Fortigate Cookbook 52
Fortigate Cookbook 52
Fortigate Cookbook 52
Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and
certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other
Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or
company names may be trademarks of their respective owners. Performance and other metrics contained herein
were attained in internal lab tests under ideal conditions, and actual performance and other results may vary.
Network variables, different network environments and other conditions may affect performance results. Nothing
herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or
implied, except to the extent Fortinet enters a binding written contract, signed by Fortinets General Counsel, with
a purchaser that expressly warrants that the identified product will perform according to certain expresslyidentified performance metrics and, in such event, only the specific performance metrics expressly identified in
such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to
performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that
any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants,
representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to
change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the
publication shall be applicable.
ii
Please report errors or omissions in this or any Fortinet technical document to techdoc@fortinet.com.
iii
Table of Contents
Change Log
Introduction
Tips
10
Getting Started
12
14
15
21
27
31
36
40
45
49
FortiGuard troubleshooting
55
56
60
65
66
72
77
81
Port forwarding
87
FortiGuard DDNS
93
SNMP monitoring
96
Packet capture
103
VDOM configuration
107
115
122
iv
127
132
141
FortiExtender installation
144
150
162
Authentication
User and device authentication
166
174
178
184
Security
164
191
193
195
Blocking Ultrasurf
201
205
212
217
222
227
233
238
242
247
252
255
268
Blocking Facebook
273
278
287
292
297
300
305
VPNs
306
308
314
323
330
341
349
355
362
372
379
IPsec troubleshooting
386
388
399
406
412
423
436
442
449
455
462
WiFi
Setting up WiFi with FortiAP
464
466
vi
471
475
479
483
489
495
502
507
512
516
BYOD scheduling
521
525
529
534
540
548
555
566
580
589
600
612
Expert
vii
619
620
Redundant architecture
628
641
646
654
669
677
696
719
725
732
741
753
760
Glossary
770
viii
Change Log
Date
Change description
Oct 2, 2015
Initial publication
Change Log
Introduction
FortiGate is a network security appliance that can apply a number of features to your network traffic, providing a
consolidated security solution to match the needs of any network, big or small.
The FortiGate recipes is divided into the following sections:
l
VPNs: recipes about virtual private networks (VPNs), including authentication methods.
Expert: recipes about advanced FortiGate configurations for users with a higher degree of background
knowledge.
This version of the complete FortiGate cookbook was written using FortiOS 5.2.4.
Introduction
Tips
Before you get started, here are a few tips about using the FortiGate Cookbook:
Ports
The specific ports being used in the documentation are chosen as examples. When you are configuring your unit,
you can substitute your own ports, provided that they have the same function.
For example, in most recipes, wan1 is the port used to provide the FortiGate with access to the Internet. If your
FortiGate uses a different port for this function, you should use that port in the parts of the configuration that the
recipe uses wan1.
Tips
10
Text elements
Bold text indicates the name of a GUI field or feature. When required, italic text indicates information that you
must enter.
Italic text is also used for notes, which contain information that you may find useful while using a recipe.
Selecting OK/Apply
Always select OK or Apply when you complete a GUI step. Because this must be done frequently, it is an
assumed step and is not included in most recipes.
11
Tips
Getting Started
This section contains information about basic tasks to get a FortiGate unit up and running, including installation,
as well common roles and configurations a FortiGate unit can have in your network.
Installation
l
FortiGuard troubleshooting
Common configurations
l
Port forwarding
FortiGuard DDNS
SNMP monitoring
Packet capture
VDOM configuration
Getting Started
12
13
FortiExtender installation
Getting Started
What are Switch mode and Interface mode and why are they used?
In Switch mode, all the internal interfaces are part of the same subnet and treated as a single interface, called
either lan or internalby default, depending on the FortiGate model. Switch mode is used when the network layout
is basic, with most users being on the same subnet.
In Interface mode, the physical interfaces of the FortiGate unit are handled individually, with each interface having
its own IP address. Interfaces can also be combined by configuring them as part of either hardware or software
switches, which allow multiple interfaces to be treated as a single interface. This mode is ideal for complex
networks that use different subnets to compartmentalize the network traffic.
Getting Started
14
In this example, you will learn how to connect and configure a new FortiGate unit in NAT/Route mode to securely
connect a private network to the Internet.
In NAT/Route mode, a FortiGate unit is installed as a gateway or router between two networks. In most cases, it
is used between a private network and the Internet. This allows the FortiGate to hide the IP addresses of the
private network using network address translation (NAT).
If you have not already done so, ensure that your FortiGate is using the correct internal switch mode. For more
information, see Choosing your FortiGate's switch mode.
A video of this recipe is available here.
Getting Started
15
Getting Started
16
17
Getting Started
Getting Started
18
5. Creating a policy to allow traffic from the internal network to the Internet
Some FortiGate models include an IPv4 security policy in the default configuration. If you have one of these
models, edit it to include the logging options shown below, then proceed to the results section.
Go to Policy & Objects > Policy > IPv4
and create a new policy (if your network
uses IPv6 addresses, go to Policy &
Objects > Policy > IPv6).
Set the Incoming Interface to the
internal interface and the Outgoing
Interface to the Internet-facing interface.
Make sure the Action is set to ACCEPT.
Turn on NAT and make sure Use
Destination Interface Address is
selected (later versions of FortiOS 5.2
call this option Use Outgoing Interface
Address).
Scroll down to view the Logging
Options. In order to view the results
later, enable Log Allowed Traffic and
select All Sessions.
19
Getting Started
6. Results
You can now browse the Internet using
any computer that connects to the
FortiGates internal interface.
You can view information about the
traffic being processed by your FortiGate
by going to System > FortiView > All
Sessions and finding traffic that has the
internal interface as the Src Interface
and the Internet-facing interface as the
Dst Interface.
If these two columns are not shown,
right-click on the title row, select Src
Interface and Dst Interface from the
dropdown menu, and then select Apply.
Getting Started
20
In this example, you will learn how to connect and configure a new FortiGate unit in Transparent mode to securely
connect a private network to the Internet. In Transparent mode, the FortiGate applies security scanning to traffic
without applying routing or network address translation (NAT).
Warning: Changing to Transparent mode removes most configuration changes made in NAT/Route mode. To
keep your current NAT/Route mode configuration, backup the configuration using the System Information
widget, found at System > Dashboard > Status.
A video of this recipe is available here.
Getting Started
21
Getting Started
22
3. Creating a policy to allow traffic from the internal network to the Internet
Go to Policy & Objects > Policy > IPv4
and create a new policy (if your network
uses IPv6 addresses, go to Policy &
Objects > Policy > IPv6).
Set the Incoming Interface to the an
available external interface (typically
port 1) and the Outgoing Interface to
the Internet-facing interface (typically
WAN1).
23
Getting Started
Getting Started
24
5. Results
You can now browse the Internet using
any computer that connects to the
FortiGates internal interface.
You can view information about the
traffic being processed by your
FortiGate by going to System >
FortiView > All Sessions and finding
traffic that has port 1 as the Src
Interface and the Internet-facing
interface as the Dst Interface.
25
Getting Started
Getting Started
26
In this example, you will use DHCP and your FortiGate's default configuration to securely connect your internal
network to the Internet in two simple steps.
This recipe has the following requirements:
l
l
An ISP that provides connectivity with DHCP and accepts DHCP requests without authentication.
A FortiGate with a default configuration that includes a DHCP server on the lan (or internal) interface and a
security policy that securely allows all sessions from the Internal network to reach the Internet.
Your network uses IPv4 to connect to the FortiGate and Internet.
Getting Started
27
Getting Started
28
Mac OS X
Go to Network Preferences and select
Ethernet.
Set Configure IPv4 to Using DHCP.
29
Getting Started
3. Results
From any PC on the internal network,
open a web browser and browse to any
website. You can successfully connect
to the Internet.
Go to Policy & Objects > IPv4 > Policy.
Your Internet-access policy is at the top
of list, in the lan - wan section (this
section's name varies based on the
FortiGate model).
View the Count column, which displays
the total amount of traffic that has used
this policy since the FortiGate's last
reboot. The column should display
results, showing that the policy is being
used for traffic.
If this column is not visible, right-click on
the title row, select Count, then Apply.
Getting Started
30
In this example, you will create a WAN link interface that provides your FortiGate unit with redundant Internet
connections from two Internet service providers (ISPs). The WAN link interface combines these two connections
into a single interface.
This example includes weighted load balancing so that most of your Internet traffic is handled by one ISP.
A video of this recipe can be found here.
Getting Started
31
Getting Started
32
33
Getting Started
5. Allowing traffic from the internal network to the WAN link interface
Go to Policy & Objects > Policy > IPv4
and create a new policy.
Set Incoming Interface to your internal
networks interface and set Outgoing
Interface to the WAN link interface.
Turn on NAT.
Getting Started
34
6. Results
Browse the Internet using a PC on the
internal network and then go to System >
FortiView > All Sessions.
Ensure that the Dst Interface column is
visible in the traffic log. If it is not shown,
right-click on the title row and select Dst
Interface from the dropdown menu.
Scroll to the bottom of the menu and
select Apply.
The log shows traffic flowing through
both WAN1 and WAN2.
Disconnect the WAN1 port, continue to
browse the Internet, and refresh the
traffic log. All traffic is now flowing
through WAN2, until you reconnect
WAN1.
35
Getting Started
Verify that you can connect to the internal IP address of the FortiGate unit
(NAT/Route mode).
Connect to the web-based manager from the FortiGates internal interface by browsing to its IP address. From the
PC, try to ping the internal interface IP address; for example, ping 192.168.1.99.
If you cannot connect to the internal interface, verify the IP configuration of the PC. If you can ping the interface
but cant connect to the web-based manager, check the settings for administrative access on that interface.
Getting Started
36
Verify that you can connect to the management IP address of the FortiGate unit
(Transparent mode).
From the internal network, attempt to ping the management IP address. If you cannot connect to the internal
interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other
devices on the network are powered on and operating. Go to the next step when you can connect to the internal
interface.
37
Getting Started
Verify that you can connect to the gateway provided by your ISP.
Ping the default gateway IP address from a PC on the internal network. If you cannot reach the gateway, contact
your ISP to verify that you are using the correct gateway.
Verify that you can communicate from the FortiGate unit to the Internet.
Access the FortiGate CLI and use the command execute ping 8.8.8.8. You can also use the execute
traceroute 8.8.8.8 command to troubleshoot connectivity to the Internet.
Verify the DNS configurations of the FortiGate unit and the PCs.
Check for DNS errors by pinging or using traceroute to connect to a domain name; for example: ping
www.fortinet.com. If the name cannot be resolved, the FortiGate unit or PC cannot connect to a DNS server
and you should confirm that the DNS server IP addresses are present and correct.
Confirm that the FortiGate unit can connect to the FortiGuard network.
Once registered, the FortiGate unit obtains antivirus and application control and other updates from the FortiGuard
network. Once the FortiGate unit is on your network, confirm that it can reach FortiGuard.
First, check the License Information widget to make sure that the status of all FortiGuard services matches the
services that you have purchased. Go to System > Config > FortiGuard. Expand Web Filtering and Email
Filtering Options and select Test Availability. After a minute, the GUI should show a successful
connection.
Getting Started
38
Either reset the FortiGate unit to factory defaults or contact the technical assistance center.
If all else fails, reset the FortiGate unit to factory defaults using the CLI command execute factoryreset.
When prompted, type y to confirm the reset.
Resetting the FortiGate unit to factory defaults puts the unit back into NAT/Route mode.
You can also contact the technical assistance center. For contact information, go to support.fortinet.com.
39
Getting Started
In this example, you will register your FortiGate unit and set the system time. You will also configure several
administrative account settings to prevent unauthorized access.
Getting Started
40
Getting Started
41
42
Getting Started
Getting Started
43
5. Results
Attempt to log in using the admin account
without a password. Access is denied.
Log in using the new password to access
the FortiGate.
44
Getting Started
This example verifies the current version of FortiOS firmware and, if necessary, updates it to the latest version.
FortiOS is the operating system used by FortiGate and FortiWiFi units. You can update FortiOS to use the latest
tools and security features available.
Getting Started
45
Getting Started
46
4. Results
The FortiGate unit uploads the firmware
image file, updates to the new firmware
version, restarts, and displays the
FortiGate login. This process takes a few
minutes.
You may have to refresh your browser to
see the FortiGate login.
47
Getting Started
Getting Started
48
If you have purchased FortiGuard services and registered your FortiGate unit, the FortiGate should automatically
connect to FortiGuard and display license information about your FortiGuard services. In this example, you will
verify whether the FortiGate unit is communicating with the FortiGuard Distribution Network (FDN) by checking
the License Information dashboard widget.
Getting Started
49
Getting Started
50
51
Getting Started
Getting Started
52
3. Results
Go to System > Dashboard > Status
and go to the License Information
widget.
Any subscribed services should have a
green checkmark, indicating that
connections have been established and
that the licenses have been verified.
53
Getting Started
Getting Started
54
FortiGuard troubleshooting
This section contains tips to help you with some common challenges of using FortiGuard.
The FortiGate is connected to the Internet but cant communicate with FortiGuard.
If you have not done so already, verify your DNS settings and ensure that an unblocked port is being used for
FortiGuard traffic.
If the FortiGate interface connected to the Internet gets its IP address using DHCP, go to System > Network >
Interfaces and edit the Internet-facing interface. Ensure that
Override internal DNS is selected.
Getting Started
55
In this example, you will enable logging to capture the details of the network traffic processed by your FortiGate
unit. Capturing log details will provide you with detailed traffic information that you can use to asses any network
issues.
A video of this recipe can be found here.
Getting Started
56
Getting Started
57
58
Getting Started
3. Results
View traffic logs by going to Log &
Report > Traffic Log > Forward
Traffic. The logs display a variety of
information about your traffic, including
date/time, source, device, and
destination.To change the information
shown, right-click on any column title
and select Column Settings to enable or
disable different columns.
Getting Started
59
In this example, you will use FortiCloud, an online logging service provided by Fortinet, to store the logs of your
FortiGate unit's traffic. You will also access logs using the FortiCloud website.
Before you can use FortiCloud, you must register your FortiGate. For more information, seeFortiGate registration
and basic settings.
A video of this recipe is available here.
Getting Started
60
1. Activating FortiCloud
Go to System > Dashboard > Status
and locate the License Information
widget. In the FortiCloud section, select
Activate.
Getting Started
61
4. Results
Browse the Internet.Go to Log & Report
> Traffic Log > Forward Traffic. In the
top right corner of the screen, the Log
location is shown as FortiCloud.
62
Getting Started
Getting Started
63
64
Getting Started
The FortiGate units performance level has decreased since enabling disk logging.
If enabling disk logging has impacted overall performance, change the log settings to either send logs to a
FortiAnalyzer unit, a FortiManager unit, or to FortiCloud.
Getting Started
65
This example shows how to create and order multiple security policies in the policy table, in order to apply the
appropriate policy to various types of network traffic.
In the example, three IPv4 policies will be configured. PolicyA will be a general policy allowing Internet access to
the LAN. PolicyB will allow Internet access while applying web filtering for specific mobile devices connecting
through the LAN. PolicyC will allow the system administrators PC (named SysAdminPC) to have full access
In this example, a wireless network has already been configured that is in the same subnet as the wired LAN. For
information about this configuration, seeSetting up a WiFi bridge with a FortiAP.
A fourth policy, the default deny policy, will also be used.
A video of this recipe can be found here.
Getting Started
66
Getting Started
67
68
Getting Started
3. Defining SysAdminPC
Go to User & Device > Device >
Device Definitions and create a new
definition for the system administrators
PC.
Select an approprate Alias, then set the
MAC Address. Set the appropriate
Device Type.
Getting Started
69
70
Getting Started
6. Results
Browse the Internet using the system administrators PC, a different PC, and a mobile device.
Go to Log & Report > Traffic Log >
Forward Traffic.
You can see that traffic from the three
devices flows through different policies.
In the example, the SysAdmin PC (IP
10.10.11.10), a Windows PC (IP
10.10.11.14), and an iPad (IP
10.10.11.13) were used to generate
traffic.
Getting Started
71
In this recipe you will create a FortiGate administrator account that is limited to read and write access for user and
device authentication and read access for logging and reporting. In addition you will use the Trusted Hosts feature
to control the IP address that the administrator can log in from.
The administrator account will have the same access limitations for both the GUI and CLI.
Getting Started
72
Getting Started
73
74
Getting Started
3. Results
Log into the FortiGate unit with the
t.white. administrator account. t.white
should only see the User & Device and
the Log & Report menus.
t.white should be able to change user and
device authentication settings and view
log messages and reports.
Getting Started
75
76
Getting Started
When you create a port pair, all traffic accepted by one of the paired interfaces can only exit out the other interface.
Restricting traffic in this way simplifies your FortiGate configuration because security policies between these
interfaces are pre-configured.
In this example you will create a wan1 to Internal port pair to make it easier to allow access to a web server
protected by a FortiGate in Transparent mode. In this unusual configuration, the web server is connected to the
FortiGates wan1 interface and the FortiGates Internal interface is connected to an internal network. Users on the
internal network access the web server through the FortiGate.
Traffic between port-paired interfaces does not check the bridge table and MAC addresses are not learned.
Instead traffic received by one interface in a port pair is forwarded out the other (if allowed by a firewall policy).
This makes port pairing useful for unusual topologies where MAC addresses do not behave normally. For
example, port paring can be used in a Direct Server Return (DSR) topology where the response MAC address pair
may not match the requests MAC address pair.
Getting Started
77
1. Switching the FortiGate unit to transparent mode and adding a static route
Go to System > Dashboard > Status.
In the System Information widget,
select Change beside Operation
Mode.
Change the Operation Mode to
Transparent. Add a Management
IP/Netmask. Also add a Default
Gateway for your network so that the
FortiGate unit can connect to the
Internet.
Getting Started
78
4. Results
Connect to the web server from the
internal network and surf the Internet
from the server itself.
Go to Log & Report > Traffic Log >
Forward Traffic to verify that there is
traffic from the internal to wan1 interface.
Select an entry for details.
79
Getting Started
Getting Started
80
In this recipe, which starts with a FortiGate Clustering Protocol (FGCP) cluster of two FortiGate units*, you will
upgrade the primary units firmware, while keeping the subordinate unit as a failsafe backup running the original
firmware.
If the new firmware upgrades and runs successfully, you can quickly upgrade the entire cluster to the new
firmware. If the new firmware fails during or after the upgrade, you can quickly revert the cluster to the older
firmware.
This recipe increases the effort needed to upgrade cluster firmware but allows easily falling back to the original
firmware version and FortiGate configuration with minimal network interruption.
Normally when you upgrade a cluster, network traffic is not interrupted. However, upgrading one unit in a cluster
results in minor network disruptions similar to upgrading the firmware of a single FortiGate unit.
This recipe requires you to enable the dedicated or reserved HA management interface feature.
This example uses the following interfaces:
l
Getting Started
81
config system ha
set ha-mgmt-interface internal1
set ha-mgmt-interface-gateway 10.11.101.2
end
set ha-mg
To configure the subordinate unit's reserved management interface, from the primary unit CLI use the execute
ha manage command to access the subordinate unit's CLI. Then use the config system interface
command to set the IP address for the subordinate unit reserved management interface. You can also use the
set ha-mgmt-interface-gateway command to configure the default gateway.
Enabling and selecting the reserved management interface is synchronized to both cluster members. The
management interface gateway and the configuration of the management interface is not synchronized.
Getting Started
82
83
Getting Started
Getting Started
84
config system ha
set sync-config enable
end
Log into the subordinate unit, enable configuration synchronization, bring up its heartbeat interfaces and bring up
its traffic interfaces.
The cluster resumes operating normally. You can use the get system ha status and diagnose sys ha
status commands to verify that HA is operating normally.
Back up the configuration of the primary and subordinate FortiGate units. Backed up configuration files are
specific to FortiOS versions.
85
Getting Started
Getting Started
86
Port forwarding
This example illustrates how to use virtual IPs to configure port forwarding on a FortiGate unit. In this example,
TCP ports 80 (HTTP), 21 (FTP), and 22 (SSH) are opened, allowing remote connections to communicate with a
server behind the firewall.
A video of this recipe can be found here.
Getting Started
87
Getting Started
88
89
Getting Started
Getting Started
90
4. Results
To ensure that TCP port 80 is open,
connect to the web server on the other
side of the firewall.
91
Getting Started
Getting Started
92
FortiGuard DDNS
In this example, you will use FortiGuard Dynamic Domain Name Service (DDNS) to allow a remote administrator
to access your FortiGate's Internet-facing interface using a domain name that remains constant, even when its IP
address changes.
Getting Started
93
Getting Started
94
3. Results
Browse to the domain name assigned to
the interface, using HTTPS (in the
example, https://branch.float-zone.com).
The FortiGate login screen will appear.
95
Getting Started
SNMP monitoring
In this example, you configure the FortiGate SNMP agent and an example SNMP manager so that the SNMP
manager can get status information from the FortiGate unit and so that the FortiGate unit can send traps to the
SNMP manager.
The Simple Network Management Protocol (SNMP) enables you to monitor hardware on your network. You
configure the hardware, such as the FortiGate SNMP agent, to report system information and send traps (alarms
or event messages) to SNMP managers.
Getting Started
96
Getting Started
97
98
Getting Started
Getting Started
99
4. Results
This example uses the SolarWinds
SNMP trap viewer.
In the SolarWinds Toolset Launch Pad,
go to SNMP > MIB Viewer and select
Launch.
100
Getting Started
Getting Started
101
102
Getting Started
Packet capture
In this example, you will set up and run some basic packet capture filters on your FortiGate and download and
view the resulting .pcap file.
You can use packet capturing to learn about network activity seen by your FortiGate by creating and saving
packet capture filters that define the packets to capture. You can then run these filters at any time, download the
resulting .pcap (packet capture) file, and use a tool like Wireshark to analyze the results.
Getting Started
103
Getting Started
104
105
Getting Started
2. Results
Running packet capture filters may affect
FortiGate performance.
Go to System > Network > Packet
Capture, choose a filter, and select the
Play icon. You can watch the filter
capture packets. When the number of
packets specified in the filter are
captured the filter stops.
You can stop and restart multiple filters
at any time.
Download any saved .pcap file to your
computer. You can open the file with a
.pcap file viewer like Wireshark.
Getting Started
106
VDOM configuration
This example illustrates how to use VDOMs to host two FortiOS instances on a single FortiGate unit.
Virtual Domains (VDOMs) can be used to divide a single FortiGate unit into two or more virtual instances of
FortiOS that function as independent FortiGate units. This example simulates an ISP that provides Company A
and Company B with distinct Internet services. Each company has its own VDOM, IP address, and internal
network.
A video of this recipe is available here.
Getting Started
107
Getting Started
108
109
Getting Started
Getting Started
110
111
Getting Started
Getting Started
112
7. Results
Connect to the Internet from the
company A and company B networks
and then log into the FortiGate unit
Go to Virtual Domains and select
VDOM-A.
Go to Policy & Objects > Monitor >
Policy Monitor to view the sessions
being processed on VDOM-A.
113
Getting Started
Getting Started
114
In this recipe, a backup FortiGate unit will be installed and connected to a FortiGate unit that has previously been
installed to provide redundancy if the primary FortiGate unit fails. This set up, called High Availability (HA),
improves network reliability.
If you have not already installed a FortiGate, see Installing a FortiGate in NAT/Route mode.
A video of this recipe is available here.
Getting Started
115
Getting Started
116
117
Getting Started
Getting Started
118
2. Results
Normally, traffic should now be flowing through the primary FortiGate. However, if the primary FortiGate is
unavailable, traffic should failover and the backup FortiGate will be used. Failover will also cause the primary
and backup FortiGates to reverse roles, even when both FortiGates are available again.
To test this, ping the IP address 8.8.8.8
using a PC on the internal network. After
a moment, power off the primary
FortiGate
119
Getting Started
Getting Started
120
121
Getting Started
In this example, you will create multicast security policies to allow AirPlay communication between an iOS device
and an Apple TV through a FortiGate unit.
Apple TV can also be connected to the Internet wirelessly. AirPlay will function from any iOS device connected to
the same SSID as the Apple TV, without any configuration required on the FortiGate.
This recipe uses a FortiAP in Tunnel mode. For more information, see Setting up WiFi with FortiAP.
Getting Started
122
Getting Started
123
124
Getting Started
Getting Started
125
5. Results
Use AirPlay to stream audio or video
from an iOS device to the Apple TV.
Go to Log & Report > Traffic Log >
Multicast. You will see traffic flowing
between the two devices, using both
multicast policies.
126
Getting Started
In the following example, you will protect a web server by connecting it using your FortiGates DMZ network.
An internal to DMZ security policy with a virtual IP (VIP) allows internal users to access the web server using an
internal IP address (10.10.10.22). A WAN-to-DMZ security policy also with a VIP hides the internal address,
allowing external users to access the web server using a public IP address (172.20.120.22).
A video of this recipe is available here.
Getting Started
127
Getting Started
128
129
Getting Started
4. Results
External users can access the web server on the DMZ network from the Internet using its Internet address (in
this example, http://172.20.120.22 and https://172.20.120.22). Internal users can access the web server using
its DMZ address (in this example. and https://10.10.10.22). Internal users cannot access the web server using
its Internet access because by default the FortiGate blocks harpining. For more information about hairpining,
see this Knowledge Base article.
Go to Policy & Objects > Monitor >
Policy Monitor.
Use the policy monitor to verify that
traffic from the Internet and from the
internal network is allowed to access the
web server. This verifies that the policies
are configured correctly.
Getting Started
130
131
Getting Started
The quality of VoIP phone calls through a firewall often suffers when the firewall is busy and the amount of
bandwidth available for the VoIP traffic fluctuates. This can be irritating, leading to unpredictable results and caller
frustration. This recipe describes how to add traffic shaping to guarantee that enough bandwidth is available for
VoIP traffic, regardless of any other activity on the network.
To achieve high quality real-time voice transmissions, VoIP traffic requires priority over other types of traffic,
minimal packet loss, andjitter buffers. You will limitbandwidth consuming services, likeFTP, while providinga
consistent bandwidth for day-to-day email and web-based traffic.First, you will customize three existing traffic
shapershigh priority, medium priority, andlow priorityand then create aseparatesecurity policy for eachservice
type.
Before you apply QoS measures,ensure you haveenough network bandwidth to support real-time voice traffic.
A video of this recipe is available here.
Getting Started
132
Getting Started
133
134
Getting Started
Getting Started
135
136
Getting Started
Getting Started
137
138
Getting Started
6. Results
Browse the Internet using a PC on
yourinternal network to generate daily
webtraffic. Then, generate FTP traffic.
Getting Started
139
140
Getting Started
In this example you will configure your FortiGate to use Stateless Address Auto Configuration (SLAAC) to assign
IPv6 addresses to IPv6-enabled devices on your internal network.
The IPv6 address block used in this recipe (2001:db8::/32) is reserved for documentation purposes and will not
work on your network. If youre not sure how to determine the correct IPv6 address for your environment, refer to
the FortiOS IPv6 Handbook Chapter.
Getting Started
141
1. Enabling IPv6
Go to System > Config > Features
and make sure that IPv6 is turned
ON.
config ip6-prefix-list
edit 2001:db8::/32
set autonomous-flag enable
set onlink-flag enable
end
end
end
Getting Started
142
5. Results
Connect a computer to the port1
interface. Configure the computer to
get an IPv6 address automatically.
Then, from a command prompt or
terminal session enter the command
ipconfig to view the computer's IP
configuration.
143
Getting Started
FortiExtender installation
This example shows how to set an internet connection using a 3G/4G modem and a FortiExtender. A
FortiExtender is used when the FortiGate unit is located in an area without 3G/4G network coverage, the
FortiExtender can be placed near a window or outdoors.
For information about the compatibility ofFortiExtenderand various modems, see the FortiGate and FortiExtender
Modem Compatibility Matrix.
Getting Started
144
Getting Started
145
146
Getting Started
4. Modem settings
The FortiExtender unit allows for two
modes of operation for the modem; On
Demand and Always Connect.
Go to System > Network >
FortiExtender and click on Configuring
Settings.
Select Always Connect for Dial Mode
and keep other settings to default.
Getting Started
147
6. Results
Browse the Internet and go to Policy &
Objects > Policy > IPv4 to verify the
Count.
148
Getting Started
Getting Started
149
In this recipe, you set up a FortiGate with a secondary IP to provide remote access to a FortiRecorder. This allows
you to securely view live FortiCamera video feeds over the Internet, using either the FortiRecorder GUI,
FortiRecorder Mobile, or FortiRecorder Central.
This recipe employs a secondary IP and two port forwarding virtual IPs to forward HTTPS and Real Time
Streaming Protocol (RTSP) packets from the Internet to the FortiRecorder. To use a secondary IP address you
must have a second Internet IP address for your FortiRecorder. Instead of adding this IP address to the
FortiRecorder, you add it to your FortiGate and forward traffic for the FortiRecorder IP address through the
FortiGate.
Getting Started
150
Getting Started
151
152
Getting Started
Getting Started
153
154
Getting Started
Getting Started
155
156
Getting Started
Getting Started
157
158
Getting Started
Getting Started
159
8. Results
From the Internet you can browse to the
secondary IP address, using HTTPS (in
the example, https://172.20.120.237).
The FortiRecorder GUI login screen
appears.
Go toMonitor > Video Monitorto see
the live video feed from the FortiCamera.
160
Getting Started
Getting Started
161
Connect a cable from the highest FortiSwitch port to an unused port on the FortiGate. For example, use
port 24 on the FS-224D-POE switch.
You may need to enable the Switch Controller using the FortiGate web-based manager.
Select Apply.
Getting Started
162
Procedure
From the FortiGate web-based manager:
1. Go to System > Network > Interfaces and edit an internal port.
2. Set Addressing mode to Dedicate to Extension Device.
3. Select OK. The FortiSwitch should now be visible
4. Go to WiFi & Switch Controller > Managed Devices > Managed FortiSwitch.
Right-click on the switch and select Authorize.
-> After a delay (while FortiGate processes the request), an icon with a checkmark appears in the Status
column. For smaller FortiSwitch models, such as FS-108D-POE, the delay may be up to 3 minutes.
Notes
1. In some FortiSwitch models (such as FS-124D), the highest port is an optical interface, which requires an
SFP module.
2. In FortiOS 5.4, additional FortiLink features include:
a. POE configuration from the FortiGate
b. Link Aggregation Group (LAG) support for Fortilink
c. Auto-detect the switch FortiLink port. Removes the restriction that only the highest port on the
switch can be used for FortiLink
3. Refer to the document below to see the FortiSwitch and FortiGate releases that support FortiLink, and the
supported FortiSwitch and FortiGate models in each release.
Getting Started
163
Authentication
This section contains information about authenticating users and devices.
Authentication, the act of confirming the identity of a person or device, is a key part of network security. When
authentication is used, the identities of users or host computers must be established to ensure that only
authorized parties can access the network.
BYOD scheduling
Authentication
164
165
Authentication
In this example, user authentication and device authentication provide different access for staff members based
on whether they are full-time or part-time employees, while denying all traffic from mobile phones.
In this example, a wireless network has already been configured that is in the same subnet as the wired LAN. For
information about this configuration, see Setting up a WiFi bridge with a FortiAP.
A video of this recipe can be found here.
Authentication
166
Authentication
167
168
Authentication
Authentication
169
170
Authentication
Authentication
171
7. Results
Browse the Internet using a computer.
You will be prompted to enter
authentication credentials.
Log in using the dprince account. You will
be able to access the Internet at any
time.
172
Authentication
Authentication
173
In this example, two company executives are excluded from the security scanning that a FortiGate applies to all
other staff Internet traffic.
The executives in this example connect to the Internet using PCs with static IP addresses, so these addresses
can be used to identify their traffic. If identifying users with a static IP address will not work for your network you
can set up authentication or device identification (BYOD).
Authentication
174
Authentication
175
176
Authentication
4. Results
Connect to the Internet from two
computers on the internal network: one
from an executive address and one from
a staff address.
Go to Log & Report > Traffic Log >
Forward Traffic. Right-click the column
headings and make sure that the Policy
ID column is visible.
In this example output, connections from
192.168.13.10 (an executive address)
use policy ID 3 and connections from
192.168.13.144 (a staff address) use
policy ID 2.
Authentication
177
In this example, you will configure Fortinet Single Sign-On (FSSO) directly in the security policy using the new
FSSO wizard introduced in FortiOS 5.2.2.
Thisrecipe requires that your FortiGate's DNS point to a DNS server that can resolve the IP addresses or fully
qualified domain names of the users' PCs.
This example uses Active Directory polling to establish FSSO for a Windows AD Domain Controller, without
requiring a FortiAuthenticator or a collector agentto act as an intermediarybetween the FortiGate and the domain.
An LDAP server is also used for authentication.
A video of this recipe is available here.
Authentication
178
Authentication
179
180
Authentication
Authentication
181
5. Results
Go to Log & Report > Traffic Log >
ForwardTraffic.
When users log into the Windows AD
network, the FortiGate will automatically
poll the domain for their account
information, and record their traffic.
182
Authentication
For further reading, check out Single SignOn to Windows AD in the FortiOS 5.2
Handbook.
Authentication
183
In this recipe, two-factor authentication is added to a user account to provide extra security to the authentication
process.
Two-factor authentication requires a user to providefurther means of authentication in addition to their credentials.
In this recipe, FortiToken Mobile app for Android will be used to generate a token, also known as a one-time
password (OTP), to use in the authentication process.
A video of this recipe is available here.
Authentication
184
Authentication
185
186
Authentication
Authentication
187
188
Authentication
(Optional) For additional security, set a PIN for FortiToken Mobile using the app's Settings options.
6. Results
Attempt to browse the Internet. An
authentication page will appear,
requesting a Username and Password.
Authentication
189
190
Authentication
Security
This section contains information about using a FortiGates security features, including antivirus, web filtering,
application control, intrusion protection (IPS), email filtering, and data leak prevention (DLP). This section also
includes information about using SSL inspection to inspect encrypted traffic.
AntiVirus
l
Blocking Ultrasurf
Application Control
l
Blocking Ultrasurf
Intrusion Protection
l
SSL Inspection
l
Security
191
Web Filtering
192
Blocking Facebook
Security
AV Scanning 101
AntiVirus scanning examines files in HTTP, HTTPS, email, and FTP traffic for threats as they pass through your
FortiGate unit. If the AV scanner finds a threat such as a virus or some other malware, FortiOS protects your
network by blocking the file.
FortiOS includes a number of AntiVirus features that make virus scanning more user friendly. One of these
features, called replacement messages, sends a customizable message to anyone whose file is blocked by AV
scanning, to explain what happened and why. Other features make communication between the client and the
server more seamless. The availability of these changes depending on the inspection mode.
Proxy-based AV scanning
Proxy-based AV scanning is the most secure and feature-rich AV scanning mode. This mode uses a proxy to
manage the communication between client and server. The proxy extracts content packets from the data stream
as they arrive and buffers the content until the complete file is assembled. Once the file is whole, the AV scanner
examines the file for threats. If no threats are found, the file is sent to its destination. If a threat is found, the file is
blocked.
Because proxy-based scanning is applied to complete files it provides very effective threat detection. Proxybased scanning also supports the a full range of features, including replacement messages and client comforting,
making proxy-based scanning the most user friendly inspection mode. In addition the proxy manages the
communication between the client and the server, so communication is cleaner.
Proxy-based scanning inspects all files under the oversized threshold. This threshold is 10 MB by default but can
be reconfigured. Any files larger than the threshold are considered oversized and not inspected.
Flow-based AV scanning
Although the name "flow-based scanning" is used in both FortiOS 5.0 and 5.2, the two different versions handle
this mode in very different ways.
193
analysis. Potentially less memory and CPU resources are used, resulting in a potential performance increase
compared to using proxy-based mode. FortiOS 5.0 flow-based AV scanning is also not limited by file size.
Flow AV uses the IPS engine and the AV database and is effective at many kinds of threat detection; however,
because it can only analyze what is in an individual packet rather than a complete file, flow-based scanning cannot
detect some types of malware, including polymorphic code. Malware in documents, compressed files, and some
archives are also less likely to be detected.
Flow AV does not actually block files, it stops delivering the rest of the file once a threat has been detected. This
means that parts of the file may already have been delivered when the threat has been detected and the recipient
application is responsible for dealing with the partially complete content.
In addition flow AV can be less user friendly. Replacement messages are not supported and clients may have to
wait for sessions to time out without knowing why content has been blocked.
194
Security
In this recipe, you will apply antivirus scanning to your network traffic. Any suspicious files entering your network
will be sent to a FortiSandbox for further examination.
This recipe was written using FortiSandbox 2.1.0.
Security
195
Security
196
197
Security
Security
198
5. Results
199
Security
Security
200
Blocking Ultrasurf
In this recipe, you will use antivirus scanning and application control to block network users from downloading and
using Ultrasurf. As mentioned in a recent SysAdmin Note, Ultrasurf is an application that is used to bypass
firewalls and browse the Internet anonymously.
In order to complete the final part of this recipe, download Ultrasurf before any security scanning is applied to your
Internet traffic.
Security
201
Security
202
203
Security
5. Results
Attempt to browse to ultrasurf.us. The
page will not load.
On your FortiGate, go to Log & Report >
Traffic Log > Forward Traffic and filter
for Destination IP: 65.49.14.131 (the
IP of ultrasurf.us). Traffic to this
destination was blocked by the
FortiGate.
Attempt to download the Ultrasurf files
from a third-party website, such as
Download.com.
The download will be blocked.
Security
204
In this example, you will learn how to use Application Control to monitor traffic and determine if there are any
applications currently in use that should not have network access. If you discover any applications that you wish
to block, application control will then be used to ensure that these applications cannot access the network.
A video of this recipe is available here.
Security
205
Security
206
207
Security
Security
208
209
Security
Security
210
7. Results
Attempt to browse to YouTube. A
warning message will appear, stating
that the application was blocked.
211
Security
In this example, you will use application control to block web traffic from PCs running Windows operating systems
that NT 5, including Windows XP and Windows Server 2003 (includes Windows virtual machines).
When a computers operating system lacks vendor support, it becomes a threat to the network because newly
discovered exploits will not be patched. Using the FortiGate application control feature, you can restrict these
computers from accessing external resources.
This recipe will only block web traffic from computers running the affected operating systems. If you wish to block
these computers from being on the network entirely, further action will be necessary. However, the logs
generated by this recipe can be used to identify the computers you wish to block.
A video of this recipe is available here.
Security
212
Security
213
214
Security
5. Results
When a PC running one of the
affected operating systems
attempts to connect to the
Internet using a browser, a
blocked message appears.
PCs running other operating
systems, including later versions
of Windows, are not affected.
Security
215
216
Security
In this recipe, you will allow one user to use the Tor browser application for web traffic, while monitoring the user's
activity. Use of the Tor browser will be blocked for all other users.
The Tor browser allows users to bounce communication traffic around a distributed network of relays located
around the world. For more information about Tor, check out the Fortinet blog entry 5 Things To Know About The
Tor Browser And Your Network.
This recipe uses the default application control signatures for the Tor client and web-based Tor. These signatures
will only match unmodified versions of the Tor application. Also, if a Tor session has already been established
prior to connecting to the network, it may take up to 10 minutes before the FortiGate is able to monitor or block the
traffic.
In this recipe, two user accounts,jack and jill, have already been configured. For more information about creating
user accounts, see User and device authentication.
A video of this recipe is available here.
Security
217
Security
218
219
Security
5. Results
The Tor browser cannot be used for user authentication, so use a different browser to authenticate using jill's
credentials.
Browse the Internet using the Tor browser. You will be able to connect to the Internet.
Security
220
221
Security
In this recipe, access to Apples App Store is blocked between 7AM and 5PM. During the rest of the day, access
is allowed.
This recipe applies to devices running MacOS and iOS devices (iPhone, iPad, or iPod).
Security
222
Security
223
3. Creating a schedule
Go toPolicy & Objects > Objects >
Schedules and create a new schedule.
SetTypetoRecurring, select the
appropriateDays, and setStart Time to
7AM (Hour 7, Minute 0) andStop Time to
5PM (Hour 17, Minute 0).
224
Security
Security
225
7. Results
On a Mac or iOS device, attempt to run
theApp Store application between 7AM
and 5PM. The application will not be able
to fully load and no new apps can be
downloaded.
226
Security
In this example, online gaming will only be allowed from 7-11PM. This includes gaming websites, applications,
and consoles.
This example assumes that a general policy allowing connections from the internal network to the Internet has
already been configured.
Security
227
Security
228
229
Security
Security
230
configfirewall policy
edit <policy_id>
set schedule-timeout enable
end
end
231
Security
7. Results
During the time that gaming is blocked,
attempt to browse to a gaming website,
such as Yahoo Games. The site is
blocked.
Attempt to run an online gaming
application, such Steam. The application
will be unable to connect to the Internet.
Attempt to connect to the Internet using a gaming console. The console will be unable to connect to the Internet.
Between 7-11PM, you are able to access the website, and all gaming applications and consoles can connect to
the Internet.
Security
232
In this example, you will block files that contain sensitive information from leaving your network. To do this, a Data
Leak Prevention (DLP) profile will be used that blocks files that have a DLP watermark applied to them, as well as
any .exe files.
A video of this recipe is available here.
Security
233
Security
234
235
Security
5. Results
Attempt to send either the watermarked file or an .exe file using a protocol that the DLP filer is
examining.Depending on which protocol is used, the attempt will either be blocked by the FortiGate or it will
timeout.
Security
236
237
Security
In this example, you will use DLP to prevent credit card numbers from being sent out of your network using HTTP,
FTP, or SMTP.
Security
238
1. Enabling DLP
Go to System > Config > Features and
make sure that DLP is turned ON.
Security
239
4. Results
Locatesome examplecredit card numbers to use for testing purposes. These can be found from a variety of
locations, including PayPal.
Testing HTTP:Go to a website with a comment section and attempt to post an example credit card number.
The comment is blocked.
Testing FTP: Transferafilecontaining an example credit card number using FTP. This transfer is blocked.
Testing SNMP: Send an email containing an example credit card number using a SNMP email client. This email
is blocked.
240
Security
Security
241
In this example, you will protect a web server using an Intrusion Prevention System (IPS) profile and a Denial of
Service (DoS) policy. This will prevent a variety of different attacks from reaching the server.
A video of this recipe is available here.
Security
242
Security
243
244
Security
5. Results
Warning: DoS attacks are illegal, unless you own the server under attack. Before performing an attack, ensure
that you have the correct server IP.
Launch a DoS attack on your web servers IP address.
Security
245
246
Security
In this recipe, you will add a custom Intrusion Protection (IPS) signature to a security policy to record all domain
lookups accepted by the policy. The signature records an IPS log message containing the domain name every
time a DNS lookup occurs.
Security
247
Security
248
249
Security
5. Results
Go to Log & Report > Security Log >
Intrustion Protection.
This log only appears when an IPS event
has occurred.
You will see that the IPS profile has
detected matching traffic.
If you select an entry, you can view
more information.
The domain name is shown in the
Message field.
Security
250
251
Security
Most of us are familiar with the benefits of Hypertext Transfer Protocol Secure (HTTPS) and how it protects most
commerce activities on the Internet. HTTPS applies Secure Sockets Layer (SSL) encryption to secure web traffic
from prying eyes. The benefits are obvious; the risks, however are not as obvious, though they do exist.
One major risk is that encrypted traffic could be used in attacks that get around your normal defences. For
example, you could download a file containing a virus during an e-commerce session. Because the session is
encrypted your normal defences would miss it.
In another example, you could receive a phishing email that contains a seemingly harmless downloader file. When
launched, the downloader could create an encrypted HTTPS session to a command and control (C&C) server that
downloads malware onto your computer. Because the session containing the malware is encrypted, your antivirus
protection cant see and block the threat.
To protect your network from these threats, SSL inspection is the key that your FortiGate can use to unlock
encrypted sessions, see into encrypted packets, find threats, and block them. SSL inspection not only protects
you from attacks that use HTTPS, but also from other commonly used SSL-encrypted protocols, such as
SMTPS, POP3S, IMAPS, and FTPS.
Security
252
Uses a CA certificate (which can be upload by going to System > Certificates > CA Certificates).
Typically applied to outbound policies where destination are unknown (i.e. normal web traffic).
Address and web category whitelists can be configured to bypass SSL inspection.
l
l
Uses a server certificate (which can be upload by going to System > Certificates > CA Certificates) to protect a single server.
Typically used on inbound policies to protect servers available externally through Virtual IPs
Since this is typically deployed outside-in (clients on the Internet accessing server(s) on the internal side
of the FortiGate), server certificates using the public FQDN of the serverare often purchased from a commercial Certificate Authority and uploaded to the FortiGate. This avoids client applications generating SSL
certificate errors due to certificate mismatch.
More detail is available in the FortiOS 5.2 Handbook. Also, check the Fortinet Knowledge Base for these technical
notes:
l
How to Enable SSL inspection from the CLI and Apply it to a Policy
How to block web-based chat on Gmail webmail using App Sensor + SSL inspection
253
Security
The only security feature that can be applied using SSL certificate inspection mode is web filtering. However,
since only the packet is inspected, this method does not introduce certificate errors and can be a useful alternative
to full SSL inspection when web filtering is used.
Troubleshooting
The most common problem with SSL inspection is users receiving SSL errors when the CA certificate is not
trusted. This is because by default the FortiGate uses a certificate that is not trusted by the client. There are two
ways to fix this:
l
l
All users must import the FortiGates default certificate into their client applications as a trusted certificate.
Configure the FortiGate to use a certificate that is already trusted by your clients. For example, a certification signed by a CA that your clients already trust.
The first method can be more labor intensive because you have to distribute a certification to all clients. This can
also be an ongoing problem as new clients are added to your network. The second method is usually less work but
may require paying for a CA. Both of these methods are covered in the recipe Preventing Certificate Warnings.
If you choose to install the cert on clients, this can be easier in a Microsoft Active Directory domain by using
Group Policy Objects to install the certificate on domain members. Check that the Group Policy has propagated to
all computers by opening Internet Explorer on a workstation PC, opening Tools > Internet Options > Content >
Certificates >Trusted Root Certification Authorities, and ensuring that the FortiGate's certificate is present.
For corporate-owned mobile devices, MDM solutions like AirWatch, MobileIron, or Fiberlink, use Simple
Certificate Enrollment Protocol (SCEP) to ease certificate enrollment.
Best practices
Because all traffic needs to be decrypted, inspected, and re-encrypted, using SSL inspection can reduce overall
performance of your FortiGate. To make sure you aren't using too many resources for SSL inspection, do the
following:
l
l
l
Know your traffic Know how much traffic is expected and what percent of the traffic is encrypted. You
can also limit the number of policies that allow encrypted traffic.
Be selective Use white lists or trim your policy to apply SSL inspection only where it is needed.
Use hardware acceleration - FortiGate models with either the CP6 or CPU processor have an SSL/TLS
protocol processor for SSL content scanning and SSL acceleration. For more information about this, see
the Hardware Acceleration handbook.
Test real-world SSL inspection performance yourself - Use the flexibility of FortiGates security policy
to gradually deploy SSL inspection, rather than enabling it all at once.
Security
254
This example illustrates how to prevent your users from getting a security certificate warning when you have
enabled full SSL inspection (also called deep inspection).
Instead of having users select Continue when they receive a warning, a bad habit to encourage, you can use the
examples below to prevent certificate warnings from appearing: Using the default FortiGate certificate or Using a
self-signed certificate .
For more information about SSL inspection, seeWhy you should use SSL inspection.
Security
255
Security
256
257
Security
For Firefox:
Depending on the platform, go to Menu >
Options or Preferences > Advanced
and find the Certificates tab.
Security
258
259
Security
Security
260
5. Results
Before installing the FortiGate SSL CA
certificate, even if you bypass the error
message by selecting Continue to this
website, the browser may still show an
error in the toolbar.
After you install the FortiGate SSL CA
certificate, you should not experience a
certificate security issue when you
browse to sites on which the FortiGate
unit performs SSL content inspection.
iTunes will now be able to run without a
certificate error.
261
Security
Security
262
263
Security
For Firefox:
Depending on the version, go to Menu >
Options or Preferences > Advanced
and find the Certificates tab.
Select View Certificates, then select the
Servers list. Import the certificate file.
Security
264
265
Security
7. Results
Before installing the self-certificate and
using it for SSL inspection, even if you
bypass the error message by selecting
Continue to this website, the browser
may still show an error in the toolbar.
After you install the self-signed
certificate, you should not experience a
certificate security issue when you
browse to sites on which the FortiGate
unit performs SSL content inspection.
If you view the website's certificate
information, the Issued By section
should contain the information of your
custom certificate, indicating that the
traffic is subject to deep inspection.
Security
266
267
Security
In this recipe, you will exempt Google Canada websites from deep SSL inspection. Exempting these websites
allows the Chrome browser to access them without errors.
You should use caution when exempting websites. In general, it is recommended that you only exempt website
that you know you can trust. Another reason for doing this is to exempt websites that do not function properly
when subjected to SSL inspection, such as a site (or application) that uses certificate/public key pinning.
In this example, google.ca is exempted from SSL inspection. If necessary, substitute your local Google search
domain.
268
269
270
271
4. Results
Using Chrome, browse to google.ca. The
site loads properly.
272
Blocking Facebook
In this example, you will learn how to configure a FortiGate to prevent access to a specific social networking
website, including its subdomains, by means of a static URL filter.
When you allow access to a particular type of content, such as the FortiGuard SocialNetworking category, there
may still be certain websites in that category that you wish toprohibit. And by using SSL inspection, you ensure
that this website is also blocked whenaccessed through HTTPS protocol.
A video of this recipe is available here.
273
274
275
276
4. Results
Visit the following sites to verify that your
web filter is blocking websites ending in
facebook.com:
l
facebook.com
attachments.facebook.com
camdencc.facebook.com
mariancollege.facebook.com
277
In this recipe, you will use FortiGate web filtering to ensure that SafeSearch is applied to all Google search results.
You will also block access to websites in the adult/mature content FortiGuard category for all network users.
This recipe requires an active FortiGuard web filtering licence.
A video of this recipe is available here.
278
279
280
281
282
283
284
Results
If you are using full SSL inspection, go to
google.com and attempt to search for
adult/mature content. When the results
are shown, a message appears stating
that SafeSearch is turned on. This
cannot be undone.
If you are using Google Chrome for
Internet browsing, you may need to
disable SPDY protocol in order for
SafeSearch to turn on automatically.
If you have altered the DNS settings, go
to google.com. A message at the top of
the page states that your network has
turned on SafeSearch.
285
286
An active license for FortiGuard Web Filtering Services is required to use web ratings.
For testing purposes, the Cookbook website (cookbook.fortinet.com) will be changed from the category
Information Technology to a custom category named Allowed Sites.
By changing the web rating for a website, you can control access to the site without affecting the rest of the sites
in its original category.
This recipe only changes the website's rating on your FortiGate. To request that the rating is changed for all of
FortiGuard, go here.
A video of this recipe is available here.
287
288
289
290
5. Results
Browse to www.fortinet.com, which is
part of the Information Technology
category. A message will appear from
FortiGuard, stating that access to this
website is blocked.
If you browse to cookbook.fortinet.com, you will still be able to access the site.
291
In this example, you will create a web filter profile that allows access to websites that are categorized as
"Personal Interest" at any point during the day, but limits access for a total of 5 minutes for each user.
An active license for FortiGuard Web Filtering Services is required to use web filtering with quotas.
Quotas are the most efficient way of allowing limited access to websites, as they do not require set schedules. To
apply web filtering using quotas, you must use a security policy with either user or device authentication. In this
recipe, a user account, alistair, has already been configured. For more information about creating user accounts,
see User and device authentication.
A video of this recipe is available here.
292
293
The web filter will now list all the subcategories listed in the two categories
and the applied quota.
294
4. Results
Browse to www.ebay.com, a website
that is found within the General Interest Personal category.
Access to the website is allowed for 5
minutes, after which a block message
appears. The message will persist for all
General Interest - Personal sites until the
quota is reset, which occurs every 24
hours at midnight.
295
296
In this recipe, you will block access to Google services for consumer accounts, while allowing access for
corporate accounts.
If your organization has set up a Google corporate account to be able to use Google services, such as Gmail and
Google Docs, this recipe can be used to block users from accessing those services with their own personal
accounts. In this example, a corporate account has been created that uses the domain fortidocs.com.
A video of this recipe is available here.
297
298
3. Results
Log in to Google using a personal
account. After you are authenticated,
attempt to access a Google service,
such as Gmail or Google Drive.
A message appears from Google stating
that the service is not available.
Sign out of the personal account and
instead use your corporate account (in
the example, test@fortidocs.com).
You can now access the Google service.
299
In this example, one user is temporarily allowed to override a web filter profile to be able to access sites that would
otherwise be blocked.
In this example, web filtering blocks the Bandwidth Consuming category for all users, except those who can
override the filter.
300
301
302
303
5. Results
Browse to blip.tv, a website that is part of
theBandwidth Consumingcategory.
Authenticate using the bwayne account.
The website is blocked.
304
305
VPNs
This section contains information about configuring a variety of different Virtual Private Networks (VPNs), as well
as different methods of authenticating VPN users. FortiGates support two types of VPNs: IPsec and SSL.
IPsec VPNs use Internet Protocol Security (IPsec) to create a VPN that extends a private network across a public
network, typically the Internet. In order to connect to an IPsec VPN, users must install and configure an IPsec
VPN client (such as FortiClient) on their PCs or mobile devices.
SSL VPNs use Secure Sockets Layer (SSL) to create a VPN that extends a private network across a public
network, typically the Internet. Connections to an SSL VPN are done through a web browser and do not require
any additional applications.
IPsec
l
IPsec troubleshooting
SSL
l
VPNs
306
307
VPNs
This recipe uses the IPsec VPN Wizard to provide a group of remote users with secure, encrypted access to the
corporate network.
The tunnel provides group members with access to the internal network, but forces them through the FortiGate
unit when accessing the Internet. When the tunnel is configured, you will connect using the FortiClient application.
A video of this recipe is available here.
VPNs
308
VPNs
309
310
VPNs
VPNs
311
5. Configuring FortiClient
Open FortiClient, go to Remote Access
and Add a new connection.
312
VPNs
6. Results
Once the connection is established, the
FortiGate assigns the user an IP address
and FortiClient displays the status of the
connection, including the IP address,
connection duration, and
bytes sent and received.
VPNs
313
This recipe uses the IPsec VPN Wizard to provide a group of remote iOS users with secure, encrypted access to
the corporate network. The tunnel provides group members with access to the internal network, but forces them
through the FortiGate unit when accessing the Internet.
This recipe was tested using an iPad 2 running iOS version 7.1.
A video of this recipe can be found here.
VPNs
314
VPNs
315
316
VPNs
VPNs
317
318
VPNs
6. Results
On the FortiGate unit, go to VPN >
Monitor > IPsec Monitor and view the
status of the tunnel.
Users on the internal network will be
accessible using the iOS device.
Go to Log & Report > Traffic Log >
Forward Traffic to view the traffic.
VPNs
319
320
VPNs
VPNs
321
322
VPNs
In this recipe, you will learn how to create an IPsec VPN on a FortiGate, and connect to it using the default client
built into the Mac OS.
This VPN configurationallows Mac users to securely access an internal network as well as browse the Internet
through the VPN tunnel.
The recipe assumes that a "mac_users"user group and a Local LAN firewall address have been created.
This recipe was tested using MacOS 10.10.2 (Yosemite).
A video of this recipe is available here.
VPNs
323
VPNs
324
325
VPNs
VPNs
326
327
VPNs
Select Shared Secret and enter the preshared key you created above, then click
OK.
VPNs
328
4. Results
On the Mac, ensure thatthe VPN is
selected and click Connect. The Status
should change to Connected and you
should be given an IP Address in the
range specified above.
You should also be able to browse the
Internet, protected by whichever profiles
you applied to the security policy created
in the above step.
329
VPNs
In this recipe, two-factor authentication is added to a user account to provide extra security when connecting to an
IPsec VPN using FortiClient for Mac OS x.
Two-factor authentication requires a user to authenticate twice before being allowed to access the IPsec VPN. In
this recipe the FortiToken Mobile app for iOS provides a one-time password (OTP) (a 6-digit number) that the you
must enter at a second authentication prompt.
This recipe assumes that you have already activated FortiToken Mobile (see Two-factor authentication with
FortiToken Mobile for details).
VPNs
330
VPNs
331
332
VPNs
VPNs
333
334
VPNs
VPNs
335
336
VPNs
(Optional) For additional security, set a PIN for FortiToken Mobile using the apps Settings options.
VPNs
337
338
VPNs
8. Results
Using FortiClient, select the IPsec VPN
connection, enter the password, and
click Connect.
VPNs
339
340
VPNs
In this recipe youll use an external DHCP server to assign IP addresses to your IPsec VPN clients, this scenario
is commonly found on enterprises where all DHCP leases need to be centrally managed.
The DHCP server assigns IP addresses in the range of 172.16.6.100 to 172.16.6.120. The server is attached to
port 4 of the FortiGate and has an IP address of 192.168.3.70.
VPNs
341
2. Adding a firewall address for the local network and IPsec VPN client range
Go to Policy & Objects > Objects >
Addresses.
Add a firewall address for the Local LAN,
including the subnet and local interface.
VPNs
342
343
VPNs
VPNs
344
6. Configuring FortiClient
Open FortiClient, go to Remote Access
and Add a new connection.
345
VPNs
VPNs
346
7. Results
Once the connection is established, the
external DHCP server assigns the user
an IP address and FortiClient displays
the status of the connection, including
the IP address, connection duration, and
bytes sent and received.
347
VPNs
VPNs
348
In this example, you will allow transparent communication between two networks that are located behind different
FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using
the VPN Wizards Site to Site FortiGate template.
In this example, one office will be referred to as HQ and the other will be referred to as Branch.
A video of this recipe is available here.
VPNs
349
VPNs
350
351
VPNs
VPNs
352
3. Results
A user on either of the office networks should be able to connect to any address on the other office network
transparently.
If you need to generate traffic to test the connection, ping the Branch FortiGate's internal interface from the HQ's
internal network.
353
VPNs
For further reading, check out Gateway-togateway configurations in the FortiOS 5.2
Handbook.
VPNs
354
This recipe describes how to construct a site-to-site IPsec VPN connection between two networks with
overlapping subnets, such that traffic will be directed to the correct address on the correct network, using Virtual
IP addresses and static routes.
A video of this recipe is available here.
VPNs
355
VPNs
356
Set Local Interface to your Internetfacing interface. The Local Subnets will
automatically populate. Set Remote
Subnets to the VIP of the internal
network for FGT_2 (10.31.101.0/24) and
click Create.
357
VPNs
Set the Interface to the IPsec VPN Site to Site interface from the drop down menu.
Set External IP Address/Range to a range in the subnet you will be redirecting from (10.21.101.1 10.21.101.254) and Mapped IP Address/Range to the internal network range (192.168.1.1 - 192.168.1.254).
Select OK.
VPNs
358
Set Local Interface to your Internetfacing interface. The Local Subnets will
automatically populate. Set Remote
Subnets to the VIP of the internal
network for FGT_1 (10.21.101.0/24) and
click Create.
359
VPNs
Set Interface to the IPsec VPN Site to Site interface from the drop down menu.
Set External IP Address/Range to a range in the subnet you will be redirecting from (10.31.101.1 10.31.101.254) and Mapped IP Address/Range to the internal network range (192.168.1.1 - 192.168.1.254).
Select OK.
5. Results
VPNs
360
361
VPNs
The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is
behind a FortiGate and another site is hosted on Microsoft Azure, for which you will need a valid Microsoft Azure
profile.
Using FortiOS 5.2, the example demonstrates how to configure the tunnel between each site, avoiding
overlapping subnets, so that a secure tunnel can be established with the desired security profiles applied.
A video of this recipe is available here.
VPNs
362
VPNs
363
364
VPNs
VPNs
365
You are now ready to configure the FortiGate endpoint of the tunnel.
366
VPNs
VPNs
367
368
VPNs
VPNs
369
6. Results
Go to VPN > Monitor > IPsec >
Monitor. Right-click the tunnel you
created and select Bring Up to activate
the tunnel.
Go to Log & Report > Event Log >
VPN.
Select an entry to view more information
and verify the connection.
Go to Log & Report > Event Log >
VPN.
Select an entry to view more information
and verify the connection.
370
VPNs
For further reading, check out Gateway-togateway configurations in the FortiOS 5.2
Handbook.
VPNs
371
In this recipe, you will use remote IPsec and SSL VPN tunnels to bypass Internet access restrictions.
Restricted Internet access is simulated with a Web Filter profile that blocks google.com. You will create
FortiClient SSL and IPsec VPN tunnels to bypass the web filter, connect to a remote FortiGate unit, and
transparently browse the Internet to google.com.
The recipe assumes that a "vpn_users"user group and a Local LAN firewall address have already been created.
A video of this recipe is available here.
VPNs
372
1.Starting point
In this example, we simulate restricted
Internet access using a Web Filtering
profile to block Google.
With the user situated behind this
FortiGate, google.com cannot be
accessed, and instead the FortiGuard
"Web Page Blocked" message appears.
For theuser to bypass this Web Filter,
the following VPN configurations must
be made on a remote FortiGate(which is
notblocked by any filter), and the user
must connectto it usingFortiClient.
VPNs
373
374
VPNs
When using the IPsec VPN Wizard,an IPsec firewall address range is automatically created using the name of
the tunnel you entered into the Wizard. The Wizard also creates an IPsec -> internal IPv4 policy, so all that is
left is to create the Internet access policy. See Step 4.
By default, the FortiGate has an ssl.root firewall address.All that is left is to create the Internet access policy,
as described in the following step.
VPNs
375
376
VPNs
VPNs
377
6. Results
From FortiClient start an IPsec or SSL
VPN session. Once the connection is
established, the FortiGate assigns the
user an IP address and FortiClient
displays the status of the connection,
including the IP address, connection
duration, andbytes sent and received.
378
VPNs
In this recipe, you will configure a site-to-site, also called gateway-to-gateway, IPsec VPN between an office with
Internet access restrictions (Remote Office) and an office without these restrictions (Head Office) so that the
Remote Office can access the Internet through the Head Office, avoiding the restrictions.
To bypass this restriction, this example shows how create a site-to-site VPN to connect the Remote Office
FortiGate unit to the Head Office FortiGate unit, and allow Remote Office staff to transparently browse the Internet
to google.com using the Head Offices Internet connection.
Note that both FortiGates run FortiOS firmware version 5.2.2 and have static IP addresses on Internet-facing
interfaces. You will also need to know the Remote Offices gateway IP address.
VPNs
379
VPNs
380
381
VPNs
VPNs
382
383
VPNs
VPNs
384
6. Results
With the tunnel up, you can nowvisit
google.com without being blocked, since
the Internet traffic is handled by theHead
OfficeFortiGate and the access
restrictions on the remoteFortiGate have
been bypassed.
385
VPNs
IPsec troubleshooting
This section contains tips to help you with some common challenges of IPsec VPNs.
Ensure that both ends use the same P1 and P2 proposal settings.
Ensure that you have allowed inbound and outbound traffic for all necessary network services, especially if
services such as DNS or DHCP are having problems.
Check that a static route has been configured properly to allow routing of VPN traffic.
Ensure that your FortiGate unit is in NAT/Route mode, rather than Transparent.
Check your NAT settings, enabling NAT traversal in the Phase 1 configuration while disabling NAT in the
security policy.
Ensure that both ends of the VPN tunnel are using Main mode, unless multiple dial-up tunnels are being
used.
If you have multiple dial-up IPsec VPNs, ensure that the Peer ID is configured properly on the FortiGate
and that clients have specified the correct Local ID.
If you are using FortiClient, ensure that your version is compatible with the FortiGate firmware by reading
the FortiOS Release Notes.
Ensure that the Quick Mode selectors are correctly configured. If part of the setup currently uses firewall
addresses or address groups, try changing it to either specify the IP addresses or use an expanded
address range.
If XAUTH is enabled, ensure that the settings are the same for both ends, and that the FortiGate unit is set
to Enable as Server.
If your FortiGate unit is behind a NAT device, such as a router, configure port forwarding for UDP ports 500
and 4500.
Remove any Phase 1 or Phase 2 configurations that are not in use. If a duplicate instance of the VPN tunnel appears on the IPsec Monitor, reboot your FortiGate unit to try and clear the entry.
If you are still unable to connect to the VPN tunnel, run the diagnostic command in the CLI:
diag debug application ike -1diag debug enable
VPNs
386
The resulting output may indicate where the problem is occurring. When you are finished, disable the diagnostics
by using the following command:
diag debug resetdiag debug disable
387
VPNs
This example provides remote users with access to the corporate network using SSL VPN and connect to the
Internet through the corporate FortiGate unit. During the connecting phase, the FortiGate unit will also verify that
the remote users antivirus software is installed and current.
A video of this recipe can be found here.
VPNs
388
VPNs
389
390
VPNs
VPNs
391
392
VPNs
5. Adding security policies for access to the Internet and internal network
Go to Policy & Objects > Policy > IPv4.
Add a security policy allowing access to
the internal network through the ssl.root
VPN tunnel interface.
Set Incoming Interface to ssl.root.
Set Source Address to all and select
the Source User group you created in
step 2.
Set Outgoing Interface to the local
network interface so that the remote user
can access the internal network.
Set Destination Address to all, enable
NAT, and configure any remaining
firewall and security options as desired.
Add a second security policy allowing
SSL VPN access to the Internet.
For this policy, Incoming Interface is
set to ssl.root and Outgoing Interface
is set to wan1.
6. Setting the FortiGate unit to verify users have current AntiVirus software
Go to System > Status > Dashboard.
VPNs
393
7. Results
Log into the portal using the credentials
you created in step 2.
394
VPNs
VPNs
395
396
VPNs
VPNs
397
398
VPNs
In this recipe, you will create an SSL VPN that remote users connect to using FortiClient running on iOS.
When a user using an iOS device connects to this SSL VPN, they can access servers and data on the internal
network. They can alsosecurely browse the Internet using the FortiGate's Internet connection.
This example uses FortiClient 5.2.0.028 for iOS. FortiClient can be downloaded from www.forticlient.com.
A video of this recipe is available here.
VPNs
399
VPNs
400
401
VPNs
4. Adding security policies for access to the Internet and internal network
Go to Policy & Objects > Policy > IPv4.
Create a security policy allowing SSL
VPN user to access the internal network.
Set Incoming Interface to ssl.root. Set
Source Address to all and Source
User to the new user group. Set
Outgoing Interface to the local network
interface so that the remote user can
access the internal network.
Set Destination Address to all, enable
NAT, and configure any remaining
firewall and security options as desired.
Add a second security policy allowing
SSL VPN users to access the Internet.
For this policy, Incoming Interface is
set to ssl.root and Outgoing Interface
is set to wan1.
VPNs
402
403
VPNs
6. Results
Select the VPN in FortiClient. Enter the
Password and select Login.
VPNs
404
405
VPNs
In this example, you will connect to a private network with a Windows Phone, using an SSL VPN.
VPNs
406
VPNs
407
408
VPNs
VPNs
409
3. Results
Using your Window Phone's web
browser, access the portal. The portal's
address is the IP address of your
Internet-facing interface with the port the
SSL VPN tunnel is listening to, and it
must be accessed using HTTPS (in the
example, https://201.21.161.9:10443).
Log in using the credentials for your SSL
VPN user.
410
VPNs
VPNs
411
In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate using a certificate.
This recipe requires that you have three certificates:
l
CA certificate
VPNs
412
VPNs
413
414
VPNs
VPNs
415
416
VPNs
7. Adding security policies for access to the Internet and internal network
Go to Policy & Objects > Policy > IPv4.
Create a security policy allowing SSL
VPN user to access the internal network.
Set Incoming Interface to ssl.root. Set
Source Address to all and Source
User to the new user group. Set
Outgoing Interface to the local network
interface so that the remote user can
access the internal network.
Set Destination Address to all, enable
NAT, and configure any remaining
firewall and security options as desired.
VPNs
417
418
VPNs
VPNs
419
420
VPNs
9. Results
Using a web browser
Browse to the SSL VPN portal (in the
example, http://172.20.121.46:10443).
A message will appear requesting a
certificate for authentication. Select the
user certificate.
Enter your user credentials when
requested.
VPNs
421
Using FortiClient
Open FortiClient and connect to the
VPN. You are able to connect.
422
VPNs
This recipe provides remote FortiClient users with access to the corporate network using SSL VPN and Internet
browsing through the corporate FortiGate unit. Remote users are authenticated using RADIUS (configured in
Microsofts Network Policy Server).
FortiClient is available here.
The recipe includes a brief explanation of the RADIUS server configuration we utilized. It was tested on a
FortiGate 60D. Microsoft Network Policy Server was configured on Windows Server 2008.
VPNs
423
VPNs
424
425
VPNs
VPNs
426
427
VPNs
VPNs
428
429
VPNs
VPNs
430
431
VPNs
5. Adding security policies for access to the Internet and internal network
Go to Policy & Objects > Policy > IPv4.
Create a security policy allowing SSL
VPN user to access the internal network.
Set Incoming Interface to ssl.root. Set
Source Address to all and Source
User to the remote user group. Set
Outgoing Interface to the local network
interface so that the remote user(s) can
access the internal network.
Set Destination Address to all, enable
NAT, and configure any remaining
firewall and security options as desired.
VPNs
432
6. Configuring FortiClient
Open FortiClient, go to Remote Access,
and add a new SSL VPN connection.
433
VPNs
7. Results
VPNs
434
435
VPNs
This recipe describes how to set up FortiAuthenticator to function as a RADIUS server for FortiGate SSL VPN
authentication. It involves adding users to FortiAuthenticator, setting up the RADIUS client on the
FortiAuthenticator, and then configuring the FortiGate to use the FortiAuthenticator as a RADIUS server.
A video of this recipe is available here.
VPNs
436
VPNs
437
438
VPNs
VPNs
439
440
VPNs
6. Results
From a remote device, access the SSL
VPN Web Portal.
Enter valid RADIUS credentials (in the
example, ckent).
VPNs
441
This recipe describes how to set up FortiAuthenticator to function as an LDAP server for FortiGate SSL VPN
authentication. It involves adding users to FortiAuthenticator, setting up the LDAP server on the
FortiAuthenticator, and then configuring the FortiGate to use the FortiAuthenticator as an LDAP server.
VPNs
442
Make sure to enable Allow LDAP browsing the user will not be able to connect to the FortiGate otherwise.
Next, go to Authentication > User
Management > User Groups, and add
a user group for the FortiGate users. Add
the desired users to the group.
VPNs
443
444
VPNs
VPNs
445
446
VPNs
VPNs
447
6. Results
From a remote device, access the SSL
VPN Web Portal.
Enter valid LDAP credentials (in the
example, bwayne).
448
VPNs
This recipe describes how to configure an SSL VPN tunnel using LDAP Authentication on a FortiAuthenticator.
The VPN will be tested using FortiClient on a mobile Android device.
The recipe assumes that an LDAP server has already been configured and connected on the FortiGate, containing
the user 'bwayne'. For instructions on configuring FortiAuthenticator as an LDAP server, see LDAP authentication
for SSLVPNwith FortiAuthenticator.
VPNs
449
VPNs
450
451
VPNs
VPNs
452
4. Results
On your Android smartphone, open the FortiClient app and create a new VPN.
Give the VPN a name (in the example,
SSL to 121.56), and set the VPN Type to
SSL VPN. Select Create.
453
VPNs
VPNs
454
In this recipe, you will create an SSL VPN with two-factor authentication consisting of a username/password and
an SMS token. The SMS token is generated by FortiAuthenticator using the FortiGuard Messaging Service.
When a user attempts to connect to this SSL VPN, they are prompted to enter their username and password. After
successfully entering their credentials, they receive an SMS message on their mobile phone containing a 6-digit
number (called the FortiToken Code). They must also enter this number to get access to the internal network and
the Internet.
Although this recipe uses the FortiGuard Messaging Service, it will also work with any compatible SMS service
you configure as an SMS Gateway.
VPNs
455
VPNs
456
Choose to Enforce two-factor authentication and add the SMS user group to the Realms group filter as
shown.
Select Save and then OK.
457
VPNs
VPNs
458
6. Results
In this example, we will use the web portal to access the SSL VPN and test the two-factor authentication.
Open a browser and navigate to the SSL
VPN web portal, in this case
https://172.20.121.56:10443.
Enter a valid username and password
and select Login. You should be
prompted to enter a FortiToken Code.
459
VPNs
VPNs
460
461
VPNs
You receive an error stating that the web page cannot be found.
Check the URL you are attempting to connect to. It should follow this pattern:
https://:/remote/login.
Ensure that you are using the correct port number for the part of the URL.
When you attempt to connect using FortiClient or in Web mode, you receive the following error message: Unable to logon to the server. Your user name or password may not be configured properly for this connection. (-12).
Ensure that cookies are enabled in your browser. Also, if you are using a remote authentication server, ensure that
the FortiGate is able to communicate with it.
VPNs
462
You can connect remotely to the VPN tunnel but are unable to access the network
resources.
Go to Policy & Objects > Policy > IPv4 and check the policy allowing VPN access to the local network. If the
destination address is set to all, create a firewall address for the internal network. Change the destination address
and attempt to connect remotely again.
463
VPNs
WiFi
These recipes describe how to use FortiAPs to add WiFi (or Wi-Fi) services to your network.
FortiAPs, managed by FortiGates, provide a full suite of WiFi features. Small offices can use FortiAPs to quickly
add WiFi. Enterprises and educational institutions can take advantage of FortiAP access control features. Each
WiFi network, or SSID, is represented by a WiFi network interface to which you can apply firewall policies,
security profiles, and other features in the same way you would for wired networks.
BYOD scheduling
WiFi
465
WiFi
In this example, a FortiAP unit is connected to and managed by a FortiGate unit in Tunnel mode, allowing wireless
access to the network.
You can configure a FortiAP unit in either Tunnel mode or Bridge mode. When a FortiAP is in Tunnel mode, a
wireless-only subnet is used for wireless traffic. When a FortiAP is in Bridge mode, the Ethernet and WiFi
interfaces are connected (or bridged), allowing wired and wireless networks to be on the same subnet. Tunnel
mode is the default mode for a FortiAP.
For information about using a FortiAP in Bridge mode, seeSetting up a WiFi bridge with a FortiAP.
A video of this recipe is available here.
WiFi
466
WiFi
467
2. Creating an SSID
Go to WiFi Controller > WiFi Network >
SSID and create a new SSID.
Set Traffic Mode to Tunnel to Wireless
Controller.
Select an IP/Network Mask for the
wireless interface and enable DHCP
Server.
Set the WiFi Settings as required,
including a secure Pre-shared Key.
468
WiFi
WiFi
469
5. Results
Go to WiFi Controller > Managed
Access Points > Managed FortiAPs. A
green checkmark now appears beside
the FortiAP, showing that the unit is
authorized and online.
Connect to the SSID with a wireless device. After a connection is established, you are able to browse the
Internet.
470
WiFi
In this example, a FortiAP unit is connected to and managed by a FortiGate unit in Bridge mode.
You can configure a FortiAP unit in either Tunnel mode or Bridge mode. When a FortiAP is in Tunnel mode, a
wireless-only subnet is used for wireless traffic. When a FortiAP is in Bridge mode, the Ethernet and WiFi
interfaces are connected (or bridged), allowing wired and wireless networks to be on the same subnet. Tunnel
mode is the default mode for a FortiAP.
For information about using a FortiAP in Tunnel mode, see Setting up WiFi with FortiAP.
WiFi
471
2. Creating an SSID
Go to WiFi Controller > WiFi Network >
SSID and create a new SSID.
Set Traffic Mode to Local bridge with
FortiAPs Interface.
Set the WiFi Settings as required,
including a secure Pre-shared Key.
WiFi
472
473
WiFi
4. Results
Go to WiFi Controller > Managed
Access Points > Managed FortiAPs. A
green checkmark now appears beside
the FortiAP, showing that the unit is
authorized and online.
Connect to the SSID with a wireless device. After a connection is established, you are able to browse the
Internet.
WiFi
474
Including mobile (WiFi) users on your office LAN can be more convenient than putting them on a separate wireless
network. The Software Switch feature of your FortiGate is a simple way to do this.
Software Switches are only available if your FortiGate is in Interface mode. For more information, seeChoosing
your FortiGate's switch mode.
WiFi
475
WiFi
476
477
WiFi
Results
Go to WiFi Controller > Monitor >
Client Monitor to see connected users.
WiFi
478
In this example, you use an external DHCP server to assign IP addresses to your WiFi clients.
The DHCP server assigns IP addresses in the range of 10.10.12.100 to 10.10.12.200. The server is attached to
Port 13 of the FortiGate and has an IP address of 10.10.13.254.
WiFi
479
WiFi
480
481
WiFi
Results
WiFi devices can connect to the Internet.
You can see them in the client monitor
(WiFi Controller > Monitor > Client
Monitor). Note the IP addresses
assigned by the external DHCP server.
WiFi
482
In this example, you pre-configure a FortiAP to provide access to the office network from any remote location
simply by connecting the FortiAP to the Internet. This FortiAP could be given to an employee to use at home or
when traveling.
The FortiAPs configuration also supports Internet browsing from behind the corporate firewall. The remote users
local network remains accessible by defining it as a split tunnel destination that is not routed through the FortiGate
unit.
WiFi
483
WiFi
484
485
WiFi
WiFi
486
FAP11C3X13000412
FAP11C3X13000412
FAP11C3X13000412
FAP11C3X13000412
#
#
#
#
login: admin
cfg -a AC_IPADDR_1=172.20.120.142
cfg -c
exit
Results
At the remote location, connect the FortiAP to the Internet using an Ethernet cable. Next, connect the FortiAP to
power. The network must provide DHCP service and allow the FortiAP to access the internet.
Once connected, the FortiAP requests an IP address and locates the FortiGate wireless controller.
The remote WiFi user can now access the corporate network and browse the Internet securely from behind the
corporate firewall.
Connections to destinations on the "split tunneling" network are possible, but will not be visible in the FortiGate
logs as the traffic remains local to the FortiAP.
Go to WiFi Controller > Monitor >
Client Monitor to see remote
wireless users connected to the
FortiAP unit.
487
WiFi
WiFi
488
In this example, two FortiAPs are used to extend the range of a single WiFi network. The second FortiAP is
connected to the FortiGate WiFi controller through a dedicated WiFi backhaul network.
In this example, both FortiAPs provide the example-staff network to clients that are in range.
More mesh-connected FortiAPs could be added to further expand the coverage range of the network. Each AP
must be within range of at least one other FortiAP. Mesh operation requires FortiAP models with two radios, such
as the FortiAP-221C units used here.
WiFi
489
WiFi
490
491
WiFi
6. Preauthorize FortiAP-1
Go to WiFi Controller > Managed
Devices > Managed FortiAPs and
create a new entry.
Enter the serial number of the FortiAP
unit and give it a name. Select the
FortiAP profile that you created earlier.
WiFi
492
493
WiFi
9. Results
Go to WiFi Controller > Monitor >
Client Monitor. Click Refresh to see
updated information.
Use a mobile device near FortiAP-2 to
connect to the example-staff network.
The monitor shows the mobile user
rgreen as a client of FortiAP-2.
Disconnect from the example-staff
network and then reconnect near
FortiAP-1. The monitor shows the mobile
user rgreen as a client of FortiAP-1.
Notice that in both cases FortiAP-2 is listed on backhaul-ssid as a client of FortiAP-1.
WiFi
494
In this example, you will add explicit proxy with web caching to your wireless network.
All devices on the wireless network will be required to connect to the proxy at port 8080 before they can browse
web pages on the Internet. WAN Optimization web caching is added to reduce the amount of Internet bandwidth
used and improve web browsing performance.
A video of this recipe is available here.
WiFi
495
1. EnablingWAN Optimization and configuring the explicit web proxy for the
wireless interface
Go to System > Config > Features.
Ensure that Explicit Proxy andWAN
Opt & Cache are enabled.
WiFi
496
497
WiFi
Windows Vista/7/8:
Open Internet Properties. Go to
Connections > LAN Settings and
enable and configure the Proxy Server.
Mac OS X:
Open Network Preferences > Wi-Fi >
Advanced > Proxies. Select Web
Proxy (HTTP) and configure the proxy
settings.
iOS:
Go to Settings > Wi-Fi. Edit the wireless
network. Scroll down to HTTP PROXY
select Manual and configure the proxy
settings.
WiFi
498
Android:
In WiFi network connection settings, edit
the wireless network. Select Show
advanced options, configure a Manual
proxy and enter the proxy settings.
499
WiFi
5. Results
To confirm that the proxy is processing traffic, attempt to connect to the Internet from the Wireless network
using a device that has not been configured to connect to the proxy. Access should be blocked.
Configure the device to use the proxy.
You should now be able to connect to the
Internet.
Go toWAN Opt. & Cache > Monitor
>WAN Opt. Monitor to view
WEBPROXY traffic in the Traffic
Summary.Check the Bandwidth
Optimization graph for WEBPROXY
traffic.
WiFi
500
501
WiFi
In this example, a guest user account will be created to allow temporary wireless access to the Internet. Access
will only be allowed using HTTP, HTTPS, and DNS protocols.
In this example, a FortiAP in Tunnel mode is used to provide wireless access to guests.
If you have not already set up a wireless network, see Setting up WiFi with FortiAP.
A video of this recipe is available here.
WiFi
502
WiFi
503
504
WiFi
WiFi
505
6. Results
On a PC, connect to the guest SSID.
When the authentication screen appears,
log in using the guest user's credentials.
You will be able to connect to the
Internet.
506
WiFi
In this example, your employees can log on to your Wi-Fi network through a captive portal.
Captive portals are often used for public Wi-Fi networks where you want Wi-Fi users to respond to a disclaimer.
Captive portals can also be used to provide unlimited access to open Wi-Fi networks.
As shown in this example, captive portals can also be used as the authentication method for restricting access to
a wireless network. Some users may find it more intuitive to add their account information to a captive portal web
page instead of a entering their user name and password into a wireless network configuration.
A video of this recipe is available here.
WiFi
507
WiFi
508
509
WiFi
WiFi
510
6. Results
The user's device shows the WiFi
network as "open" and associates with it
without requesting credentials. The first
time that a wireless user attempts to use
a web browser, the captive portal login
screen is displayed. Users who are
members of the employees group can log
on using their username and password
and proceed to access the wireless
network.
511
WiFi
In this example, you will improve your WiFi security with WPA2 enterprise authentication.
In the Setting up WiFi with FortiAP recipe, you set up a WiFi network with a single pre-shared key. In this
example, there is no longer a pre-shared key that could fall into the wrong hands, or that needs to be changed if
someone leaves the company. Each user has an individual user account and password, and accounts can be
added or removed later as needed.
This example shows how to authenticate local FortiGate users. You can also integrate WPA2 security with most
3rd party authentication solutions including RADIUS.
WiFi
512
WiFi
513
Configure WPA2-Enterprise
authentication using the employees user
group.
514
WiFi
Results
Users who are members of the employees group can log on to the WiFi network using their username and
password.
Go to WiFi Controller > Monitor >
Client Monitor to see connected users.
WiFi
515
In this example, you will add device definitions to your FortiGate using Media Access Control (MAC) addresses.
These definitions are then used to determine which devices can access the wireless network.
By using a MAC address for identification, you will also be able to assign a reserved IP for exclusive use by the
device when it connects to the wireless network.
Warning: Since MAC addresses can be easily spoofed, using MAC access control should not be considered a
security measure.
A video of this recipe is available here.
WiFi
516
WiFi
517
518
WiFi
WiFi
519
6. Results
Connect to the wireless network with a device that is a member of the device group. The device should be able
to connect and allow Internet access.
Connection attempts from a device that is not a group member will fail.
Go to System > FortiView > All
Sessions and view the results for now.
Filter the results using the reserved
Source IP (in the example, 10.10.80.20),
to see that it is being used exclusively by
the wireless device.
520
WiFi
BYOD scheduling
In this example, a school blocks Internet access to mobile devices during class time (9am - 12pm and 1pm - 3pm).
This recipe shows how to use a schedule group and a BYOD device policy to permit mobile device Internet
access before and after class time and during lunch. The school is open from 7am to 6pm.
]In this example a FortiWiFi unit provides the wireless network. The steps are the same if the wireless network is
provided by FortiAP with a FortiGate as a wireless controller.
A video of this recipe is available here.
WiFi
521
WiFi
522
3. Results
Verify that mobile devices can connect to the Internet outside of class time, when the schedule group is valid.
Go to Log & Report > Traffic Log >
Forward Traffic to view mobile device
traffic.
523
WiFi
WiFi
524
In this example, you will make a FortiOS security policy that requires both user and device authentication, so that
known users can only access the network when they are using known devices.
Using a combination of user and device authentication improves security in BYOD environments. Any
authenticated user can connect through wireless, using any wireless device that is included in the device group
specified in the policy. Thus, the BYOD policy can even support a user with multiple devices.
WiFi
525
WiFi
526
527
WiFi
5. Results
User rgreen can connect to the Internet
using the rgreen tablet that belongs to
the staff devices group.
Go to Policy & Objects > Monitor >
Policy Monitor to see the security policy
in use.
Attempts to access the Internet fail if any of the following are true:
l
WiFi
528
In this example, you use an external RADIUS server to authenticate your WiFi clients.
In the example, a FortiAuthenticator (v3.00-build0176) is used as a RADIUS server to authenticate users who
belong to the employees user group.
WiFi
529
WiFi
530
531
WiFi
WiFi
532
Results
Go to WiFi Controller > Monitor >
Client Monitor to see that clients
connect and authenticate.
533
WiFi
In this example, wireless users are redirected to a captive portal web page (no matter what URL they enter) that
requires them to authenticate before they can access the Internet. The portal page can also contain links to local
information such as legal notices, terms of service and so on. This is sometimes called a walled garden.
The web portal page is a script that gathers the users logon credentials and sends back to the FortiGate a POST
message of the format https://<FGT_IP>:1000/fgtauth with data magic=session_
id&username=<username>&password=<password>. (The magic value was provided in the initial FortiGate
request to the web server.) The script used for this example is here.
A RADIUS server provides authentication.
WiFi
534
WiFi
535
536
WiFi
ed
se
endObtain <policy_id> from ID column of the policy list (Policy & Obje
Policy > IPv4).
WiFi
537
Results
The WiFi network's security shows as Open. The device can associate and is assigned an IP address.
538
WiFi
WiFi
539
Virtual LANs (VLANs) are used to assign wireless users to different networks without requiring the use of multiple
SSIDs. Each users VLAN assignment is stored in the user database of the RADIUS server that authenticates the
users.
This example creates dynamic VLANs for the Techdoc and Marketing departments. The RADIUS server is a
FortiAuthenticator.
WiFi
540
WiFi
541
542
WiFi
WiFi
543
Create the VLAN interface for techdoc200 and set up DHCP service.
544
WiFi
WiFi
545
546
WiFi
Results
The SSID will appear in the list of available wireless networks on the users devices. Both twhite and jsmith can
connect to the SSID with their credentials and access the Internet.
(If a certificate warning message appears, accept the certificate.)
Go to Log & Report > Traffic Log >
Forward Traffic Log.
Note that traffic for jsmith and twhite
pass through
different policies. The policy IDs
correspond to the marketing-100 and
techdoc-200 policies respectively.
The security policies could be made
different so that Marketing and Techdoc
departments are allowed different
access, but we didn't think that was fair.
WiFi
547
This is an example of wireless single-sign-on (WSSO) with a Fortigate. The WiFi users are teachers and students
at a school. Each user belongs to a user group, either TeacherGroup or StudentGroup. A FortiAuthenticator
performs user authentication and passes the user group name to the FortiGate so that the appropriate security
policy is applied. The student security policy applies a more restrictive web filter.
WiFi
548
WiFi
549
550
WiFi
WiFi
551
552
WiFi
Configure WPA2-Enterprise
authentication that uses the
FortiAuthenticator as RADIUS server.
WiFi
553
Results
Connect to the WiFi network, authenticate, and browse the Internet. Try this with both student and teacher
accounts.
Go to User & Device > Monitor >
Firewall. You can verify the User Group
and that the WSSO authentication
method was used.
554
WiFi
In this example, you will use RADIUS Single Sign-On (RSSO) to authenticate wireless users.
Users will be required to enter their credentials, which are stored on a RADIUS server, when connecting to the
wireless network. Once they have been authenticated, the same credentials will also be used by the FortiGate to
allow outbound traffic without requiring additional authentication.
In this example, a FortiAP has already been installed in Tunnel mode. For more information, seeSetting up WiFi
with FortiAP.
WiFi
555
WiFi
556
557
WiFi
Go to Authentication/Accounting.
Deselect Use the same share secret
for authentication and accounting and
enter the same secret that is used by the
RSSO agent.
WiFi
558
559
WiFi
WiFi
560
Go to Conditions.
Add Windows Group and select
Corp/Internet_user from the AD.
Go to Constraints.
Select Authentication Methods and add
Microsoft: Protected EAP (PEAP)
under EAP Types.
561
WiFi
Go to Settings.
Select Standard and remove all
attributes that are listed.
WiFi
562
Go to Conditions.
Add Client IPv4 Address and enter the
IP of the FortiAP.
563
WiFi
Go to Settings.
Select RADIUS Attributes and add the
same class attribute used by the RSSO
user group (in the example, tac).
9. Results
WiFi
564
Users in the RSSO group will now be able to use their credentials to connect to the wireless network. They will
then be able to access the Internet without having to authenticate again.
565
WiFi
WiFi authentication using social media provides access control without having to manually create guest accounts.
This recipe involves configuring an API for Facebook accounts, setting up a social portal RADIUS service on the
FortiAuthenticator, and configuring the FortiGate for Captive Portal access.
This recipe is similar to theCaptive portal WiFi access control, but involves external security mode configuration,
RADIUS authentication, and does not include FortiAP registration instructions.
Note that some CLI usage is required when configuring the FortiGate.
The FortiAuthenticator has been given an example fully qualified domain name (FQDN)
fortiauthenticator.example.com.
WiFi
566
https://developers.facebook.com/products/login/
Select My Apps and select Register as Developer.
Confirm your Facebook password to
continue.
Select that you have read and agree to
the Facebook Platform and Facebook
Privacy policies, and select Next to
continue.
WiFi
567
568
WiFi
WiFi
569
The App ID and App Secret can be accessed at any time on the LinkedIn developer account, but it may be a
good idea to copy them to a secure location.
570
WiFi
Enter the pre-shared Secret and set the Authentication method. The FortiGate will use this secret key in its
RADIUS configuration.
Add the Social_Users user group to the Realms group filter as shown.
Select Save and then OK.
WiFi
571
572
WiFi
For the Authentication Portal, select External, and enter the FQDN of the FortiAuthenticator, followed by
/social_login/.
For this recipe, it is set to:
https://fortiauthenticator.example.com/social_login/
Set User Groups to the social_users group.
WiFi
573
edit "FB5"
set subnet 2.16.0.0 255.248.0.0
next
edit "FB6"
set subnet 66.171.231.0 255.255.255.0
next
edit "FB7"
set subnet 31.13.24.0 255.255.248.0
next
edit "FB8"
set subnet 31.13.64.0 255.255.192.0
next
edit "FB9"
set subnet 23.67.246.0 255.255.255.0
next
edit "akamai-subnet-23.74.8"
set subnet 23.74.8.0 255.255.255.0
next
edit "akamai-subnet-23.74.9"
set subnet 23.74.9.0 255.255.255.0
next edit "akamaihd.net"
set type fqdn
set fqdn "akamaihd.net"
next
edit "channel-proxy-06-frc1.facebook.com"
set type fqdn
set fqdn "channel-proxy-06-frc1.facebook.com"
next
edit "code.jquery.com"
set type fqdn
set fqdn "code.jquery.com"
next
edit "connect.facebook.com"
set type fqdn
set fqdn "connect.facebook.com"
next
edit "fbcdn-photos-c-a.akamaihd.net"
set type fqdn
set fqdn "fbcdn-photos-c-a.akamaihd.net"
next
edit "fbcdn-profile-a.akamaihd.net"
set type fqdn
set fqdn "fbcdn-profile-a.akamaihd.net"
next edit "fbexternal-a.akamaihd.net"
set type fqdn
set fqdn "fbexternal-a.akamaihd.net"
next
edit "fbstatic-a.akamaihd.net"
set type fqdn
set fqdn "fbstatic-a.akamaihd.net"
574
WiFi
next
edit "m.facebook.com"
set type fqdn
set fqdn "m.facebook.com"
next
edit "ogp.me"
set type fqdn
set fqdn "ogp.me" next
edit "s-static.ak.facebook.com"
set type fqdn
set fqdn "s-static.ak.facebook.com"
next
edit "static.ak.facebook.com"
set type fqdn
set fqdn "static.ak.facebook.com"
next
edit "static.ak.fbcdn.com"
set type fqdn
set fqdn "static.ak.fbcdn.com"
next
edit "web_ext_addr_SocialWiFi"
set type fqdn
set fqdn "web_ext_addr_SocialWiFi"
next
edit "www.facebook.com"
set type fqdn
set fqdn "www.facebook.com"
next
end
config firewall addrgrp
edit "Facebook_Auth"
set member "FB0" "FB1" "FB2" "FB3" "FB4" "FB5" "FB6" "FB7" "FB8" "FB9"
"akamaisubnet-23.74.8" "akamai-subnet-23.74.9" "akamaihd.net"
"channel-proxy-06-frc1.facebook.com" "code.jquery.com"
"connect.facebook.com" "fbcdn-photos-ca.akamaihd.net"
"fbcdn-profile-a.akamaihd.net" "fbexternal-a.akamaihd.net"
"fbstatic-a.akamaihd.net" "m.facebook.com" "ogp.me"
"s-static.ak.facebook.com" "static.ak.facebook.com"
"static.ak.fbcdn.com" "web_ext_addr_SocialWiFi"
"www.facebook.com" "FortiAuthenticator"
next
end
WiFi
575
Go to System > Dashboard and enter the CLI Console. Add the following to exempt the Facebook
authentication traffic policy from the captive portal:
config firewall policy
edit <policy_id>
set captive-portal-exempt enable
next
end
This command allows access to the external Captive Portal.
576
WiFi
WiFi
577
7. Results
Connect to the WiFi and attempt to
browse the Internet. You will be
redirected to the Captive Portal splash
page.
Select Facebook and you should be
redirected to the Facebook login page.
578
WiFi
WiFi
579
WiFi authentication using social media provides access control without having to manually create guest accounts.
This recipe involves configuring an API for Twitter accounts, setting up a social portal RADIUS service on the
FortiAuthenticator, and configuring the FortiGate for Captive Portal access.
This recipe is similar to theCaptive portal WiFi access control, but involves external security mode configuration,
RADIUS authentication, and does not include FortiAP registration instructions.
Note that some minimal CLI usage is required when configuring the FortiGate.
The FortiAuthenticator has been given an example fully qualified domain name (FQDN)
fortiauthenticator.example.com.
A recipe of this video is available here.
WiFi
580
https://apps.twitter.com/
Select Create New App.
WiFi
581
The Consumer Key and Consumer Secret can be accessed at any time on the Twitter developer account, but
it may be a good idea to copy them to a secure location.
582
WiFi
Enter the pre-shared Secret and set the Authentication method. The FortiGate will use this secret key in its
RADIUS configuration.
Add the Social_Users user group to the Realms group filter as shown.
Select Save and then OK.
Next go to Authentication > Captive
Portal > General and enable Social
Portal.
Configure the account expiry time (in the
example it is set to 1 hour).
Set Place registered users into a group
to Social_Users.
Enable the Twitter login option and add
your Twitter Consumer Key and
Consumer Secret.
WiFi
583
584
WiFi
The following step can be performed in the GUI, but may take considerably longer than using the CLI. You can
also copy and paste the commands below into the CLI console.
Go to System > Dashboard and enter the CLI Console. Enter the following, which creates the firewall
addresses and adds them to a firewall address group called Twitter_Auth:
config firewall address
edit "api.twitter.com"
set type fqdn
set fqdn "api.twitter.com"
next
edit "abs.twimg.com"
set type fqdn
set fqdn "abs.twimg.com"
next
edit "abs-0.twimg.com"
set type fqdn
set fqdn "abs-0.twimg.com"
next
end
config firewall addgrp
edit "Twitter_Auth"
set member "api.twitter.com" "abs.twimg.com" "abs-0.twimg.com"
next
end
Go to Policy & Objects > Policy > IPv4
and create a policy for Twitter
authentication traffic.
Set Incoming Interface to the WiFi SSID
interface and set Source Address to all.
Set Outgoing Interface to the Internetfacing interface and set Destination
Address to Twitter_Auth.
Set Service to ALL and enable NAT.
Configure Security Profiles accordingly.
Go to System > Dashboard and enter the CLI Console. Add the following to exempt the Twitter authentication
traffic policy from the captive portal:
config firewall policy
edit <policy_id>
set captive-portal-exempt enable
next
end
This command allows access to the external Captive Portal.
WiFi
585
586
WiFi
7. Results
Connect to the WiFi and attempt to browse
the Internet. You will be redirected to the
Captive Portal splash page.
Select Twitter and you should be
redirected to the Twitter login page.
WiFi
587
588
WiFi
WiFi authentication using social media provides access control without having to manually create guest accounts.
This recipe involves configuring an API for Google+ accounts, setting up a social portal RADIUS service on the
FortiAuthenticator, and configuring the FortiGate for Captive Portal access.
This recipe is similar to theCaptive portal WiFi access control, but involves external security mode configuration,
RADIUS authentication, and does not include FortiAP registration instructions.
Note that some minimal CLI usage is required when configuring the FortiGate.
The FortiAuthenticator has been given an example fully qualified domain name (FQDN)
fortiauthenticator.example.com.
WiFi
589
https://console.developers.google.com
Under Select a project, select Create a
project.
Enter a Project name, and accept the
Terms of Service before continuing.
WiFi
590
Set Application type to Web application. Under Authorized JavaScript origins, enter the FortiAuthenticator
FQDN.
Under Authorized redirect URIs, enter the following:
https://fortiauthenticator.example.com/social/complete/google-oauth2/
Note that the FortiAuthenticator needs to be able to access the Internet.
591
WiFi
The client ID and client secret can be accessed at any time on the Google developer account, but it may be a
good idea to copy them to a secure location.
WiFi
592
Enter the pre-shared Secret and set the Authentication method. The FortiGate will use this secret key in its
RADIUS configuration.
Add the Social_Users user group to the Realms group filter as shown.
Select Save and then OK.
593
WiFi
For the Authentication Portal, select External, and enter the FQDN of the FortiAuthenticator, followed by
/social_login/.
For this recipe, it is set to:
https://fortiauthenticator.example.com/social_login/
Set User Groups to the social_users group.
WiFi
594
595
WiFi
WiFi
596
597
WiFi
7. Results
Connect to the WiFi and attempt to
browse the Internet. You will be redirected
to the Captive Portal splash page.
Select Google and you should be
redirected to the Google login page.
WiFi
598
599
WiFi
WiFi authentication using social media provides access control without having to manually create guest accounts.
This recipe involves configuring an API for LinkedIn accounts, setting up a social portal RADIUS service on the
FortiAuthenticator, and configuring the FortiGate for Captive Portal access.
This recipe is similar to theCaptive portal WiFi access control recipe, but involves external security mode
configuration, RADIUS authentication, and does not include FortiAP registration instructions.
Note that some minimal CLI usage is required when configuring the FortiGate.
The FortiAuthenticator has been given an example fully qualified domain name (FQDN)
fortiauthenticator.example.com.
WiFi
600
https://developer.linkedin.com/documents/authentication
Select Create Application.
Enter information in the required fields.
Unlike the other social applications,
LinkedIn requires an Application Logo URL.
Select that you have read and agree to the
LinkedIn API Terms if Use and select
Submit.
WiFi
601
602
WiFi
WiFi
603
Enter the pre-shared Secret and set the Authentication method. The FortiGate will use this secret key in its
RADIUS configuration.
Add the Social_Users user group to the Realms group filter as shown.
Select Save and then OK.
604
WiFi
WiFi
605
For the Authentication Portal, select External, and enter the FQDN of the FortiAuthenticator, followed by
/social_login/.
For this recipe, it is set to:
https://fortiauthenticator.example.com/social_login/
Set User Groups to the social_users group.
606
WiFi
WiFi
607
Go to System > Dashboard and enter the CLI Console. Add the following to exempt the LinkedIn
authentication traffic policy from the captive portal:
config firewall policy
edit <policy_id>
set captive-portal-exempt enable
next
end
This command allows access to the external Captive Portal.
608
WiFi
WiFi
609
7. Results
Connect to the WiFi and attempt to browse
the Internet. You will be redirected to the
Captive Portal splash page.
Select LinkedIn and you should be
redirected to the LinkedIn login page.
610
WiFi
You can configure Captive Portal to use other social WiFi logins:
WiFi
611
WiFi authentication using a forms-based portal provides access control without having to manually create guest
accounts.
This recipe involves setting up a social portal RADIUS service on the FortiAuthenticator, and configuring the
FortiGate for Captive Portal access, allowing users to log in to the WiFi network using either SMS or e-mail selfregistration.
This recipe is similar to the Captive portal WiFi access control recipe, but involves RADIUS authentication, and
does not include FortiAP registration instructions.
WiFi
612
Enter the pre-shared Secret and set the Authentication method. The FortiGate will use this secret key in its
RADIUS configuration.
Add the Social_Users user group to the Realms group filter as shown.
Select Save and then OK.
WiFi
613
614
WiFi
For the Authentication Portal, select External, and enter the FQDN of the FortiAuthenticator, followed by
/social_login/.
For this recipe, it is set to:
https://fortiauthenticator.example.com/social_login/
Set User Groups to the social_users group.
WiFi
615
616
WiFi
5. Results
Connect to the WiFi and attempt to
browse the Internet. You will be
redirected to the Captive Portal splash
page.
Select Form-based and you should be
redirected to the Form-based
authentication login page.
WiFi
617
You can configure Captive Portal to use other social WiFi logins:
618
WiFi
Expert
FortiGate units can be deployed in many ways to meet a wide range of advanced requirements. This section
contains recipes and articles (which discuss topics in greater depth than a recipe) about a variety of these
configurations.
Recipes and articles in this section are intended for users with a high degree of background knowledge about
FortiGates and computer networking, such as users who have completed Fortinets Network Security Expert
(NSE) 4 level of training.
High Availability
l
Redundant architecture
IPsec VPN
l
Authentication
l
Articles
l
Expert
619
This recipe describes how to enhance the reliability of a network protected by a FortiGate unit by adding a second
FortiGate unit and setting up a FortiGate Clustering Protocol (FGCP) High Availability cluster.
The FortiGate already on the network will be configured to become the primary unit by increasing its device priority
and enabling override. The new FortiGate will be prepared by setting it to factory defaults to wipe any configuration
changes. Then it will be licensed, configured for HA, and then connected to the FortiGate already on the network.
The new FortiGate becomes the backup unit and its configuration is overwritten by the primary unit.
The recipe contains instructions for both the GUI and the CLI, with some parts of the configuration requiring use of
the CLI.For a simplified HA recipe that only requires use of the GUI, see High Availability with two FortiGates.
Before you start the FortiGates should be running the same FortiOS firmware version and interfaces should not be
configured to get their addresses from DHCP or PPPoE.
Expert
620
config system ha
set mode a-p
set group-name My-HA-Cluster
set password
set priority 250
set override enable
set hbdev ha1 50 ha2 50
end
Expert
621
config system ha
set override enable
end
The FortiGate unit negotiates to establish an HA cluster. When you select OK you may temporarily lose
connectivity with the FortiGate unit as FGCP negotiation takes place and the MAC addresses of the FortiGate
unit are changed to HA virtual MAC addresses. These virtual MAC addresses are used for failover. The actual
virtual MAC address assigned to each FortiGate interface depends on the HA group ID. Since this example
does not involved changing the HA group ID, the FortiGate unit's interfaces will have the following MAC
622
Expert
Expert
623
624
config system ha
set mode a-p
set group-name My-HA-Cluster
set password
set priority 50
set hbdev ha1 50 ha2 50
end
Expert
Expert
625
5. Results
Normally, traffic should now be flowing through the primary FortiGate. However, if the primary FortiGate is
unavailable, traffic should failover and the backup FortiGate will be used. Failover will also cause the primary
and backup FortiGates to reverse roles, even when both FortiGates are available again.
To test this, ping the IP address 8.8.8.8
using a PC on the internal network. After
a moment, power off the primary
FortiGate.
626
Expert
traffic to continue.
Expert
627
Redundant architecture
The following recipe provides useful instructions for customers with multi-site architecture and redundant
firewalls. It is intended for those customers that want to reduce the number of on-site appliances while increasing
network security and decreasing Total Cost of Ownership, where the goal is simple, cost-effective reliability.
FortiOS 5.2 introduced many new features that we will use in this configuration, which is therefore not possible on
FortiOS 5.0.x or earlier. The recipe is performed with the FortiGate 1xxD/2xxD series.
By following the recipe, you will be able to provide your small-site customers with simple, yet secure infrastructure
that perfectly matches the UTM approach, where we want to centralize as many security features as possible on
a single device or cluster.
Expert
628
The recipe provides task-oriented instructions for administrators to fully complete the installation. It is divided into
the following sections:
1. Scenario: This section section explains the problems that this new network topology solves, including the
cases in which the topology should be used.
2. Topology: This section includes diagrams of the new topology. It also lists key advantages to this kind of
architecture and explains why it solves the problems previously identified in The Scenario.
3. Configuration: This section provides step-by-step instructions for configuring the FortiGates within the new
topology.
629
Expert
Scenario
In the standard scenario, we assume the following topology as the starting point:
Multi-site customers that want to avoid any Single Point of Failure in their remote networks often use this kind of
topology. These customers require two FortiGates in Active/Passive mode and therefore two switches on the
LAN side to transfer Ethernet payloads to the active FortiGate. There are a few downsides to this approach:
l
Administrators must know how to work with the Firewall OS and with the Switch OS.
If one switch fails, the workstations connected wont be able to reach the Internet.
Expert
630
Topology
In this section, we look at the target topology and the scenarios for FortiGate failover. At the end of the section, we
discuss the key advantages of adopting the target topology.
In this new topology, we wont be using additional switches. Instead, we will be using the FortiGates Integrated
Switch Fabric (ISF) solution on both master and slave firewalls.
Note that the target topology uses a FortiGate 2xxD, which has 40 ports. In your configuration, ensure that each
FortiGate has enough ports to handle all of the computers in the event of a failover, or switches will still need to be
involved.
Expert
631
The administrator will have to configure a trunk link between the two FortiGate physical switches to expand
subnets and VLANs from one firewall to the other.
In a FortiGate cluster using FGCP, the slave firewalls ISF can still be used to send traffic destined for the active
member across the trunk link.
A representation of the traffic flow appears below:
632
Expert
The monitored WAN port, on what was originally the Master FortiGate, fails.
The link between the router and the original Master FortiGate fails.
Expert
633
634
Only two devices are required, where four are required in the standard topology.
It is easier for the administrator to manage security and switching on a single device.
Expert
Configuration
In this section, we reproduce the following network topology. Notice how the router has a switch interface.If your
router does not have a switch interface, you will have to add an extra switch (noted in gray below), and in the event
of a firewall crash, you will have to power cycle the router.
As we will be changing the configuration of the hardware switch, we strongly recommend that you use the
management port to follow the steps below.
By default, the FortiGate management IP address is 192.168.1.99/24.
Expert
635
If the unit is in Switch mode, it will have to be reconfigured into Interface mode. For more information, see
Choosing your FortiGate's switch mode.
Go to System > Network > Interfaces
and double-click lan in the interface list.
636
Expert
Expert
637
3. Configuring HA
We will now configure High Availability. Port 40 will be used for HeartBeat/Sync communications between
cluster members. Port Wan1 will be monitored.
Go to System > Config > HA and
configure High Availability as shown:
638
Expert
Expert
639
640
Expert
This example describes the basics of setting up a Session-aware Load Balancing Cluster (SLBC) that consists of
one FortiController-5103B, installed in chassis slot 1, and three FortiGate-5001C workers, installed in chassis
slots 3, 4, and 5. This SLBC configuration can have up to eight 10 Gbit network connections.
For more information about SLBC go here.
Expert
641
1. Hardware setup
Install a FortiGate-5000 series chassis and connect it to power. Install the FortiController in slot 1. Install the
workers in slots 3, 4, and 5. Power on the chassis.
Check the chassis, FortiController, and FortiGate LEDs to verify that all components are operating normally. (To
check normal operation LED status see the FortiGate-5000 series documents available here.)
Check the FortiSwitch-ATCA release notes and install the latest supported firmware on the FortiController and
on the workers. Get FortiController firmware from the Fortinet Support site. Select the FortiSwitch-ATCA
product.
Expert
642
execute factoryreset
643
Expert
4. Results
You can now manage the workers in the same way as you would manage a standalone FortiGate. You can
connect to the worker GUI or CLI using the External Management IP. If you had configured the worker mgmt1
or mgmt2 interfaces you can also connect to one of these addresses to manage the cluster.
To operate the cluster, connect networks to the FortiController front panel interfaces and connect to a worker
GUI or CLI to configure the workers to process the traffic they receive. When you connect to the External
Management IP you connect to the primary worker. When you make configuration changes they are
Expert
644
645
Expert
This example describes the basics of setting up an active-passive Session-aware Load Balancing Cluster (SLBC)
that consists of two FortiController-5103Bs, installed in chassis slots 1 and 2, and three FortiGate-5001C workers,
installed in chassis slots 3, 4, and 5. This SLBC configuration can have up to eight redundant 10Gbit network
connections.
The FortiControllers in the same chassis to operate in active-passive HA mode for redundancy. The
FortiController in slot 1 becomes the primary unit actively processing sessions. The FortiController in slot 2
becomes the subordinate unit, sharing the primary units session table. If the primary unit fails the subordinate unit
resumes all active sessions.
All networks have redundant connections to both FortiControllers. You also create heartbeat links between the
FortiControllers and management links from the FortiControllers to an internal network.
For more information about SLBC go here.
Expert
646
1. Hardware setup
Install a FortiGate-5000 series chassis and connect it to power. Install the FortiControllers in slots 1 and 2.
Install the workers in slots 3, 4, and 5. Power on the chassis.
Check the chassis, FortiController, and FortiGate LEDs to verify that all components are operating normally (to
check normal operation LED status, see the FortiGate-5000 series documents available here).
Create duplicate connections from the FortiController front panel interfaces to the Internet and to the internal
network.
Create a heartbeat link by connecting the FortiController B1 interfaces together. Create a backup heartbeat link
by connecting the FortiController B2 interfaces together. You can directly connect the interfaces with a patch
cable or connect them together through a switch. If you use a switch, it must allow traffic on the heartbeat VLAN
(default 999) and the base control and management VLANs (301 and 101). These connections establish
heartbeat, base control, and base management communication between the FortiControllers. Only one
heartbeat connection is required but redundant connections are recommended.
Connect the mgmt interfaces of the both FortiControllers to the internal network or any network from which you
want to manage the cluster.
Check the FortiSwitch-ATCA release notes and install the latest supported firmware on the FortiController and
on the workers. Get FortiController firmware from the Fortinet Support site. Select the FortiSwitch-ATCA
product.
Expert
647
config system ha
set mode a-p
set groupid 23
set hbdev b1 b2
end
If you have more than one cluster on the same network, each cluster should have a different Group ID.
Changing the Group ID changes the cluster interface virtual MAC addresses. If your group ID setting causes a
MAC address conflict you can select a different Group ID. The default Group ID of 0 is not a good choice and
normally should be changed.
You can also adjust other HA settings. For example, you could increase the Device Priority of the
648
Expert
FortiController that you want to become the primary unit, enable Override to make sure the FortiController with
the highest device priority becomes the primary unit, and change the VLAN to use for HA heartbeat traffic if it
conflicts with a VLAN on your network.
You would only select Enable chassis redundancy if your cluster has more than one chassis.
Log into the web-based manager of the FortiController in slot 2 and duplicate the HA configuration of the
FortiController in slot 1, except for the Device Priority and override setting, which can be different on each
FortiController.
After a short time, the FortiControllers restart in HA mode and form an active-passive cluster. Both
FortiControllers must have the same HA configuration and at least one heartbeat link must be connected.
Normally the FortiController in slot 1 is the primary unit, and you can log into the cluster using the management
IP address you assigned to this FortiController.
You can confirm that the cluster has
been formed by viewing the HA
configuration from the the FortiController
web-based manager. The display should
show both FortiControllers in the cluster.
Since the configuration of all
FortiControllers is synchronized, you can
complete the configuration of the cluster
from the primary FortiController.
Expert
649
650
Expert
end
end
execute factoryreset
Expert
651
4. Results
You can now connect to the worker GUI or CLI using the External Management IP and manage the workers in
the same way as you would manage a standalone FortiGate. If you configured the worker mgmt1 or mgmt2
interfaces you can also connect to these interfaces to configure the workers. Configuration changes made to
any worker are synchronized to all workers.
Configure the workers to process the traffic they receive from the FortiController front panel interfaces. By
default all FortiController front panel interfaces are in the root VDOM. You can keep them in the root VDOM or
create additional VDOMs and move interfaces into them.
For example, if you connect the Internet
to FortiController front panel interface 1
(fctrl/f1 on the worker GUI and CLI) and
the internal network to FortiController
front panel interface 6 (fctrl/f6 on the
worker GUI and CLI) you would access
the root VDOM and add this policy to
allow users on the Internal network to
access the Internet.
652
Expert
Expert
653
This example describes how to setup an active-passive session-aware load balancing cluster (SLBC) consisting
of two FortiGate-5000 chassis, two FortiController-5103Bs, and six FortiGate-5001Bs acting as workers, three in
each chassis. This SLBC configuration can have up to seven redundant 10Gbit network connections.
The FortiControllers operate in active-passive HA mode for redundancy. The FortiController in chassis 1 slot 1 will
be configured to be the primary unit, actively processing sessions. The FortiController in chassis 2 slot 1 becomes
the subordinate unit. If the primary unit fails the subordinate unit resumes all active sessions.
All networks in this example have redundant connections to both FortiControllers and redundant heartbeat and
base control and management links are created between the FortiControllers using their front panel B1 and B2
interfaces.
This example also includes a FortiController session sync connection between the FortiControllers using the
FortiController F4 front panel interface (resulting in the SLBC having a total of seven redundant 10Gbit network
connections). (You can use any fabric front panel interface.)
Heartbeat and base control and management traffic uses VLANs and specific subnets. So the switches and
network components used must be configured to allow traffic on these VLANs and you should be aware of the
subnets used in case they conflict with any connected networks.
Expert
654
This example sets the device priority of the FortiController in chassis 1 higher than the device priority of the
FortiController in chassis 2 to make sure that the FortiController in chassis 1 becomes the primary FortiController
for the cluster.
For more information about SLBC go here.
655
Expert
1. Hardware setup
Install two FortiGate-5000 series chassis and connect them to power. Ideally each chassis should be connected
to a separate power circuit. Install a FortiController in slot 1 of each chassis. Install the workers in slots 3, 4,
and 5 of each chassis. The workers must be installed in the same slots in both chassis. Power on both chassis.
Check the chassis, FortiController, and FortiGate LEDs to verify that all components are operating normally (to
check normal operation LED status, see the FortiGate-5000 series documents available here).
Create duplicate connections from both FortiController front panel interfaces to the Internet and to the internal
network.
Create a heartbeat link by connecting the FortiController B1 interfaces together. Create a backup heartbeat link
by connecting the FortiController B2 interfaces together. You can directly connect the interfaces with a patch
cable or connect them together through a switch. If you use a switch, it must allow traffic on the heartbeat VLAN
(default 999) and the base control and management VLANs (301 and 101). These connections establish
heartbeat, base control, and base management communication between the FortiControllers. Only one
heartbeat connection is required but redundant connections are recommended.
Create a FortiController session sync connection between the chassis by connecting the FortiController F4
interfaces. If you use a switch it must allow traffic on the FortiController session sync VLAN (2000). You can
use any of the F1 to F8 interfaces. We chose F4 in this example to make the diagram easier to understand.
Connect the mgmt interfaces of the both FortiControllers to the internal network or any network from which you
want to manage the cluster.
Check the FortiSwitch-ATCA release notes and install the latest supported firmware on the FortiController and
on the workers. Get FortiController firmware from the Fortinet Support site. Select the FortiSwitch-ATCA
product.
Expert
656
edit admin
set password
end
config system ha
Enter this command to use the
set session-sync-port f4
FortiController front panel F4 interface
end
for FortiController session sync
communication between
FortiControllers.
config system ha
Expert
If you have more than one cluster on the same network, each cluster should have a different Group ID.
Changing the Group ID changes the cluster interface virtual MAC addresses. If your group ID setting causes a
MAC address conflict you can select a different Group ID. The default Group ID of 0 is not a good choice and
normally should be changed.
Enable Override is selected to make sure the FortiController in chassis 1 always becomes the primary unit.
Enabling override could lead to the cluster renegotiating more often, so once the chassis is operating you can
disable this setting.
You can also adjust other HA settings. For example, you could change the VLAN to use for HA heartbeat
traffic if it conflicts with a VLAN on your network. You can also adjust the Heartbeat Interval and Number of
Heartbeats lost to adjust how quickly the cluster determines one of the FortiControllers has failed.
config system ha
set mode active-passive
set groupid 5
set priority 10
set chassis-redundancy enable
set chassis-id 2
set hbdev b1 b2
set session-sync-port f4
Expert
end
658
659
Expert
Expert
660
execute factoryreset
661
Expert
end
To use HTTP to connect to the GUI of the FortiController in chassis 1 slot 1, browse to: https://172.20.120.100:44311
To use HTTP to connect to the GUI of the FortiController in chassis 2 slot 1, (the backup FortiController) browse to:
https://172.20.120.100:44321
To use Telnet to connect to the CLI of the worker in chassis 1 slot 4: telnet 172.20.120.100 2314
To use SSH to connect to the CLI the worker in chassis 2 slot 5: ssh admin@172.20.120.100 -p2225
To use SNMP to query the FortiController in chassis 2 slot 1 (the backup FortiController) use port 16121 in the SNMP query.
You can also manage the primary FortiController using the IP address of its mgmt interface, set up when you
Expert
662
first configured the primary FortiController. You can also manage the workers by connecting directly to their
mgmt1 or mgmt2 interfaces if you set them up. However, the only way to manage the backup FortiController is
by using its special port number.
To manage a FortiController using SNMP you need to load the FORTINET-CORE-MIB.mib file into your SNMP
manager. You can get this MIB file from the Fortinet support site, in the same location as the current
FortiController firmware (select the FortiSwitchATCA product).
On the primary FortiController GUI go
to Load Balance > Status. As the
workers in chassis 1 restart they
should appear in their appropriate
slots.
The primary FortiController should be
the FortiController in chassis 1 slot 1.
The primary FortiController status
display includes a Config Master link
that you can use to connect to the
primary worker.
663
Expert
Configure the workers to process the traffic they receive from the FortiController front panel interfaces. By
default all FortiController front panel interfaces are in the worker root VDOM. You can keep them in the root
VDOM or create additional VDOMs and move interfaces into them.
For example, if you connect the
Internet to FortiController front panel 2
interfaces (fctrl/f2 on the worker GUI
and CLI) and the internal network to
FortiController front panel 6 interfaces
(fctrl/f6) you would access the root
VDOM and add this policy to allow
users on the Internal network to
access the Internet.
For example, you can use SSH to log into the primary FortiController CLI
using the external management IP:
ssh admin@172.20.120.100 -p2211
get system status
Version: FortiController-5103B
v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3912000029
BIOS version: 04000009
System Part-Number: P08442-04
Hostname: ch1-slot1
Current HA mode: a-p, master
System time: Sat Sep 13 06:51:53 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
Expert
664
Standby]
Standby]
Standby]
Standby]
665
Expert
Enter this command from the primary FortiController to show the HA status of the primary and backup
FortiControllers. The command output shows a lot of information about the cluster including the host names and
chassis and slot locations of the FortiControllers, the number of sessions each FortiController is processing
(this case 0 for each FortiController) the number of failed workers (0 of 3 for each FortiController), the number of
FortiController front panel interfaces that are connected (2 for each FortiController) and so on. The final two lines
of output also show that the B1 interfaces are connected (status=alive) and the B2 interfaces are not
(status=dead). The cluster can still operate with a single heartbeat connection, but redundant heartbeat
interfaces are recommended.
diagnose system ha status
mode: a-p
minimize chassis failover: 1
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.41,
uptime=62581.81, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=2
force-state(0:none) hbdevs: local_interface= b1 best=yes
local_interface= b2 best=no
ch2-slot1(FT513B3912000051), Slave(priority=1), ip=169.254.128.42,
uptime=1644.71, chassis=2(1)
slot: 1
sync: conf_sync=0, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=2
force-state(0:none) hbdevs: local_interface= b1 last_hb_time=66430.35
status=alive
local_interface= b2 last_hb_time= 0.00
status=dead
Log into the backup FortiController
CLI and enter this command to view
the status of the backup
FortiController.
Expert
To use SSH:
ssh admin@172.20.120.100 -p2221
get system status
Version: FortiController-5103B
v5.0,build0020,131118 (Patch 3)
Branch Point: 0020
Serial-Number: FT513B3912000051
BIOS version: 04000009
System Part-Number: P08442-04
Hostname: ch2-slot1
Current HA mode: a-p, backup
System time: Sat Sep 13 07:29:04 2014
666
Standby]
Standby]
Standby]
Standby]
667
Expert
Expert
668
This example describes the basics of setting up a dual mode Session-aware Load Balancing Cluster (SLBC) that
consists of two FortiController-5103Bs, installed in chassis slots 1 and 2, and three FortiGate-5001C workers,
installed in chassis slots 3, 4, and 5. This SLBC configuration can have up to 16 10Gbit network connections.
The two FortiControllers in the same chassis to operate in dual mode to double the number of network interfaces
available. In dual mode, two FortiControllers load balance traffic to multiple workers. Traffic can be received by
both FortiControllers and load balanced to all of the workers in the chassis. In dual mode configuration the front
panel interfaces of both FortiControllers are active.
In a dual FortiController-5103B cluster this means up to 16 10Gbyte network interfaces are available. The
interfaces of the FortiController in slot 1 are named fctrl/f1 to fctrl/f8 and the interfaces of the FortiController in slot
2 are named fctr2/f1 to fctrl2/f8.
All networks have single connections to the first or second FortiController. One or more heartbeat links are created
between the FortiControllers. Redundant heartbeat links are recommended. The heartbeat links use the front
panel B1 and B2 interfaces.
If one of the FortiControllers fails, the remaining FortiController keeps processing traffic received by its front panel
interfaces. Traffic to and from the failed FortiController is lost.
For more information about SLBC go here.
Expert
669
1. Hardware setup
Install a FortiGate-5000 series chassis and connect it to power. Install the FortiControllers in slots 1 and 2.
Install the workers in slots 3, 4, and 5. Power on the chassis.
Check the chassis, FortiController, and FortiGate LEDs to verify that all components are operating normally (to
check normal operation LED status, see the FortiGate-5000 series documents available here).
Create connections from the FortiController front panel interfaces to the Internet and to the internal network.
Create a heartbeat link by connecting the FortiController B1 interfaces together. Create a backup heartbeat link
by connecting the FortiController B2 interfaces together. You can directly connect the interfaces with a patch
cable or connect them together through a switch. If you use a switch, it must allow traffic on the heartbeat VLAN
(default 999) and the base control and management VLANs (301 and 101). These connections establish
heartbeat, base control, and base management communication between the FortiControllers. Only one
heartbeat connection is required but redundant connections are recommended.
Connect the mgmt interfaces of the both FortiControllers to the internal network or any network from which you
want to manage the cluster.
Check the FortiSwitch-ATCA release notes and install the latest supported firmware on the FortiController and
on the workers. Get FortiController firmware from the Fortinet Support site. Select the FortiSwitch-ATCA
product.
Expert
670
command.
Set the chassis type that you are using.
end
config system ha
set mode dual
set groupid 4
set hbdev b1 b2
end
If you have more than one cluster on the same network, each cluster should have a different Group ID.
Changing the Group ID changes the cluster interface virtual MAC addresses. If your group ID setting causes a
MAC address conflict you can select a different Group ID. The default Group ID of 0 is not a good choice and
normally should be changed.
You can also adjust other HA settings. For example, you could increase the Device Priority of the
FortiController that you want to become the primary unit, enable Override to make sure the FortiController with
the highest device priority becomes the primary unit, and change the VLAN to use for HA heartbeat traffic if it
671
Expert
Expert
672
673
Expert
this address.
Enable base management traffic
between FortiControllers.
end
config load-balance setting
config base-mgmt-interfaces
edit b1
next
edit b2
end
end
execute factoryreset
Expert
674
Optionally give the mgmt1 and or mgmt2 interfaces of each worker IP addresses and connect them to your
network. When a cluster is created, the mgmt1 and mgmt2 IP addresses are not synchronized, so you can
connect to and manage each worker separately.
Optionally give each worker a different hostname. The hostname is also not synchronized and allows you to
identify each worker.
Log into the CLI of each worker and enter
this command to set the worker to
operate in FortiController mode.
675
Expert
4. Results
You can now connect to the worker GUI or CLI using the External Management IP and manage the workers in
the same way as you would manage a standalone FortiGate. If you configured the worker mgmt1 or mgmt2
interfaces you can also connect to these interfaces to configure the workers. Configuration changes made to
any worker are synchronized to all workers.
Configure the workers to process the traffic they receive from the FortiController front panel interfaces. By
default all FortiController front panel interfaces are in the root VDOM. You can keep them in the root VDOM or
create additional VDOMs and move interfaces into them.
For example, if you connect the Internet
to FortiController front panel interface 2
of the FortiController in slot 1 (fctrl1/f2 on
the worker GUI and CLI) and the internal
network to FortiController front panel
interface 6 of the FortiController in slot 2
(fctrl2/f6 on the worker GUI and CLI) you
would access the root VDOM and add
this policy to allow users on the Internal
network to access the Internet.
Expert
676
This example describes how to setup an active-passive session-aware load balancing cluster (SLBC) consisting
of two FortiGate-5000 chassis, four FortiController-5103Bs two in each chassis, and six FortiGate-5001Bs acting
as workers, three in each chassis. This SLBC configuration can have up to seven redundant 10Gbit network
connections.
The FortiControllers operate in active-passive HA mode for redundancy. The FortiController in chassis 1 slot 1 will
be configured to be the primary unit, actively processing sessions. The other FortiControllers become the
subordinate units.
In active-passive HA with two chassis and four FortiControllers, both chassis have two FortiControllers in activepassive HA mode and the same number of workers. Network connections are duplicated to the redundant
FortiControllers in each chassis and between chassis for a total of four redundant data connections to each
network.
All traffic is processed by the primary unit. If the primary unit fails, all traffic fails over to the chassis with two
functioning FortiControllers and one of these FortiControllers becomes the new primary unit and processes all
traffic. If the primary unit in the second chassis fails as well, one of the remaining FortiControllers becomes the
primary unit and processes all traffic.
Expert
677
Heartbeat and base control and management communication is established between the chassis using the
FortiController B1 and B2 interfaces. Only one heartbeat connection is required but redundant connections are
recommended. Connect all of the B1 and all of the B2 interfaces together using switches. This example shows
using one switch for the B1 connections and another for the B2 connections. You could also use one switch for
both the B1 and B2 connections but using separate switches provides more redundancy.
The following VLAN tags and subnets are used by traffic on the B1 and B2 interfaces:
l
This example also includes a FortiController session sync connection between the FortiControllers using the
FortiController F4 front panel interface (resulting in the SLBC having a total of seven redundant 10Gbit network
connections). (You can use any fabric front panel interface, F4 is used in this example to make the diagram
clearer.) FortiController-5103B session sync traffic uses VLAN 2000.
This example sets the device priority of the FortiController in chassis 1 slot 1 higher than the device priority of the
other FortiControllers to make sure that the FortiController in chassis 1 slot 1 becomes the primary FortiController
for the cluster. Override is also enabled on the FortiController in chassis 1 slot 1. Override may cause the cluster
to negotiate more often to select the primary unit. This makes it more likely that the unit that you select to be the
primary unit will actually be the primary unit; but enabling override can also cause the cluster to negotiate more
often.
For more information about SLBC go here.
678
Expert
1. Hardware setup
Install two FortiGate-5000 series chassis and connect them to power. Ideally each chassis should be connected
to a separate power circuit. Install FortiControllers in slot 1 and 2 of each chassis. Install the workers in slots 3,
4, and 5 of each chassis. The workers must be installed in the same slots in both chassis. Power on both
chassis.
Check the chassis, FortiController, and FortiGate LEDs to verify that all components are operating normally (to
check normal operation LED status, see the FortiGate-5000 series documents available here).
Create redundant connections from all four FortiController front panel interfaces to the Internet and to the internal
network.
Create a heartbeat link by connecting the FortiController B1 interfaces together. Create a backup heartbeat link
by connecting the FortiController B2 interfaces together.
Create a FortiController session sync connection between the chassis by connecting the FortiController F4
interfaces together.
Connect the mgmt interfaces of all of the FortiControllers to the internal network or any network from which you
want to manage the cluster.
Check the FortiSwitch-ATCA release notes and install the latest supported firmware on the FortiControllers and
on the workers. Get FortiController firmware from the Fortinet Support site. Select the FortiSwitch-ATCA
product.
Expert
edit admin
set password
end
679
config system ha
Enter this command to use the
set session-sync-port f4
FortiController front panel F4 interface for
end
FortiController session sync
communication between
FortiControllers.
680
Expert
config system ha
set mode active-passive
set groupid 15
set priority 250
set override enable
set chassis-redundancy enable
set chassis-id 1
set hbdev b1 b2
set session-sync-port f4
end
If you have more than one cluster on the same network, each cluster should have a different Group ID.
Changing the Group ID changes the cluster interface virtual MAC addresses. If your group ID setting causes a
MAC address conflict you can select a different Group ID. The default Group ID of 0 is not a good choice and
normally should be changed.
You can also adjust other HA settings. For example, you could change the VLAN to use for HA heartbeat
traffic if it conflicts with a VLAN on your network. You can also adjust the Heartbeat Interval and Number of
Heartbeats lost to adjust how quickly the cluster determines one of the FortiControllers has failed.
set groupid 15
set priority 10
set chassis-redundancy enable
set chassis-id 1
set hbdev b1 b2
set session-sync-port f4
end
Expert
681
set priority 10
set chassis-redundancy enable
set chassis-id 2
set hbdev b1 b2
set session-sync-port f4
end
set priority 10
set chassis-redundancy enable
set chassis-id 2
set hbdev b1 b2
set session-sync-port f4
end
682
Expert
Expert
683
684
Expert
execute factoryreset
Expert
685
To use HTTP to connect to the GUI of the FortiController in chassis 1 slot 2, browse to: https://172.20.120.100:44312
To use HTTP to connect to the GUI of the FortiController in chassis 2 slot 1,browse to: https://172.20.120.100:44321
To use Telnet to connect to the CLI of the worker in chassis 2 slot 4: telnet 172.20.120.100 2324
To use SSH to connect to the CLI the worker in chassis 1 slot 5: ssh admin@172.20.120.100 -p2215
To use SNMP to query the FortiController in chassis 1 slot 2 use port 16112 in the SNMP query.
You can also manage the primary FortiController using the IP address of its mgmt interface, set up when you
first configured the primary FortiController. You can also manage the workers by connecting directly to their
mgmt1 or mgmt2 interfaces if you set them up. However, the only way to manage the backup FortiControllers is
by using its special port number (or a serial connection to the Console port).
To manage a FortiController using SNMP you need to load the FORTINET-CORE-MIB.mib file into your SNMP
686
Expert
manager. You can get this MIB file from the Fortinet support site, in the same location as the current
FortiController firmware (select the FortiSwitchATCA product).
On the primary FortiController GUI go to
Load Balance > Status. As the workers
in chassis 1 restart they should appear in
their appropriate slots.
The primary FortiController should be the
FortiController in chassis 1 slot 1. The
primary FortiController status display
includes a Config Master link that you
can use to connect to the primary worker.
Expert
687
For example, you can use SSH to log into the primary FortiController CLI using the
external management IP:
ssh admin@172.20.120.100 -p2211
get system status
Version: FortiController-5103B v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3912000029
BIOS version: 04000009
System Part-Number: P08442-04
Hostname: ch1-slot1
Current HA mode: a-p, master
System time: Sun Sep 14 08:16:25 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
3 [3 Active 0 Standby]
688
Expert
Enter this command from the primary FortiController to show the HA status of the FortiControllers. The
command output shows a lot of information about the cluster including the host names and chassis and slot
locations of the FortiControllers, the number of sessions each FortiController is processing (this case 0 for each
FortiController) the number of failed workers (0 of 3 for each FortiController), the number of FortiController front
panel interfaces that are connected (2 for each FortiController) and so on. The final two lines of output also show
that the B1 interfaces are connected (status=alive) and the B2 interfaces are not (status=dead). The cluster can
still operate with a single heartbeat connection, but redundant heartbeat interfaces are recommended.
diagnose system ha status
mode: a-p
minimize chassis failover: 1
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.121, uptime=4416.18, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
local_interface= b2 best=no
ch2-slot1(FT513B3912000051), Slave(priority=2), ip=169.254.128.123, uptime=1181.62, chassis=2(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
Expert
689
force-state(0:none)
To use SSH:
ssh admin@172.20.120.100 -p2212
get system status
Version: FortiController-5103B v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3914000006
BIOS version: 04000010
System Part-Number: P08442-04
Hostname: ch1-slot2
Current HA mode: a-p, backup
System time: Sun Sep 14 12:44:58 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
690
Expert
Enter this command from the FortiController in chassis 1 slot 2 to show the HA status of the FortiControllers.
Notice that the FortiController in chassis 1 slot 2 is shown first.
diagnose system ha status
mode: a-p
minimize chassis failover: 1
ch1-slot2(FT513B3914000006), Slave(priority=1), ip=169.254.128.122, uptime=4292.69, chassis=1(1)
slot: 2
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
local_interface= b2 best=no
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.121, uptime=4664.49, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
Expert
691
force-state(0:none)
To use SSH:
ssh admin@172.20.120.100 -p2221
get system status
Version: FortiController-5103B v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3912000051
BIOS version: 04000009
System Part-Number: P08442-04
Hostname: ch2-slot1
Current HA mode: a-p, backup
System time: Sun Sep 14 12:53:09 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
Enter this command from the FortiController in chassis 2 slot 1 to show the HA status of the FortiControllers.
692
Expert
local_interface= b2 best=no
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.121, uptime=5093.30, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
Expert
To use SSH:
ssh admin@172.20.120.100 -p2222
get system status
693
Enter this command from the FortiController in chassis 2 slot 2 to show the HA status of the FortiControllers.
Notice that the FortiController in chassis 2 slot 2 is shown first.
diagnose system ha status
mode: a-p
minimize chassis failover: 1
ch2-slot2(FT513B3913000168), Slave(priority=3), ip=169.254.128.124, uptime=1276.77, chassis=2(1)
slot: 2
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
694
Expert
force-state(0:none)
local_interface= b2 best=no
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.121, uptime=5356.98, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
Expert
695
This example describes how to setup a dual-mode session-aware load balancing cluster (SLBC) consisting of two
FortiGate-5144C chassis, four FortiController-5903Cs two in each chassis, and six FortiGate-5001Ds acting as
workers, three in each chassis. This SLBC configuration can have up to 8 redundant 40Gbps network
connections. The FortiGate-5144C is required to supply enough power for the FortiController-5903Cs and provide
40Gpbs fabric backplane communication.
In this dual mode configuration, the FortiController in chassis 1 slot 1 is configured to become the primary unit.
Both of the FortiControllers in chassis 1 receive traffic and load balance it to the workers in chassis 1. In dual
mode configuration the front panel interfaces of both FortiControllers are active. All networks have single
connections to the FortiController in slot 1 or the FortiController in slot 2. The front panel F1 to F4 interfaces of the
FortiController in slot 1 are named fctrl1/f1 to fctrl1/f4 and the front panel F1 to F4 interfaces of the FortiController
in slot 2 are named fctrl2/f1 to fctrl2/f4.
The network connections to the FortiControllers in chassis 1 are duplicated with the FortiControllers in chassis 2.
If one of the FortiControllers in chassis 1 fails, the FortiController in chassis 2 slot 1 becomes the primary
FortiController and all traffic fails over to the FortiControllers in chassis 2. If one of the FortiControllers in chassis 2
fails, the remaining FortiController in chassis 2 keeps processing traffic received by its front panel interfaces.
Traffic to and from the failed FortiController is lost.
Heartbeat, base control, base management, and session sync communication is established between the chassis
using the FortiController B1 and B2 interfaces. Connect all of the B1 interfaces together using a 10 Gbps switch.
Expert
696
Collect all of the B2 interfaces together using another 10 Gbps switch. Using the same switch for the B1 and B1
interfaces is not recommended and requires a double VLAN tagging configuration.
The switches must be configured to support the following VLAN tags and subnets used by the traffic on the B1
and B2 interfaces:
l
This example sets the device priority of the FortiController in chassis 1 slot 1 is higher than the device priority of
the other FortiControllers to make sure that the FortiController in chassis 1 slot 1 becomes the primary
FortiController for the cluster. Override is also enabled on the FortiController in chassis 1 slot 1. Override may
cause the cluster to negotiate more often to select the primary unit. This makes it more likely that the unit that you
select to be the primary unit will actually be the primary unit; but enabling override can also cause the cluster to
negotiate more often.
For more information about SLBC go here.
697
Expert
1. Hardware setup
Install two FortiGate-5144C series chassis and connect them to power. Ideally each chassis should be
connected to a separate power circuit. Install FortiControllers in slot 1 and 2 of each chassis. Install the workers
in slots 3, 4, and 5 of each chassis. The workers must be installed in the same slots in both chassis. Power on
both chassis.
Check the chassis, FortiController, and FortiGate LEDs to verify that all components are operating normally (to
check normal operation LED status, see the FortiGate-5000 series documents available here).
Create redundant network connections to FortiController front panel interfaces. In this example, a redundant
connection to the Internet is made to the F1 interface of the FortiController in chassis 1 slot 1 and the F1
interface of the FortiController in chassis 2 slot 1. This becomes the fctl1/f1 interface. As well, a redundant
connection to the internal network is made to the F3 interface of the FortiController in chassis 1 slot 2 and the F3
interface of the FortiController in chassis 2 slot 2. This becomes the fctl2/f3 interface.
Create the heartbeat links by connecting the FortiController B1 interfaces together and the FortiController B2
interfaces together.
Connect the mgmt interfaces of all of the FortiControllers to the internal network or any network from which you
want to manage the cluster.
Check the FortiSwitch-ATCA release notes and install the latest supported firmware on the FortiControllers and
on the workers. Get FortiController firmware from the Fortinet Support site. Select the FortiSwitch-ATCA
product.
Expert
698
config system ha
Enter these commands to use the
FortiController front panel F4 interface for set session-sync-port f4
end
session sync communication.
699
Expert
config system ha
set mode dual
set groupid 25
set priority 250
set override enable
set chassis-redundancy enable
set chassis-id 1
set hbdev b1 b2
end
If you have more than one cluster on the same network, each cluster should have a different Group ID.
Changing the Group ID changes the cluster interface virtual MAC addresses. If your group ID setting causes a
MAC address conflict you can select a different Group ID. The default Group ID of 0 is not a good choice and
normally should be changed.
You can also adjust other HA settings. For example, you could change the VLAN to use for HA heartbeat
traffic if it conflicts with a VLAN on your network. You can also adjust the Heartbeat Interval and Number of
Heartbeats lost to adjust how quickly the cluster determines one of the FortiControllers has failed.
Expert
config system ha
set mode dual
set groupid 25
set priority 10
set chassis-redundancy enable
set chassis-id 1
set hbdev b1 b2
end
700
config system ha
set mode dual
set groupid 25
set priority 10
set chassis-redundancy enable
set chassis-id 2
set hbdev b1 b2
end
701
config system ha
set mode dual
set groupid 25
set priority 10
set chassis-redundancy enable
set chassis-id 2
set hbdev b1 b2
end
Expert
Expert
702
To change backplane fabric channel interface speeds, from the GUI go to Switch >
Fabric Channel and edit the slot-3, slot-4, and slot-5 interface. Set the Speed to
703
Expert
speed. Since the workers are FortiGate5001Ds and the cluster is using
FortiGate-5144C chassis, the
FortiController fabric backplane interface
speed should be set to 40Gbps full
duplex.
You can also enter this command to set the External Management IP and configure management access:
config load-balance setting
set base-mgmt-external-ip 172.20.120.100 255.255.255.0
set base-mgmt-allowaccess https ssh ping
end
Enable base management traffic
between FortiControllers. The CLI
syntax shows setting the default base
management VLAN (101). You can use
this command to change the base
management VLAN.
Expert
704
execute factoryreset
705
Expert
Expert
Telnet to connect to the CLI of the worker in chassis 2 slot 4: telnet 172.20.120.100 2324
To use SSH to connect to the CLI the worker in chassis 1 slot 5: ssh admin@172.20.120.100 -p2205
You can also manage the primary FortiController using the IP address of its mgmt interface, set up when you
first configured the primary FortiController. You can also manage the workers by connecting directly to their
mgmt1 or mgmt2 interfaces if you set them up. However, the only way to manage the backup FortiControllers is
by using its special port number (or a serial connection to the Console port).
To manage a FortiController using SNMP you need to load the FORTINET-CORE-MIB.mib file into your SNMP
manager. You can get this MIB file from the Fortinet support site, in the same location as the current
FortiController firmware (select the FortiSwitchATCA product).
On the primary FortiController GUI go to
Load Balance > Status. If the workers
in chassis 1 are configured correctly they
should appear in their appropriate slots
The primary FortiController should be the
FortiController in chassis 1 slot 1. The
primary FortiController status display
includes a Config Master link that you
can use to connect to the primary worker.
707
Expert
Expert
708
For example, you can use SSH to log into the primary FortiController
CLI using the external management IP:
ssh admin@172.20.120.100 -p2201
get system status
Versio: FortiController-5903C v5.0,build0024
14815
Branch Point: 0024
Serial-Number: FT513B3912000029
BIOS version: 04000009
System Part-Number: P08442-04
Hostname: ch1-slot1
Current HA mode: dual, master
System time: Mon Sep 15 10:11:48 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
Enter this command to view the load balance status of the primary FortiController and its workers. The
command output shows the workers in slots 3, 4, and 5, and status information about each one.
get load-balance status
ELBC Master Blade: slot-3
Confsync Master Blade: slot-3
Blades:
Working: 3 [ 3 Active 0 Standby]
Ready:
0 [ 0 Active 0 Standby]
Dead:
0 [ 0 Active 0 Standby]
Total:
3 [ 3 Active 0 Standby]
Slot 3: Status:Working
Function:Active
Link:
Base: Up
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Slot 4: Status:Working
Function:Active
Link:
Base: Up
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Slot 5: Status:Working
Function:Active
Link:
Base: Up
Fabric: Up
709
Expert
Expert
710
Enter this command from the primary FortiController to show the HA status of the FortiControllers. The
command output shows a lot of information about the cluster including the host names and chassis and slot
locations of the FortiControllers, the number of sessions each FortiController is processing (in this case 0 for
each FortiController) the number of failed workers (0 of 3 for each FortiController), the number of FortiController
front panel interfaces that are connected (2 for each FortiController) and so on. The final two lines of output also
show that the B1 interfaces are connected (status=alive) and the B2 interfaces are not (status=dead). The
cluster can still operate with a single heartbeat connection, but redundant heartbeat interfaces are
recommended.
diagnose system ha status
mode: dual
minimize chassis failover: 1
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.201,
uptime=1517.38, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 best=yes
local_interface=
b2 best=no
ch2-slot1(FT513B3912000051), Slave(priority=2), ip=169.254.128.203,
uptime=1490.50, chassis=2(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 last_hb_
time=82192.16
status=alive
local_interface=
b2 last_hb_time=
0.00
status=dead
ch2-slot2(FT513B3913000168), Slave(priority=3), ip=169.254.128.204,
uptime=1476.37, chassis=2(1)
slot: 2
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 last_hb_
time=82192.27
status=alive
local_interface=
b2 last_hb_time=
0.00
status=dead
ch1-slot2(FT513B3914000006), Slave(priority=1), ip=169.254.128.202,
uptime=1504.58, chassis=1(1)
711
Expert
slot: 2
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
time=82192.16
status=alive
local_interface=
b2 last_hb_time=
b1 last_hb_
0.00
status=dead
To use SSH:
ssh admin@172.20.120.100 -p2202
get system status
Version: FortiController-5903C
v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3914000006
BIOS version: 04000010
System Part-Number: P08442-04
Hostname: ch1-slot2
Current HA mode: dual, backup
System time: Mon Sep 15 10:14:53 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
Enter this command to view the status of this backup FortiController and its workers.
get load-balance status
ELBC Master Blade: slot-3
Confsync Master Blade: slot-3
Blades:
Working: 3 [ 3 Active 0 Standby]
Ready:
0 [ 0 Active 0 Standby]
Dead:
0 [ 0 Active 0 Standby]
Total:
3 [ 3 Active 0 Standby]
Slot 3: Status:Working
Function:Active
Link:
Base: Down
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Slot 4: Status:Working
Function:Active
Link:
Base: Down
Fabric: Up
Expert
712
713
Expert
To use SSH:
ssh admin@172.20.120.100 -p2221
get system status
Version: FortiController-5903C
v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3912000051
BIOS version: 04000009
System Part-Number: P08442-04
Hostname: ch2-slot1
Current HA mode: dual, backup
System time: Mon Sep 15 10:17:10 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada))
Enter this command to view the status of this backup FortiController and its workers.
get load-balance status
ELBC Master Blade: slot-3
Confsync Master Blade: N/A
Blades:
Working: 3 [ 3 Active
Ready:
0 [ 0 Active
Dead:
0 [ 0 Active
Total:
3 [ 3 Active
Slot 3: Status:Working
Link:
Base: Up
Heartbeat: Management:
Expert
0
0
0
0
Standby]
Standby]
Standby]
Standby]
Function:Active
Fabric: Up
Good
Data: Good
714
Status Message:"Running"
Slot 4: Status:Working
Function:Active
Link:
Base: Up
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Slot 5: Status:Working
Function:Active
Link:
Base: Up
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Enter this command from the FortiController in chassis 2 slot 1 to show the HA status of the FortiControllers.
Notice that the FortiController in chassis 2 slot 1 is shown first.
diagnose system ha status
mode: dual
minimize chassis failover: 1
ch2-slot1(FT513B3912000051), Slave(priority=2), ip=169.254.128.203,
uptime=1785.61, chassis=2(1)
slot: 1
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 best=yes
local_interface=
b2 best=no
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.201,
uptime=1812.38, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 last_hb_
time=79145.95
status=alive
local_interface=
b2 last_hb_time=
0.00
status=dead
ch2-slot2(FT513B3913000168), Slave(priority=3), ip=169.254.128.204,
uptime=1771.36, chassis=2(1)
slot: 2
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 last_hb_
time=79145.99
status=alive
715
Expert
local_interface=
b2 last_hb_time=
0.00
status=dead
To use SSH:
ssh admin@172.20.120.100 -p2222
get system status
Version: FortiController-5903C
v5.0,build0024,140815
Branch Point: 0024
Serial-Number: FT513B3913000168
BIOS version: 04000010
System Part-Number: P08442-04
Hostname: ch2-slot2
Current HA mode: dual, backup
System time: Mon Sep 15 10:20:00 2014
Daylight Time Saving: Yes
Time Zone: (GMT-8:00)Pacific Time(US&Canada)
Enter this command to view the status of the backup FortiController and its workers.
get load-balance status
ELBC Master Blade: slot-3
Confsync Master Blade: N/A
Blades:
Working: 3 [ 3 Active
Ready:
0 [ 0 Active
Dead:
0 [ 0 Active
Total:
3 [ 3 Active
Slot 3: Status:Working
Expert
0
0
0
0
Standby]
Standby]
Standby]
Standby]
Function:Active
716
Link:
Base: Down
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Slot 4: Status:Working
Function:Active
Link:
Base: Down
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Slot 5: Status:Working
Function:Active
Link:
Base: Down
Fabric: Up
Heartbeat: Management: Good
Data: Good
Status Message:"Running"
Enter this command from the FortiController in chassis 2 slot 2 to show the HA status of the FortiControllers.
Notice that the FortiController in chassis 2 slot 2 is shown first.
diagnose system ha status
mode: dual
minimize chassis failover: 1
ch2-slot2(FT513B3913000168), Slave(priority=3), ip=169.254.128.204,
uptime=1874.39, chassis=2(1)
slot: 2
sync: conf_sync=1, elbc_sync=1
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 best=yes
local_interface=
b2 best=no
ch1-slot1(FT513B3912000029), Master(priority=0), ip=169.254.128.201,
uptime=1915.59, chassis=1(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
force-state(0:none)
hbdevs: local_interface=
b1 last_hb_
time=78273.86
status=alive
local_interface=
b2 last_hb_time=
0.00
status=dead
ch2-slot1(FT513B3912000051), Slave(priority=2), ip=169.254.128.203,
uptime=1888.78, chassis=2(1)
slot: 1
sync: conf_sync=1, elbc_sync=1, conn=3(connected)
session: total=0, session_sync=in sync
state: worker_failure=0/3, intf_state=(port up:)=0
717
Expert
force-state(0:none)
hbdevs: local_interface=
time=78273.85
status=alive
local_interface=
b2 last_hb_time=
b1 last_hb_
0.00
status=dead
Expert
718
This example shows how to create a dynamic IPsec VPN tunnel and allowing BGP peering through it.
Expert
719
Create phase 2.
Expert
720
Create phase 2.
721
Expert
edit dial_p2
set phase1name Dialup
set proposal 3des-sha1 aes128sha1
set keepalive enable
next
end
8. Verifying tunnel is Up
Expert
722
Go to VPN > Monitor > IPsec Monitor to verify that the tunnel is Up.
9. Results
From FortiGate 1, Go to Router > Monitor > Routing Monitor and
verify that routes from FortiGate 2 were successfully advertised to
FortiGate 1 via BGP.
From FortiGate 1, go to System > Status to look for CLI Console
widget and type this command to verify BGP neighbors.
723
Expert
Expert
724
This example shows how to create a dynamic IPsec VPN tunnel and allowing OSPF through it.
Expert
725
Create phase 2.
Expert
726
727
Expert
Create phase 2.
Expert
728
729
Expert
8. Verifying tunnel is up
Go to VPN > Monitor > IPsec Monitor
to verify that the tunnel is Up.
9. Results
From FortiGate 1, go to Router >
Monitor > Routing Monitor and verify
that routes from FortiGate 2 were
successfully advertised to FortiGate 1
via OSPF.
From FortiGate 1, go to System > Status get router info ospf neighbor
to look for the CLI Console widget and
OSPF process 0:
type this command to verify OSPF
Neighbor ID Pri State Dead Time Address Interface
neighbors.
172.20.120.25 1 Full/ - 00:00:34 10.10.101.1
dial-up_0
From FortiGate 2, go to Router >
Monitor > Routing Monitor and verify
that routes from FortiGate 1 were
successfully advertised to FortiGate 2
via OSPF.
Expert
730
From FortiGate 2, go to System > Status get router info ospf neighbor
to look for the CLI Console widget and
OSPF process 0:
type this command to verify OSPF
Neighbor ID Pri State Dead Time Address Interface
neighbors.
172.20.120.22 1 Full/ - 00:00:30 10.10.101.2
dial-up-client
731
Expert
This recipe illustrates FortiGate user authentication with FSSO. In this example, user authentication controls
Internet access and applies different security profiles for different users.
Expert
732
Expert
733
734
Expert
Expert
735
736
Expert
Expert
737
738
Expert
9. Results
Have users log on to the domain, go to
the FSSO agent, and select Show
Logon Users.
Expert
739
740
Expert
This recipe demonstrates FortiGate user authentication with FSSO and the use of FortiAuthenticator as an LDAP
server. In this example, user authentication controls Internet access and applies different security profiles for
different users.
Expert
741
Expert
742
743
Expert
Expert
744
745
Expert
Expert
746
747
Expert
Expert
748
749
Expert
7. Results
Have users log on to the domain, go to
the FSSO agent, and select Show
Logon Users.
Expert
750
751
Expert
Expert
752
This recipe demonstrates FortiGate user authentication with the use of a FortiAuthenticator as a Single Sign-On
server. In this example, the FortiAuthenticator is configured to collect the user logon by polling the Domain
Controller logs. User authentication controls Internet access and applies different security profiles for different
users.
Expert
753
Expert
754
755
Expert
Expert
756
757
Expert
Expert
758
759
Expert
The reddotted line showing the VPN tunnel connection between the primary and backup datacenters; in
this case, our two hubs.
The bluedotted line showing the VPN tunnel connection between the primary datacenter and the branch
offices; the spokes in the scenario.
The orangedotted line shows the VPN tunnel connection between the backup datacenter and the branch
offices.
While the topology shown in the diagram can be built using individual static tunnels between each site, this would
not scale well if addition spokes grow to a significant number. There would also be limited support for dynamically
addressed sites. This strategy put forth by this article offers a solution to these issues by using a single phase 1
dialup definition on the hub FortiGates with additional spoke tunnels being added, without any changes to the hubs
beyond that of adding additional user accounts for each additional spoke.
Spoke authentication is maintained by with X-Auth, which keeps the authentication of the individual tunnels
separate in such a way that the use of a Pre-Shared Key alone is insufficient to authenticate a tunnel. A Public
Key Infrastructure can also be used, provided that separate key-pairs are used for each VPN tunnel to maintain
the segregation of the spokes.
The key points of this design are:
l
Expert
Each hub FortiGate is configured with a dialup interface-mode Phase1 using X-Auth.
760
Each spoke has its own user account on the hub FortiGates. In this example, local accounts are used on
each hub, but a RADIUS or LDAP authentication server could be used on the back end, eliminating the
need to managed the accounts on the FortiGates.
Spoke FortiGates are configured to propagate their local subnets using quick mode selectors (specifically,
a source object).
When a new spoke tunnel is connected, the hub FortiGate validates the shared secret along with the XAuth credentials provided by the spoke FortiGate.
Spokes FortiGates can have dynamically assigned IP addresses such as those given out by DSL or cable
ISPs.
The hub FortiGates each insert a reverse route pointing to newly established tunnel interfaces, for any of
the subnets provided by the spoke FortiGate's source quick mode selectors.
Each spoke FortiGate uses configured static routes to direct traffic that needs to go to the datacenter(s)
through the VPN tunnels destined for the hubs. The static route to the backup hub is set to a higher priority
number value, making it the less preferred route. There is also an option where you can send all of your
traffic from the spokes through the VPN tunnel by default. This can be done by configuring the WAN interface to route all traffic through the public IP address of the hub FortiGate. This is what our example configuration is set to do.
We need to aware of any potential points where asymmetrical routing could occur as it relates to traffic
returning to the spokes (This is essentially the response to a request coming back through a different route
than it took to get there). This can be a potential problem especially when communicating to hosts that are
connected to both data centers and we happen to be redistributing spoke routes using a dynamic routing
protocol with hub sites using OSI Layer 3 networking devices. In this case, we would ensure that the
backup hub's redistributed routes are less preferred than the primary hub's routes. In all cases, it is important to have a clear view of the routing flows between each endpoint and to keep "diag debug flow" in our
toolbox to diagnose those potentialasymmetric routing issues. In our example, we would want to route
traffic destined to resources in each respective hub directly to thathub, rather than have it cross the interdatacenter VPN tunnel, and have default routing flow to the primary hub under normal circumstances.
Expert
Expert
762
Aggressive mode: We are using this mode in order to ensure that these dialup spokes are terminated on
the right dialup phase1. If the hub unit has other dialup phase1 (for FortiClient VPN users, for instance), the
hub would otherwise be unable to distinguish between each dialup phase1.Afew of the above configuration
aspects require further explanation:
X-Auth: As previously stated, this allows us to authenticate each connecting spoke unit to a local group,
which is defined in the above configuration as currently containing two user accounts (our example has
twospokes). Provisioning additional spokes on the hub would simply involve adding additional user
accounts.
Policies: As usual, we must always configure policies in order for traffic to flow. IPsecPhase1 follows a
special rule in which tunnels will not even attempt to come up unless they have at least one policy referring
to them (this happens to be a good trick to know when you want to disable an IPsec VPN tunnel without
deleting its configuration).
763
Expert
764
765
Expert
766
Aggressive mode: As the hub is validating the inbound ID, we have configured our peer ID to the matching
string "SPOKES".
X-Auth: Our spokes are acting as X-auth clients, and each of our unit is using distinct credentials passed
to the hub device during IKE phase1 negotiation.
Phase 2 quick mode selectors:As the title of this recipe suggests, this is where the spoke provisioning
routing automation happens. We've defined address objects, added them to a group, and performed the configuration found in Phase2. There is however a peculiarity where if we have more than one subnet behind
our spoke unit, the "set mesh-selector-type subnet" command must be configured to ensure multiple
Phase2 SAs are negotiated for each subnet listed in our group.
Routing: As previously expressed, we have configured our default routing to flow through the primary hub
(blue links) and failover routing to the backup hub (orange links, using route priority adjustment). Notice
that we are explicitly routing each hub's public IP through the public Internet to ensure that traffic will not
flow through the VPN tunnel (and result in flapping).
X-Auth:Our spokes are acting as X-auth clients, and each of our unit is using distinct credentials passed to the hub device during IKE
phase1 negotiation.
Phase 2 quick mode selectors:This is where the spokerouting automation happens. We've defined address objects, added
them to a group, and performed the configuration found in Phase2. There is however a peculiarity where if we have more than one
subnet behind our spoke unit, the followingsetting must be used to ensure multiple Phase2 SAs are negotiated for each subnet listed
in our group:
767
Expert
Routing:This wont necessarily be different between the different spoke FortiGates, but as previously mentioned, in this example
recipe we have configured our default routing to flow through the primary hub and failover routing to the backup hub. Notice that we
are explicitly routing each hub's public IP through the public Internet to ensure that traffic will not flow through the VPN tunnel (and result in flapping).
Results
And this concludes our VPN configuration! But this recipe would not be complete without a very important
verification step. Lets look at the routing table on the hub:
HUB # get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
S* 0.0.0.0/0 [10/0] via 192.168.56.2, port1
S
100.64.254.12/32 [15/0] is directly connected, HUB_0S
100.64.254.13/24 [15/0] is directly connected, HUB_1
C 192.168.11.0/24 is directly connected, port2
S 192.168.12.0/24 [15/0] is directly connected, HUB_0S
192.168.13.0/24 [15/0] is directly connected, HUB_1
C 192.168.56.0/24 is directly connected, port1
As can be seen above, our spoke subnets have been automatically injected into the hub's routing tables. A closer
look at the VPN details of one spoke confirms that the hub received the negotiated subnets during quick mode
negotiation and inserted distinct SAs for each SA.
FGT1 # get vpn ipsec tunnel details
gateway
name: 'HUB_0'
type: route-based
local-gateway: 192.168.56.11:0 (static)
remote-gateway: 192.168.56.12:0 (dynamic)
mode: ike-v1
interface: 'port1' (2)
rx packets: 56 bytes: 8736 errors: 0
tx packets: 41 bytes: 3444 errors: 0
dpd: enabled/negotiated idle: 5000ms retry: 3 count: 0
selectors
name: 'HUB-P2'
auto-negotiate: disable
mode: tunnel
src: 0:0.0.0.0-255.255.255.255:0
dst: 0:192.168.12.0-192.168.12.255:0
--------OUTPUT TRUNCATED-------selectors
name: 'HUB-P2'
auto-negotiate: disable
mode: tunnel
src: 0:0.0.0.0-255.255.255.255:0
dst: 0:100.64.254.12-100.64.254.12:0
Expert
768
--------OUTPUT TRUNCATED-------If you require communication between the spokes, this can be routed through the hub FortiGates. The only change
to the example recipe's configuration is an addition policy on each of the hub FortiGates which defines the both the
Incoming Interface and the Outgoing Interface as the VPN Dialup Interface (in this example, SPOKES)
On the Spoke FortiGates, once the poke tunnels have been established, you can see the default route to the
primary datacenter and the alternate though less preferred route to the backup datacenter by running the
commandget router info routing-table all
FGT-SPOKE-1 # get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
S* 0.0.0.0/0 [10/0] is directly connected,HUB-PRIMARY
[10/0] is
directly connected, HUB-BACKUP, [20/0]
S 100.64.10.2/32 [10/0] is directly connected, port1
S 100.64.11.2/32 [10/0] is directly connected, port1
C 100.64.12.0/24 is directly connected, port1
C 100.64.254.12/32 is directly connected, lo0
C 192.168.12.0/24 is directly connected, port2
We can test the failover function by shutting down the port1 interface on the primary hub. This will bring down the
VPN between the primary hub and the spokes. Once the DPD detects the fault, traffic switches over to the
backup hub as shown here:
FGT-SPOKE-1 # get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
S* 0.0.0.0/0 [10/0] is directly connected,HUB-BACKUP, [20/0]
S 100.64.10.2/32 [10/0] is directly connected, port1
S 100.64.11.2/32 [10/0] is directly connected, port1
C 100.64.12.0/24 is directly connected, port1
C 100.64.254.12/32 is directly connected, lo0C 192.168.12.0/24 is directly
connected, port2
Final notes
l
769
The technique shown here does not involve dynamic routing so this configuration and its very straight forward template can be easily used to scale up the topology to include thousands of spoke sites.
To make it even easier, this configuration can be entirely built and automated with FortiManager, which has
support for provisioning hub-and-spoke dialup topologies.
Expert
Glossary
BGP:
Border Gateway Protocol is primarily used to connect the networks of large organizations that have two or more
ISP connections, or between other autonomous systems. If used in such a situation, a FortiGate can use BGP
for routing.
BYOD:
Bring Your Own Device (also called device management) is the practice of allowing network users to access an
organizations (usually wireless) network with their own computers, smart phones, tablets and other devices.
BYOD has a major impact on networks with large and diverse user bases, such as educational institutions, but
also affects large and small business networks.
CA:
A certificate authority (CA) is an entity that issues digital certificates, which are used to establish secure
connections over a network, typically the Internet. The CA acts as a trusted third-party by verifying the identity of
a certificates owner: for example, the certificate found when you go to https://www.facebook.com is verified as
belonging to Facebook.
Certificates:
In networking, certificates (including public key certificates, digital certificates, and identity certificates) provide
digital signatures for websites or other electronic communication and allow you to verify whether a digital identity
is legitimate.. A FortiGate can use certificates for many things, including SSL inspection and user authentication.
CLI:
The Command Line Interface is a text-based interface used to configure a FortiGate unit. Most steps in the
FortiGate Cookbook use the Graphical User Interface (see GUI), but some configuration options are only
available using the CLI.
DHCP:
Dynamic Host Configuration Protocol is a networking protocol that allows devices to request network
parameters, such as IP addresses, automatically from a DHCP server, reducing the need to assign these
settings manually. A FortiGate can function as a DHCP server for your network and can also receive its own
network parameters from an external DHCP server.
Dial-up/dynamic
VPN:
A dial-up VPN, also called a dynamic VPN, is a type of IPsec VPN where one of the endpoints has a dynamic IP
address.
DMZ:
A Demilitarized Zone is an interface on a FortiGate unit that provides external users with secure access to a
protected subnet on the internal network without giving them access to other parts of the network. This is most
commonly done for subnets containing web servers, which must be accessible from the Internet. The DMZ
interface will only allow traffic that has been explicitly allowed in the FortiGates configuration. FortiGate models
that do not have a DMZ interface can use other interfaces for this purpose.
DNS:
Domain Name System is used by devices connecting to the Internet to locate websites by mapping a domain
name to a websites IP address. For example, a DNS server maps the domain name www.fortinet.com to the IP
address 66.171.121.34. Your FortiGate unit controls which DNS servers the network uses. A FortiGate can also
function as a DNS server.
DSR:
In a typical load balancing scenario, server responses to client requests are routed through a load balancer on
their way back to the client. The load balancer examines the headers of each response and can insert a cookie
before sending the server response on to the client. In a Direct Server Return (DSR) configuration, the server
receiving a client request responds directly to the client IP, bypassing the load balancer. Because the load
balancer only processes incoming requests, load balancing performance is dramatically improved when using
Glossary
770
DSR in high bandwidth applications. In such applications, it is not necessary for the load balancer to receive and
examine the servers responses. So the client makes a request and the server simply streams a large amount of
data to the client.
Dynamic IP
address:
A dynamic IP address is one that can change without the devices user having to do anything. Dynamic IP
addresses allow networks to control the IP addresses of devices that connect to them. This allows you to connect
portable devices to different networks without needing to manually change their IP addresses.
Dynamic IP addresses are set by network protocols, most often DHCP.
ECMP:
Equal Cost Multipath Routing allows next-hop packet forwarding to a single destination to occur over multiple
best paths that have the same value in routing metric calculations. ECMP is used by a FortiGate for a variety of
purposes, including load balancing.
Explicit Proxy:
Explicit proxy is a type of configuration where all clients are configured to allow requests to go through a proxy
server, which is a server used as an intermediary for requests from clients seeking resources from other
servers. When a FortiGate uses explicit proxy, the clients sending traffic are given the IP address and port
number of the proxy server.
FGCP:
FortiAP:
A FortiAP unit is a wireless Access Point that can be managed by a FortiGate. Most FortiAP functions can also
been accomplished using a FortiWiFi unit.
FortiClient:
The FortiClient software provides a variety of features, including antivirus, web filtering, firewall, and parental
controls, to individual computers and mobile devices. It can also be used to connect to a FortiGate using either an
SSL or IPsec VPN.
FortiClient is available for Windows, Mac OSX, iOS, and Android, and can be set up quickly. After being installed,
it automatically updates its virus definition files, does a full system scan once per week, and much more.
FortiClient can be downloaded at www.forticlient.com.
FortiOS:
FortiOS is the operating system used by FortiGate and FortiWiFi units. It is also referred to as firmware.
FTP:
File Transfer Protocol is a standard protocol used to transfer computer files from one host to another host over a
computer network, usually the Internet, using FTP client and server applications.
Gateway:
A gateway is the IP address that traffic is sent to if it needs to reach resources that are not located on the local
subnet. In most FortiGate configurations, a default route using a gateway provided by an Internet service
provider must be set to allow Internet traffic.
GUI:
The Graphical User Interface, also known as the web-based manager, is a graphics-based interface used to
configure a FortiGate unit and is an alternative to using the Command Line Interface (see CLI). You can connect
to the GUI using either a web browser or FortiExplorer. Most steps in the FortiGate Cookbook use the GUI.
HTTP:
Hypertext Transfer Protocol is a protocol used for unencrypted communication over computer networks,
including the Internet, where it is used to access websites. FortiGate units handle more HTTP traffic than any
other protocol.
771
Glossary
HTTPS:
Hypertext Transfer Protocol Secure is a protocol that secures HTTP communications using the Secure Sockets
Layer (SSL) protocol. HTTPS is the most commonly used secure communication protocol on the Internet.
Interfaces:
Interfaces are the points at which communication between two different environments takes place. These points
can be physical, like the Ethernet ports on a FortiGate, or logical, like a VPN portal.
IPaddress:
An Internet Protocol address is a numerical label assigned to each device participating in a computer network
that uses the Internet Protocol for communication. FortiGate units can use IP addresses to filter traffic and
determine whether to allow or deny traffic. Both IP version 4 and IP version 6 (see IPv4 and IPv6) are supported
by your FortiGate.
IPsec:
Internet Protocol Security is used to for securing IP communications by authenticating and encrypting each
packet of a session. A FortiGate primarily uses this protocol to secure virtual private networks (see VPN).
IPv4:
Internet Protocol version 4 is the fourth version of the Internet Protocol (IP), the main protocol used for
communication over the Internet. IPv4 addresses are 32-bit and can be represented in notation by 4 octets of
decimal digits, separated by a period: for example, 172.16.254.1.
IPv6:
Internet Protocol version 6 is the sixth version of the Internet Protocol (IP), the main protocol used for
communication over the Internet (IPv5 never became an official protocol). IPv6 was created in response to the
depletion of available IPv4 addresses. IPv6 addresses are 128-bit and can be represented in notation by 8
octets of hexadecimal digits, separated by a colon: for example, 2001:db8:0000:0000:0000:0000:0000:0000.
IPv6 addresses can be shortened if all the octets are 0000; for example, the previous address can also be
written as 2001:db8::
LAN/internal:
The LAN/internal interface is an interface that some FortiGate models have by default. This interface contains a
number of physical ports that are all treated as a single interface by the FortiGate unit. This allows you to
configure access for the entire Local Area Network at the same time, rather than configuring each port
individually.
LDAP:
Lightweight Directory Access Protocol is a protocol used for accessing and maintaining distributed directory
information services over a network. LDAP servers are commonly used with a FortiGate for user authentication.
MAC address:
A Media Access Control address is a unique identifier assigned to a network interface used for network
communication. A MAC address is assigned to a device by the manufacturer and so this address, unlike an IP
address, is not normally changed. MAC addresses are represented in notation by six groups of two hexadecimal
digits, separated by hyphens or colons: for example, 01:23:45:67:89:ab. Your FortiGate can identify network
devices using MAC addresses.
Multicast:
NAT:
Network Address Translation is a process used to modify, or translate, either the source or destination IP
address or port in a packet header. The primary use for NAT is to allow multiple network devices on a private
network to be represented by a single public IP address when they browse the internet. FortiGate also supports
many other uses for NAT.
Netmask
A netmask, or subnet mask, is the part of an IP address that is used to determine if two addresses are on the
same subnet by allowing any network enabled device, such as a FortiGate, to separate the network address and
the host address. This lets the device determine if the traffic needs to be sent through a gateway to an external
network or if it is being sent to host on the local network.
Glossary
772
Packet:
A packet is a unit of data that is transmitted between communicating devices. A packet contains both the
message being sent and control information, such as the source address (the IP address of the device that sent
the packet) and the destination address (the IP address of the device the packet is being sent to).
Ping:
Ping is a utility used to test whether devices are connected over a IP network and to measure how long it takes
for a reply to be received after the message is sent, using a protocol called Internet Control Message Protocol
(ICMP). If ICMP is enabled on the destination interface, you can ping the IP address of a FortiGate interface to
test connectivity between your computer and the FortiGate. You can also use the CLI command execute ping
to test connectivity between your FortiGate and both internal and external devices.
Ports:
Port numbers:
Port numbers are communication endpoints used to allow network communication. Different ports are used for
different application-specific or process-specific purposes; for example, HTTP protocol commonly uses port 80.
Pre-shared key:
In cryptography, a pre-shared key is a character string (like a password) known by two parties, and used by
those parties to identify each other. Pre-shared keys are commonly used for granting access to IPsec VPNs and
WiFi networks.
Pre-shared keys are different from regular passwords because they are not normally associated with a specific
individuals credentials.
RADIUS:
Remote Authentication Dial In User Service is a protocol that provides centralized Authentication, Authorization,
and Accounting (AAA) management for users that connect and use a network service. RADIUS servers are
commonly used with a FortiGate for user authentication, including single-sign on.
RTSP:
The Real Time Streaming Protocol is a media control protocol that is used for controlling streaming audio and
video streams. RTSP has a wide range of uses and is often leveraged by other media-related services such as
SIP. It most commonly uses TCP and UDP port 554 but additional ports are used by the actual media controlled
by RTSP.
FortiOS includes an RSTP session helper that opens the ports used by individual RTSP-controlled streams.
FortiRecorder and FortiCamera use RTSP for video streaming.
SCTP:
The Stream Control Transmission Protocol is a transport layer protocol (protocol number 132) used most often
for sending telephone signalling messages over carrier IP networks.
Session:
A session is the dialogue between two or more communicating devices that include all messages that pass
between the devices; for example, a session is created when a user browses to a specific website on the Internet
for all communication between the users computer and the web server that hosts the site. Sessions are tracked
by a FortiGate unit in order to create logs about the network traffic.
SIP:
Session Initiation Protocol is used for controlling multimedia communication sessions such as voice and video
calls over Internet Protocol networks. FortiGate units use this protocol for voice over IP (see VoIP).
Site-to-site
VPN:
A site-to-site VPN allows two networks that are each behind a VPN gateway (for example, a FortiGate unit), to
establish secure connections with each other over a public network, typically the Internet.
Site-to-site VPNs most often use IPsec and can be established between two FortiGates, or between a FortiGate
and any other IPsec VPN gateway, such as a Cisco ASA or Microsoft Azure.
773
Glossary
SLAAC:
Stateless Address Autoconfiguration is a feature of IPv6 that allows devices on an IPv6 network to automatically
get IPv6 addresses. SLAAC is similar to DHCP except that DHCP requires you to run and configure a DHCP
server. SLAAC is built into IPv6 and requires only minor additional configuration. SLAAC is defined by RFC
2462.
SNMP:
Simple Network Management Protocol is a protocol that monitors hardware on your network. A FortiGate can
use SNMP to monitor events such as high CPU usage, VPN tunnels going down, or hardware becoming
disconnected.
SSH:
Secure Shell is a protocol used for secure network services between two devices, including remote commandline access. SSH can be used to access a FortiGates command line interface (CLI).
SSID:
A Service Set Identifier is the name that a wireless access point broadcasts to wireless users. Wireless users
select this name to join a wireless network.
SSL:
Secure Sockets Layer is a protocol for encrypting information that is transmitted over a network, including the
Internet. SSL can be used for secure communications to a FortiGate, as well as for encrypting Internet traffic
(see HTTPS) and for allowing remote users to access a network using SSL virtual private network (see VPN).
SSLinspection:
Secure Sockets Layer inspection is used by your FortiGate to scan traffic or communication sessions that use
SSL for encryption, including HTTPS protocol.
SSO:
Single Sign-On is a feature that allows a user to login just once and remembers the credentials to re-use them
automatically if additional authentication is required. A FortiGate supports both Fortinet single sign-on (FSSO)
and single sign-on using a RADIUS server (RSSO).
Static IP
address:
Static IP addresses require user intervention to change. Normally a device that always has a wired connection to
an Ethernet network has a static IP address.
Static route:
A static route is a manually-configured routing entry that is fixed and does not change if the network is changed
or reconfigured.
Subnet:
A subnetwork, or subnet, is a segment of the network that is separated physically by routing network devices
and/or logically by the difference in addressing of the nodes of the subnet from other subnets. Dividing the
network into subnets helps performance by isolating traffic from segments of the network where it doesnt need
to go, and it aids in security by isolating access. The addressing scope of a subnet is defined by its IP address and
subnet mask and its connection to other networks is achieve by the use of gateways.
Subnet Mask:
A subnet mask is the part of an IP address that is used to determine if two addresses are on the same subnet by
allowing any network enabled device, such as a FortiGate, to separate the network address and the host
address. This lets the device determine if the traffic needs to be sent through a gateway to an external network
or if it is being sent to host on the local network.
traceroute
traceroute is a diagnostic tool used to display the route of packets across an IP network and measure transit
delays. traceroute can be useful to troubleshoot a connection and determine where an error is occurring.
Transport layer
protocol
A transport layer protocol provides end-to-end communication on top of the network layer (IP) layer for IP
networks. Using a FortiGate, you can create security policies that control the following transport layer protocols:
TCP (protocol number 6), UDP (protocol number 17), ICMP (protocol number 1), and SCTP (protocol number
132).
Glossary
774
URL:
A Uniform Resource Locator is a text string that refers to a network resource. The most common use for URLs is
on the Internet, where they are also known as web addresses.
URLs are used by a FortiGate to locate websites on the Internet and can also be used in web filtering to block
specific sites from being accessed.
VDOM:
Virtual Domains are used to divide a single FortiGate unit into two or more virtual instances of FortiOS that
function separately and can be managed independently.
VLAN:
Virtual Local Area Networks are used to logically divide a single local area network (LAN) into different parts that
function independently. A FortiGate uses VLANs to provide different levels of access to users connecting to the
same LAN.
VoIP:
Voice over Internet Protocol is a protocol that is used to allow voice communications and multimedia sessions
over Internet Protocol sessions, including the Internet. VoIP protocol is used by a FortiGate when traffic needs to
reach a connected VoIP phone or FortiVoice unit.
VPN:
A Virtual Private Network is a private network that acts as a virtual tunnel across a public network, typically the
Internet, and allows remote users to access resources on a private network. There are two main types of VPNs
that can be configured using a FortiGate unit: IPsec VPN (see IPsec) and SSL VPN (see SSL).
WAN/WAN 1:
The WAN or WAN1 port on your FortiGate unit is the interface that is most commonly used to connect the
FortiGate to a Wide Area Network, typically the Internet. Some FortiGate models have a WAN2 port, which is
commonly used for redundant Internet connections.
775
Glossary
The FortiGate Cookbook contains a variety of step-by-step examples of how to integrate a FortiGate
unit into your network and apply features such as security profiles, wireless networking, and VPN.
Using the FortiGate Cookbook, you can go from idea to execution in simple steps, configuring a
secure network for better productivity with reduced risk.
Written for FortiOS 5.2
Fortinet.com