Created on
11-02-2011
01:37 AM
Edited on
12-31-2024
11:55 AM
By
ap
Description
This article describes that the FortiGate unit matches Virtual IP firewall policies differently from regular firewall policies. If there is a VIP firewall policy below a 'regular' DENY firewall policy, the VIP traffic will still be able to go through.
Scope
VIP DENY firewall policy.
Solution
- Specify the 'Action' as DENY on a firewall policy specifically created for the VIP object(s) that must be blocked.
For example:
GUI.
From CLI:config firewall policy
edit 66
set name "BLOCK access to VIP"
set srcintf "x1"
set dstintf "any"
set srcaddr "all"
set dstaddr "VM - FortiManager - TCP 541" <-- Specify VIP object(s) that needs to be blocked.
set schedule "always"
set service "ALL"
set logtraffic all
set comments "DENY access to VIP"
next
end
Or: - Configure the 'match-vip' option for the DENY firewall policy in CLI:
config firewall policy
edit <fw_policy_id>
set srcintf "portx"
set dstintf "porty"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set match-vip enable
next
end
Note:
- In FortiOS v6.4.3 and above, 'set match-vip enable' is only available within the Firewall Policy when the ACTION of the policy is set to DENY.
- The match-vip option is disabled by default until v7.2.3. In versions after 7.2.3, the option is enabled by default.