Create a new security virtual wire pair policy
This section describes how to create virtual wire pair policies. Before you can create a policy, you must create a virtual wire pair. See Configuring virtual wire pairs.
You can create a security virtual wire pair policy in a policy package that is set to Policy-based. If the policy package is set to Profile-based, see Create a new firewall virtual wire pair policy.
See Virtual wire pair in the FortiOS Administration Guide for more information about virtual wire pairs and virtual wire pair policies.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a checkmark for the corresponding feature. |
To create a new Security Virtual Wire Pair policy:
- If using ADOMs, ensure that you are in the correct ADOM.
- Go to Policy & Objects > Policy Packages.
- In the tree menu for the policy package in which you will be creating the new policy, select Security Virtual Wire Pair Policy.
- Click Create New.
- Enter the following information:
Option
Description
ID
Enter a unique number as the policy ID, or use the default (0) to automatically assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Name
Enter a unique name for the policy. Each policy must have a unique name.
Virtual Wire Pair Interface
Select one or more virtual wire pair interfaces. This field is required..
Virtual Wire Pair
Select an arrow to indicate the flow of traffic between the ports in the selected Virtual Wire Pair Interface.
Source
Select the source address, address groups, virtual IPs, virtual IP groups, user, user groups, and FSSO groups.
Destination
Select the destination address, address groups, virtual IPs, virtual IP groups, and services.
Schedule
Select a one-time schedule, recurring schedule, or schedule group.
Service
Select the service. Select App Default or Specify. If Specify is selected, select the Service.
Application
Select applications.
URL Category
Select URL categories.
Action
Select an action for the policy to take: DENY or ACCEPT.
Log Traffic
When the Action is DENY, select Log Violation Traffic to log violation traffic.
When the Action is ACCEPT, select one of the following options:
- No Log
- Log Security Events
- Log All Sessions
Select whether to generate logs when the session starts.
Protocol Options
Select protocol options profiles for handling protocol-specific traffic.
This option is available when the Action is ACCEPT.
Security Profiles
Select to add security profiles or profile groups.
This option is available when the Action is ACCEPT.
If Use Standard Security Profiles is selected, the following standard security profile types can be added:
- AntiVirus Profile
- Web Filter Profile
- IPS Profile
- Email Filter
- File Filter Profile
If Use Security Profile Group is selected, select the Profile Group.
Comments
Add a description of the policy, such as its purpose, or the changes that have been made to it.
Advanced Options
Configure advanced options, see Advanced options below.
For more information on advanced option, see the FortiOS CLI Reference.
Change Note
Add a description of the changes being made to the policy. This field is required.
- Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the bottom of the list, but above the implicit policy.
Advanced options
Option |
Description |
Default |
---|---|---|
application-list |
Select …an existing application list. |
none |
comments |
Add a description of the policy, such as its purpose, or the changes that have been made to it. A comment added here will overwrite the comment added in the above Comments field. |
none |
dlp-profile |
Select an existing data leak prevention (DLP) profile. |
none |
dnsfilter-profile |
Select an existing DNS filter profile. |
none |
dstaddr-negate |
Enable to negate the values set in IPv4 Destination Address and IPv6 Destination Address. |
disable |
global-label |
Set the label for the policy to be displayed when the GUI is in Global View mode. |
none |
icap-profile |
Select an existing Internet Content Adaptation Protocol (ICAP) profile. |
none |
internet-service-negate |
When enabled, Internet services match against any Internet service except the selected Internet service. |
disable |
internet-service-src-negate |
Enables or disables the use of Internet Services in source for this policy. If enabled, |
disable |
internet-service6 |
Enable or disable the use of IPv6 internet services for this policy. If enabled, the destination address and service set in the policy are not used. |
disable |
internet-service6-custom |
Select a custom IPv6 internet service. |
none |
internet-service6-custom-group |
Select a custom IPv6 internet service group. |
none |
internet-service6-group |
Select an IPv6 internet service group. |
none |
internet-service6-name |
Select an IPv6 internet service. |
none |
internet-service6-negate |
Enable to negate the source IPv6 internet service set in this policy. |
disable |
internet-service6-src |
Enable or disable use of the IPv6 internet services in the source for this policy. If enabled, the source address is not used. |
disable |
internet-service6-src-custom |
Select the custom IPv6 internet service source. |
none |
internet-service6-src-custom-group |
Select the custom IPv6 source group. |
none |
internet-service6-src-group |
Select the IPv6 source group. |
none |
internet-service6-src-name |
Select the IPv6 source. |
none |
internet-service6-src-negate |
Enable to negate the value set in |
disable |
nat46 |
Enable or disable NAT46. |
disable |
nat64 |
Enable or disable NAT64. |
disable |
sctp-filter-profile |
Select an existing stream control transmission protocol (SCTP) filter profile. |
none |
send-deny-packet |
Enable or disable sending a reply packet when a session is denied or blocked by this policy. |
disable |
service-negate |
Enable or disable negation of the selected Service. |
disable |
srcaddr-negate |
Enable or disable negation of the IPv4 Source Address or IPv6 Source Address address. |
disable |
ssh-filter-profile |
Select an existing SSH filter profile. |
none |
ssl-ssh-profile |
Select an existing SSL SSH profile. |
no-inspection |
utm-status |
Enable or disable the Unified Threat Management status. |
disable |
uuid |
Enter the universally unique identifier (UUID). This value is automatically assigned but can be manually reset. |
00000000-0000- 0000-0000- 000000000000 |
voip-profile |
Select an existing VOIP profile. |
None |