Description | This article describes how to use ISDB objects as a source IP address for local-in policy. |
Scope | FortiGate v7.4.4+. |
Solution |
Local-in policies use ISDB as a source address. Local-in policies are used to control the traffic destined for FortiGate interfaces.
For example: HTTP/HTTPS or SSH traffic can be allowed or denied by local-in policies. Another useful approach is to restrict the access to VPN/remote VPN access based on geographic type IP addresses.
Configuration:
config firewall local-in-policy
Note:
As of FortiOS v7.6.1, a new default local-in-policy has been added with internet service source enabled for Malicious-Malicious.Server, Tor-Exit.Node, and Tor-Relay.Node. This policy is designed to utilize these 3 ISDB sources to identify known malicious threat actors and prevent them from accessing any interface on the FortiGate on any service and port.
Note:
As of FortiOS v7.6.0, the Local-in-Policy can now be also configured in the GUI. Refer to Technical Tip: Creating a Local-In policy (IPv4 and IPv6) on the GUI.
By default, the action of the local-in rules is 'deny'. If the administrator wants to see logs for the blocking results of the local-in policy, the following change needs to be implemented under log settings:
config log setting
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.