Created on
12-23-2024
01:49 AM
Edited on
04-23-2025
06:53 AM
By
Jean-Philippe_P
| Description | This article describes using the local in policies in the FortiGate VM. |
| Scope | FortiGate. |
| Solution |
The Local policies cannot be created or edited in the FortiGate GUI. There are system-defined Local in Policies by default, and they cannot be removed.
From v7.6.0 onwards, it is also possible to configure them from the GUI: GUI support for local-in policies. config firewall address Create a local in policy by defining the interface as port5, source address as 11.11.11.0, and destination address as all for the service ping: config firewall local-in-policy In the debug logs, the output for the matching traffic will be dropped: id=20085 trace_id=1 func=fw_local_in_handler line=474 msg="iprope_in_check() check failed on policy 7, drop" To view the local in policies created in the CLI: config firewall local-in-policy Note 1: If the local in policy is defined and no action is set, then the default action will be set to Deny.
Note 2: Starting from FortiOS v7.6.x firmware custom local-in policies can be created and configured in the GUI in Policy & Objects -> Local-In Policy. Before the mentioned, only implicit read-only policies can be displayed.
In FortiOS v7.6.x tabs have also been implemented to separate IPv4 and IPv6 policies. IPv4 and IPv6 local-in policies can be created and edited in their respective tabs. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.