Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Network88
New Contributor

Block acces to an internal server

Hi ,

 

I have a lan network 192.168.10.x  and a server on 192.168.10.30 , every host from the same network can acces this server by tapping the ip adress on web URL , i want to let this acces just for IT departement and block it for other hosts on the entreprise please

 

Thanks 

2 Solutions
Dave_Hall
Honored Contributor

Keep in mind that the Fortigate's traditional role as a security appliance is to sit on the edge of your network, facing towards the Internet and/or in between network segments (see Security Fabric).

 

What you are asking is more akin to server security - setting up or locking down the server access via firewall rules (on the server) and/or login access, group policies, etc.

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

View solution in original post

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Toshi_Esumi
Esteemed Contributor III

A good practice is to isolate the subnet for servers from all other devices, and put it on an individual interface/vlan. Then you can apply FW policies to control server accesses.

View solution in original post

3 REPLIES 3
Dave_Hall
Honored Contributor

Keep in mind that the Fortigate's traditional role as a security appliance is to sit on the edge of your network, facing towards the Internet and/or in between network segments (see Security Fabric).

 

What you are asking is more akin to server security - setting up or locking down the server access via firewall rules (on the server) and/or login access, group policies, etc.

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Toshi_Esumi
Esteemed Contributor III

A good practice is to isolate the subnet for servers from all other devices, and put it on an individual interface/vlan. Then you can apply FW policies to control server accesses.

Network88

You are right , thanks for the tip 

Labels
Top Kudoed Authors