To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".
Per Policy Geo-IP block use the default group "Default Geo-IP and Botnet Exclusion Group" ?
I have made test using packet capture and I think that answer is no.
*Packet number: 105*
Header Values:
Bytes captured: 74, Actual Bytes on the wire: 74
Packet Info(Time:06/12/2023 14:59:10.208):
in:X1*(interface), out:--, DROPPED, Drop Code: 630(Packet dropped - Per Policy Geo-IP block for existing init country, country loc: FirewallDefaultTree), Module Id: 25(network), (Ref.Id: _4162_hfpJqIppl), 15:15)
Ethernet Header
Ether Type: IP(0x800), Src=[38:bc:01:61:08:8d], Dst=[c2:ea:e4:f5:65:af]
IP Packet Header
IP Type: TCP(0x6), Src=[62.77.154.57], Dst=[192.168.5.7]
TCP Packet Header
TCP Flags = [SYN,], Src=[50122], Dst=[25], Checksum=0x864
Application Header
Smtp
Value:[0]
Hex and ASCII dump of the packet:
c2eae4f5 65af38bc 0161088d 08004500 003c4efa 40003706 *....e.8..a....E..<N.@.7.*
b73f3e4d 9a39c0a8 0507c3ca 0019b5e4 cd100000 0000a002 *.?>M.9..................*
faf00864 00000204 05b40402 080af132 6e690000 00000103 *...d...........2ni......*
0307 *.. *
add ip to Default Geo-IP and Botnet Exclusion Group same problem
*Packet number: 94*
Packet Info(Time:06/12/2023 15:03:33.576):
in:X1*(interface), out:--, DROPPED, Drop Code: 630(Packet dropped - Per Policy Geo-IP block for existing init country, country loc: FirewallDefaultTree), Module Id: 25(network), (Ref.Id: _4162_hfpJqIppl), 11:11)
Ether Type: IP(0x800), Src=[38:bc:01:61:09:7d], Dst=[c2:ea:e4:f5:65:af]
TCP Flags = [SYN,], Src=[34896], Dst=[25], Checksum=0xb7f2
c2eae4f5 65af38bc 0161097d 08004500 003c65cc 40003706 *....e.8..a.}..E..<e.@.7.*
a06d3e4d 9a39c0a8 05078850 0019f80e 11f90000 0000a002 *.m>M.9.....P............*
faf0b7f2 00000204 05b40402 080af136 733e0000 00000103 *...............6s>......*
0307
Answers
I have made test using packet capture and I think that answer is no.
*Packet number: 105*
Header Values:
Bytes captured: 74, Actual Bytes on the wire: 74
Packet Info(Time:06/12/2023 14:59:10.208):
in:X1*(interface), out:--, DROPPED, Drop Code: 630(Packet dropped - Per Policy Geo-IP block for existing init country, country loc: FirewallDefaultTree), Module Id: 25(network), (Ref.Id: _4162_hfpJqIppl), 15:15)
Ethernet Header
Ether Type: IP(0x800), Src=[38:bc:01:61:08:8d], Dst=[c2:ea:e4:f5:65:af]
IP Packet Header
IP Type: TCP(0x6), Src=[62.77.154.57], Dst=[192.168.5.7]
TCP Packet Header
TCP Flags = [SYN,], Src=[50122], Dst=[25], Checksum=0x864
Application Header
Smtp
Value:[0]
Hex and ASCII dump of the packet:
c2eae4f5 65af38bc 0161088d 08004500 003c4efa 40003706 *....e.8..a....E..<N.@.7.*
b73f3e4d 9a39c0a8 0507c3ca 0019b5e4 cd100000 0000a002 *.?>M.9..................*
faf00864 00000204 05b40402 080af132 6e690000 00000103 *...d...........2ni......*
0307 *.. *
add ip to Default Geo-IP and Botnet Exclusion Group same problem
*Packet number: 94*
Header Values:
Bytes captured: 74, Actual Bytes on the wire: 74
Packet Info(Time:06/12/2023 15:03:33.576):
in:X1*(interface), out:--, DROPPED, Drop Code: 630(Packet dropped - Per Policy Geo-IP block for existing init country, country loc: FirewallDefaultTree), Module Id: 25(network), (Ref.Id: _4162_hfpJqIppl), 11:11)
Ethernet Header
Ether Type: IP(0x800), Src=[38:bc:01:61:09:7d], Dst=[c2:ea:e4:f5:65:af]
IP Packet Header
IP Type: TCP(0x6), Src=[62.77.154.57], Dst=[192.168.5.7]
TCP Packet Header
TCP Flags = [SYN,], Src=[34896], Dst=[25], Checksum=0xb7f2
Application Header
Smtp
Value:[0]
Hex and ASCII dump of the packet:
c2eae4f5 65af38bc 0161097d 08004500 003c65cc 40003706 *....e.8..a.}..E..<e.@.7.*
a06d3e4d 9a39c0a8 05078850 0019f80e 11f90000 0000a002 *.m>M.9.....P............*
faf0b7f2 00000204 05b40402 080af136 733e0000 00000103 *...............6s>......*
0307