Warning! Audit Deprecated
Information
Configure Local-in Policies to control inbound traffic that is destined to a FortiGate interface.
Rationale:
Local-in Policies allow for more granular and specific control of all types of traffic that are destined for a FortiGate interface. They are not limited to management-only protocols, therefore they can extend past 'trusted host' configurations and be configured with source and destination addresses as well as specific services.
Impact:
Local-in Policies are processed before 'trusted host' configurations, so it is important to validate that management access will be maintained once the Local-in policies are put in place.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Local-in Policies can only be configured through the CLI:
config firewall {local-in-policy | local-in-policy6}
edit <policy_number>
set intf <interface>
set srcaddr <source_address> [source_address] ...
set dstaddr <destination_address> [destination_address] ...
set action {accept | deny}
set service <service_name> [service_name] ...
set schedule <schedule_name>
set comments <string>
next
end
For example, to prevent the source subnet 10.10.10.0/24 from pinging port1, but allow administrative access for PING on port1:
config firewall address
edit '10.10.10.0'
set subnet 10.10.10.0 255.255.255.0
next
end
config firewall local-in-policy
edit 1
set intf 'port1'
set srcaddr '10.10.10.0'
set dstaddr 'all'
set service 'PING'
set schedule 'always'
next
end
Default Value:
There are no Local-in Policies in place by default.