Created on 
    
	
		
		
		10-25-2023
	
		
		01:51 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
  Edited on 
    
	
		
		
		01-19-2025
	
		
		09:50 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 By  
				
		
		
			Anthony_E
		
		
		
		
		
		
		
		
	
			 
		
| Description | This article describes how to block the IGMP protocol using a local policy. | 
| Scope | FortiGate v6.0 and above. | 
| Solution | 
 If it is necessary to block a specific protocol when it reaches a FortiGate interface without needing to know the port used, follow this method. 
 The IGMP protocol will be blocked in this example. 
 Create a custom firewall service: 
 config firewall service custom edit IGMP set category "Network Services" set protocol IP set protocol-number 2 next end 
 Find a list of protocols and their corresponding numbers in the FortiGate handbook 
 After, it will only be necessary to create the local in policy using the new custom service: 
 config firewall local-in-policy edit 1 set intf wan1 set srcaddr all set dstaddr all set service IGMP set schedule always set action deny next end 
 This method can be used to block some other protocols as well. 
 Note 1:  
 Note 2: After upgrading to v7.4.6 or v7.6.1, local in policies will be removed or show an empty value if the interface is part of the SD-WAN zone. After the upgrade, manually create the local in policy again with the SD-WAN zone. After these upgrades, member interfaces of the SD-WAN zone can not be assigned individually in local in policies. Refer to this KB article for the above upgrade change information:Troubleshooting Tip: Local-in, Central-SNAT, DoS policies etc are missing after upgrade to FortiOS v...  | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.