Created on
11-24-2021
02:25 PM
Edited on
03-13-2025
01:39 AM
By
Anthony_E
Description | This article discusses how to configure IP to MAC binding settings on FortiGate. |
Scope | FortiGate v6.0 and later. |
Solution |
IP/MAC binding protects the FortiGate and/or the network from IP address spoofing attacks. IP spoofing attacks attempt to use the IP address of a trusted computer to connect to, or through, the FortiGate from a different computer. It is simple to change a computer’s IP address to mimic that of a trusted host, but MAC addresses are often added to Ethernet cards at the factory and are more difficult to change. By requiring that traffic from trusted hosts reflect both the IP address and MAC address known for that host, fraudulent connections are more difficult to construct.
When an internal DHCP server is behind a FortiGate firewall, it is responsible for assigning IP addresses to devices on the network. To ensure that specific devices always receive the same IP address, reservations must be configured on the DHCP server based on the device's MAC address. This prevents other devices from using these reserved IP addresses and ensures that only authorized devices can access the Internet.
Since FortiGate is not acting as the DHCP server in this setup, it does not handle IP addresses to MAC binding assignments directly.
Alternatively, IP/MAC binding can be implemented at the interface level on FortiGate, if FortiGate is acting as DHCP server.
Configuration:
config firewall ipmacbinding table edit {seq-num} ---> Sequence number for IP to MAC address pairs in the IP/MAC binding table. set ip {ipv4 address} ---> IPv4 address portion of the pair (format: xxx.xxx.xxx.xxx), source user system ip address next end
Example :
config firewall ipmacbinding table edit 1 set ip 172.31.139.62 next end
Configuration:
config firewall ipmacbinding setting set bindthroughfw [enable|disable] --->Enable/disable use of IP/MAC binding to filter packets that would normally go through the firewall. end
set bindthroughfw enable end
edit "port2" set vdom "root" next end
Verification:
FGT1# diagnose firewall ipmac list FGT1 # diagnose firewall ipmac status
Note:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.