Hi,
I have imported 2 FGT with their policy package in one ADOM. The policy and other was already configured.
In this scenario there is 2 different policy package, one for FGT. The physical interface or zone of FGTs are different name from each other.
How do I configured a shared policy for web navigation unique for both?
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
Select one of these two packages as the master package. In this package you have to do two things:
1. Go to the "Installation targets" and add both fortigates as targets (one FG should be already a target).
2. Go to "Objects configurations" and make interface mappings for all interfaces engaged in policies for both FGs. An interface mapping should be like:
FMG interface object A <-> FG-1 interface X
FMG interface object A <-> FG-2 interface Y
FMG interface object B <-> FG-1 interface XX
FMG interface object B <-> FG-2 interface YY
and so on...
(2b. You might also need address objects mappings or other mappings as well, for example if one address object has different value in one FG than the other).
When you finish with all this, you'll have a single policy package with both FGs as installation targets and interface mappings for all interfaces of all FGs. Any change you make in this policy package during installation will be installed to both FGs.
You must remember this: Having a single policy package for many FGs is a very good practice, but you need to keep an order in many things: like the naming convention, in maintaining a common policy for all FGs, in the addressing, etc. If you cannot maintain this order, then you'll end up with a complex and impossible to manage policy package.
Cheers
Hi,
Select one of these two packages as the master package. In this package you have to do two things:
1. Go to the "Installation targets" and add both fortigates as targets (one FG should be already a target).
2. Go to "Objects configurations" and make interface mappings for all interfaces engaged in policies for both FGs. An interface mapping should be like:
FMG interface object A <-> FG-1 interface X
FMG interface object A <-> FG-2 interface Y
FMG interface object B <-> FG-1 interface XX
FMG interface object B <-> FG-2 interface YY
and so on...
(2b. You might also need address objects mappings or other mappings as well, for example if one address object has different value in one FG than the other).
When you finish with all this, you'll have a single policy package with both FGs as installation targets and interface mappings for all interfaces of all FGs. Any change you make in this policy package during installation will be installed to both FGs.
You must remember this: Having a single policy package for many FGs is a very good practice, but you need to keep an order in many things: like the naming convention, in maintaining a common policy for all FGs, in the addressing, etc. If you cannot maintain this order, then you'll end up with a complex and impossible to manage policy package.
Cheers
I use the default policy package for this. This is deployed to all our FGT so all have the same policies (at least if they match the installation target(s) of the policy). So I just need dynamic objects/interfaces with corresponding mappings per device. Some objects I also maintain in the global adom's default policy package.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1662 | |
1077 | |
752 | |
446 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.