config firewall policy
Configure IPv4 policies.
config firewall policy
Description: Configure IPv4 policies.
edit <policyid>
set name {string}
set uuid {uuid}
set srcintf <name1>, <name2>, ...
set dstintf <name1>, <name2>, ...
set srcaddr <name1>, <name2>, ...
set dstaddr <name1>, <name2>, ...
set internet-service [enable|disable]
set internet-service-id <id1>, <id2>, ...
set internet-service-group <name1>, <name2>, ...
set internet-service-custom <name1>, <name2>, ...
set internet-service-custom-group <name1>, <name2>, ...
set internet-service-src [enable|disable]
set internet-service-src-id <id1>, <id2>, ...
set internet-service-src-group <name1>, <name2>, ...
set internet-service-src-custom <name1>, <name2>, ...
set internet-service-src-custom-group <name1>, <name2>, ...
set reputation-minimum {integer}
set reputation-direction [source|destination]
set rtp-nat [disable|enable]
set rtp-addr <name1>, <name2>, ...
set action [accept|deny|...]
set send-deny-packet [disable|enable]
set firewall-session-dirty [check-all|check-new]
set status [enable|disable]
set schedule {string}
set schedule-timeout [enable|disable]
set service <name1>, <name2>, ...
set tos {user}
set tos-mask {user}
set tos-negate [enable|disable]
set anti-replay [enable|disable]
set tcp-session-without-syn [all|data-only|...]
set geoip-anycast [enable|disable]
set utm-status [enable|disable]
set inspection-mode [proxy|flow]
set http-policy-redirect [enable|disable]
set ssh-policy-redirect [enable|disable]
set webproxy-profile {string}
set profile-type [single|group]
set profile-group {string}
set profile-protocol-options {string}
set ssl-ssh-profile {string}
set av-profile {string}
set webfilter-profile {string}
set dnsfilter-profile {string}
set emailfilter-profile {string}
set dlp-sensor {string}
set ips-sensor {string}
set application-list {string}
set voip-profile {string}
set icap-profile {string}
set cifs-profile {string}
set waf-profile {string}
set ssh-filter-profile {string}
set logtraffic [all|utm|...]
set logtraffic-start [enable|disable]
set capture-packet [enable|disable]
set auto-asic-offload [enable|disable]
set np-acceleration [enable|disable]
set wanopt [enable|disable]
set wanopt-detection [active|passive|...]
set wanopt-passive-opt [default|transparent|...]
set wanopt-profile {string}
set wanopt-peer {string}
set webcache [enable|disable]
set webcache-https [disable|enable]
set webproxy-forward-server {string}
set traffic-shaper {string}
set traffic-shaper-reverse {string}
set per-ip-shaper {string}
set application <id1>, <id2>, ...
set app-category <id1>, <id2>, ...
set url-category <id1>, <id2>, ...
set app-group <name1>, <name2>, ...
set nat [enable|disable]
set permit-any-host [enable|disable]
set permit-stun-host [enable|disable]
set fixedport [enable|disable]
set ippool [enable|disable]
set poolname <name1>, <name2>, ...
set session-ttl {user}
set vlan-cos-fwd {integer}
set vlan-cos-rev {integer}
set inbound [enable|disable]
set outbound [enable|disable]
set natinbound [enable|disable]
set natoutbound [enable|disable]
set wccp [enable|disable]
set ntlm [enable|disable]
set ntlm-guest [enable|disable]
set ntlm-enabled-browsers <user-agent-string1>, <user-agent-string2>, ...
set fsso [enable|disable]
set wsso [enable|disable]
set rsso [enable|disable]
set fsso-agent-for-ntlm {string}
set groups <name1>, <name2>, ...
set users <name1>, <name2>, ...
set fsso-groups <name1>, <name2>, ...
set auth-path [enable|disable]
set disclaimer [enable|disable]
set email-collect [enable|disable]
set vpntunnel {string}
set natip {ipv4-classnet}
set match-vip [enable|disable]
set match-vip-only [enable|disable]
set diffserv-forward [enable|disable]
set diffserv-reverse [enable|disable]
set diffservcode-forward {user}
set diffservcode-rev {user}
set tcp-mss-sender {integer}
set tcp-mss-receiver {integer}
set comments {var-string}
set auth-cert {string}
set auth-redirect-addr {string}
set redirect-url {string}
set identity-based-route {string}
set block-notification [enable|disable]
set custom-log-fields <field-id1>, <field-id2>, ...
set replacemsg-override-group {string}
set srcaddr-negate [enable|disable]
set dstaddr-negate [enable|disable]
set service-negate [enable|disable]
set internet-service-negate [enable|disable]
set internet-service-src-negate [enable|disable]
set timeout-send-rst [enable|disable]
set captive-portal-exempt [enable|disable]
set ssl-mirror [enable|disable]
set ssl-mirror-intf <name1>, <name2>, ...
set dsri [enable|disable]
set radius-mac-auth-bypass [enable|disable]
set delay-tcp-npu-session [enable|disable]
set vlan-filter {user}
next
end
config firewall policy
Parameter name |
Description |
Type |
Size |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
name |
Policy name. |
string |
Maximum length: 35 |
||||||||
uuid |
Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
uuid |
Not Specified |
||||||||
srcintf |
Incoming (ingress) interface. Interface name. |
string |
Maximum length: 79 |
||||||||
dstintf |
Outgoing (egress) interface. Interface name. |
string |
Maximum length: 79 |
||||||||
srcaddr |
Source address and address group names. Address name. |
string |
Maximum length: 79 |
||||||||
dstaddr |
Destination address and address group names. Address name. |
string |
Maximum length: 79 |
||||||||
internet-service |
Enable/disable use of Internet Services for this policy. If enabled, destination address and service are not used. |
option |
- |
||||||||
|
|
||||||||||
internet-service-id |
Internet Service ID. Internet Service ID. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
||||||||
internet-service-group |
Internet Service group name. Internet Service group name. |
string |
Maximum length: 79 |
||||||||
internet-service-custom |
Custom Internet Service name. Custom Internet Service name. |
string |
Maximum length: 79 |
||||||||
internet-service-custom-group |
Custom Internet Service group name. Custom Internet Service group name. |
string |
Maximum length: 79 |
||||||||
internet-service-src |
Enable/disable use of Internet Services in source for this policy. If enabled, source address is not used. |
option |
- |
||||||||
|
|
||||||||||
internet-service-src-id |
Internet Service source ID. Internet Service ID. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
||||||||
internet-service-src-group |
Internet Service source group name. Internet Service group name. |
string |
Maximum length: 79 |
||||||||
internet-service-src-custom |
Custom Internet Service source name. Custom Internet Service name. |
string |
Maximum length: 79 |
||||||||
internet-service-src-custom-group |
Custom Internet Service source group name. Custom Internet Service group name. |
string |
Maximum length: 79 |
||||||||
reputation-minimum |
Minimum Reputation to take action. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
||||||||
reputation-direction |
Direction of the initial traffic for reputation to take effect. |
option |
- |
||||||||
|
|
||||||||||
rtp-nat |
Enable Real Time Protocol (RTP) NAT. |
option |
- |
||||||||
|
|
||||||||||
rtp-addr |
Address names if this is an RTP NAT policy. Address name. |
string |
Maximum length: 79 |
||||||||
action |
Policy action (allow/deny/ipsec). |
option |
- |
||||||||
|
|
||||||||||
send-deny-packet |
Enable to send a reply when a session is denied or blocked by a firewall policy. |
option |
- |
||||||||
|
|
||||||||||
firewall-session-dirty |
How to handle sessions if the configuration of this firewall policy changes. |
option |
- |
||||||||
|
|
||||||||||
status |
Enable or disable this policy. |
option |
- |
||||||||
|
|
||||||||||
schedule |
Schedule name. |
string |
Maximum length: 35 |
||||||||
schedule-timeout |
Enable to force current sessions to end when the schedule object times out. Disable allows them to end from inactivity. |
option |
- |
||||||||
|
|
||||||||||
service |
Service and service group names. Service and service group names. |
string |
Maximum length: 79 |
||||||||
tos |
ToS (Type of Service) value used for comparison. |
user |
Not Specified |
||||||||
tos-mask |
Non-zero bit positions are used for comparison while zero bit positions are ignored. |
user |
Not Specified |
||||||||
tos-negate |
Enable negated TOS match. |
option |
- |
||||||||
|
|
||||||||||
anti-replay |
Enable/disable anti-replay check. |
option |
- |
||||||||
|
|
||||||||||
tcp-session-without-syn |
Enable/disable creation of TCP session without SYN flag. |
option |
- |
||||||||
|
|
||||||||||
geoip-anycast |
Enable/disable recognition of anycast IP addresses using the geography IP database. |
option |
- |
||||||||
|
|
||||||||||
utm-status |
Enable to add one or more security profiles (AV, IPS, etc.) to the firewall policy. |
option |
- |
||||||||
|
|
||||||||||
inspection-mode |
Policy inspection mode (Flow/proxy). Default is Flow mode. |
option |
- |
||||||||
|
|
||||||||||
http-policy-redirect |
Redirect HTTP(S) traffic to matching transparent web proxy policy. |
option |
- |
||||||||
|
|
||||||||||
ssh-policy-redirect |
Redirect SSH traffic to matching transparent proxy policy. |
option |
- |
||||||||
|
|
||||||||||
webproxy-profile |
Webproxy profile name. |
string |
Maximum length: 63 |
||||||||
profile-type |
Determine whether the firewall policy allows security profile groups or single profiles only. |
option |
- |
||||||||
|
|
||||||||||
profile-group |
Name of profile group. |
string |
Maximum length: 35 |
||||||||
profile-protocol-options |
Name of an existing Protocol options profile. |
string |
Maximum length: 35 |
||||||||
ssl-ssh-profile |
Name of an existing SSL SSH profile. |
string |
Maximum length: 35 |
||||||||
av-profile |
Name of an existing Antivirus profile. |
string |
Maximum length: 35 |
||||||||
webfilter-profile |
Name of an existing Web filter profile. |
string |
Maximum length: 35 |
||||||||
dnsfilter-profile |
Name of an existing DNS filter profile. |
string |
Maximum length: 35 |
||||||||
emailfilter-profile |
Name of an existing email filter profile. |
string |
Maximum length: 35 |
||||||||
dlp-sensor |
Name of an existing DLP sensor. |
string |
Maximum length: 35 |
||||||||
ips-sensor |
Name of an existing IPS sensor. |
string |
Maximum length: 35 |
||||||||
application-list |
Name of an existing Application list. |
string |
Maximum length: 35 |
||||||||
voip-profile |
Name of an existing VoIP profile. |
string |
Maximum length: 35 |
||||||||
icap-profile |
Name of an existing ICAP profile. |
string |
Maximum length: 35 |
||||||||
cifs-profile |
Name of an existing CIFS profile. |
string |
Maximum length: 35 |
||||||||
waf-profile |
Name of an existing Web application firewall profile. |
string |
Maximum length: 35 |
||||||||
ssh-filter-profile |
Name of an existing SSH filter profile. |
string |
Maximum length: 35 |
||||||||
logtraffic |
Enable or disable logging. Log all sessions or security profile sessions. |
option |
- |
||||||||
|
|
||||||||||
logtraffic-start |
Record logs when a session starts. |
option |
- |
||||||||
|
|
||||||||||
capture-packet |
Enable/disable capture packets. |
option |
- |
||||||||
|
|
||||||||||
auto-asic-offload |
Enable/disable policy traffic ASIC offloading. |
option |
- |
||||||||
|
|
||||||||||
np-acceleration |
Enable/disable UTM Network Processor acceleration. |
option |
- |
||||||||
|
|
||||||||||
wanopt |
Enable/disable WAN optimization. |
option |
- |
||||||||
|
|
||||||||||
wanopt-detection |
WAN optimization auto-detection mode. |
option |
- |
||||||||
|
|
||||||||||
wanopt-passive-opt |
WAN optimization passive mode options. This option decides what IP address will be used to connect server. |
option |
- |
||||||||
|
|
||||||||||
wanopt-profile |
WAN optimization profile. |
string |
Maximum length: 35 |
||||||||
wanopt-peer |
WAN optimization peer. |
string |
Maximum length: 35 |
||||||||
webcache |
Enable/disable web cache. |
option |
- |
||||||||
|
|
||||||||||
webcache-https |
Enable/disable web cache for HTTPS. |
option |
- |
||||||||
|
|
||||||||||
webproxy-forward-server |
Webproxy forward server name. |
string |
Maximum length: 63 |
||||||||
traffic-shaper |
Traffic shaper. |
string |
Maximum length: 35 |
||||||||
traffic-shaper-reverse |
Reverse traffic shaper. |
string |
Maximum length: 35 |
||||||||
per-ip-shaper |
Per-IP traffic shaper. |
string |
Maximum length: 35 |
||||||||
application |
Application ID list. Application IDs. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
||||||||
app-category |
Application category ID list. Category IDs. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
||||||||
url-category |
URL category ID list. URL category ID. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
||||||||
app-group |
Application group names. Application group names. |
string |
Maximum length: 79 |
||||||||
nat |
Enable/disable source NAT. |
option |
- |
||||||||
|
|
||||||||||
permit-any-host |
Accept UDP packets from any host. |
option |
- |
||||||||
|
|
||||||||||
permit-stun-host |
Accept UDP packets from any Session Traversal Utilities for NAT (STUN) host. |
option |
- |
||||||||
|
|
||||||||||
fixedport |
Enable to prevent source NAT from changing a session's source port. |
option |
- |
||||||||
|
|
||||||||||
ippool |
Enable to use IP Pools for source NAT. |
option |
- |
||||||||
|
|
||||||||||
poolname |
IP Pool names. IP pool name. |
string |
Maximum length: 79 |
||||||||
session-ttl |
TTL in seconds for sessions accepted by this policy (0 means use the system default session TTL). |
user |
Not Specified |
||||||||
vlan-cos-fwd |
VLAN forward direction user priority: 255 passthrough, 0 lowest, 7 highest. |
integer |
Minimum value: 0 Maximum value: 7 |
||||||||
vlan-cos-rev |
VLAN reverse direction user priority: 255 passthrough, 0 lowest, 7 highest. |
integer |
Minimum value: 0 Maximum value: 7 |
||||||||
inbound |
Policy-based IPsec VPN: only traffic from the remote network can initiate a VPN. |
option |
- |
||||||||
|
|
||||||||||
outbound |
Policy-based IPsec VPN: only traffic from the internal network can initiate a VPN. |
option |
- |
||||||||
|
|
||||||||||
natinbound |
Policy-based IPsec VPN: apply destination NAT to inbound traffic. |
option |
- |
||||||||
|
|
||||||||||
natoutbound |
Policy-based IPsec VPN: apply source NAT to outbound traffic. |
option |
- |
||||||||
|
|
||||||||||
wccp |
Enable/disable forwarding traffic matching this policy to a configured WCCP server. |
option |
- |
||||||||
|
|
||||||||||
ntlm |
Enable/disable NTLM authentication. |
option |
- |
||||||||
|
|
||||||||||
ntlm-guest |
Enable/disable NTLM guest user access. |
option |
- |
||||||||
|
|
||||||||||
ntlm-enabled-browsers |
HTTP-User-Agent value of supported browsers. User agent string. |
string |
Maximum length: 79 |
||||||||
fsso |
Enable/disable Fortinet Single Sign-On. |
option |
- |
||||||||
|
|
||||||||||
wsso |
Enable/disable WiFi Single Sign On (WSSO). |
option |
- |
||||||||
|
|
||||||||||
rsso |
Enable/disable RADIUS single sign-on (RSSO). |
option |
- |
||||||||
|
|
||||||||||
fsso-agent-for-ntlm |
FSSO agent to use for NTLM authentication. |
string |
Maximum length: 35 |
||||||||
groups |
Names of user groups that can authenticate with this policy. Group name. |
string |
Maximum length: 79 |
||||||||
users |
Names of individual users that can authenticate with this policy. Names of individual users that can authenticate with this policy. |
string |
Maximum length: 79 |
||||||||
fsso-groups |
Names of FSSO groups. Names of FSSO groups. |
string |
Maximum length: 511 |
||||||||
auth-path |
Enable/disable authentication-based routing. |
option |
- |
||||||||
|
|
||||||||||
disclaimer |
Enable/disable user authentication disclaimer. |
option |
- |
||||||||
|
|
||||||||||
email-collect |
Enable/disable email collection. |
option |
- |
||||||||
|
|
||||||||||
vpntunnel |
Policy-based IPsec VPN: name of the IPsec VPN Phase 1. |
string |
Maximum length: 35 |
||||||||
natip |
Policy-based IPsec VPN: source NAT IP address for outgoing traffic. |
ipv4-classnet |
Not Specified |
||||||||
match-vip |
Enable to match packets that have had their destination addresses changed by a VIP. |
option |
- |
||||||||
|
|
||||||||||
match-vip-only |
Enable/disable matching of only those packets that have had their destination addresses changed by a VIP. |
option |
- |
||||||||
|
|
||||||||||
diffserv-forward |
Enable to change packet's DiffServ values to the specified diffservcode-forward value. |
option |
- |
||||||||
|
|
||||||||||
diffserv-reverse |
Enable to change packet's reverse (reply) DiffServ values to the specified diffservcode-rev value. |
option |
- |
||||||||
|
|
||||||||||
diffservcode-forward |
Change packet's DiffServ to this value. |
user |
Not Specified |
||||||||
diffservcode-rev |
Change packet's reverse (reply) DiffServ to this value. |
user |
Not Specified |
||||||||
tcp-mss-sender |
Sender TCP maximum segment size (MSS). |
integer |
Minimum value: 0 Maximum value: 65535 |
||||||||
tcp-mss-receiver |
Receiver TCP maximum segment size (MSS). |
integer |
Minimum value: 0 Maximum value: 65535 |
||||||||
comments |
Comment. |
var-string |
Maximum length: 1023 |
||||||||
auth-cert |
HTTPS server certificate for policy authentication. |
string |
Maximum length: 35 |
||||||||
auth-redirect-addr |
HTTP-to-HTTPS redirect address for firewall authentication. |
string |
Maximum length: 63 |
||||||||
redirect-url |
URL users are directed to after seeing and accepting the disclaimer or authenticating. |
string |
Maximum length: 255 |
||||||||
identity-based-route |
Name of identity-based routing rule. |
string |
Maximum length: 35 |
||||||||
block-notification |
Enable/disable block notification. |
option |
- |
||||||||
|
|
||||||||||
custom-log-fields |
Custom fields to append to log messages for this policy. Custom log field. |
string |
Maximum length: 35 |
||||||||
replacemsg-override-group |
Override the default replacement message group for this policy. |
string |
Maximum length: 35 |
||||||||
srcaddr-negate |
When enabled srcaddr specifies what the source address must NOT be. |
option |
- |
||||||||
|
|
||||||||||
dstaddr-negate |
When enabled dstaddr specifies what the destination address must NOT be. |
option |
- |
||||||||
|
|
||||||||||
service-negate |
When enabled service specifies what the service must NOT be. |
option |
- |
||||||||
|
|
||||||||||
internet-service-negate |
When enabled internet-service specifies what the service must NOT be. |
option |
- |
||||||||
|
|
||||||||||
internet-service-src-negate |
When enabled internet-service-src specifies what the service must NOT be. |
option |
- |
||||||||
|
|
||||||||||
timeout-send-rst |
Enable/disable sending RST packets when TCP sessions expire. |
option |
- |
||||||||
|
|
||||||||||
captive-portal-exempt |
Enable to exempt some users from the captive portal. |
option |
- |
||||||||
|
|
||||||||||
ssl-mirror |
Enable to copy decrypted SSL traffic to a FortiGate interface (called SSL mirroring). |
option |
- |
||||||||
|
|
||||||||||
ssl-mirror-intf |
SSL mirror interface name. Mirror Interface name. |
string |
Maximum length: 79 |
||||||||
dsri |
Enable DSRI to ignore HTTP server responses. |
option |
- |
||||||||
|
|
||||||||||
radius-mac-auth-bypass |
Enable MAC authentication bypass. The bypassed MAC address must be received from RADIUS server. |
option |
- |
||||||||
|
|
||||||||||
delay-tcp-npu-session |
Enable TCP NPU session delay to guarantee packet order of 3-way handshake. |
option |
- |
||||||||
|
|
||||||||||
vlan-filter |
Set VLAN filters. |
user |
Not Specified |