Fortinet black logo

Administration Guide

Configuring FortiPolicy NEW

Configuring FortiPolicy NEW

FortiPolicy can be added to the Security Fabric. When FortiPolicy joins the Security Fabric and is authorized in the Security Fabric widget, it appears in the Fabric topology pages. A FortiGate can grant permission to FortiPolicy to perform firewall address and policy changes.

To add FortiPolicy to the Security Fabric:
  1. Enable the Security Fabric (see Configuring the root FortiGate and downstream FortiGates) with the following settings:

    1. Configure the interface to allow other Security Fabric devices to join.

    2. Enable Allow downstream device REST API access and select an Administrator profile.

  2. In FortiPolicy, edit the Security Fabric settings (this example assumes a root FortiGate has already been configured, see Creating a fabric connector in the FortiPolicy Administration Guide):

    1. Go to Configuration > Security Fabric and select Edit current security fabric settings.

    2. Enter the root FortiGate's IP address.

    3. Set the Port (the default is 8013).

    4. Select a FortiPolicy security policy.

    5. Click UPDATE. The connection status is Not Connected (Authorization Pending).

  3. Authorize the FortiPolicy in FortiOS:

    1. Go to Dashboard > Status and locate the Security Fabric widget.

    2. In the topology tree, click the highlighted FortiPolicy and select Authorize. The Device Registration pane opens.

    3. Click Authorize.

    4. Click Accept to verify the device certificate.

    5. Once the FortiPolicy is registered, click Close.

  4. In FortiPolicy, refresh the Configuration > Security Fabric page. and verify that the connection status is Connected (Authorized).

  5. In FortiOS, grant FortiPolicy write access permission in the CLI:

    config system csf
        config fabric-connector
            edit "FPLVM1TM23000000"
                set configuration-write-access enable
            next
        end
    end
  6. Go to Security Fabric > Physical Topology or Security Fabric > Logical Topology to view more information.

    Physical topology view:

    Logical topology view:

To deploy firewall policies from FortiPolicy to the root FortiGate:
  1. Create a policy in FortiPolicy (see Customizing policies in the FortiPolicy Administration Guide).

    In this example, a default security policy rule called PC71O_External_2 is created. Since the FortiPolicy is integrated in the Security Fabric, it will use the REST API to push the static policy, dynamic firewall objects, and service objects to the root FortiGate.

  2. In FortiOS, go to Policy & Objects > Firewall Policy to view the policy named PC71O_External_2.

  3. Go to Policy & Objects > Addresses to view the dynamic firewall address associated with the policy (FPLVM1TM23000000_Oth_Default_PC71).

  4. Go to Policy & Objects > Services to view the service objects associated with the policy (seg_DNS_UDP, seg_UDP_443, seg_HTTPS, and seg_TCP_8013).

Configuring FortiPolicy NEW

FortiPolicy can be added to the Security Fabric. When FortiPolicy joins the Security Fabric and is authorized in the Security Fabric widget, it appears in the Fabric topology pages. A FortiGate can grant permission to FortiPolicy to perform firewall address and policy changes.

To add FortiPolicy to the Security Fabric:
  1. Enable the Security Fabric (see Configuring the root FortiGate and downstream FortiGates) with the following settings:

    1. Configure the interface to allow other Security Fabric devices to join.

    2. Enable Allow downstream device REST API access and select an Administrator profile.

  2. In FortiPolicy, edit the Security Fabric settings (this example assumes a root FortiGate has already been configured, see Creating a fabric connector in the FortiPolicy Administration Guide):

    1. Go to Configuration > Security Fabric and select Edit current security fabric settings.

    2. Enter the root FortiGate's IP address.

    3. Set the Port (the default is 8013).

    4. Select a FortiPolicy security policy.

    5. Click UPDATE. The connection status is Not Connected (Authorization Pending).

  3. Authorize the FortiPolicy in FortiOS:

    1. Go to Dashboard > Status and locate the Security Fabric widget.

    2. In the topology tree, click the highlighted FortiPolicy and select Authorize. The Device Registration pane opens.

    3. Click Authorize.

    4. Click Accept to verify the device certificate.

    5. Once the FortiPolicy is registered, click Close.

  4. In FortiPolicy, refresh the Configuration > Security Fabric page. and verify that the connection status is Connected (Authorized).

  5. In FortiOS, grant FortiPolicy write access permission in the CLI:

    config system csf
        config fabric-connector
            edit "FPLVM1TM23000000"
                set configuration-write-access enable
            next
        end
    end
  6. Go to Security Fabric > Physical Topology or Security Fabric > Logical Topology to view more information.

    Physical topology view:

    Logical topology view:

To deploy firewall policies from FortiPolicy to the root FortiGate:
  1. Create a policy in FortiPolicy (see Customizing policies in the FortiPolicy Administration Guide).

    In this example, a default security policy rule called PC71O_External_2 is created. Since the FortiPolicy is integrated in the Security Fabric, it will use the REST API to push the static policy, dynamic firewall objects, and service objects to the root FortiGate.

  2. In FortiOS, go to Policy & Objects > Firewall Policy to view the policy named PC71O_External_2.

  3. Go to Policy & Objects > Addresses to view the dynamic firewall address associated with the policy (FPLVM1TM23000000_Oth_Default_PC71).

  4. Go to Policy & Objects > Services to view the service objects associated with the policy (seg_DNS_UDP, seg_UDP_443, seg_HTTPS, and seg_TCP_8013).