Created on
10-06-2025
10:52 PM
Edited on
10-29-2025
11:25 AM
By
Stephen_G
This article describes how to block TCP ports using an Access Control List (ACL) on FortiGate to mitigate DDoS attacks. It provides a step-by-step guide on configuring an ACL to block specific ports and explains the difference between using an ACL and a local-in policy.
FortiGate.
It is important to note that the ACL is implemented on models with an NPU and ISF (Integrated Switch Fabric), and therefore only specific models have this feature.
The following FortiGate models support ACLs:
100D, 100E, 100EF, 101E
140D, 140D-POE, 140E, 140E-POE
1500D, 1500DT
3000D, 3100D, 3200D, 3700D, 3800D
All 300E and larger E-series models
All 100F and larger F-series models
To block specific TCP ports using an ACL on FortiGate, follow these steps:
Note:
The FortiGate CPU handles local-in policies and does not offload them to the Network Processing Unit (NPU). However, ACLs can be offloaded to the NPU7, which can help reduce CPU usage.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.