Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
vvserpent
New Contributor II

Firewall Action

Hi,

 

The security auditor came to our office to check the Firewall Policies.  The guy suggests to configure the Firewall Access Rule to "DROP" the unwanted traffic instead of "DENY". 

 

When setup Firewall Access Rule, I can select "ACCEPT" or "DENY" only.

 

Is it possible to configure the Fortinet Firewall do "DROP" instead of "DENY" ? 

 

Regards,

 

11 REPLIES 11
lobstercreed
Valued Contributor

emnoc wrote:

 

IMHO you will never ever send a tcp reset for a deny policy ( I can't think of one validate case that would warrant it )

 

 

Been running FortiGates for most of the last 7 years and literally JUST found the use case for it today.  Something in the Windows logon process is causing PCs in our classroom computer labs to try to connect to our domain controllers on TCP port 80.  They don't have anything running on 80, but when this traffic was allowed (by the firewall) the DCs would send rejects quickly and the PCs would move on and complete the logon. When I isolated these computer labs in the firewall and dropped the port 80 traffic logon times increased exponentially.  A packet capture revealed that the PCs waited for about 10-15 seconds per DC before timing out.  So I put in a new deny rule with send-deny-packet enabled and voila!  Logon times went back to normal.

rwpatterson
Valued Contributor III

lobstercreed wrote:

emnoc wrote:
IMHO you will never ever send a tcp reset for a deny policy ( I can't think of one validate case that would warrant it )

 

Been running FortiGates for most of the last 7 years and literally JUST found the use case for it today.  Something in the Windows logon process is causing PCs in our classroom computer labs to try to connect to our domain controllers on TCP port 80.  They don't have anything running on 80, but when this traffic was allowed (by the firewall) the DCs would send rejects quickly and the PCs would move on and complete the logon. When I isolated these computer labs in the firewall and dropped the port 80 traffic logon times increased exponentially.  A packet capture revealed that the PCs waited for about 10-15 seconds per DC before timing out.  So I put in a new deny rule with send-deny-packet enabled and voila!  Logon times went back to normal.

Leave it to M$ to totally go their own convoluted way...

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors