Description | This article describes how to create a FortiManager local-in policy via CLI. |
Scope | FortiManager v7.2.0 and higher. |
Solution |
Starting from FortiManager v7.2.0 and onward, users can create a FortiManager local-in policy to control inbound traffic to a FortiManager interface. This feature is just a basic, implicit-allow, inbound access control list. FortiManager is essentially a server, not a firewall, and it is recommended to be placed in a protected network segment.
By default there are no local-in policies configured, and FortiManager is 'accepting' inbound connections to all enabled services.
config system local-in-policy edit <id> set action {accept | drop | reject} set dport <integer> set dst <ip&netmask> set intf <string> set protocol {tcp | tcp_udp | udp} set src <ip&netmask> end end
Below is an example of a local-in policy configuration, where:
config system local-in-policy set dport 541
Note that the local-in policies are applied only on the inbound, from FortiManager perspective, traffic. Having such a configuration, as in the above example, would not prevent FortiManager from initiating an FGFM tunnel to a FortiGate in other than the trusted network. However, if this tunnel is interrupted, only FortiManager would be able to reclaim it.
Related article: |