- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
12-26-2023 03:52 PM
Hi @ccortijo ,
Traffic from the untrust zone to the interface in the same untrust zone is allowed by the intrazone-default rule. The easiest way to solve your problem is to create a drop rule (which will be above intrazone-default) that will drop all countries you do not want.
Rule Type: intrazone
Source Zone: Untrust
Source Address: List you countries you want to allow and check Negate.
Destination Address: Portal IP (could also be any if you want to block for all public IP addresses)
Application: Any
Service/URL Category: Any
Action: Drop
You can choose not to log if you don't want the clutter, but you may need to enable for troubleshooting.
You can also stop 99% of the brute force attacks by disabling the portal login page.
Thanks,
Tom