- Create a 'Network Group' "Public Addresses" containg the "(Address)" objects for all 'Additional Addresses' and the primary IPs of all external interfaces. You must use these objects, and not manually-created 'Host' or 'Network' definitions.
- Create a group "Hackers" containing the offending networks.
- Create a 'Packet Filter' rule: 'Hackers -> Any -> Public Addresses : Drop'.
- Create a 'Network Group' "Public Addresses" containg the "(Address)" objects for all 'Additional Addresses' and the primary IPs of all external interfaces. You must use these objects, and not manually-created 'Host' or 'Network' definitions.
- Create a group "Hackers" containing the offending networks.
- Create a 'Packet Filter' rule: 'Hackers -> Any -> Public Addresses : Drop'.
- Create a 'Network Group' "Public Addresses" containg the "(Address)" objects for all 'Additional Addresses' and the primary IPs of all external interfaces. You must use these objects, and not manually-created 'Host' or 'Network' definitions.
- Create a group "Hackers" containing the offending networks.
- Create a 'Packet Filter' rule: 'Hackers -> Any -> Public Addresses : Drop'.
Let us know what you do to solve this issue.
Cheers - Bob
PS Oh, I just internalized the fact that you're using a DNAT for the traffic. I think the Packet Filter rule wouldn't be recognized. There are two other possible solutions:
-Instead you could make a DNAT above your DNAT for the SFTP server: 'Hackers -> {SFTP services} -> Public Addresses : DNAT to {non-existent internal IP}.
-Instead of the new DNAT, you use not the 'Automatic Firewall rule' in the DNAT for SFTP, and, instead, use Packet Filter rules with 'Hackers -> Any -> Any : Drop' above 'Internet -> {SFTP services} -> {SFTP server} : Allow'.