Description | This article describes how to use ISDB objects as a source IP address for local-in policy. |
Scope | FortiGate v7.4.4+. |
Solution |
Local-in policies use ISDB as a source address. Local-in policies are used to control the traffic destined for FortiGate interfaces.
For example: HTTP/HTTPS or SSH traffic can be allowed or denied by local-in policies. Another useful approach is to restrict the access to VPN/remote VPN access based on geographic type IP addresses.
Configuration:
config firewall local-in-policy
Note:
As of FortiOS v7.6.1, a new default local-in-policy has been added with internet service source enabled for Malicious-Malicious.Server, Tor-Exit.Node, and Tor-Relay.Node. This policy is designed to utilize these 3 ISDB sources to identify known malicious threat actors and prevent them from accessing any interface on the FortiGate on any service and port.
Note:
As of FortiOS v7.6.0, the Local-in-Policy can now be also configured in the GUI. Refer to Technical Tip: Creating a Local-In policy (IPv4 and IPv6) on the GUI.
By default, the action of the local-in rules is 'deny'. If the administrator wants to see logs for the blocking results of the local-in policy, the following change needs to be implemented under log settings:
config log setting
|