waf geo-block-list
Use this command to define large sets of client IP addresses to block based upon their associated geographical location.
![]() |
Because network mappings may change as networks grow and shrink, if you use this feature, be sure to periodically update the geography-to-IP mapping database. To download the file, go to the Fortinet Customer Service & Support website: |
Optionally, you can also specify a list of IP addresses or IP address ranges that are exempt from this blacklist. For details, see waf geo-ip-except.
Alternatively, you can block clients individually (see server-policy custom-application application-policy) or based upon their reputation (see waf ip-intelligence).
To apply the rule, select it in a protection profile. For details, see waf web-protection-profile inline-protection or waf web-protection-profile offline-protection.
To use this command, your administrator account’s access control profile must have either w
or rw
permission to the wafgrp
area. For details, see Permissions.
Syntax
config waf geo-block-list
set severity {High | Medium | Low | Info}
set trigger "<trigger-policy_name>"
set exception-rule "<geo-ip-except_name>"
config country-list
edit <entry_index>
set country-name "<region_name>"
next
end
next
end
Variable | Description | Default |
Enter the name of a new or existing rule. The maximum length is 63 characters. To display the list of existing rules, enter:
|
No default. | |
Select the severity level to use in logs and reports generated when a violation of the rule occurs. |
Low
|
|
Enter the name of the trigger to apply when this rule is violated. For details, see log trigger-policy. The maximum length is 63 characters. To display the list of existing trigger policies, enter:
|
No default. | |
Enter the name of a list of exceptions to this blacklist. | No default. | |
Enter the index number of the individual entry in the table. The valid range is 1–9,999,999,999,999,999,999. | No default. | |
Enter the name of a region ( The list of locations varies by the currently installed IP-to-geography mapping package. For a current list of locations, use the web UI. |
No default. |
Example
This example creates a set of North American IP addresses that a server policy can use to block clients with IP addresses belonging to Belize and Canada. FortiWeb does not block the IP addresses specified by the allow-north-america
exception list.
config waf geo-block-list
edit "north-america"
set trigger "notification-servers1"
set exception rule "allow-north-america"
set severity Low
config country-list
edit 1
set country-name "Belize"
next
edit 2
set country-name "Canada"
next
end
next
end