By Manny Fernandez

May 26, 2024

Cisco Wildcard Objects in FortiOS

Recently, I was working with a customer that had a lot of Cisco wildcard addresses in access-lists they were using for both firewall rules as well as route-maps.  To create these on the FortiOS, you need to do it via the CLI only.

From the cli, type the following command config firewall address this will get you to the addresses section.  You will need to create a new entry by typing the keyword edit followed by the name of the object you want to create, in my example Cisco-WildCard.

config firewall address 
   edit Cisco-WildCard
     new entry 'Cisco-WildCard' added
     set type wildcard 
     set wildcard 10.0.0.0 0.16.255.255
     set comment "Cisco Wildcard in FortiOS"
end

This object can be used in various locations of the FortiGate such as Firewall Policies .

Sometimes it is tricky to understand what you are letting in or blocking based on these wildcard addresses.  When I was a big Cisco guy I used some pretty crazy ones.  When creating FortiOS access-list for routing, you can enter the Wildcard mask directly into those sections.

I use sipcalc with Homebrew on my macOS.

[CIDR]
Host address - 10.1.0.0
Host address (decimal) - 167837696
Host address (hex) - A010000
Network address - 10.1.0.0
Network mask - 255.255.255.224
Network mask (bits) - 27
Network mask (hex) - FFFFFFE0
Broadcast address - 10.1.0.31
Cisco wildcard - 0.0.0.31
Addresses in network - 32
Network range - 10.1.0.0 - 10.1.0.31
Usable range - 10.1.0.1 - 10.1.0.30

As you can see above, the wild card is 255-%the-masked-bits% (255-224=31)

Hope this helps

Recent posts