Fortinet black logo

Cookbook

Dynamic policy — fabric devices

Copy Link
Copy Doc ID af0e75e9-211f-11ea-9384-00505692583a:146433
Download PDF

Dynamic policy — fabric devices

The dynamic address group represents the configured IP addresses of all Fortinet devices connected to the Security Fabric. It currently includes FortiManager, FortiAnalyzer, FortiClient EMS, FortiMail, FortiAP(s), and FortiSwitch(es). Like other dynamic address groups for fabric connectors, it can be used in IPv4 policies and objects.

The list of firewall addresses includes a default address object called FABRIC_DEVICE. You can apply the FABRIC_DEVICE object to the following types of policies:

  • IPv4 firewall policy (including virtual wire pairs)
  • IPv4 shaping policy
  • IPv4 ACL policy
  • policy64 and policy46 (IPv4 only)
  • Consolidated policy (IPv4 only)

You cannot apply the FABRIC_DEVICE object to the following types of policies:

  • All IPv6 policies
  • IPv4 explicit proxy policy

You also cannot use the FABRIC_DEVICE object with the following settings:

  • Custom extension on internet-service
  • Exclusion of addrgrp

Initially the FABRIC_DEVICE object does not have an address value. The address value is populated dynamically as things change. As a result, you cannot edit the FABRIC_DEVICE object, add any addresses to the object, or remove any addresses from the object. The Edit Address pane in the GUI only has a Return button because the object is read-only:

The FABRIC_DEVICE object address values are populated based on:

  • FortiAnalyzer IP (from the Fabric Settings pane)
  • FortiManager IP (from the Fabric Settings pane)
  • FortiMail IP (from the Fabric Settings pane)
  • FortiClient EMS IP (from the Fabric Settings pane)
  • FortiAP IPs (from the FortiAP Setup pane or DHCP)
  • FortiSwitch IPs (from the FortiSwitch Setup page or DHCP)
To apply the FABRIC_DEVICE object to an IPv4 policy using the GUI:
  1. Go to Policy & Objects > IPv4 Policy.
  2. Create a new policy or edit an existing policy.
  3. For the Destination field, select FABRIC_DEVICE from the list of address entries.

  4. Configure the rest of the policy as needed.
  5. Click OK.
To apply the FABRIC_DEVICE object to an IPv4 policy using the CLI:
(root) # show full-configuration firewall address FABRIC_DEVICE
config firewall address
    edit "FABRIC_DEVICE"
        set uuid ffde44a6-9eab-51ea-62f2-d5facde7af77
        set type ipmask
        set comment "IPv4 addresses of Fabric Devices."
        set associated-interface ''
        set color 0
        set allow-routing disable
        set subnet 0.0.0.0 0.0.0.0
    next
end
config firewall policy
    edit 1
        set srcintf "port2"
        set dstintf "port1"
        set srcaddr "all"
        set dstaddr "FABRIC_DEVICE"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set fsso disable
        set nat enable
    next
end

Diagnose command

You can use the diagnose command to list IP addresses of Fortinet devices that are configured in the Security Fabric.

To run the diagnose command using the CLI:
(root) # diagnose firewall sf-addresses list
 
FabricDevices: 172.18.64.48
FortiAnalyzer: 172.18.60.25
FortiSandbox: 172.18.52.154
FortiManager: 172.18.28.31
FortiClientEMS: 172.18.62.6
FortiAP:
FortiSwitch:
FortiAP/SW-DHCP:

Dynamic policy — fabric devices

The dynamic address group represents the configured IP addresses of all Fortinet devices connected to the Security Fabric. It currently includes FortiManager, FortiAnalyzer, FortiClient EMS, FortiMail, FortiAP(s), and FortiSwitch(es). Like other dynamic address groups for fabric connectors, it can be used in IPv4 policies and objects.

The list of firewall addresses includes a default address object called FABRIC_DEVICE. You can apply the FABRIC_DEVICE object to the following types of policies:

  • IPv4 firewall policy (including virtual wire pairs)
  • IPv4 shaping policy
  • IPv4 ACL policy
  • policy64 and policy46 (IPv4 only)
  • Consolidated policy (IPv4 only)

You cannot apply the FABRIC_DEVICE object to the following types of policies:

  • All IPv6 policies
  • IPv4 explicit proxy policy

You also cannot use the FABRIC_DEVICE object with the following settings:

  • Custom extension on internet-service
  • Exclusion of addrgrp

Initially the FABRIC_DEVICE object does not have an address value. The address value is populated dynamically as things change. As a result, you cannot edit the FABRIC_DEVICE object, add any addresses to the object, or remove any addresses from the object. The Edit Address pane in the GUI only has a Return button because the object is read-only:

The FABRIC_DEVICE object address values are populated based on:

  • FortiAnalyzer IP (from the Fabric Settings pane)
  • FortiManager IP (from the Fabric Settings pane)
  • FortiMail IP (from the Fabric Settings pane)
  • FortiClient EMS IP (from the Fabric Settings pane)
  • FortiAP IPs (from the FortiAP Setup pane or DHCP)
  • FortiSwitch IPs (from the FortiSwitch Setup page or DHCP)
To apply the FABRIC_DEVICE object to an IPv4 policy using the GUI:
  1. Go to Policy & Objects > IPv4 Policy.
  2. Create a new policy or edit an existing policy.
  3. For the Destination field, select FABRIC_DEVICE from the list of address entries.

  4. Configure the rest of the policy as needed.
  5. Click OK.
To apply the FABRIC_DEVICE object to an IPv4 policy using the CLI:
(root) # show full-configuration firewall address FABRIC_DEVICE
config firewall address
    edit "FABRIC_DEVICE"
        set uuid ffde44a6-9eab-51ea-62f2-d5facde7af77
        set type ipmask
        set comment "IPv4 addresses of Fabric Devices."
        set associated-interface ''
        set color 0
        set allow-routing disable
        set subnet 0.0.0.0 0.0.0.0
    next
end
config firewall policy
    edit 1
        set srcintf "port2"
        set dstintf "port1"
        set srcaddr "all"
        set dstaddr "FABRIC_DEVICE"
        set action accept
        set schedule "always"
        set service "ALL"
        set utm-status enable
        set fsso disable
        set nat enable
    next
end

Diagnose command

You can use the diagnose command to list IP addresses of Fortinet devices that are configured in the Security Fabric.

To run the diagnose command using the CLI:
(root) # diagnose firewall sf-addresses list
 
FabricDevices: 172.18.64.48
FortiAnalyzer: 172.18.60.25
FortiSandbox: 172.18.52.154
FortiManager: 172.18.28.31
FortiClientEMS: 172.18.62.6
FortiAP:
FortiSwitch:
FortiAP/SW-DHCP: