Internet Security

How To Block Mobile Device In Fortigate Firewall

When it comes to protecting your network, blocking mobile devices in a Fortigate Firewall is an essential step. Did you know that mobile devices can pose significant security risks, as they can be easily compromised and used as entry points for cyber attacks? With the increasing reliance on smartphones and tablets, it's crucial to have effective measures in place to prevent unauthorized access and protect sensitive information.

Blocking mobile devices in a Fortigate Firewall involves implementing policies and rules that restrict their access to your network. By doing so, you can prevent potential threats, such as data breaches and malware infections, from infiltrating your systems. Fortigate Firewall offers comprehensive features and functionalities that allow you to control and manage mobile devices, ensuring a secure and productive environment for your organization.



How To Block Mobile Device In Fortigate Firewall

Understanding Mobile Device Blocking in Fortigate Firewall

Fortigate Firewall is a powerful network security device that provides comprehensive protection for your network infrastructure. In addition to its traditional firewall capabilities, Fortigate Firewall allows you to control and manage mobile devices connected to your network. This article will guide you through the process of blocking mobile devices in Fortigate Firewall, ensuring that your network remains secure and protected.

Step 1: Accessing Fortigate Firewall Interface

The first step in blocking mobile devices in Fortigate Firewall is to access the Fortigate Firewall interface. To do this, open your preferred web browser and enter the IP address of your Fortigate Firewall device in the address bar. You will be prompted to enter your login credentials to access the Fortigate Firewall interface. Once logged in, you will have full access to the Firewall's configuration settings.

It is essential to have administrative access to the Fortigate Firewall to make configuration changes. If you do not have administrative access, contact your system administrator or the person responsible for managing the Firewall for assistance.

Step 1.1: Navigating to the Device List

After accessing the Fortigate Firewall interface, navigate to the "Device List" section. The Device List contains all the devices connected to your network, including mobile devices. To access the Device List, locate the "Menu" or "Configuration" tab, depending on the Fortigate Firewall version you are using. From the menu, select "Device List" or a similar option.

Step 1.2: Selecting the Mobile Device

Once you are in the Device List, locate and select the mobile device you want to block. The Device List will display a list of all devices connected to the network. You can identify the mobile device by its IP address, MAC address, or hostname. Select the device you wish to block by clicking on it.

Step 1.3: Accessing Device Configuration Settings

After selecting the mobile device, you will be directed to its configuration settings. In this section, you can view and modify various settings related to the device, including blocking and filtering options. To proceed with blocking the device, proceed to the next step.

Step 2: Blocking the Mobile Device

Now that you have accessed the configuration settings of the mobile device, you can block it by following these steps:

  • Locate the "Block" or "Filtering" tab within the device configuration settings.
  • Select the appropriate blocking or filtering option depending on your requirements. This can include blocking specific ports, protocols, or applications.
  • Enable the blocking or filtering option by toggling the switch to the "On" position.
  • Save the changes to apply the blocking settings to the mobile device.

Once you have completed these steps, the mobile device will be blocked from accessing the network according to the specified blocking or filtering rules. It is crucial to review and test the blocking settings to ensure they meet your network security requirements.

Step 3: Monitoring and Managing Blocked Devices

After blocking a mobile device, it is essential to monitor and manage the blocked devices to ensure the effectiveness of your network security measures. Fortigate Firewall provides various tools and features to help you monitor and manage blocked devices:

Step 3.1: Event Logs

The Event Logs feature in Fortigate Firewall provides a detailed record of all network activities, including blocked devices and attempts to access restricted resources. By regularly reviewing the event logs, you can identify any suspicious or unauthorized activities on your network. You can access the Event Logs through the Fortigate Firewall interface or by exporting them for further analysis.

Step 3.2: Intrusion Prevention System (IPS)

The Intrusion Prevention System (IPS) feature in Fortigate Firewall helps detect and prevent malicious activities on your network. By enabling IPS, you can enhance the security of your network and ensure that any attempted breaches or attacks are blocked at the firewall level. Regularly reviewing and updating the IPS configurations will help keep your network protected against emerging threats.

Step 3.3: Network Access Control (NAC)

The Network Access Control (NAC) feature in Fortigate Firewall allows you to define and enforce network access policies. By creating specific policies for blocked devices, you can control their access to network resources and prevent unauthorized activities. Regularly reviewing and updating the NAC policies will help strengthen the security of your network.

Step 4: Periodic Review and Updates

Blocking mobile devices in Fortigate Firewall is an ongoing process. It is crucial to periodically review and update the blocking rules and configurations to ensure the continued security of your network. Regularly monitoring network activities and keeping up-to-date with the latest security threats will help you make informed decisions when it comes to blocking and managing mobile devices.

By following these steps and implementing a robust mobile device blocking strategy, you can ensure that your network remains secure and protected from potential security risks posed by mobile devices.


How To Block Mobile Device In Fortigate Firewall

Blocking Mobile Devices in Fortigate Firewall

In order to block mobile devices in a Fortigate firewall, you can follow these steps:

1. Access the Fortigate firewall's web-based interface by entering the device's IP address in a web browser.

2. Log in to the firewall using the admin credentials.

3. Navigate to the "Security Profiles" section and select "Application Control" from the menu.

4. In the "Application Control" settings, click on "Create New" to define a new policy.

5. In the policy settings, choose the desired application category or specific applications that you want to block on mobile devices.

6. Configure other settings such as schedule, action, and logging as per your requirements.

7. Click "OK" to apply the policy and block the selected applications on mobile devices.

8. Apply the policy to specific interfaces or zones where the mobile devices are connected.

By following these steps, you can effectively block mobile devices from accessing specific applications or categories on your Fortigate firewall.


Key Takeaways - How to Block Mobile Device in Fortigate Firewall

  • Fortigate Firewall can be used to block mobile devices on the network.
  • By creating a device sensor, administrators can identify mobile devices connected to the network.
  • The device sensor can then be used to create a security policy to block these devices.
  • Using FortiClient, admins can apply an endpoint control profile to enforce mobile device restrictions.
  • Implementing SSL Inspection can help detect and block unauthorized mobile device traffic.

Frequently Asked Questions

Here are some commonly asked questions about blocking mobile devices in Fortigate Firewall:

1. Can I block specific mobile devices from accessing my network using Fortigate Firewall?

Yes, you can block specific mobile devices from accessing your network using Fortigate Firewall. Fortigate offers a feature called "Device Identification" that allows you to identify and block specific devices based on their MAC address or other identifying information. By adding the MAC address of the mobile device to the blocked device list, you can prevent it from accessing your network.

Additionally, Fortigate Firewall allows you to create policies and rules to control access based on device type or operating system. This way, you can restrict mobile devices from accessing your network altogether or allow only specific devices to connect.

2. How can I block mobile devices based on their MAC address in Fortigate Firewall?

To block mobile devices based on their MAC address in Fortigate Firewall, follow these steps:

  • Login to the Fortigate Firewall interface and go to the "Device Identification" section.
  • Select "MAC Address" as the identification method.
  • Add the MAC addresses of the mobile devices you want to block to the blocked device list.
  • Save the changes.

Once the MAC addresses of the mobile devices are added to the blocked device list, the Fortigate Firewall will prevent those devices from accessing your network.

3. Can I block mobile devices from accessing specific websites or applications?

Yes, Fortigate Firewall allows you to block mobile devices from accessing specific websites or applications. You can create URL filtering policies or application control policies to block access to specific websites or applications based on categories, domains, or specific URLs.

By configuring these policies, you can restrict mobile devices from accessing websites or applications that are deemed inappropriate or pose a security risk.

4. Is it possible to block mobile devices temporarily in Fortigate Firewall?

Yes, it is possible to block mobile devices temporarily in Fortigate Firewall. Fortigate offers a feature called "Scheduling" that allows you to create time-based policies. By creating a policy to block mobile devices during specific time intervals, you can temporarily restrict their access to the network.

This can be useful in scenarios where you want to limit access to certain devices during working hours or certain peak times.

5. Can I monitor the network activity of blocked mobile devices in Fortigate Firewall?

Yes, Fortigate Firewall provides various monitoring and reporting features that allow you to track the network activity of blocked mobile devices. You can view logs and reports to analyze the traffic generated by these devices, including the websites visited, applications used, and bandwidth consumed.

This visibility is crucial in identifying potential security threats or unauthorized access attempts from blocked mobile devices.



To conclude, blocking a mobile device in Fortigate Firewall is a straightforward process that can help enhance network security. By following a few key steps, such as identifying the device's IP address and creating a firewall policy, you can effectively restrict access from specific mobile devices. Understanding the importance of blocking unwanted devices can prevent potential security breaches and unauthorized access to your network.

Additionally, regularly reviewing and updating your firewall rules will ensure that your network remains secure. It's important to stay proactive by regularly monitoring the devices connected to your network and adjusting firewall policies accordingly. By implementing these measures, you can enjoy a safer and more secure network environment.


Recent Post