Created on 11-11-2024 11:02 AM Edited on 01-14-2025 11:42 PM By Anthony_E
Description | This article describes different types of iprope policy groups for local-in traffic and how they are enforced on local-in traffic. |
Scope | FortiGate. |
Solution |
The iprope table on FortiGate devices contains various iprope policy groups designed to match different types of traffic. Each policy group is critical for determining how traffic is processed upon reaching the FortiGate. For a comprehensive explanation of iprope policy groups, refer to Technical Tip: Iprope policies group. For the local-in traffic, there are five different iprope policy groups to be enforced to. They are:
00100000 [VIP] 00100011 [ ZTNA_PROXY ] 00100001 [ CUST_LOCAL_IN ] 0010000e [ IMPLICIT_IN ] 0010000f [ ADMIN_IN ]
00100000 [VIP] and 00100011 [ ZTNA_PROXY ]: When a Virtual IP (VIP) or Zero Trust Network Access (ZTNA) proxy is configured on a FortiGate device, the corresponding iprope policies are automatically populated in their respective groups. This automatic configuration ensures that incoming traffic can access the specified external IP and port. For a detailed understanding of how iprope VIP policies are matched, refer to this article.
00100001 [ CUST_LOCAL_IN ]: This is the iprope policy group for the custom local-in policy configured on FortiGate. This group will be matched by the local-in traffic if there is no match in VIP and ZTNA. When the custom local-in policy is configured, the corresponding iprope policy will populate in the group 00100001.
For example:
The corresponding group policy is below:
The following debug flow indicates that when the local-in traffic hit this policy 2 in the group 00100001, it was dropped immediately.
0010000e [ IMPLICIT_IN ]:
The iprope policy group 0010000e is designated for managing local-in policies related to various services running on FortiGate devices, including BGP, IPsec, SSL VPN, and others. This policy group ensures that the necessary ports are opened to facilitate the operation of these services.
For example, when the IPsec VPN is configured, UDP port 500 and UDP/TCP 4500 are opened to accept the incoming IPsec tunnel negotiation. If the IKE port is changed in the system settings, the policy within this group will automatically update to reflect the new port configuration.
If a specific service is not enabled on the FortiGate device, no corresponding local-in policy will be generated for its associated ports within this group. As a result, any incoming traffic targeting those ports will be dropped by the last policy in this group, as below:
0010000f [ ADMIN_IN ]: The iprope policy group 0010000f consists of local-in policies that restrict the admin access to the FortiGate. Policies in this group are automatically populated based on the protocol type of ‘Administrative Access’ enabled on the interface and trust host setting under system administrator.
When the specific ‘Administrative Access’ (such as HTTPS, SSH, HTTP, SNMP) is enabled on the interface level, the corresponding port will be opened by the auto-populated policy in this group. In the following example, when ping, https, ssh, http and telnet are all enabled on the interface, the policy is generated to open up the TCP port 443, 22, 23 and 80. Also, the proto 1 is added in the policy to allow the ICMP traffic.
If all the system administrators have the trust host enabled, the policy with the corresponding trust host IP as source will be populated to allow the admin traffic from these hosts. In the following example, only traffic from these hosts is able to match these two policies: otherwise, it will be dropped by the implicit policy at the end of this group (similar to 0010000e).
Note: the ICMP will not be restricted by the trust host. Thus, the proto 1 is not added into these two policies. Instead, there is another separate policy in this group to allow the ICMP in this scenario as below.
There has been a vulnerability FG-IR-24-535 that could potentially allow remote users to access FortiGate via HTTPS/HTTP without authentication in v7.0. The workaround is to apply the local-in policy for the HTTPS/HTTP port or disable the HTTPS/HTTP ports on public facing interfaces. These two methods are respectively enforced by the custom local-in policy group and implicit-in group.
Trust host is another workaround but when using this feature to mitigate the vulnerability of FG-IR-24-535, please make sure all administrators have trust host configured as in the above example.
Summary:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.