steps
- Configure the connection to FortiGuard so the system can receive periodic Geo IP Database updates. See Configuring FortiGuard service settings.
- Create rules to block traffic from locations.
- Maintain a allowlist to allow traffic from specified subnets even if they belong to the address space blocked by the Geo IP block list.
- Select the Geo IP block list and allowlist in the profiles you associate with virtual servers. See Configuring Application profiles.
Before you begin:
- You must have Read-Write permission for Security settings.
To configure a Geo IP block list:
- Go to Network Security > Geo IP Protection.
- Click the Geo IP Protection tab.
- Click Create New to create a block list as described in Geo IP block list configuration.
- Click Save.
- Edit your new block list to add members as described in Geo IP block list configuration.
- Click Save to save your member settings.
- Click Save.
Settings | Guidelines |
---|---|
Name |
Configuration name. Valid characters are After you initially save the configuration, you cannot edit the name. |
Default Action |
Note: Layer 4 and TCPS virtual servers do not support Redirect or Send 403 Forbidden. If you apply an Geo IP configuration that uses these options to a Layer 4 or TCPS virtual server, FortiADC logs the action as Redirect or Send 403 Forbidden, but in fact denies the traffic. |
Status |
Enable or disable the Geo IP block list configuration. |
Member |
|
Log |
Enable/disable logging. |
Severity |
The severity to apply to the event. Severity is useful when you filter and sort logs:
|
Action |
Note: Layer 4 and TCPS virtual servers do not support Redirect or Send 403 Forbidden. If you apply an Geo IP configuration that uses these options to a Layer 4 or TCPS virtual server, FortiADC logs the action as Redirect or Send 403 Forbidden, but in fact denies the traffic. |
Regions |
Select a geolocation object. The list includes countries as well as selections for anonymous proxies and satellite providers. |