Created on
08-26-2025
11:47 PM
Edited on
09-07-2025
11:40 PM
By
Anthony_E
Description | This article describes a method to block specific traffic inside an SSID, without disabling all intra-SSID traffic. |
Scope | All FortiGate managed Wireless Networks (SSIDs). |
Solution |
In some cases, administrators may need to block traffic to a specific Wi-Fi client without disabling all intra-SSID communication. This article explains how to achieve this using an L3 Firewall Protection Profile.
Intra-SSID traffic (i.e., Wireless device-to-Wireless device) is enabled by default, and can be blocked (Technical Tip: Enable Intra-SSID Privacy) entirely by simply enabling the block option in the SSID; however, this stops ALL intra-SSID traffic, which may not be ideal or wanted.
Since this traffic does not traverse a different interface, it cannot be blocked with a standard Firewall Policy.
The solution here is to create and use an L3 Firewall Protection profile (Protection Profiles Entry, also known as an Access Control List) and assign this to the SSID.
In this example, the requirement is to simply block ICMP (ping) traffic from working to a particular wireless client (from any client on the SSID), but this could easily be adapted to block any other protocol (e.g., TCP, UDP) and/or be restricted to particular clients (source IP Addresses) or source ports too.
The steps are as follows:
From the FortiGate GUI, select: WiFi & Switch Controller -> Protection Profiles -> L3 Firewall Profiles -> + Create New.
In this example, ICMP / Ping (IANA Protocol 1) to 192.168.40.42 is blocked from ANY IP Address:
Add the required fields, then select OK to view the new rule:
At this point, optionally create any other rules. Only a single Protection Profile can be attached to an SSID, so multiple rules must be combined into a single profile.
(CLI Steps using the same example to create the rule):
config wireless-controller access-control-list
Navigate to: WiFi & Switch Controller -> SSIDs.
Select the relevant SSID and select Edit:
Scroll down the page and find the L3 firewall profile in Advanced Settings and select the new profile to attach it to the SSID:
Select OK, and it is ready to test (CLI Steps to attach to the SSID).
config wireless-controller vap set access-control-list "Block Ping to 192.168.40.42"
This example shows where ping worked previously, and it was then blocked (after the L3 Firewall profile was added to the SSID):
Related articles: Technical Note: How to configure intra-SSID privacy |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.