Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Not applicable

Firewall rules actions

Hi there, I am quite a new on Fortigates world and want to check the following. 1. If the action for the firewall rule is set to " ACCEPT" that means that means that also an opposite traffic is allowed? For example on Cisco in Zone based firewalls I have two possible actions " Permit" and " INSPECT" . While the " INSPECT" allows also opposite traffic, " PERMIT" allows traffic only in one direction. What are the analogues in FortiOS? Thanks!
6 REPLIES 6
billp
Contributor

Yes. " Accept" allows traffic in both directions.

Bill ========== Fortigate 600C 5.0.12, 111C 5.0.2 Logstash 1.4.1

Bill ========== Fortigate 600C 5.0.12, 111C 5.0.2 Logstash 1.4.1
ether
New Contributor

Wow, seriously? So if I set an accept policy for Internal/all/http -> WAN/all/http, it also allows all http traffic inbound???
ether Fortigate 30b Fortigate 224b
ether Fortigate 30b Fortigate 224b
Not applicable

Thanks for the reply! What if I want to enable traffic only in one direction?
billp
Contributor

Wow, seriously? So if I set an accept policy for Internal/all/http -> WAN/all/http, it also allows all http traffic inbound???
First -- I hope I have understood the question here. This policy would allow all originating and RETURN traffic that originated with that firewall rule. It doesn' t open up your firewall to all incoming traffic from any source. I hope that' s clear. I' ve worked with some firewalls where it was necessary to create separate rules on both the LAN and WAN side for all traffic. Fortinet is not like that. A single rule will allow return traffic. If you want to accept traffic that originated from WAN --> LAN, you would need to explicitly create a rule for that. For example, if you had an internal web/ftp site. And this rule, conversely, would allow allow the corresponding LAN --> WAN return traffic that originated with that rule. Handshake -- hopefully the above answers your question as well.

Bill ========== Fortigate 600C 5.0.12, 111C 5.0.2 Logstash 1.4.1

Bill ========== Fortigate 600C 5.0.12, 111C 5.0.2 Logstash 1.4.1
ether
New Contributor

Ah, yes. That would make a lot more sense. Thanks for humoring me ;)
ether Fortigate 30b Fortigate 224b
ether Fortigate 30b Fortigate 224b
claumakurumure
New Contributor III

To add for incoming traffic you need to create a VIP and in your Firewall rule you do not NAT. for outgoing you need to NAT and thus need only one firewall rule to accept return traffic (established sessions only).
hezvo uko
hezvo uko
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors