Firewall policies are rules that control network traffic between different segments. They define who can communicate with whom, what type of traffic is allowed, and whether security inspections should be applied.
Example:
If we have the following rules:
192.168.1.0/24 to the Internet.192.168.2.0/24 to the Internet.Traffic from 192.168.1.0/24 is allowed, but traffic from 192.168.2.0/24 is denied.
| Component | Description |
|---|---|
| Source & Destination | Defines where the traffic comes from and where it goes. |
| Services | Specifies allowed protocols (e.g., HTTP, SSH, or custom services). |
| Action | Choose between Allow or Deny. |
| Logging | Enables logging for traffic monitoring and auditing. |
| Security Profiles | Attach web filtering, antivirus, IPS, etc., for deeper inspection. |
Example Firewall Policy:
A rule that allows all employees to access the Internet except for certain restricted websites.
| Source | Destination | Service | Action | Security Profile |
|---|---|---|---|---|
Employees |
Internet |
HTTP, HTTPS |
Allow |
Web Filtering - Block Social Media |
Expected Outcome:
Firewall rules use objects instead of hardcoded IP addresses. This makes policies easier to manage and scale.
| Object Type | Description |
|---|---|
| Address Objects | Define single IPs, ranges, or subnets. |
| Service Objects | Represent TCP/UDP port numbers. |
| Time Schedules | Apply policies based on time constraints. |
| User/Group Objects | Assign rules based on user identity. |
Why Use Objects Instead of IP Addresses?
Define IP addresses, subnets, or FQDNs (fully qualified domain names).
Example:
| Object Name | Type | IP Address/Subnet |
|---|---|---|
HR_Network |
Subnet | 192.168.10.0/24 |
Finance_Server |
Host | 10.10.10.5 |
Define protocols and port numbers used in firewall policies.
Example:
| Service Name | Protocol | Port(s) |
|---|---|---|
Web_Traffic |
TCP | 80, 443 |
SSH_Access |
TCP | 22 |
Custom_App |
UDP | 5000-5100 |
Firewall rules can be restricted to specific time periods.
Example:
| Schedule Name | Time Window |
|---|---|
Work_Hours |
Mon-Fri 9:00 AM - 6:00 PM |
Night_Access |
Daily 10:00 PM - 6:00 AM |
Example:
| User Group | Allowed Access |
|---|---|
HR_Department |
Internal Network, HR Apps |
Developers |
Internet, GitHub, Dev Servers |
HR_NetworkSubnet192.168.10.0/24Custom_Web_Service8080-8090HR_Network.Internet.Custom_Web_Service.Expected Outcome:
Internet using ports 8080-8090.Basic firewall rules are simple, but in complex networks, additional settings may be needed. Below are some advanced configurations used in FortiManager.
Example:
A company wants to allow HTTPS traffic, but they need to block downloads of EXE files from the Internet.
Solution:
Example:
A company wants to allow Internet access but block social media apps like Facebook, Instagram, and Twitter.
Solution:
Example:
A company wants to prioritize VoIP calls and limit YouTube streaming bandwidth.
Solution:
NAT (Network Address Translation) modifies the source or destination IP address of packets as they pass through the firewall.
Why use NAT?
| NAT Type | Description | Example Use Case |
|---|---|---|
| Source NAT (SNAT) | Replaces the source IP with a public IP. | Users accessing the Internet from inside the network. |
| Destination NAT (DNAT) | Maps external IP to internal server IP. | Allowing external users to access an internal web server. |
| Overload (PAT - Port Address Translation) | Multiple internal users share a single public IP. | Office network using one ISP public IP for all users. |
Expected Outcome:
Expected Outcome:
Expected Outcome:
Even with correct configurations, firewall policies or NAT rules may fail. Below are common issues and solutions.
| Issue | Possible Cause | Solution |
|---|---|---|
| Firewall Policy Not Working | Misconfigured source/destination or wrong service type | Verify the policy order, source/destination, and services used. |
| NAT Not Working | NAT is disabled or incorrectly configured | Ensure NAT is enabled on the correct interface. |
| External Users Cannot Access an Internal Server | VIP (DNAT) misconfigured or firewall policy missing | Verify Virtual IP settings and create a proper firewall rule. |
| Internal Users Cannot Browse the Internet | No NAT rule applied | Enable SNAT using the outgoing interface address. |
| Traffic Logs Not Showing Expected Results | Logging not enabled in policy | Enable logging for both accepted and denied traffic. |
diagnose firewall policy list
diagnose firewall ippool list
diagnose sys session list
execute ping 8.8.8.8
What is a policy package in FortiManager?
A policy package is a collection of firewall policies and objects that can be installed on managed devices.
In FortiManager, firewall policies are organized into policy packages. Each package represents a complete policy configuration that can be deployed to one or more devices. This allows administrators to manage large numbers of devices efficiently. Instead of editing individual device policies, administrators modify the package and install it across multiple firewalls.
Demand Score: 92
Exam Relevance Score: 95
Why are shared objects useful in FortiManager?
They allow objects to be reused across multiple policies and devices.
Shared objects reduce configuration duplication and simplify management. For example, a shared address object representing a corporate subnet can be referenced by multiple policies and devices. If the subnet changes, administrators only update the object once instead of modifying every policy.
Demand Score: 85
Exam Relevance Score: 88
Why might a policy package fail to install on a device?
The device may be missing required objects referenced by the policy.
Policies depend on address objects, services, and other configuration elements. If a referenced object is not available or incorrectly defined, FortiManager cannot generate the correct configuration during installation. Administrators must verify that all required objects exist in the policy database before installing the package.
Demand Score: 80
Exam Relevance Score: 90
What is the benefit of policy package reuse across multiple devices?
It simplifies centralized policy management.
Using a single policy package for multiple devices ensures consistent security rules across the network. Administrators can apply the same policy logic to many firewalls, reducing configuration errors and management overhead.
Demand Score: 78
Exam Relevance Score: 86
What role do objects play in firewall policy configuration?
Objects define reusable network elements such as addresses, services, and schedules.
Instead of entering raw values in every policy rule, administrators reference predefined objects. This improves readability, reduces configuration duplication, and simplifies updates.
Demand Score: 76
Exam Relevance Score: 84
Why is centralized policy management beneficial in large networks?
It ensures consistent security policies across all managed devices.
Centralized management allows administrators to maintain uniform security policies and deploy updates efficiently. This reduces configuration drift and improves compliance across distributed network environments.
Demand Score: 70
Exam Relevance Score: 82