Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
BusinessUser
Contributor

Create Multiple Firewall Rules For Each Subinterface?

I have a physical interface "internal1" with 3 subinterfaces.

I have another physical interface "internal2".

If i want to create firewall rule to allow traffic from "internal1" to "internal2",

do i have to create 1 firewall rule only or i have to do 3 firewall rules?

1 Solution
Nchandan
Staff
Staff

In your case, if you have a physical interface "internal1" with three subinterfaces (let's call them Sub1, Sub2, and Sub3), and another physical interface "internal2," you would need to create three firewall rules to allow traffic from each subinterface of "internal1" to "internal2."

 

Policy1

Source Interface: internal1:Sub1 Destination Interface: internal2 Action: Allow

 

Policy2 

Source Interface: internal1:Sub2 Destination Interface: internal2 Action: Allow

 

Policy3

Source Interface: internal1:Sub3 Destination Interface: internal2 Action: Allow

 

Each rule specifies the source and destination interfaces, allowing traffic between the specified subinterfaces on "internal1" and "internal2." This approach ensures that you have control over traffic between each pair of subinterfaces.

View solution in original post

5 REPLIES 5
pminarik
Staff
Staff

A firewall policy for "internal-X" will not match traffic for any of its sub-interfaces. "internal-X" and its sub-interfaces are independent logical interfaces, and any permutation of A->B traffic flow must be addressed with a firewall policy for specifically A->B.

 

The only exception would be using "any" as a source/destination interface in a policy, or if you were to select multiple interfaces as source/destination in a policy. (this needs to be enabled in Feature Visibility first for the GUI to allow it)

[ corrections always welcome ]
mle2802
Staff
Staff

Hi @BusinessUser,

You can run sniffer to identify the flow of the traffic if it is just from internal1 to 2, then you will not need the sub-interface policy.

hbac
Staff
Staff

Hi @BusinessUser,

 

I believe internal1 and its 3 subinterfaces are in different subnets/VLANs. It depends which subnets you want to allow to access internal2, you need to create a firewall policy for that interface. 

 

Regards, 

LunarEcho
New Contributor II

I'd go for one rule covering all subinterfaces on "internal1". Keeps things simple and less maintenance. Just make sure the rule applies to all traffic between "internal1" and "internal2".

Nchandan
Staff
Staff

In your case, if you have a physical interface "internal1" with three subinterfaces (let's call them Sub1, Sub2, and Sub3), and another physical interface "internal2," you would need to create three firewall rules to allow traffic from each subinterface of "internal1" to "internal2."

 

Policy1

Source Interface: internal1:Sub1 Destination Interface: internal2 Action: Allow

 

Policy2 

Source Interface: internal1:Sub2 Destination Interface: internal2 Action: Allow

 

Policy3

Source Interface: internal1:Sub3 Destination Interface: internal2 Action: Allow

 

Each rule specifies the source and destination interfaces, allowing traffic between the specified subinterfaces on "internal1" and "internal2." This approach ensures that you have control over traffic between each pair of subinterfaces.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors