FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
gakshay
Staff
Staff
Article Id 195090
Description
Geographic-based Internet Service Database (ISDB) objects allows users to define a country, region, and city.
These objects can be used in firewall policies for more granular control over the location of the parent ISDB object.
ISDB objects are now referenced in policies by name instead of ID.

This article describes how to allow creation of ISDB objects with regional information.


Solution
To apply a location-based ISDB object to a policy from the GUI.

1) Create the ISDB object.
- Go to Policy & Objects -> Internet Service Database and select 'Create New'.
- For Type, select Geographic Based, and configure the other settings as needed.
- Select 'OK'.


2) View the IP ranges in the location-based internet service.
- Go to Policy & Objects -> Internet Service Database.
- In the table, hover over the object created in step 1) and select 'View/Edit Entries'.

The list of IPs is displayed.





- Select 'Return'.

3) Add the ISDB object to a policy.
- Go to Policy & Objects -> Firewall Policy. Create a new policy or edit an existing policy.
- For Destination, select 'Internet Service' and select the ISDB object created in step 1).
- Configure the other settings as needed.
- Select 'OK'.




To apply a location-based ISDB object to a policy from the CLI.

1) Create the ISDB object.
# config firewall internet-service-name
    edit "test-locaction-isdb-1"
        set type location
        set internet-service-id 65536
        set country-id 840
        set region-id 283
        set city-id 23352
    next
end
2) View the IP ranges in the location-based internet service.
# diagnose internet-service id 65536 | grep "country(840) region(283) city(23352)"
96.45.33.73-96.45.33.73 country(840) region(283) city(23352) blacklist(0x0) reputation(4), domain(5) popularity(0) botnet(0) proto(6) port(1-65535) 96.45.33.73-96.45.33.73 country(840) region(283) city(23352) blacklist(0x0) reputation(4), domain(5) popularity(0) botnet(0) proto(17) port(1-65535) 198.94.221.56-198.94.221.56 country(840) region(283) city(23352) blacklist(0x0) reputation (4), domain(5) popularity(4) botnet(0) proto(6) port(1-65535) 198.94.221.56-198.94.221.56 country(840) region(283) city(23352) blacklist(0x0) reputation (4), domain(5) popularity(4) botnet(0) proto(17) port(1-65535)
3) Add the ISDB object to a policy.
# config firewall policy
    edit 99
        set name "Demo_Policy"
        set srcintf "wan2"
        set dstintf "wan1"
        set srcaddr "all"
        set internet-service enable
        set internet-service-name "test-locaction-isdb-1"
        set action accept
        set schedule "always"
        set logtraffic all
        set logtraffic-start enable
        set auto-asic-offload disable
        set nat enable
    next
end

Contributors