Description | This article describes the FMG-Access setting available on each network interface for the FortiGate, including its intended purpose, what it does at a functional level, and whether or not it is required for day-to-day management of the FortiGate by FortiManager. |
Scope | FortiGate, FortiManager. |
Solution |
The core purpose of the FMG-Access toggle is to determine if the FortiGate will accept incoming connection attempts from FortiManager for discovery and for FGFM management tunnel establishment for destination port TCP/541: FGFM - FortiGate to FortiManager Protocol. Note that this is not the same thing as the FortiGate making outbound connections to FortiManager after it is configured for central-management, which means that it is not necessary to leave FMG-Access enabled if the FortiGate can successfully initiate outgoing connections to FortiManager.
For example, when connecting a FortiGate to FortiManager for the first time, there are generally two options to accomplish this:
Once the initial management settings and FGFM tunnel are established, the FortiGate will know the FortiManager's network address and will re-initiate tunnel establishment whenever it goes down.
What does the FMG-Access setting actually do/allow? When this option is enabled, the FortiGate will add an implicit Local-In Policy that allows TCP/541 traffic inbound on the associated network interface. This can be seen in the GUI for FortiOS v7.6+ (Policy & Objects -> Local-In Policy), and it can also be seen in the CLI for all FortiOS versions with the command diagnose firewall iprope list 10000e.
FortiGate # diagnose firewall iprope list 10000e [...] policy index=4294967295 uuid_idx=10 action=accept [...]
When should FMG-Access be enabled/disabled? This setting can be enabled in situations where the FortiGate is unable to initiate a connection to FortiManager itself and is reliant on FortiManager initiating the management tunnel connection, but otherwise it should be disabled if not required as a means of reducing potential attack surface. Additionally, the setting should only be enabled on FortiGate interfaces that FortiManager is actually expected to form connections to.
Consider the following examples where one might enable FMG-Access on a FortiGate interface:
Note that in most scenarios, alternative options exist that allow the FortiGate to initiate the FGFM tunnel connection to FortiManager. For example:
Where is FMG-Access enabled/disabled? For reference, the FMG-Access option can be found in the Administrative Access section for each FortiGate's interface configuration. It can also be set in the CLI via set allowaccess fgfm:
config system interface edit <interface_name> set allowaccess fgfm next end
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.