Description | This article describes how to create a FortiManager local-in policy via CLI. |
Scope | FortiManager v7.2.0 and higher. |
Solution |
Starting from FortiManager v7.2.0 and onward, users can create a FortiManager local-in policy to control inbound traffic to a FortiManager interface. This feature is just a basic, implicit-allow, inbound access control list. FortiManager is essentially a server, not a firewall, and it is recommended to be placed in a protected network segment.
By default there are no local-in policies configured, and FortiManager is 'accepting' inbound connections to all enabled services.
config system local-in-policy edit <id> set action {accept | drop | reject} set dport <integer> set dst <ip&netmask> set intf <string> set protocol {tcp | tcp_udp | udp} set src <ip&netmask> end end
Below is an example of a local-in policy configuration, where:
config system local-in-policy set dport 541
Note that the local-in policies are applied only on the inbound, from FortiManager perspective, traffic. Having such a configuration, as in the above example, would not prevent FortiManager from initiating an FGFM tunnel to a FortiGate in other than the trusted network. However, if this tunnel is interrupted, only FortiManager would be able to reclaim it.
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.