FortiGate Basics
FortiGate Basics
FortiGate Basics
Introduction:
Fortinet NGFWs meet the performance needs of highly scalable, hybrid IT architectures, enabling
organizations to reduce complexity and manage security risks.
• Default Subnet:192.168.1.0/24
• Default Management IP:192.168.1.99
• Console Connection
• SSH Access
• FortiExplorer
5.FortiGate Modes
NAT Mode: FortiGate act as a Layer 3 Router or Gateway for Separate Vlans
Transparent Mode: FortiGate act as a bridge between the two networks and can provide security
features by inspecting the traffic passing through it.
7.VDOMS:
VDOMS are nothing but virtual firewalls on main hardware. Two VDOMs can work as independent
firewalls with separate VPN,Security,NAT and Routing Policies.
8.HA Requirements:
• Same Firmware
• Same Model
• Same Hardware Specs
9.Heart Beat:
Heart Beat connections i.e back-to-back link for synchronizing and knowing the status of HA Pair.
• Active-Active
• Active-Passive
• Virtual
11. FortiGuard
It’s Features
• Antivirus
• IPS
• Application Control
• Antispam
• Web Filtering
• WAF
• Traffic Policing
• Traffic Shaping
• Queueing
Traffic Policing: Rate limits the traffic and drops any traffic exceeds the configured limit
Traffic Shaping: Rate limits the traffic and buffers the extra traffic exceeding the limit.
Using GUI
Using CLI
• Using GUI
Go to Dashboard
• Using CLI
execute shutdown
14.Transparent Proxy:
In transparent proxy, we browsers are not aware of any proxy server and usual internet content is
accessible.
15.Zones:
Zones are used to group multiple interfaces in a virtual zone so that a common security policy can
be applied across zones, which will cover all underlying group of interfaces.
16.Command to communicate
what is the command Different interfaces under same zone cannot communicate to each other
Means to connect two interfaces so that they can forward traffic. It consists of two interfaces that
do not have any IP address and considered as transparent mode.
The FortiGate data leak prevention (DLP) system allows you to prevent sensitive data from leaving
your network. When you define sensitive data patterns, data matching these patterns will be
blocked, or logged and allowed, when passing through the FortiGate unit. You configure the DLP
system by creating individual filters based on file type, file size, a regular expression, an advanced
rule, or a compound rule, in a DLP sensor and assign the sensor to a security policy.
The filters in a DLP sensor can examine traffic for the following:
-Known files using DLP fingerprinting
-Known files using DLP watermarking
-Particular file types
-Particular file names
-Files larger than a specified size
-Data matching a specified regular expression
-Credit card and social security numbers
Proxy-based inspection reconstructs content that passes through the FortiGate and inspects the
content for security threats.
When a firewall policy’s inspection mode is set to proxy, traffic flowing through the policy will be
buffered by the FortiGate for inspection. This means that the packets for a file, email message, or
web page will be held by the FortiGate until the entire payload is inspected for violations (virus,
spam, or malicious web links). After FortiOS has finished the inspection, the payload is either
released to the destination (if traffic is clean) or dropped and replaced with a replacement message
(if traffic contains violations).
In transparent mode, a VDOM becomes a layer-2 IP forwarding bridge. This means that Ethernet frames
are forwarded based on destination MAC address, and no other routing is performed. All incoming traffic
that is accepted by the firewall, is broadcast out on all interfaces.
In transparent mode the VDOM is a forwarding bridge, not a switch. A switch can develop a port table
and associated MAC addresses, so that it can bridge two ports to deliver the traffic instead of
broadcasting to all ports.
In transparent mode, the VDOM does not following this switch behavior, but instead is the forwarding
bridge that broadcasts all packets out over all interfaces, subject to security policies.
NAT/Route mode is the most commonly used mode by a significant margin and is thus the default
setting on the device. As the name implies the function of NAT is commonly used in this mode and is
easily configured but there is no requirement to use NAT. The FortiGate unit performs network
address translation before IP packets are sent to the destination network.
1-Typically used when the FortiGate unit is a gateway between private and public networks.
3-When used, the FortiGate unit is visible to the networks that is connected to.
4-Each logical interface is on a distinct subnet.
5-Each Interface needs to be assigned a valid IP address for the subnet that it is connected to it.
Security Fabric provides a visionary approach to security that allows your organization to deliver
intelligent, powerful, and seamless security. Fortinet offers security solutions for endpoints, access
points, network elements, the data center, applications, cloud, and data, designed to work together
as an integrated Security Fabric that can be integrated, analyzed, and managed to provide end-to-
end protection for your network. Your organization can also add third-party products that are
members of the Fabric-Ready Partner Program to the Security Fabric.
FortiGate uses AES and DES symmetric-key algorithms for encrypting and decrypting data. Some
of the algorithms supported by FortiGate are,
1. des-md5
2. des-sha1
3. des-sha256
4. des-sha384
5. des-sha512
6. aes128-md5
7. aes128-sha1 Master You
FGCP stands for FortiGate Clustering Protocol. This is one of the proprietaries and popular
high availability solutions offered by Fortinet firewall. FortiGate High Availability solution
mainly contains two firewalls, which are used for configuring the high availability operation.
27.
# show
# show | grep xxxx
Check configuration # show full-configuration
#show full-configuration | grep XXXX
#show full-configuration | grep -f XXXX ← display with tree view
Network:
Hardware:
NTP:
# execute time
Check NTP # get system ntp
# diagnose sys ntp status
ARP Table
• get system arp
• get system arp-table: static arp
Session Table
• diagnose sys session list
• diagnose sys session filter [$option]
• diagnose sys session clear: clear all session if no filter set
Routing
Show command
• get router info routing-table <ospf|bgp|rip|connected|static|all|static>: view
routing table
• get router info routing-table details 192.168.1.0
BGP
• get router info bgp network 192.168.1.0
• get router info bgp summary: show ip bgp summary
• get router info bgp neighbors [<neighbor ip>]: show ip bgp neighbor <ip>
• exec router clear bgp ip <neighbor ip>: Reset BGP peering
• exec router clear bgp ip <neighbor ip> soft [in | out]: Route Refresh
OSPF
• get router info ospf neighbor [neighbor ip]: show ip ospf neighbor
• get router info ospf database brief: show ip ospf database
• get router info ospf interface <name>: show ip ospf interface
• get router info ospf status: show ip ospf status
• get router info ospf route: route advertised and received via OSPF
• exec router clear ospf process: clear ip ospf process
# get system ha
Check HA Configuration
# show system ha
Commands:
# diag traffictest port 5209 <----- Define iPerf3 port running on the iPerf3 server.
# diag traffictest run -c 45.154.168.155 <----- Run iPerf3 against the public 45.154.168.155 iPerf3
server.
Test Reverse Direction from client as Server mode is not fully supported
Happy Learning…
Thanks
Rakesh