201 v4-1 Final
201 v4-1 Final
201 v4-1 Final
www.fortinet.com
FortiGate Multi-Threat Security Systems I
Administration, Content Inspection and SSL VPN
Student Guide v4.1 for FortiOS 4.0 MR2
Course 201
01-4200-0201-20100430
© Copyright 2010 Fortinet, Inc. All rights reserved. No part of this publication including text, examples,
diagrams, or illustrations may be reproduced, transmitted, or translated in any form or by any means,
electronic, mechanical, manual, optical, or otherwise, for any purpose, without prior written permission of
Fortinet, Inc.
Trademarks
Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient,
FortiGate, FortiGate Unified Threat Management System, FortiGuard, FortiGuard-Antispam, FortiGuard-
Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager, Fortinet, FortiOS,
FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and FortiWiFi are
trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual companies
and products mentioned herein may be the trademarks of their respective owners.
Contents
Contents
Introduction............................................................................... 1
Course Overview ........................................................................................... 3
Course Objectives ................................................................................... 3
Prerequisites ........................................................................................... 3
Who Should Attend ................................................................................. 3
Certification ............................................................................................. 4
Self-Paced Training Course .................................................................... 4
Course Evaluation (for Self-Paced Training Students) ........................... 4
1
www.fortinet.com
Introduction Course Overview
Course Overview
This course provides an introduction to the configuration and administration of
FortiGate Unified Threat Management (UTM) appliances.
Through a variety of hands-on labs, students will learn about the most common
features of the FortiGate unit.
Students will gain a solid understanding of how to integrate the FortiGate unit into
an existing environment and the operational maintenance involved to ensure
optimal performance and full protection of corporate assets.
Course Objectives
Upon completion of this course, students will be able to:
• Use Web Config and the CLI to complete the following administration and
maintenance tasks for FortiGate devices:
• Configure system and network settings.
• Create administrative accounts.
• Perform system backups.
• Monitor system alerts.
• Verify device performance and operational status.
• Update FortiGuard Subscription Services.
• Manage firmware to ensure availability and reliability.
• Implement logging and monitoring features of the FortiGate device using a
FortiAnalyzer appliance for content archiving.
• Construct firewall policies with schedules, source and service type restrictions,
and unauthorized traffic logging.
• Apply firewall policy options for authentication, virtual IP address, IP pool, and
traffic shaping.
• Enable FortiGate threat management features in policies including antivirus,
email filtering, web filtering, data leak prevention and application control.
• Understand the differences between operating a FortiGate unit in NAT/Route
and Transparent modes.
Prerequisites
The following is required to attend this course:
• Introductory-level network security experience
• Basic understanding of core network security and firewall concepts
Certification
This course helps to prepare students for the following certification exams:
• Fortinet Certified Network Security Associate (FCNSA)
• Fortinet Certified Network Security Professional (FCNSP)
5
www.fortinet.com
Overview and System Setup Unified Threat Management
FortiGate Appliance
The FortiGate unit is a dedicated, easily managed security device that delivers a
full suite of capabilities including:
• Application-level services such as virus protection, email filtering, web content
filtering, data leak prevention, application control, as well as IM, P2P, and VoIP
filtering
• Network-level services such as firewall, intrusion detection, IPSec and SSL
VPN, and traffic shaping
• Management services such as user authentication, logging, reporting,
administration profiles, secure administrative access, and SNMP
The FortiGate relies on the dedicated Fortinet Global Threat Research Team that
researches and develops protection against known and unknown security threats.
This dynamic protection forms the basis of the FortiGuard Subscription Services,
which results in continuous updates for antivirus, intrusion prevention, web
filtering and antispam services.
Branch
SOHO Office Medium Enterprise Large Enterprise Service Provider
5140
5
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
PWRACC
MANAGEMENT MANAGEMENT
E E
T T
H H
O O
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
CONSOLE
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
USB
SYSTEM SYSTEM
CONSOLE CONSOLE
R R
S S
2 2
3 3
2 2
1
1
1
Z Z
R R
E E
0 0
2
Z Z
2
2
2
R R
E E
1 1
Z Z
R R
3
E E
3
3
3
2 2
E2 E1 E2 E1
14 15 14 15
12 13 12 13
4
4
4
10 11 10 11
8 9 8 9
6 7 6 7
4 5 4 5
5
5
5
2 3 2 3
0 1 0 1
ZRE ZRE
6
6
6
CLK OK CLK OK
EXT INT EXT INT
FLT FLT FLT FLT
7
7
7
HOTSWAP HOTSWAP
RESE
T RESE
T
8
8
8
LED MODE LED MODE
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
STA IPM
PSUA
PSUB
USB 1 2 3 4 5 6 7 8
CONSOL
E
USB 1 2 3 4 5 6 7 8
CONSOL
E
-E4
AMC-SW2 AMC-DW2
USB
CONSOL
E AUX 1 2 3 4 5 6 7 8 9 10
Esc Enter
STATUS
POWER
FortiGate 3810A
CONSOLE
PWR
Esc Enter
Hi-Temp
1 3 5 7 9 MODEM USB
2 4 6 8 10
FortiGate 3600A
CONSOLE 1 3 5 7 9 11 13 15 17
FG-AMC-SW
MODEM 2 4 6 8 10 12 14 16 18
FortiGate 3016B
FSM FSM FSM5
FortiGate 1240B
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 ASM USB
FortiGate 1240B
A1 A2
Gigabit performance
FortiGate 800
620B-DC USB CONSOLE
311B STATUS
ALARM
1 POWER HA
FortiGate 311B
Pow
ered
NP2
TUS
STA
ALARM
POW
ER
HA
ASM
CONSOLE
USB
9/10
7/8
5/6
3/4
1/2
FortiGate 310B
Esc Enter
CONSOLE USB
1 2
10/100
3 4 5
10/100/1000
6
Gigabit Ethernet
FortiGate 300A
1 3 5 7 9 11 13 15 17 19 21 23
2 4 6 8 10 12 14 16 18 20 22 24
FortiGate 224B
Integrated logging
CONSO
LE USB INTERNAL DMZ1 DMZ2 WAN1 WAN2
1 2 3 4
Esc Enter
FortiGate 200A
111C
USB CONSOLE
1 2 3 4 5 6 7 8 WAN1 WAN2
FortiGate 111C
USB CONSOLE
1 2 3 4 5 6 7 8 WAN1 WAN2
FortiGate 110C
1 2 3 4
FortiGate 82C
INTERNAL
1 3 5
FortiGate 80C
INTERNAL
1 3 5
FortiWifi 80CM
FortiGate 60B
INTERNAL
1 3 5
FortiWifi 60B
INTERNAL
WAN1 WAN2
LINK / ACT
POWER STATUS HDD
10/100
1 2 3
FortiGate 51B
INTERNAL
WAN1 WAN2
LINK/ ACT
POWER STATUS
10/100
1 2 3
FortiGate 50B
INTERNAL
WAN1
(PoE) WAN2
WLAN LINK/ ACT
POWER STATUS
10/100
1 2 3
FortiWifi 50B
FortiGate 30B
INTERNAL
WAN
WLAN LINK / ACTIVITY
POWER STATUS
10/100
1 2 3 4
30B
FortiWifi 30B
FortiGate Solutions for the Small Office/Home Office (SOHO) and Branch
Office
The FortiGate 30B series, 50B series, 51B, 60B series, 80C series along with the
100C and 111C devices are all-in-one, network-based security solutions designed
to protect smaller deployments from network level and content level threats.
FortiGuard
FortiGuard Subscription Services extend the value of the initial investment in
Fortinet by providing customers with dynamic updates to antivirus, intrusion
prevention, web filtering and email filtering functionality.
FortiGuard Subscription Services are continuously updated by the 24x7x365
Global Threat Research Team possessing in-depth expertise in content and
network level attacks. The FortiGuard network has data centers around the world
located in secure, high-availability locations that automatically deliver updates to
the Fortinet security platforms. With the FortiGuard Subscription Services
enabled, customers can rest assured that their Fortinet security platforms are
performing optimally and protecting their corporate assets with the latest security
technology.
FortiManager
To compliment the FortiGate product line, Fortinet also offers FortiManager
appliances which enable customers to manage all Fortinet products from a
centralized console. It minimizes the administrative effort required to deploy,
configure, and maintain the full range of network protection services provided by
Fortinet products.
FortiAnalyzer
For centralized analysis and reporting, Fortinet offers FortiAnalyzer appliances for
forensics, archiving and graphical reporting functions.
The FortiAnalyzer unit is a dedicated hardware solution that securely aggregates
and analyzes log data from FortiGate security appliances. It provides network
administrators with a comprehensive view of network usage and security
information, supporting the needs of enterprises and service providers
responsible for discovering and addressing vulnerabilities across dispersed
FortiGate systems. FortiAnalyzer appliances minimize the effort required to
monitor and maintain acceptable use policies, to identify attack patterns and
prosecute attackers, and to comply with governmental regulations regarding
privacy and disclosure of security breaches. They accept and process a full range
of log records provided by FortiGate systems, including traffic, event, virus, attack,
content filtering, and email filtering data. FortiAnalyzer devices also provide
advanced security management functions such as quarantine archiving, event
correlation, vulnerability assessments, traffic analysis, and content archiving.
FortiMail
With the worldwide volume of spam now significantly increasing, daily corporate
email servers and users alike are becoming increasingly overwhelmed. Spam
email results in wasted corporate resources and decreased employee
productivity. In addition, increasingly sophisticated content level threats now
commonly use email applications as a mode of attack. This can be illustrated by
the dramatic rise in phishing attacks, signaling a change in strategy for spammers
looking to profit from unsuspecting users.
Fortinet FortiMail is a family of high-performance, multi-layered email security
platforms that remove unwanted spam, provide maximum protection for blended
email-related threats and facilitate regulatory compliance. For complete email
security that includes content archiving and the highest levels of antispam and
antivirus capabilities, Fortinet offers FortiMail specialized email security
appliances. The FortiMail device can provide full messaging server functionality
when configured in Server Mode.
FortiClient
For endpoint security, Fortinet provides FortiClient software, a product that
provides unified endpoint security for desktops, laptops and mobile devices.
PC desktop and laptop devices have allowed users to access enterprise
applications and mission critical data both in the office and on the road.
Unfortunately, these devices are exposed to blended threats such as viruses,
spam, spyware and worms. As well, users accessing inappropriate and
dangerous web content jeopardize device integrity, negatively impact productivity
and violate corporate content access guidelines. While security technologies,
such as antivirus agents, are available to protect devices from certain threats,
such methods fall short from comprehensively protecting against blended threats
and do not enforce content access guidelines.
FortiClient provides unified security agent features for personal computers
including personal firewall, IPSec VPN, antivirus, antispam and web content
filtering. FortiClient's protection agent is powered by FortiGuard Subscription
Services to ensure devices are comprehensibly protected against today's blended
threats.
FortiWeb
FortiWeb devices protect, balance, and accelerate Web applications, databases,
and the information exchanged between them. FortiWeb devices protect web-
based applications, improve the security of confidential information and aid in
legislative and PCI compliance. FortiWeb goes beyond traditional web application
firewalls to provide XML security enforcement, application acceleration, and
server load balancing.
FortiDB
FortiDB devices provide a comprehensive solution to secure databases and
applications such as ERP, CRM, SCM and custom applications, addressing
vulnerability management, Database Activity Monitoring (DAM), data loss
prevention, auditing and compliance as well as change control.
FortiScan
FortiScan devices integrate endpoint vulnerability management, industry and
federal compliance, patch management, remediation, auditing and reporting into a
single, unified appliance. A FortiScan device can be used to identify security
vulnerabilities and finds compliance exposures on hosts, servers and throughout
the network.
FortiSwitch
FortiSwitch devices meet the growing needs of high-speed interconnected
applications driven by server virtualization, data center consolidation, and parallel
and cloud computing applications. With FortiSwitch hardware at the core, network
operators can build wire speed, resilient, scalable, ultra-low latency fabrics with
the simplicity and robustness of standard Ethernet. Multi-path traffic switching and
Dynamic Congestion Avoidance features on the device switch data flows to the
lowest latency path - avoiding congestion while maintaining full Ethernet
compliance.
FortiCarrier
FortiCarrier devices extend the integrated security concept to protect critical
applications across a service provider's IP network. Features such as a GTP
firewall, secure MMS with scanning of all interfaces, and an SIP/IMS signaling
firewall assure service providers of the security, privacy, and quality of service that
are critical to their businesses.
Firewall Basics
Internet
Firewall
The area situated between the Internet and a trusted internal network is often
referred to as a demilitarized zone (DMZ) or perimeter network. Normally, this is
where firewalls are positioned but some larger organizations may also place
firewalls between different parts of their own network that require different levels
of security.
Firewalls control the flow of traffic between two or more networks, allowing good
information through but blocking intrusions, unauthorized users, or malicious
traffic from accessing a network. As network traffic passes through the firewall,
the firewall either allows or denies passage based on a set rules configured on the
device. The rules may be defined by the firewall administrator or the default rules
may apply.
For example, a firewall might permit all traffic of a specified type (such as HTTP)
and deny all other services or requests. Or, it might be configured to deny all
traffic types except incoming (also referred to as ingress) traffic from a specified
network address or address range. Firewalls can enforce an organization’s
security policies by filtering outgoing (also referred to as egress) traffic to ensure
that it complies with usage policies. Incoming traffic is similarly inspected and
matched against the firewall’s policies to allow or deny access, to apply advanced
filtering options and other security settings configured in the policy.
In basic terms, a firewall’s main function is to keep information from leaking out
(for example, confidential business information) and leaking in (for example,
viruses, spyware, or spam).
Depending on the sophistication of the firewall, it can provide rudimentary or
advanced protection.
Entry-level software firewalls for personal computers are widely available or even
built in to the operating system to protect an individual computer when it accesses
an external network. Firewalls designed for businesses can be more extensively
customized in various ways. They can perform more involved operations, such as
filtering spam and spyware, preventing intrusions into the network and allowing
administrators to monitor traffic. High-end enterprise products can also create
virtual private networks, allow management for multiple firewalls, support
sophisticated authentication or access management systems, and allow for load
balancing and failover.
Some common firewall features include:
• Blocking unwanted incoming traffic based on source or destination IP
addresses
• Blocking outgoing network traffic based on source or destination IP addresses.
This can be an advantage for organizations who, for example, may want to
prevent employees from accessing inappropriate web sites from workplace
computers.
• Blocking network traffic based on content.
For example, the firewall can screen network traffic for unacceptable content
such as files that contain viruses or unacceptable spam email.
• Allowing connections to an internal network.
For example, telecommuters and traveling salespeople can use a VPN to
connect to the corporate network.
• Reporting on network traffic and firewall activities.
Administrators might use this reporting information to know what the firewall is
doing, who tried to break into the network, who tried to access inappropriate
material on the Internet and so forth.
• Performing authentication to verify the identity of the users or processes.
By authenticating users, the firewall has additional information it can work with
to filter packets. Identifying the user can permit the firewall to allow the user to
access some services but not others.
Types of Firewalls
Firewalls fall into different categories including:
• Packet filter firewall
• Stateful firewall
• Application layer (or proxy-based) firewall
Stateful Firewall
A stateful firewall is a form of packet filtering that does more than just examine the
headers of a packet to determine source and destination information. It also looks
at the contents of the packet to determine what the state is of each connection
that is created and holds attributes of each connection in a state table in memory,
from the start to the end of the connection. These attributes may include details
such as the IP addresses and ports involved in the connection and the sequence
numbers of the packets passing through the connection. When a packet is
received by the firewall, it will compare the information reported in the packet
header with the state of its associated session stored in memory in the state table.
If the information matches what is in memory, the packet is allowed to pass the
firewall. If the two do not match, the packet is dropped. When stateful filtering is
used, packets are only forwarded if they belong to a connection that has already
been established and tracked in a state table.
Since more intensive checking is performed at the time of setup of the connection,
all packets for that session that are delivered after the initial setup are processed
quickly since they belong to an existing pre-screened session. Once the session
has ended, its entry in the state table is discarded and the ports closed off until a
connection to the specific port is requested. This allows an added layer of
protection from the threat of port scanning.
Stateful firewalls provide added efficiency in terms of packet inspection since they
only need to check the state table, instead of checking the packet against the
firewall's established rule set each time a packet is received.
Dynamic NAT
Dynamic NAT is one form of NAT in which a private IP address is mapped to a
public IP address drawn from a pool of registered public IP addresses. Typically,
the NAT device will maintain a table of registered IP addresses. When a private IP
address requests access to the Internet, the device will choose an IP address
from the table that is not being used at the time by another private IP address.
Dynamic NAT helps to secure a network as it masks the internal configuration of a
private network and makes it difficult for someone outside the network to monitor
individual usage patterns. Another advantage of dynamic NAT is that it allows a
private network to use private IP addresses that are invalid on the Internet but
useful as internal addresses.
This method of mapping an unregistered IP address to a registered IP address on
a one-to-one basis is particularly useful when a device needs to be accessible
from outside the network.
Static NAT
Static NAT is a type of NAT in which a private IP address is mapped to a public,
static IP address, where the public address is always the same IP address. This
allows an internal host, such as a web server, to have an unregistered (private) IP
address and still be reachable over the Internet.
FortiGate Capabilities
FortiGate devices include a comprehensive array of security and networking
capabilities.
Firewall
A FortiGate unit uses firewall policies to dictate whether traffic will be allowed or
denied access to the network. Traffic will not be able to pass through the FortiGate
unit unless it matches the policy rules exactly. The FortiGate unit uses UTM
profiles to dictate which type of content inspection will be performed on traffic
passing though the firewall.
Antivirus
The FortiGate unit uses a combination of techniques to provide real-time
protection against virus attacks, worms and spyware. These techniques include
signature blocking, file recognition, heuristics, IP address checks, and URL
checks and more.
Email Filtering
The FortiGate unit delivers reliable and high performance features to detect, tag,
quarantine, and block spam messages and their malicious attachments, including
IP address checks, checksum checks, banned word check, black/white list,
DNSBL, ORDBL, and more.
Web Filtering
The FortiGate unit, in conjunction with the FortiGuard Web Filtering Service offers
a solution to control access to inappropriate web sites that may expose
businesses to potentially liable material, jeopardize network security and consume
valuable bandwidth. The FortiGuard Web Filtering database is a URL database
with over 60 million rated web sites and 76 web content categories.
Intrusion Prevention
The FortiGate unit can record suspicious traffic in logs, can send alert email to
system administrators, and can log, pass, drop, reset, or clear suspicious packets
or sessions. An organization can create custom signatures to customize the
Intrusion Prevention System on the FortiGate unit for diverse network
environments. The FortiGate Intrusion Prevention System matches network traffic
against patterns contained in attack signatures. Attack signatures reliably protect
the network from known attacks.
The FortiGuard infrastructure ensures the rapid identification of new threats and
the development of new attack signatures.
Application Control
Application Control detects network traffic based on the applications generating
the traffic, for instance, Instant Messaging (IM), Peer-to-Peer (P2P), and VoIP.
Based on FortiGate Intrusion Prevention protocol decoders, application control is
a more user-friendly and powerful way to use Intrusion Protection features to log
and manage the behavior of application traffic passing through the FortiGate unit.
WAN Optimization
The FortiGate WAN optimization can be used to improve performance and
security across a WAN by applying a number of related techniques, including
protocol and application-based data compression and optimization data deduction
(a technique that reduces how often the same data is transmitted across the
WAN), web caching, secure tunneling, and SSL acceleration.
Endpoint Control
Endpoint control can be used to block or monitor applications on the client
computer, including enforcement of the use of FortiClient End Point Security
software. Clients can be monitored to ensure they have both the most recent
version of the FortiClient software and the most up-to-date antivirus signatures. A
database of end point applications to allow, block or monitor is available on the
FortiGate device. Endpoint client computers can also be scanned to help
determine if the computers are vulnerable to attacks.
Virtual Domains
Virtual Domains (VDOMs) enable a FortiGate unit to function as multiple
independent units. A single FortiGate unit can then be flexible enough to serve
multiple departments of an organization, separate organizations or be the basis
for a service provider’s managed security service. VDOMs provide separate
security domains that allow separate zones, user authentication, firewall policies,
routing, and VPN configurations. Using VDOMs can also simplify administration of
complex configurations because administrators do not have to manage as many
routes or firewall policies at one time.
Traffic Shaping
Traffic shaping controls the bandwidth available and the priority of traffic
processed by a firewall policy. Traffic shaping makes it possible to control which
policies have the highest priority when large amounts of data are moving through
the FortiGate device. For example, the policy for the corporate web server might
be given higher priority than the policies for an employee's computer.
Secure VPN
The built-in SSL and IPSec VPN capabilities of the FortiGate unit can ensure the
confidentiality and integrity of data transmitted over the Internet. The FortiGate
unit provides enhanced authentication in addition to encrypting and securing
information sent from a web browser to a web server. Customized SSL VPN web
portal configurations can be created which have a different look and feel, as well
as different types of web portal functionality.
High Availability
FortiGate High Availability (HA) provides a solution for two key requirements of
critical enterprise networking components: enhanced reliability and increased
performance. FortiGate HA is implemented by configuring two or more FortiGate
units to operate as an HA cluster. To the network, the HA cluster appears to
function as a single FortiGate unit, processing network traffic and providing
normal security services such as firewall, VPN, IPS, virus scanning, web filtering,
and spam filtering services.
Logging
A FortiGate unit provides extensive logging capabilities for traffic, system and
network protection functions. Detailed log information and reports provide
historical as well as current analysis of network activity to help identify security
issues and reduce network misuse and abuse.
User Authentication
A FortiGate unit can control access to network resources by defining lists of
authorized users. User authentication can be performed locally on the FortiGate
unit, or through the use of external authentication servers and and digital
certificates. Supported external server types for authentication include: RADIUS,
LDAP, Directory Services, and TACACS+.
CPU
Depending on the model of FortiGate device, a 300 Mhz to 1.8 Ghz Intel
processor is included. Some higher-end models may include dual processors.
DRAM
The FortiGate unit can include from 64MB to 1GB of DRAM.
Flash Memory
The FortiGate unit can include from 32MB to 64MB of flash memory to store
firmware images on the device.
Hard Drive
Some FortiGate devices include a hard drive that can be used for storing logs,
archiving content and quarantines as well as enabling the WAN optimization
mechanisms on certain FortiGate models.
USB Port
A USB port is included on the FortiGate device for use with any FAT16 formatted
USB drive or an external modem.
Wireless
Some FortiGate devices, such as the FortiWifi 30, 50, 60 and 80C are WiFi
enabled and will enable wireless connections between host computers and the
FortGate unit.
PC Card Slot
Some models of FortiGate devices integrate a PC card slot (also called PCMCIA)
for additional expansion using a Type II PC card.
X Power LED: This indicator will display green when the FortiGate unit is powered
on.
Y Status LED: This indicator will flash green when the FortiGate unit is starting up
and will be off when the FortiGate unit is running normally, or when the device is
shut off. The indicator will be red when the modem is in use and connected.
Z Alarm: The Alarm indicator will display red when a major error has occurred and
will display amber when a minor error has occurred.
[ WAN1 and WAN2 interface LED: There are indicators for each of the wan
interfaces on the FortiGate unit. The indicator will display green when the correct
cable is in use, and the connected equipment has power. This indicator will flash
green when there is network activity on the interface and will be off when there is
no link established on the interface.
\ Internal interface LEDs: There are indicators for each internal interface on the
FortiGate unit. The indicator will display green when the correct cable is in use,
and the connected equipment has power. This indicator will flash green when
there is network activity on the interface and will be off when there is no link
established on the interface.
Y Console: This RJ-45 interface connects the FortiGate unit to the management
computer using the supplied DB-9 serial cable.
Z USB: These optional USB connections can be used for a serial modem (serial to
USB adapter required), or for USB drives.
[ Internal: Ethernet cables connect the FortiGate unit to computers on an internal
network. Internal interfaces are MDI/MDIX auto-sensing, therefore, both straight
through and cross-over cables will work.
\ WAN1 and WAN2: A straight-through Ethernet cable connects the wan1 interface
to the Internet (public switch, router or modem). The wan2 connection offers an
optional redundant connection to the Internet.
NAT/Route Mode
NAT/Route Mode is the default configuration on the FortiGate unit. In NAT/Route
Mode, each FortiGate unit is visible to the network that it is connected to. All of its
interfaces are on different subnets. Each interface that is connected to a network
must be configured with a private IP address that is valid for that network.
Internal
192.168.1.99
192.168.1.3
WAN1 Routing policies control
204.23.1.5 traffic between internal
Internet
networks.
Router
DMZ
10.10.10.1
10.10.10.2
An organization would typically use NAT/Route Mode when the FortiGate unit is
deployed as a gateway between private and public networks.
In its default NAT/Route Mode configuration, the unit functions as a firewall.
Firewall policies control communications through the FortiGate unit. No traffic can
pass through the FortiGate unit until firewall policies are put in place to allow
network traffic to pass. In NAT/Route Mode, firewall policies can operate in NAT
Mode or in Route Mode. In NAT Mode, the FortiGate unit performs network
address translation before IP packets are sent to the destination network. In
Route Mode, no translation takes place.
Transparent Mode
In Transparent Mode, the FortiGate unit is invisible to the network. All of its
interfaces are on the same subnet. Configure a management IP address so that
configuration changes can be made. This type of configuration is used when an
organization wishes to make use of the features of the FortiGate without altering
the IP infrastructure of the network.
WAN1
204.23.1.5 10.10.10.2
Internet
Router Internal
Hub or switch
10.10.10.3
Device Administration
Administration tasks on the FortGate unit can be performed from either a
graphical user interface (Web Config) or a command line interface (CLI).
Web Config
Web Config can be used to configure most FortiGate settings and to monitor the
status of the FortiGate unit using HTTP or a secure HTTPS connection from any
computer running a web browser.
Web Config consists of a menu and web pages. When a menu item is selected,
such as System, it expands to reveal a submenu. When one of the submenu
items is selected, the associated page is displayed.
Configuration changes made using Web Config are effective immediately without
resetting the firewall or interrupting service. Once satisfied with a configuration, it
can be backed up. The saved configuration can be restored at any time.
To connect to the Web Config interface, the following are required:
• A computer with an Ethernet connection
• A display monitor with a resolution of at least 1280x1024
• A supported web browser such as Microsoft Internet Explorer (version 8 or
higher) or Firefox (version 3.5 or higher)
• Ethernet cables (Since internal interfaces are MDI/MDIX auto-sensing,
straight-through or crossover cables will work)
System Dashboard
The system dashboard, displayed under System > Dashboard > Status uses
widgets to display important information about the FortiGate device. A default
dashboard displays core widgets. Elements can be moved around on the Status
page and or click Widget to remove, replace or add additional items to the
dashboard.
License Information
The License Information widget displays the current status of service contracts,
versions of antivirus and IPS definitions, available services and more.
CLI Console
The Status tab displays a CLI Console where commands can be entered without
leaving Web Config.
System Resources
The System Resource widget displays the current CPU and memory usage.
Unit Operation
The Unit Operation widget displays which interfaces are currently in use, along
with links to reboot, restart, and reset the FortiGate device.
Top Sessions
Top Sessions displays the IP addresses that have the most sessions open on the
FortiGate unit.
Add Widgets
Click Widget to display the additional dashboard elements.
Add Dashboards
Click Dashboard to add additional dashboard pages or to rename, delete or reset
existing dashboard pages. Once a new dashboard page has been added, widgets
can be added to the web page.
Online Help
Online help can be accessed from anywhere in Web Config by clicking the Online
Help icon.
Searching Help
It is also possible to search the Help index by clicking Show Navigation in the Help
window and clicking the Contents, Index or Search tabs.
The command line prompt changes to the # character once the administrator has
completed a successful login.
Commands
Commands are at the top level of the CLI command structure and indicate an
action that the FortiGate unit should perform on a part of the configuration or host
on the network.
Once logged in as an administrator, type ? at the # prompt to view the available
commands.
Note: The ? character that is typed is not displayed in the command line.
config Configures CLI objects, such as the firewall, the router, and
antivirus protection.
For example: config system admin
get Displays system status information. get can also be used within
a config command to display the settings for that command, or
use get with a full path to display the settings for a particular
object.
For example: get hardware status
show Displays the FortiGate unit configuration. By default, only
changes to the default configuration are displayed. Use show
full-configuration to display the complete configuration.
Use show within a config command to display the configuration
of that command.
For example: show branch
execute Runs static commands to reset the FortiGate unit to factory
defaults or to back up or restore a FortiGate configuration file.
The execute commands are available only from the root level.
For example: execute factoryreset
diagnose Commands in the diagnose branch are used to debug the
operation of the FortiGate unit and to set parameters for
displaying different levels of diagnostic information.
For example: diagnose branch
exit Exits the CLI.
Objects
The next level of the FortiGate CLI command structure is based on configurable
objects. For each of the commands at the top level, there are objects that can be
associated with it. Objects contains tables and/or fields. To view the objects
associated with a command, type the command followed by the ? character.
In this example, all objects related to the config command are displayed.
The objects vary depending on the command that is entered and include the
following:.
application Configures application control.
antivirus Scans services for viruses and grayware, optionally providing
quarantine of infected files
dlp Configures Data Leak Prevention (DLP).
endpoint control Configures parts of the Endpoint NAC feature:
firewall Controls connections between interfaces according to
policies based on IP addresses and type of service, applies
protection profiles
gui Controls preferences for the web-based manager, CLI
console, and topology viewer
imp2p Controls user access to Internet Messaging and Peer-to-
Peer applications
ips Configures the Intrusion Prevention System
log Configures logging
netscan Configures the Endpoint network vulnerability scanner.
report Configures SQL reports.
router Moves packets from one network segment to another
towards a network destination, based on packet headers
spamfilter Filters email based on MIME headers, a banned word list,
email and IP addresses
system Configures options related to the overall operation of the
FortiGate unit, such as interfaces, virtual domains, and
administrators
user Authenticates users to use firewall policies or VPNs
voip Configures VoIP profiles for firewall policies.
vpn Provides Virtual Private Network access through the
FortiGate unit
wanopt Configures FortiGate WAN optimization
web-proxy Configures the FortiGate web proxy.
webfilter Blocks or passes web traffic based on a banned word list,
filter URLs, and FortiGuard-Web category filtering
Objects are containers for more specific lower level items that are each in the form
of a table. For example, the firewall object contains tables of addresses, address
groups, policies and protection profiles. Entries in the table can be added, deleted
or edited. Table entries consist of keywords that can be set to particular values (or
parameters).
Note: There may be other CLI objects that are model-specific and, therefore, only
available on certain FortiGate models.
Tables
The next level of the command structure is the table. The table allows the
modification of an objects’ fields and values. The available tables will be different
depending on the object being modified.
When entering a table, the command prompt changes to identify the table. To exit
a table, enter the end command.
In this example, the administrator is editing the FortiGate unit interface table.
Sub-commands
Sub-commands are command that are available only when nested within the
scope of another command and affect fields and their values.
In this example, the edit sub-command is entered to modify the port field..
Once the desired parameters are set, type end to go back to the table level.
Alternately, to configure other parameters, type next to display the next
parameter.
By default, when end or next is entered, the parameters are written to the
configuration file. These changes are not lost should a system reboot occur.
Modifying the cfg-save parameter can change the behavior so that changes are
not automatically saved. If this option is used, all changes must be saved
manually before exiting the CLI by entering exe cfg save at the root level.
CLI Basics
There are shortcuts and options available to simplify using CLI commands.
Command Help
• Press the question mark (?) key at the command prompt to display a list of the
commands available and a description of each command.
• Type a command followed by a space and press the question mark (?) key to
display a list of the objects available for that command and a description of
each.
• Type a command followed by an object and press the question mark (?) key to
display a list of branches available for that command/object combination, along
with a description of each option.
Command Completion
• Use the tab key or the question mark (?) key to complete commands.
• Press the tab key at any prompt to scroll through the options available for that
prompt.
• Type the first characters of any command and press the tab key or the
question mark (?) key to complete the command or to scroll through the
options that are available at the current cursor position.
• After completing the first word of a command, press the space bar and then the
tab key to scroll through the objects available at the current cursor position.
Recalling Commands
Recall previously entered commands by using the Ç and È arrow keys to scroll
through the commands previously entered.
Editing Commands
Use the Å and Æ keys to move the cursor back and forth in a recalled
command. Use the Backspace and Delete keys and the control keys listed below
to edit the command.
Function Key combination
Beginning of line CTRL+A
End of line CTRL+E
Back one character CTRL+B
Forward one character CTRL+F
Delete current character CTRL+D
Previous command CTRL+P
Next command CTRL+N
Abort the command CTRL+C
Exit the CLI if used at the root prompt CTRL+C
Line Continuation
To break a long command over multiple lines, use a \ character at the end of
each line.
Command Abbreviation
Abbreviate commands, objects, and branches to the smallest number of non-
ambiguous characters. For example, the command get system status can be
abbreviated to g sy st.
IP Address Formats
Enter an IP address and subnet using either dotted decimal or slash-bit format.
For example, type either:
set ip 192.168.1.1 255.255.255.0
or
set ip 192.168.1.1/24
The IP address is displayed in the configuration file in dotted decimal format.
See the FortiGate CLI Reference Guide for more details on using the CLI.
Administrators
Administrators are responsible for the firewall’s configuration and operation. The
system’s factory default configuration has one administrative account called
admin. The admin account has full read/write control of the FortiGate unit’s
configuration. After connecting to Web Config or the CLI, additional administrators
can be configured. Once they are added, administrators are given various levels
of access to different parts of the FortiGate unit configuration using an admin
profile.
Admin Profiles
Admin profiles define the permissions assigned to administrators. Multiple admin
profiles can be created and assigned to administrators to restrict them to specific
tasks.
To view the list of available admin profiles on the FortiGate unit, go to System >
Admin > Admin Profile.
The factory default system administrator account called admin uses an admin
profile called super_admin. This is a special profile which cannot be viewed or
changed. It can, however, be assigned to additional administrative users.
Any administrator assigned to the super_admin profile has full access to the
FortiGate unit configuration in all VDOMs, and in addition, they can:
• Enable VDOM configuration
• Create VDOMs
• Configure VDOMs
• Assign regular administrators to VDOMs
• Configure global options
The default prof_admin profile can also be assigned to any administrator and
allows the same access as the super_admin profile, but is tied to a specific
VDOM. This profile can be edited to remove any permissions that should be
available to the administrator.
To view or modify any other admin profiles in the list (other than super_admin),
select the profile and click Edit ( ) or double-click the entry.
New admin profiles can be defined by clicking Create New ( ) on the Admin
Profile List page. Complete the parameters of the admin profile as needed.
Administrative Users
An identity must be created for each administrative user assigned to the FortiGate
unit. The administrator will log into the FortiGate unit with the credentials defined.
To view the list of available administrators on the FortiGate unit, go to System >
Admin > Administrators.
Admin Settings
Settings related to administrator access are defined in System > Admin >
Settings.
DHCP
The FortiGate unit can operate as a Dynamic Host Configuration Protocol (DHCP)
server to assign IP addresses to PCs on the network. A range of IP addresses is
defined on the FortiGate unit, and are leased to PCs as needed.
The PC must be set to Obtain an IP address automatically to receive the IP
address from the FortiGate device.
A DHCP server called internal is available by default on the FortiGate unit.
Multiple DHCP servers can be created on the FortiGate unit.
To view the list of available DHCP servers on a Fortigate unit, go to System >
DHCP Server > Service.
To view the parameters of the internal DHCP server, select the server and click
Edit ( ) or double-click the entry.
Address Leases
Administrators can view the list of addresses that have been leased to PCs on the
network. Go to System > DHCP Server > Address Leases.
Interface Addressing
One of the first tasks in setting up a FortiGate device to operate in the network is
to configure the network interfaces.
The number of physical interfaces on a FortiGate unit varies per model. On the
FortiGate 51B for example, there are five interfaces. The interfaces are named
wan1, wan2, internal1, internal2 and internal3.
The interfaces on a FortiGate unit can support multiple IP addresses, each with
independent administrative access settings, for example, HTTPS, ping, and SSH.
A FortiGate interface can be configured with a static IP address or acquire its IP
address from a DHCP or PPPoE server.
The FortiGate interfaces can be configured using either Web Config or the CLI
command config system interface.
Administrative access is configured per interface and can include the following
protocols:
• HTTPS
• PING
• HTTP
• SSH
• SNMP
• Telnet
Manual
In Web Config, configure a manual (or static) IP address on the Interface tab in
System > Network. Select Manual as the Addressing mode. The IP address and
subnet information are entered in the IP/Netmask field. Note that an IP address
can only be assigned on the same subnet as the network to which the interface
connects. The same is true for any assigned secondary IP addresses.
DHCP
No configuration information is required on the FortiGate unit for interfaces that
are configured to use DHCP. When DHCP is selected, the FortiGate unit
automatically broadcasts a DHCP request. The interface is configured with the IP
address and optionally the DNS server addresses and default gateway address
that the DHCP server provides.
If Retrieve default gateway from server is selected, the gateway (next hop)
retrieved by the interface will be set as the default gateway for the FortiGate
device. This will override any other configured default gateways.
If Override internal DNS is selected, the DNS servers retrieved by the interface
will become the FortiGate device’s preferred DNS servers. This will override any
DNS entries configured in the system.
PPPoE
If PPPoE is configured for the interface, the FortiGate unit automatically
broadcasts a PPPoE request. PPPoE requires a username and password. In
addition, PPPoE unnumbered configurations require an IP address in the
Unnumbered IP field. If the ISP has assigned a block of IP addresses, use one of
them. Otherwise, this IP address can be the same as another interface or it can be
any IP address.
DNS
Several FortiGate functions make use of DNS, including alert email and URL
blocking. The IP addresses of the DNS servers to which the FortiGate unit
connects must be specified. DNS server IP addresses are usually supplied by the
ISP. Configure SOHO-level FortiGate models to obtain DNS server addresses
automatically. To obtain these addresses automatically, at least one FortiGate
unit interface must use the DHCP or PPPoE addressing mode.
FortiGate SOHO models can provide DNS forwarding on their interfaces. Hosts
on the attached network use the interface IP address as their DNS server. DNS
requests sent to the interface are forwarded to configured DNS server addresses
or ones that the FortiGate unit obtained automatically.
Backups are performed manually by clicking the Backup link in the System
Information widget.
Indicate the location for the backup, either to the hard drive of the management
PC, to a remote FortiManager device or to a USB disk. To protect the contents of
the backup, select the option to encrypt the configuration file and enter a
password to decrypt the file.
If the password used to encrypt the configuration file is forgotten, the configuration
file can no longer be used.
To revert the FortiGate device to the configuration saved in the file, click the
Restore link in the System Information widget.
Locate the configuration file and enter the password if the file was encrypted.
Firmware Upgrades
Firmware upgrades can be applied through Web Config, CLI, or automatically
through the FortiGuard Management Service.
To upgrade the firmware through Web Config or CLI, the firmware file must be
obtained from Fortinet Support.
In Web Config, the firmware file can be applied from the System Information
widget in System > Dashboard > Status.
Click the Update link and mbrowse to the location of the firmware file obtained
from Fortinet.
Alternately, apply the update from System > Maintenance > Firmware.
Disk Usage
An administrator can track the capacity of a FortiGate device hard disk through
System > Maintenance > Disk.
Tasks
In this lab, the following tasks will be completed:
• Exercise 1 Connecting the FortiGate unit
• Exercise 2 Accessing the Command Line Interface (CLI)
• Exercise 3 Accessing FortiGate Web Config
• Exercise 4 Configuring Network Connectivity
• Exercise 5 Exploring the CLI
• Exercise 6 Configuring Global System Settings
• Exercise 7 Configuring Administrative Users
Timing
Estimated time to complete this lab: 55 minutes
Note: In the classroom lab environment, all addresses used are private addresses as
outlined in RFC1918. The wan1 Internet subnet is actually a private address subnet
and cannot be used in a real-world situation.
2 Connect the PC’s network cable into the internal1 interface of the FortiGate
unit and make sure the corresponding INTERNAL LED indicators are green.
The FortiGate unit’s built-in DHCP server will assign addresses to the devices
connected to these ports as required. The factory default subnet assignment of
192.168.1.0/24 will be used.
Note: The internal interface on a FortiGate unit is a multi-port switching hub port with
auto-MDX sensing so either a straight or cross-over cable can be used.
Depending on objects and branches used with this command, there may be
other sub-keywords and additional parameters to enter.
7 Press the Ç key to display the previous get system status command and
try some of the control key sequences that are summarized below.
CTRL+C is context sensitive and in general, aborts the current command and
moves up to the previous command branch level. If already at the root branch
level, CTRL+C will force a logout of the current session and another login will
be required.
8 Type the following command and press the <tab> key 2 or 3 times.
execute <tab>
The command displays the list of available system utility commands one at a
time each time the <tab> key is pressed.
Note: Log back into the CLI if the admin login timeout has elapsed.
9 Type the following command to see the entire list of execute commands:
execute ?
10 Enter the following CLI commands and compare the available keywords for
each one:
config ?
show ?
These two commands are closely related.
config begins the configuration mode while show displays the
configuration. The only difference is show full-configuration. The
default behavior of the show command is to only display the differences from
the factory-default configuration.
11 Enter the following CLI commands to display the FortiGate unit’s internal
interface configuration settings and compare the output for each of them:
show system interface internal
show full-configuration system interface internal
Only the characters shown in bold type face need to be typed, optionally
followed by <tab>, to complete the command key word. Use this technique to
reduce the number of keystrokes to enter information. CLI commands can be
entered in an abbreviated form as long as enough characters are entered to
ensure the uniqueness of the command keyword.
Note: At the --More-- prompt in the CLI, press the spacebar to continue scrolling or
<enter> to scroll one line at a time. Press <q> to exit.
12 Enter the CLI command below to display the factory set IP address of the
FortiGate’s internal interface.
show system interface internal
The internal interface’s IP address is 192.168.1.99. This address will be
used later for HTTP administrative access to the FortiGate device.
Caution: If using a personal laptop or PC for the following exercise, make sure to
record the original PC network settings before proceeding.
Other system details found on the Dashboard include the current CPU and
memory usage, number of active sessions, alert messages, number of
administrative users, and FortiGuard Services status.
6 To avoid Web Config timeouts during the lab exercises, increase the idle
timeout. Go to System > Admin > Settings. Increase the Idle Timeout to 60
minutes.
Leave all other settings unchanged.
Click Apply to save the changes.
7 Before proceeding to the next exercise, ensure that the FortiGate unit is
running the correct version of FortiOS firmware (FortiOS version 4.0 MR2).
Note: If are not running the correct version, click Update for Firmware version on the
Dashboard and browse to the firmware file available from the Fortinet Support site with
a valid service contract.
Click OK.
2 Wait a few seconds for the wan1 interface to acquire an address from the
ISP’s DHCP server before continuing.
Note: Configuration changes get saved to the non-volatile flash memory when clicking
OK in Web Config or when next or end is entered on the CLI. No explicit save
command is required.
For CLI configuration only, this behavior can be changed to require an explicit save or
to revert after a set period if an explicit save is not performed.
config system global
set cfg-save <automatic/manual/revert>
set cfg-revert-timeout <600> (in seconds, only when cfg-save is revert)
3 After a few seconds, the acquired DHCP address assignment will be displayed
in the IP/Netmask column on the Interface page.
Continue at step 4.
Click Apply.
2 Click the Options tab to open Networking Options. In the Primary DNS Server
field, enter the IP address of the DNS server given by the network
administrator.
If a second DNS server is available, enter its IP address in the Secondary DNS
Server field.
Click OK.
3 Go to the Router > Static > Static Route and click Create New to define a new
static route entry for the default gateway.
In the New Static Route window, leave the Destination/IP Mask settings at the
default setting 0.0.0.0/0.0.0.0.
Select the the wan1 device from the list and enter the IP address for Gateway
as the default gateway device as provided by a network administrator.
Leave the distance to the default of 10.
Click OK.
Continue at step 4.
Click OK.
2 Go to System > Network > Options. In the Primary DNS Server field, enter the
IP address of the DNS Server as provided by a network administrator.
If a second DNS server is available, enter its IP address in the Secondary DNS
Server field.
Leave the Dead Gateway Detection values at their default.
Click Apply.
3 Go to the Router > Static > Static Route tab to configure a new static route
entry for the default gateway.
In the New Static Route window, leave the Destination/IP Mask settings at the
default setting 0.0.0.0/0.0.0.0.
Select the the wan1 device from the list and enter the IP address for Gateway
as the default gateway device as provided by a network administrator.
Leave the distance to the default of 10.
Click OK.
Continue at step 4.
Note: Depending on how long it has been since the last command has been entered in
the CLI, another login may be required.
Note: The DHCP leases are preserved even when the FortiGate unit is re-booted. To
clear all DHCP leases, disable and then re-enable the specific DHCP server.
Note: The set command is not additive. The existing parameters must be re-entered
along with the new parameter being added.
Click Apply.
Note: For FortiGate 200A models and higher, the Primary DNS and Secondary DNS
servers can only be configured manually. The factory defaults are set to Fortinet-
maintained DNS forwarders 208.91.112.53 and 208.91.112.52 respectively.
Administrator admin1
Type Regular
Password fortinet
Trusted Host #1 192.168.1.0/24
Admin Profile super_admin
Note: Ping requests to this device are also restricted by the trusted host setting of the
administrator account.
5 Go to System > Admin > Admin Profile. Click Create New to define a new
admin profile called content-control as in the New Admin Profile window
illustrated below. Limiting access only to the areas affecting content inspection
helps to eliminate accidental errors that could adversely affect connectivity.
Click OK.
6 Go to System > Admin > Administrators and create a new administrative
account that uses the new content-control admin profile. Configure the new
administrator account using the following settings:
Administrator cadmin
Type Regular
Password 123456
Trusted Host #1 192.168.1.0/24
Admin Profile content-control
Click OK.
7 To view the CLI configuration for administrative users and profiles, type the
following commands:
show system admin
show system accprofile
8 Test the new administrative access login by logging out of the current Web
Config session and logging in again as the new cadmin user.
Try to access areas set to read only, for example, go to System > Network >
Interface. The data will be able to be viewed but not edited.
The Trusted Host setting configured for admin1 and cadmin will only allow
access to PCs connected to the internal 192.168.1.0/24 subnet even if the
correct password is entered.
79
www.fortinet.com
Logging and Alerts Logging Levels
Logging Levels
All log messages have severity or priority levels. The administrator should define
at what severity level the FortiGate unit will record logs when the logging location
is configured. All messages at and above the minimum log level selected will be
logged, for example, if the Error level is selected, the unit logs for Error, Critical,
Alert, and Emergency level messages.
In the following example of a log message, the priority level is notification. This
indicates the occurrence of a normal event, which in this example indicates that
the admin user has added a new firewall policy.
2007-01-11 14:23:37 log_id=0104032126 type=event
subtype=admin pri=notification vd=root user=admin
ui=GUI(192.168.96.1) seq=3 msg="User admin added new
firewall policy 3 from GUI(192.168.96.1)"
The minimum logging levels is selected from the drop down list for each enabled
log type.
Emergency
Event logs, specifically administrative events, can generate an emergency
severity level. This level indicates the system has become unstable.
Alert
Attack logs are the only logs that generate an alert severity level. This level
indicates that immediate action is required.
Critical
This level is generated by event, antivirus, and spam filter logs and indicates that
functionality is affected.
Error
This level is generated by event and spam filter logs and indicates that an error
condition exists and functionality could be affected.
Warning
This level is generated by event and antivirus logs and indicates that functionality
could be affected.
Notification
This level is generated by traffic and web filter logs and indicates information
about normal events.
Information
This level is generated by content archive, event, and spam filter logs and
indicates general information about system operations.
Debug
This level is primarily used as a technical or customer support function on an as-
directed basis only.
Log Storage
FortiGate logs can be stored in various locations depending on the type and
frequency of the logs to save.
FortiGate logs can be stored in the following locations:
• System memory
• Local hard disk
• Syslog
• FortiGuard Analysis Service
• FortiAnalyzer appliance
Local Logging
Local logs are stored and viewed on the FortiGate device. Local logs are
displayed under Log&Report > Log Access. Select the log type to be viewed.
Local logs can also be read from the CLI using the execute log display
command if a log filter has been defined.
Memory
When logging to memory is enabled, recent log entries are stored for most log
types except for Traffic and Content, mainly due to their frequency and large file
size. When the system has reached its capacity for log messages, the FortiGate
unit overwrites the oldest messages.
The logging level required can be selected from the Minimum log level list.
IPS Packet Archives can be enabled for memory logs.
Memory logs can be backed up to an FTP server using the execute backup
command.
Memory is volatile, that is, if the FortiGate unit is reset or loses power, log entries
captured to memory will be lost.
Disk
If the FortiGate unit includes a hard disk, logging to that disk can be enabled. All
log types are supported when logging to hard disk except for Content logs.
The logging level required can be selected from the Minimum log level list.
Log rolling settings can identify when information will be written to a new log file,
either when a maximum size is reached or at a scheduled time.
The administrator should specify how the FortiGate unit handles new logs when
the hard disk becomes full. In this case, the older logs can be overwritten, or the
device can stop logging information altogether.
DLP Archive can be enabled when logging to the hard disk. The archiving of
information is triggered by Data Leak Prevention sensors. Content archiving
provides a method of simultaneously logging and archiving copies of content
transmitted over the network, such as email and web pages. Content logs include
information such as the senders, recipients, and the content of messages and
files. If full content archiving is enabled, FortiGate units can also archive a copy of
the associated file or message with the content log message. If the DLP sensor is
configured to archive data when triggered and DLP Archive is enabled on the
FortiGate, information will be archived to the local hard disk on the FortiGate unit.
IPS Packet Archives can be enabled for memory logs.
SQL Logging is enabled by selecting the log type from the list.
Remote Logging
Remote logs include information forwarded from the FortiGate unit to an external
storage mechanism.
Syslog
A Syslog server is a remote computer running software used to collect log
messages forwarded over an IP network. Administrators commonly use Syslog
servers for logging purposes because computers on a variety of operating
systems can run Syslog software, including Linux, Unix, and Windows systems.
The IP address or FQDN of the Syslog server must be identified where the
information is to be forwarded. Usually, communication with the Syslog server
takes place on port 514 but any port number can be used.
The logging level required can be selected from the Minimum log level list.
The Facility value is used as a way of determining which process of the computer
created the machine and can be used to distinguish between different classes of
syslog messages. On the FortiGate unit, the Facility can be used to identify the
source of the log message. The FortiGate reports the Facility at a default value of
local7, but any value can be selected from the list.
When logging to a Syslog server there are two different log file formats available,
either Comma Separated Values (CSV) or normal. The CSV format contains
commas, whereas the normal format contains spaces.
FortiAnalyzer
A FortiGate unit can be configured to send log messages to a FortiAnalyzer
device on the local network or over the Internet. FortiAnalyzer units are network
appliances that provide integrated log collection, analysis tools, and data storage.
The IP Address of the FortiAnalyzer device must be identified. Click Test
Connectivity to ensure that a connection to the FortiAnalyzer device is available.
To conserve bandwidth over the network, FortiGate units equipped with a hard
drive can buffer log information locally and upload to the FortiAnalyzer device at a
scheduled time. Enable Buffer to hard disk and upload and set the time for the
transfer.
IPS Packet Archives can be enabled for FortiAnalyzer logs.
The administrator should specify how the FortiGate unit handles new logs when
the hard disk on the FortiAnalyzer becomes full. In this case, the older logs can be
overwritten, or the device can stop logging information altogether.
Log Types
A FortiGate system can log a wide range of system activity including overall
network traffic, attack incidents, and general system events.
Event Log
The Event Log records management and activity events including configuration
changes, admin logins, or high availability and VPN events.
Traffic Log
The Traffic log records any traffic between a source and destination interface.
These interfaces must be correctly classified in the FortiAnalyzer device so that it
can identify if the session is incoming or outgoing, internal or external.
Traffic logs are only generated when the session table entry expires. This is
because the log message also includes the amount of data sent and received.
This is not the case for violation traffic as no session entry is created and a log
message is generated immediately indicating 0 bytes were transmitted and
received.
Note: Any denied traffic on a FortiGate device is implicit and not logged. Therefore, to
log violation traffic, a deny and log rule is required. Also, in order to log connections to
closed ports, set the global variable set loglocaldeny enable.
Attack Log
The Attack log records attacks that are detected and prevented by the FortiGate
unit. The FortiGate unit will log attack signatures and attack anomalies. Packet
logging can also be enabled through the IPS settings (CLI or Web Config). This
feature provides administrators with the ability to analyze packets for forensics
and false positive detection.
AntiVirus Log
The Antivirus log records virus incidents within the proxies. For example, when the
FortiGate unit detects an infected file, blocks a file type, or blocks an oversized file
or email.
DLP Log
The Data Leak Prevention log records data that matches pre-defined sensitive
patterns as it passes through the FortiGate unit. The data patterns can also be
blocked.
Generating Logs
Depending on the information required to record, logging can be enabled in
various locations in Web Config including:
• UTM profiles and sensors
• Event log
• Firewall policy
Event Log
FortiGate unit events to be logged are enabled from the Event Log list.
If the CLI is used to disable certain event logs for a destination, the Event Log
option display check boxes are greyed out.
Firewall Policy
Traffic logging can be enabled for individual firewall policies. Logging traffic per
firewall policy is more granular and better suited for troubleshooting.
Formatted View
Formatted View presents logs information in a columnar format. Column Settings
allows the log information columns that are displayed to be added or removed (for
example, Date, Time, Source etc.).
Filters allow only the log messages that fit a specified filter criteria to be viewed.
For example, to view all log messages for a specific date range, the Date filter can
be used.
Select the log type from the Log&Report > Log Access menu including:
• Application Control
• DLP
• Email Filter
• Attack
• Web Filter
• Antivirus
• Event
• Traffic
• Network Scan
Columns can be added or removed from the the log display by clicking Column
Settings ( ).
Select the fields to be displayed from the Available fields list and click Æ to move
the field to the Show list. Click Move Up and Move Down to change the order of
the fields in the list. Fields will be displayed in Formatted View in the order they
are shown in the list.
To remove a field from the columns displayed, select it in the Show list and click
Å to move it back to the Available fields list
In addition, filters can be used to display only the log messages that fit a specified
filter criteria. For example, to view all log messages for a specific date range, use
the Date filter. Click Filter ( ) to edit the filters for the column.
Raw View
When log messages display in raw view, the log message displays as it is saved
in the log file.
The Syslog protocol (UDP port 514) is used by default by the FortiGate unit to
transport log messages to the FortiAnalyzer unit. TCP port 514 (OFTP) is used to
transfer the content archive and to remotely view the log files and reports.
If logging data is traversing a public network, an IPSec tunnel can be used to
secure the communication between the FortiGate and the FortiAnalyzer devices.
The FortiGate unit can send all log message types, as well as quarantine files, to
a FortiAnalyzer unit for storage. Log files stored on a FortiAnalyzer unit can also
be uploaded to an FTP server for archival purposes.
The transfer of log data between the FortiGate unit and the FortiAnalyzer can be
secured using IPSec.
The Secure column the in Device List identifies when secure connections are
enabled. If secure connections are enabled, the closed lock ( ) will appear,
however, the FortiAnalyzer unit cannot create a secure tunnel without being
configured first.
Secure connections are enabled and configured between the FortiAnalyzer unit
and the device(s) being monitored though the CLI. The secure tunnel must be
configured on both ends of the tunnel including the FortiAnalyzer unit and the
device.
Secure connections cannot be configured with FortiMail units, FortiClient
installations, or syslog devices.
Device Registration
The FortiAnalyzer device list can display both registered and unregistered
devices. Depending on the settings in Unregistered Device Options, the
FortiAnalyzer unit handles connection attempts from unregistered or
unrecognized devices in one of these ways:
• Ignore the connection and only allow connections from manually added
devices.
• Allow the connection, add as an unregistered device, but do not keep the
device’s log data. This option will add devices automatically, but will not keep
data until manually registered.
• If the device is an unknown type, allow the connection, add as an unregistered
device, and keep a specified amount of the device’s log data.
• If the device is a known type, allow the connection, and add as a registered
device and keep a specified amount of the device’s log data.
Manually adding a device to the device list configures connections from the device
but does not automatically establish a connection. The device must be configured
to send traffic to the FortiAnalyzer unit to establish a connection.
A device will not be able to use most of the FortiAnalyzer unit’s features until the
device is registered, either manually or automatically.
Historical
The Historical tab displays all log messages for the selected log type whose time
stamps are within the specified time frame.
Select the devices to be displayed in the log list from the Show list. Select the
Timeframe for the list to be displayed, either Anytime, Last 1 Hour, Last 1 Day,
Last 7 days, or Last Month.
Select the columns be displayed by clicking Column Settings. Identify the columns
to display in the list by selecting the column and moving it from the Available
Fields list to the Display Fields list.
Real-time
An up-to-the-minute display of the log messages received by the FortiAnalyzer
unit can be displayed by clicking Realtime Log ( ) . The display refreshes every
few seconds, and contains only the most current entries.
Display Options
Click the Display Options link at the bottom of the window to to choose either Raw
or Formatted view or to resolve host names and services.
Raw View
Raw view displays log messages exactly as they appear in the log file.
Formatted view
Formatted view displays log messages in a columnar format. Each log field in a
log message appears in its own column, aligned with the same field in other log
messages, for rapid visual comparison. When displaying log messages in
formatted view, the log view can be customized by hiding, displaying and
arranging columns and/or by filtering columns, refining the view to include only
those log messages and fields that are required for display. If log messages are
displayed in formatted view, the log messages can be displayed and arranged
and/or filtered by column contents.
When viewing log messages in formatted view, columns can be filtered to display
only those log messages that do or do not contain the specified content in that
column. By default, most column headings contain a gray filter icon, which
becomes green when a filter is configured and enabled. When viewing real-time
logs, the time column cannot be filtered on (by definition of the real-time aspect,
only current logs are displayed).
A device’s log files can be imported. This can be useful when restoring data or
loading log data for temporary use. For example, if older log files from a device
are available, these logs can be imported into the FortiAnalyzer unit in order to
generate reports on older data. Logs can be imported in normal log, compressed
log (.log.gz) or comma separated value format.
In addition, a log file can be downloaded to save it as a backup or for use outside
the FortiAnalyzer unit. The download consists of either the entire log file, or a
partial log file, as selected by the current log view filter settings.
Quick Search
Quick Search finds results more quickly if the search terms are relatively simple
and only need to search indexed log fields. Indexed log fields are those that
appear with a filter icon when browsing the logs in column view; unindexed log
fields do not contain a filter icon for the column or do not appear in column view,
but do appear in the raw log view. Quick Search keywords cannot contain special
characters such as single (‘) quotes, double quotes (“), question marks (?), wild
card characters (*), or only contain a wild card as the last character of a keyword
(logi*)
Quick Searches can be perfomed quickly by entering the search value in the
search field on the Log Display page..
Quick Searches can also be performed by clicking Advanced Search, entering the
criteria as needed and clicking Quick Search.
Full Search
Full Search can be used if the search terms are more complex, and require the
use of special characters, regular expressions or log fields not supported by Quick
Search. Full Search performs an exhaustive search of all log fields, both indexed
and unindexed, but is often slower than Quick Search.
Content Archiving
Content archiving provides a method of simultaneously logging and archiving
copies of content transmitted over the network, such as email and web pages.
Content logs include information such as the senders, recipients, and the content
of messages and files. If full content archiving is enabled, FortiGate units can also
archive a copy of the associated file or message with the content log message.
Content archive data is needed to generate many of the reports available on the
FortiAnalyzer device. Content archiving may also be required by corporate policy
and/or to ensure regulatory compliance.
Both FortiGate content archive logs and their associated copies of files or
messages can be stored and viewed remotely on a FortiAnalyzer unit, leveraging
its large storage capacity for large media files that can be common with
multimedia content. When content archives are received by the FortiAnalyzer unit,
data filtering similar to other log files can be used to track and locate specific email
or instant messages, or to examine the contents of archived files.
Summary content archives are those which contain only a log message consisting
of summary metadata. Full content archives are those which contain both the
summary and a hyperlink to the associated archived file or message. For
example, if the FortiAnalyzer unit has a full content archive for an email message,
the Subject log field of email content archives contains a link that enables that
email message to be viewed. If the FortiAnalyzer unit has only a content archive
summary, the Subject field does not contain a link.
Whether or not each content archive will be full or summary varies by whether the
device is configured to send full content archives, whether the content satisfies
content archiving requirements, and whether the FortiAnalyzer unit has the copy
of the file or message associated with the summary log message.
Content archiving is enabled through DLP rules. Rules are added to DLP sensor
which are then applied within a protection profile. Content meta-information for
HTTP, HTTPS, FTP, IMAP, POP3, SMTP, and IM traffic can be displayed on the
System Dashboard or the full content archive to a FortiAnalyzer device.
At least one of the threat management functions, such as antivirus scanning, web
filtering, and spam filtering for the relevant protocol should be enabled to use the
full content archiving features for that protocol.
Alert Email
Alert Emails enable the FortiGate unit to send notifications to an email address
upon detection of a message meeting a defined event type or security level.
For example, an alert email can be configured to send notifications for critical
events such as an HA member leaving the cluster.
The FortiGate unit uses the SMTP server name to connect to the mail server.
When configuring alert email, configure at least one DNS server. Up to three
recipients can be specified per mail server and the email body is base64 encoded.
SNMP
Simple Network Management Protocol (SNMP) enables administrators to manage
hardware on a network including servers, workstations, routers, switches, and
other network devices. An SNMP-managed network is made up of three main
components: managed devices, agents, and SNMP managers. Configure the
hardware or FortiGate SNMP agent to report system information and to send
traps (alarms or event messages) to SNMP managers. An SNMP manager is a
computer running an application that can read the incoming traps from the agent
and track the information. Using an SNMP manager, access SNMP traps and
data from any FortiGate interface configured for SNMP management access.
The FortiGate SNMP implementation is read-only. SNMP v1 and v2c compliant
SNMP managers have read-only access to FortiGate system information and can
receive FortiGate traps. To monitor FortiGate system information and receive
FortiGate traps, compile the Fortinet proprietary Management Interface Bases
(MIBs), as well as Fortinet supported standard MIBs (available from the Fortinet
Support site) into an SNMP manager.
SNMP is configured through System > Config > SNMP v1/v2c. Enable the SNMP
agent option and enter information for the Description, Location, and Contact.
SNMP Communities
Add SNMP communities so that SNMP managers can connect to the FortiGate
unit to view system information and receive SNMP traps. SNMP communities can
be configured to have different SNMP queries and traps and they can be
configured to monitor the FortiGate unit for different sets of SNMP events. Up to
eight SNMP managers per community can be added.
SNMP Traps
The FortiGate agent can send traps to SNMP managers added to SNMP
communities. To receive traps, load and compile the Fortinet 3.0 MIB into the
SNMP manager.
All traps include the trap message, as well as the FortiGate unit serial number and
hostname. Available traps include:
• CPU overusage
• Memory low
• Log disk space low
• HA cluster status changed
• HA heartbeat failure
• HA member up
• HA member down
• Interface IP changed
• Virus detected
• Oversize file/email detected
• Fragmented email detected
• IPS Signature
• IPS Anomaly
• VPN tunnel up
• VPN tunnel down
• FortiAnalyzer disconnection
Reporting
Reports provide an easy way to analyze and view the information from logs. A
report is a collection of log information which is then displayed in the report in the
form of text, graphs and tables. An administrator can create reports based on log
information that has been accumulated over a period of time.
Reports are only available logging to a FortiAnalyzer device.
FortiAnalyzer reports provide flexible options, offering a choice to compile a report
layout based on variables (which can be reused) or based on specific information.
Logs are the basis of all FortiAnalyzer reports. Logs must be collected or
uploaded before a report can be generated. Reports cannot be created for
devices that are of an unknown type, such as generic Syslog devices, nor for
devices that are not registered with the FortiAnalyzer unit.
After logs are collected or uploaded, the report can be defined.
Report Layout
In FortiAnalyzer Web Config, go to Report > Config > Report to configure and
define layout of the report.
Click Add to select components, such as charts or graphics that are to be included
on the report.
Tasks
In this lab, you will complete the following tasks:
• Exercise 1 Exploring Web Config Monitoring
• Exercise 2 Configuring System Event Logging
• Exercise 3 Exploring the FortiAnalyzer Interface
• Exercise 4 Configuring Email Alerts (Optional)
Timing
Estimated time to complete this lab: 35 minutes
4 A pop-up window appears showing a trace of past CPU usage, memory usage,
session, network utilization, virus, and intrusion history.
In the System Resource History graph window, the time interval represented
by each horizontal grid square can be selected from the pull-down menu to the
right of Time Interval. The refresh rate of this window is automatically set to
1/20th of the time interval.
Click Close.
5 The Alert Message Console widget displays recent critical system events, such
as system restart and firmware upgrade.
Hover over the Alert Message Console title bar and click the History icon to
view a pop-up window that displays the entire message list.
Click Close.
6 Log and DLP archive statistics are shown in the Log and Archive Statistics
widget. Since there will have been little or no traffic through the FortiGate unit
and no content inspection configured, the DLP Archive and Log statistics will
be uninteresting at this time.
The Reset link in the top-right of the Statistics box will clear the current
statistics counts.
Click Apply.
For initial testing purposes, the log level is set to the lowest and most verbose
level, Information. In actual deployments, the level would more likely be set to
Warning or Notification.
Automatic discovery of a FortiAnalyzer unit with the Fortinet Discovery
Protocol is only applicable when the FortiGate unit and the FortiAnalyzer unit
are on the same broadcast domain (subnet). This would be a rare situation in
an actual network but appropriate for a FortiGate 5000 series chassis when a
FortiAnalyzer blade is used.
2 In Remote Logging & Archiving, click Test Connectivity to register with the
FortiAnalyzer device. A pop-up window displays to indicate a successful
connection and registration process.
The FortiAnalyzer unit being used is configured to automatically accept and
register all new FortiGate device connections. Alternate settings are to register
only (and ignore logging messages) or ignore (manual registration).
In an actual scenario, there would be additional configuration required at the
FortiAnalyzer end to permit the necessary connection for manual device
registration.
Click Close to exit from the FortiAnalyzer Connection Summary window.
3 While still in the Log Settings window, expand Local Logging & Archiving and
confirm that Disk logging is enabled and that the Minimum log level is set to
Information. If using a FortiGate device without a local hard drive, enable
Memory logging instead.
4 On the Log&Report > Log Config > Event Log page, click Enable and select all
events.
Click Apply to save the changes.
The CLI settings for the logging destinations can be displayed with the
following commands:
get log <destination> setting
get log <destination> filter
Substitute <destination> with either fortianalyzer, disk or
memory.
Note: There are different logging capabilities, depending on the destination. The
keywords may also differ.
5 Test the logging setup with some simulated log messages sent to the logging
destinations using the following CLI command:
diagnose log test
6 Go to Log&Report > Log Access. Select each log type from the Log Access
menu item one at a time. Click Disk from the Log Access pages to view the
entries for the test messages.
Note: Depending on the location of class, the instructor may direct students to a
FortiAnalyzer unit at a different address.
Note: If the FortiGate unit collects more than one log message before an interval is
reached, it combines the messages and sends out one alert email.
123
www.fortinet.com
Firewall Policies
Policy Matching
When the FortiGate unit receives a connection attempt on an interface, it selects a
policy list to search through for a policy that matches the connection attempt. The
FortiGate unit chooses the policy list based on the source and destination
addresses of the connection attempt.
The FortiGate unit starts at the top of the selected policy list and searches down
the list for the first policy that matches the connection attempt source and
destination addresses, service port, and time and date at which the connection
attempt was received. The first policy that matches is applied to the connection
attempt. If no policy matches, the connection is dropped. Arrange policies in the
policy list from more specific to more general. For example, the default policy is a
very general policy because it matches all connection attempts. Exceptions to that
policy are added to the policy list above the default policy. No policy below the
default policy will ever be matched.
General policies are policies that can accept connections from multiple source
and destination addresses or from address ranges. General policies can also
accept connections from multiple service ports or have schedules that mean the
policy can be matched over a wide range of times and dates. Policies that are
exceptions to general policies should be added to the policy list above the general
policies. For example, a general policy may allow all users on the internal network
to access all services on the Internet. To block access to specific services, such
as FTP servers on the Internet, add a policy that denies FTP connections above
the general policy. The deny policy blocks FTP connections. Connection attempts
for all other kinds of services do not match the FTP policy but do match the
general policy. Therefore, the firewall still accepts all connections from the internal
network to the Internet other than FTP connections.
If virtual domains are enabled on the FortiGate unit, firewall policies are
configured separately for each virtual domain.
Section View
Selecting Section View in Web Config will display firewall polices organized by
Source and Destination interfaces.
Global View
Selecting Global View will list all firewall policies in order, according to a sequence
number, and are not grouped by interface. When policies are re-ordered, the
sequence number will change in consequence. The Policy ID value is
independent of the sequence number.
If a firewall policy is created with a source or destination interface of ANY, only the
global view will be available in Web Config.
Column Settings
Some columns of information may not be displayed by default. Use the Column
Settings options to add or remove table columns from the displayed list. Select the
item to display from the Available fields list and click Æ to move it to the Show
these fields in this order list. Reorder the items in the Show these fields in this
order list by selecting the item and clicking Move Up or Move Down.
For example, if the Count field is added to the column settings, the number of
packets and bytes that match a firewall policy can be displayed.
Filtering Columns
Click Filter ( ) to edit the column filters which allow the policy list to be filtered or
sorted according to criteria specified. Filters are useful for reducing the number of
entries that are displayed on the list. Filters can be added for one column or for
multiple columns. Filter configuration is maintained after leaving Web Config, after
logging out of Web Config, or after rebooting the FortiGate unit.
Different filter styles are available depending on the type of information displayed
in individual columns. In all cases, filters are configured by specifying what to filter
on and whether to display information that matches the filter or to select NOT to
display information that does not match the filter.
Reordering Policies
A policy can be moved within the list to influence the order in which policies are
evaluated. When more than one policy has been defined for the same interface
pair, the policy that is first in the list is evaluated first.
The ordering of firewall encryption policies is important to ensure that they take
effect as expected; firewall encryption policies must be evaluated before regular
firewall policies. Moving a policy in the list does not change its policy ID number.
Select a policy and click Move ( ) to change the order of policies in the list.
Alternately, when creating a new policy click Insert ( ) to create the new policy in
the list before the selected policy.
The policy ordering can also be changed using the CLI move command from the
firewall policy table.
For example:
config firewall policy
move X before Y
end
Click Create New ( ) in the Policy List to create a new firewall policy or select an
existing policy and click Edit ( ) to modify or view the policy.
Alternately, click Insert ( ) to create a new policy in the list before the currently
selected policy.
Note: The Comments field is very useful to complete when working with
firewall policies as important details can be documented about the firewall
policy which may be referred to in the future.
Firewall Addresses
Firewall addresses are added to the Source and Destination Address fields of
firewall policies to match the source or destination IP addresses of packets that
are received by the FortiGate unit.
Multiple addresses can be added on the FortiGate device and the appropriate
address can be selected when creating the policy.
To view the list of available addresses on the FortiGate unit, go to Firewall >
Address > Address.
To view or modify any individual addresses in the list, select the address from the
list and click Edit ( ) or double-click the entry.
The FortiGate unit comes configured with a default All address which represents
any IP address on the network. This is required in order to reach all addresses on
the Internet.
Address Groups
Related addresses can be organized into address groups to simplify policy
creation and management. For example, after adding three addresses and
configuring them in an address group, configure a single policy using all three
addresses.
Multiple address groups can be added on the FortiGate device and the
appropriate address group can be selected when creating the policy.
To view the list of available address groups on the FortiGate unit, go to Firewall >
Address > Group.
To view or modify any individual groups in the list, select the group and click Edit
( ) or double-click the entry.
New firewall address groups can be defined by clicking Create New ( ) on the
Address Group List page, or by selecting [Multiple...] from the Source Address
and Destination Address drop-down list on the New Policy page. Complete the
parameters of the firewall address group as needed.
Firewall Schedules
Schedules are used to control when policies are active.
One-Time Schedule
One-time schedules are used to activate a policy for a specified period of time. For
example, a firewall might be configured with a default policy that allows access to
all services on the Internet at all times and a one-time schedule can be added to
block access to the Internet during a holiday period.
Multiple one-time schedules can be added on the FortiGate device and the
appropriate schedule can be selected when creating a policy.
To view or modify any one-time schedules in the list, select the schedule and click
Edit ( ) or double-click the entry.
New one-time schedules can be defined by clicking Create New ( ) on the One-
time Schedule List page, or by selecting [Create New...] from the Schedule drop-
down list on the New Policy page. Complete the parameters of the one-time
schedule as needed.
Recurring Schedules
Recurring schedules are used to activate policies at specified times of the day or
on specified days of the week. For example, game play can be prevented during
working hours by creating a recurring schedule.
Multiple recurring schedules can be added on the FortiGate device and the
appropriate schedule can be selected when creating a policy.
To view the list of available recurring schedules on a FortiGate unit, go to Firewall
> Schedule > Recurring.
To view or modify any recurring schedules in the list, select the schedule and click
Edit ( ) or double-click the entry.
Schedule Groups
Related schedules can be organized into groups to simplify policy creation and
management. For example, after adding multiple schedules and configuring them
in a schedule group, configure a single policy using all the selected schedules.
Multiple schedule groups can be added on the FortiGate device and the
appropriate group can be selected when creating a policy.
To view the list of available schedule groups on the FortiGate unit, go to Firewall >
Schedule > Group.
To view or modify any individual groups in the list, select the group and click Edit
( ) or double-click the entry.
New schedule groups can be defined by clicking Create New ( ) on the Schedule
Group List page. Complete the parameters of the schedule group as needed.
Firewall Services
The Service list is used to determine the types of communication accepted or
denied by the firewall. Services control the opening and closing of ports.
Predefined Services
Certain services are predefined on the FortiGate unit and can be easily added to a
policy by selecting from the list
To view the list of predefined services, go to Firewall > Service > Predefined.
These services can be added to a policy by selecting them from the Service drop-
down list on the New Policy page, or can be added to service groups.
Custom Services
A custom service can be created for any type of communication that is not in the
predefined list.
Multiple custom services can be added on the FortiGate device and the
appropriate service can be selected when creating a policy.
To view the list of available custom services on the FortiGate unit, go to Firewall >
Service > Custom.
To view or modify any custom services in the list, select the service and click Edit
( ) or double-click the entry.
New services can be defined by clicking Create New ( ) on the Custom Services
List page, or by selecting [Create New...] from the Service drop-down list on the
New Policy page. Complete the parameters of the custom service as needed.
Service Groups
To make it easier to add and manage policies, groups of services can be created
and a single policy can be used to allow or block access for all the services in the
group. A service group can contain predefined services and custom services in
any combination. A service group cannot be added to another service group.
Multiple service groups can be added on the FortiGate device and the appropriate
group can be selected when creating a policy.
To view the list of available service groups on the FortiGate unit, go to Firewall >
Service > Group.
To view or modify any individual groups in the list, select the group and click Edit
( ) or double-click the entry.
New service groups can be defined by clicking Create New ( ) on the Service
Group List page or by selecting [Multiple...] from the Service drop-down list on the
New Policy page. Complete the parameters of the service group as needed.
Firewall Actions
The firewall action identifies the response to make when the policy matches a
connection attempt. If the initial packet matches the firewall policy, the FortiGate
unit performs the configured action and any other configured options on all
packets in the session.
Packet handling actions can be Accept, Deny, SSL-VPN or IPSec.
Accept
A policy action of Accept permits communication sessions, and may optionally
include other packet processing instructions, such as requiring authentication to
use the policy, or specifying threat management features such as virus scanning
to be applied to packets in the session.
Deny
A policy action of Deny blocks communication sessions, and may optionally log
the denied traffic.
SSL VPN
A policy action of SSL-VPN configures an SSL VPN firewall encryption policy to
accept SSL VPN traffic. This action is available only after an SSL VPN user group
has been added.
Policies with an SSL-VPN action can also include settings for NAT and identity-
based policies.
IPSec
A policy action of IPSec applies a firewall encryption policy to process packets in
policy-based IPSec VPNs. Tunnel options must be identified when assigning an
action of IPSec for the policy. In addition, threat management features such as
virus scanning can be specified to be applied to packets in the session as well as
traffic shaping.
Logging Traffic
Enable Log Allowed Traffic for Accept, SSL-VPN or IPSec policies or Log
Violation Traffic for Deny policies to record messages to the traffic log whenever
the policy processes a connection. Logging will be performed based on the
configuration defined in Log&Report > Log Config > Log Settings.
No NAT
If no address translation of the source address is to be performed by the FortiGate
unit for this policy, enable No NAT.
Enable NAT
Click Enable NAT when address translation is necessary, In this example, the IP
address of the client on the internal network is translated from 10.10.10.1 to
192.168.2.2.
Dynamic IP Pool
When Enable NAT is selected in the firewall policy and an IP pool has been
defined, the option to enable Dynamic IP Pool becomes available. Enable
Dynamic IP Pool, and select an IP pool to translate the source address to an IP
address randomly selected from addresses in the IP Pool.
An IP pool defines an address or a range of IP addresses, all of which respond to
ARP requests on the interface to which the IP pool is added.
IP pools cannot be used when using zones. An IP pool can only be associated
with an interface.
In this example, the IP address of the client on the internal network is translated
from 10.10.10.1 to an address within the 172.168.12.2 - 172.16.12.12
range.
Multiple IP pools can be added on the FortiGate device and the appropriate pool
can be selected when creating a policy.
To view the list of available IP pools on the FortiGate unit, go to Firewall > Virtual
IP > IP Pool.
To view or modify any individual pool in the list, select the pool and click Edit ( )
or double-click the entry.
New IP pools can be defined by clicking Create New ( ) on the IP Pool List page
or by selecting [Create...] from the Dynamic IP Pool drop-down list on the New
Policy page. Complete the parameters of the IP pool as needed.
To view or modify any individual NAT rules in the list, select the table and click
Edit ( ) or double-click the entry.
New NAT rules can be defined by clicking Create New ( ) on the NAT Table List
page. Complete the parameters of the NAT rule as needed.
Fixed Port
When NAT is enabled in the firewall policy, the option to enable Fixed Port
becomes available. Enable Fixed Port to prevent NAT from translating the source
port. Some applications do not function correctly if the source port is translated. In
most cases, if Fixed Port is enabled, Dynamic IP Pool is also enabled.
If Dynamic IP Pool is not enabled, a policy with Fixed Port enabled can only allow
one connection to that service at a time.
In this example, the IP address of the client on the internal network is translated
from 10.10.10.1 to an address within the 172.16.12.2 - 172.16.12.12
range, but the source port of 1025 is not translated.
Identity-Based Policies
Identity-based policies can be enabled to configure firewall policies to require
authentication. If identity-based policies are enabled in a firewall policy, network
users must send traffic involving a supported firewall authentication protocol to
trigger the firewall authentication challenge, and successfully authenticate, before
the FortiGate unit will allow any other traffic matching the firewall policy.
Authentication rules must be defined to specify the user group details identifying
users who will be forced to authenticate.
Disclaimers
Enabling Disclaimer and Redirect URL displays the Authentication Disclaimer
page (a replacement message) that the user must accept to connect to the
destination. The disclaimer option is available when Identity-based Policy is
enabled.
If you enter a URL in the Redirect URL field, the user is redirected to that URL
after authenticating and/or accepting the user authentication disclaimer.
Threat Management
The threat management capabilities of the FortiGate unit are enabled in the
firewall policy. UTM elements that apply different protection settings are pre-
configured, then selected when the policy is created. The types and levels of
protection for different firewall policies can be customized, for example, traffic
between internal and external addresses can use strict protection, traffic between
trusted internal addresses can use moderate protection.
Threat management attributes available in firewall policies include:
• Protocol Options
• Antivirus
• IPS
• Web Filtering
• Email Filtering
• Data Leak Prevention
• Application Control
• VoIP
Enabling UTM in the New Policy window will allow the selection of the threat
management elements.
Protocol Options
Protocol options include settings related to proxy operations. A Protocol Options
List can be selected when UTM is enabled in a firewall policy. To enable the
attributes contained in a Protocol Options List within the policy, select the list from
Protocol Options drop-down list, or click [Create New...] to define a new list. Click
Edit ( ) to modify a selected Protocol Options List from the Policy page.
Multiple Protocol Options Lists can be added on the FortiGate device and the
appropriate list can be selected when creating a policy.
To view the list of available Protocol Options Lists on the FortiGate unit, go to
Firewall > Policy > Protocol Options.
To view or modify any individual Protocol Options Lists, select the list and click
Edit ( ) or double-click the entry.
New Protocol Options Lists can be defined by clicking Create New ( ) on the
Protocol Options List page or by selecting [Create New...] from the Protocol
Options drop-down list on the New Policy page. Complete the parameters of the
protocol options as needed.
HTTP
Expand HTTP to set the attributes affecting HTTP traffic.
HTTPS
Expand HTTPS to set the attributes affecting secured HTTP traffic.
FTP
Expand FTP to set the attributes affecting FTP traffic.
IMAP
Expand IMAP to set the attributes affecting IMAP traffic.
POP3
Expand POP3 to set the attributes affecting POP3 traffic.
SMTP
Expand SMTP to set the attributes affecting SMTP traffic.
IM
Expand IM to set the attributes affecting instant messaging traffic.
NNTP
Expand NNTP to set the attributes affecting NNTP traffic.
Antivirus
Click Enable Antivirus to enforce the attributes contained in an antivirus profile
within the policy. Select the antivirus profile from the drop-down list, or click
[Create New...] to define a new profile. Click Edit ( ) to modify a selected
antivirus profile from the Policy page.
IPS Filtering
Click Enable IPS to enforce the rules contained in an IPS sensor within the policy.
Select the IPS sensor from the drop-down list, or click [Create New...] to define a
new IPS sensor. Click Edit ( ) to modify a selected IPS sensor from the Policy
page.
Web Filtering
Click Enable Web Filter to enforce the attributes contained in a web filter profile
within the policy. Select the web filter profile from the drop-down list, or click
[Create New...] to define a new web filter profile. Click Edit ( ) to modify a
selected web filter profile from the Policy page.
Email Filtering
Click Enable Email Filter to enforce the attributes contained in a email filter profile
within the policy. Select the email filter profile from the drop-down list, or click
[Create New...] to define a new email filter profile. Click Edit ( ) to modify a
selected email filter profile from the Policy page.
DLP Filtering
Click Enable DLP Sensor to enforce the rules contained in a DLP sensor within
the policy. Select the DLP sensor from the drop-down list, or click [Create New...]
to define a new DLP sensor. Click Edit ( ) to modify a selected DLP sensor from
the Policy page.
Application Control
Click Enable Application Control to enforce attributes contained in an application
control list within the policy. Select the application control list from the drop-down
list, or click [Create New...] to define a new application control list. Click Edit ( )
to modify a selected application control list from the Policy page.
VoIP
Click Enable VoIP to enforce attributes contained in an VoIP profile within the
policy. Select the VoIP profile from the drop-down list, or click [Create New...] to
define a new VoIP profile. Click Edit ( ) to modify a selected VoIP profile from
the Policy page.
Traffic Shaping
Traffic shaping controls the available bandwidth and the priority of traffic
processed by a policy. Traffic shaping makes it possible to control which policies
have the highest priority when large amounts of data are moving through the
FortiGate device. For example, the policy for the corporate web server might be
given higher priority than the policies for an employee’s computer. Traffic shaping
is available for Accept, IPSEC, and SSL-VPN policies and is also available for all
supported services.
Traffic shaping consists of a mixture of traffic policing to enforce bandwidth limits,
and priority queue adjustment to assist packets in achieving the guaranteed rate.
Traffic shaping does not increase the total amount of bandwidth available but is
used to improve the quality of bandwidth-intensive and sensitive traffic.
Click to enable Traffic Shaping on the policy. Select a traffic shaper from the drop-
down list or click [Create New...] to define a new traffic shaper. Click Edit ( ) to
modify a selected traffic shaper from the Policy page.
If traffic shaping is to be applied to traffic passing in the reverse direction, enable
Reverse Direction Traffic Shaping and select a traffic shaper from the list.
Traffic Shapers
Traffic shapers help to ensure that traffic may consume bandwidth at least at the
guaranteed rate by assigning a greater priority queue if the guarantee is not being
met. Also, it ensures that traffic cannot consume bandwidth greater than the
maximum at any given instant in time. Flows greater than the maximum rate are
subject to traffic policing.
After packet acceptance, the FortiGate unit classifies traffic and may apply traffic
policing at additional points during processing. It may also apply additional QoS
techniques, such as prioritization and traffic shaping.
For traffic types originating on or terminating at the FortiGate unit, such as
administrative access to the FortiGate unti through HTTPS or SSH, or IPSec
tunnel negotiations, firewall policies do not apply, and therefore FortiGate units do
not apply traffic shaping. Such traffic also uses the highest priority queue, queue
0. Exceptions to this rule include traffic types that, while technically originated by
the FortiGate unit, are connections related to a session governed by a firewall
policy. For example, if the administrator has enabled scanning by FortiGuard
Antivirus, traffic from the sender technically terminates at the FortiGate proxy that
scans that traffic type; the FortiGate unit initiates a second connection that
transmits scanned content to its destination. Because the second connection’s
traffic is technically originating from the FortiGate proxy and therefore the
FortiGate unit itself, it uses the highest priority queue, queue 0. However, this
connection is logically associated with through traffic, and is therefore subject to
possible bandwidth enforcement and guarantees in its governing firewall policy. In
this way, it behaves partly like other through traffic.
For traffic passing through the FortiGate unit, the method used is determined by
the priority queue and whether traffic shaping is enabled. Packets may or may not
use a priority queue directly or indirectly derived from the Type of Service (ToS)
byte, sometimes used instead with differentiated services, in the packet’s IP
header.
If traffic shaping is not enabled in the firewall policy, the FortiGate unit neither
limits nor guarantees bandwidth, and traffic for that session uses the priority
queue determined directly by matching the ToS byte in its header with the values
configured on the FortiGate unit.
If traffic shaping is enabled in the firewall policy, the FortiGate unit may instead or
also subject packets to traffic policing, or priority queue increase in an effort to
meet bandwidth guarantees configured in the firewall policy.
Traffic shaping is enforced for traffic which may flow in either direction. A session,
which may be set up by an internal host to an external one through an internal Æ
external policy, will have traffic shaping applied even if the data stream is then
coming from external to internal.
Traffic shaping is effective for normal IP traffic at normal traffic rates. Traffic
shaping is not effective during extremely high-traffic situations where the traffic is
exceeding the FortiGate unit's capacity. Packets must be received by the
FortiGate unit before they are subject to traffic shaping. If the FortiGate unit
cannot process all of the traffic it receives, dropped packets, delays, and latency
are likely to occur.
To ensure that traffic shaping is working at its best, verify that the interface
Ethernet statistics are clean of errors, collisions, or buffer overruns. If these are
not clean, the FortiGate settings may require adjusting.
To make traffic shaping work efficiently, be sure to observe the following rules:
• Enable traffic shaping on all firewall policies. If traffic shaping is not applied to a
policy, the policy is set to high priority by default.
• Distribute firewall policies over all three priority queues (low, medium, and
high).
• Be sure that the sum of all Guaranteed Bandwidth in all firewall policies is
significantly less than the bandwidth capacity of the interface.
To view or modify any shared traffic shapers in the list, select the traffic shaper
and click Edit ( ) or double-click the entry.
New shared traffic shapers can be defined by clicking Create New ( ) on the
Shared Traffic Shaper List page, or by selecting [Create New...] from the Traffic
Shaping drop-down list on the New Policy page. Complete the parameters of the
shared traffic shaper as needed.
The bandwidth available for traffic controlled by a policy is used for both control
and data sessions and is used for traffic in both directions. For example, if
guaranteed bandwidth is applied to an internal to external FTP policy and a user
on an internal network uses FTP to put and get files, both the put and get
sessions share the bandwidth available to the traffic controlled by the policy.
The guaranteed and maximum bandwidth available for a policy is the total
bandwidth available to all traffic controlled by the policy. If multiple users start
multiple communications sessions using the same policy, all of these
communications sessions must share the available bandwidth for the policy.
Bandwidth availability is not shared between multiple instances of using the same
service if these multiple instances are controlled by different policies. For
example, you can create one FTP policy to limit the amount of bandwidth
available for FTP for one network address and create another FTP policy with a
different bandwidth availability for another network address.
Click to enable Per-IP Traffic Shaping on the policy and select a per-IP traffic
shaper from the list or click [Create New...] to define a new Traffic Shaper. Click
Edit ( ) to modify the selected per-IP traffic shaper on the Policy page.
Multiple per-IP traffic shapers can be added on the FortiGate device and the
appropriate per-IP traffic shapers can be selected when creating a policy.
To view the list of available per-IP traffic shapers on the FortiGate unit, go to
Firewall > Traffic Shaper > Per-IP.
To view or modify any per-IP traffic shapers in the list, select the traffic shaper and
click Edit ( ) or double-click the entry.
New per-IP traffic shapers can be defined by clicking Create New ( ) on the per-
IP traffic shaper list page, or by selecting [Create New...] from the Per-IP Traffic
Shaping drop-down list on the New Policy page. Complete the parameters of the
shared traffic shaper as needed.
Virtual IPs
Virtual IPs can be used to allow connections through a FortiGate unit using
network address translation firewall policies. Virtual IPs use Proxy ARP so that the
FortiGate unit can respond to ARP requests on a network for a server that is
actually installed on another network. For example, add a virtual IP to an external
FortiGate unit interface so that the external interface can respond to connection
requests for users who are actually connecting to a server on the DMZ or internal
network.
A virtual IP’s external IP address can be a single IP address or an IP address
range, and is bound to a FortiGate unit interface. When you bind the virtual IP’s
external IP address to a FortiGate unit interface, by default, the network interface
responds to ARP requests for the bound IP address or IP address range.
To implement the translation configured in the virtual IP or IP pool, it must be
added to a NAT firewall policy.
A virtual IP can be a single IP address or an IP address range bound to a
FortiGate unit interface. When an IP address or IP address range is bound to a
FortiGate unit interface using a virtual IP, the interface responds to ARP requests
for the bound IP address or IP address range.
When virtual IPs are used, the FortiGate unit receives packets from a client. The
addresses in the packets are remapped and forwarded to the server on the
private network. The client computer’s address does not appear in the packets the
server receives. After the FortiGate unit translates the network addresses, there is
no reference to the client computer’s network. The server has no indication that
another network exists. As far as the server can tell, all the communication is
coming directly from the FortiGate unit.
When the server answers the client computer, the procedure works the same way
but in the other direction. The server sends its response packets and the
FortiGate unit receives them at its internal interface. This time, however, the
firewall session table entry is used to determine what the destination address will
be translated to. The server computer’s address does not appear in the packets
the client receives. After the FortiGate unit translates the network addresses,
there is no reference to the server computer’s network. The client has no
indication that the server’s private network exists.
You add the virtual IP to a NAT firewall policy to actually implement the mapping
configured in the virtual IP. To add a firewall policy that maps addresses on an
external network to an internal network, add an external to internal firewall policy
and add the virtual IP to the destination address field of the policy.
For example, if the computer hosting a web server is located on the internal
network, it might have a private IP address such as 10.10.10.42. To get packets
from the Internet to the web server, there must be an external address for the web
server on the Internet. Add a virtual IP to the firewall that maps the external IP
address of the web server on the Internet to the actual address of the web server
on the internal network. To allow connections from the Internet to the web server,
add an external to internal firewall policy and set the Destination Address to the
virtual IP.
Virtual IPs also translate the source IP address or addresses of return packets
from the source address on the hidden network to be the same as the destination
address of the originating packets.
Virtual IP ranges can be of almost any size and can translate addresses to
different subnets. Virtual IP ranges have the following restrictions:
• The mapped IP cannot include 0.0.0.0 or 255.255.255.255.
• The external IP cannot be 0.0.0.0 if the virtual IP type is static NAT and is
mapped to a range of IP addresses. Only load balance virtual IPs and static
NAT virtual IPs mapped to a single IP address support an external IP of
0.0.0.0.
• Port mapping maps a range of external port numbers to a range of internal port
numbers. The number of ports in these two ranges must be equal.
Therefore, the external port must not be set so that its range exceeds 65535.
For example, an internal range of 20 ports mapped from external port 65530 is
invalid as the last port in the range would be 65550.
• When port forwarding, the external IP range cannot include any interface IP
addresses.
• The mapped IP range must not include any interface IP addresses.
• The virtual IP name cannot be the same as any address name or address
group name.
• No duplicate entries or overlapping ranges are permitted.
In addition to binding the IP address or IP address range to the interface, the
virtual IP also contains all of the information required to map the IP address or IP
address range from the interface that receives the packets to the interface
connected to the same network as the actual IP address or IP address range.
Different kinds of virtual IPs can be created, each of which can be used for a
different DNAT variation.
Virtual IP Mappings
Multiple virtual IP mappings can be added on the FortiGate device and the
appropriate mapping can be selected when creating a policy.
To view the list of available Virtual IP Mappings on the FortiGate unit, go to
Firewall > Virtual IP > Virtual IP.
To view or modify any virtual IP mappings in the list, select the mapping entry and
click Edit ( ) or double-click the entry.
New virtual IP mappings can be defined by clicking Create New ( ) on the Virtual
IP Mappings list page, or by selecting [Create New...] from the drop-down list on
the New Policy page. Complete the parameters of the virtual IP mapping as
needed.
Virtual IP Groups
Multiple virtual IPs can be organized into a group to simplify the firewall policy list.
For example, instead of having five identical policies for five different but related
virtual IPs located on the same network interface, combine the five virtual IPs into
a single virtual IP group, which is used by a single firewall policy.
Firewall policies using VIP groups are matched by comparing both the member
VIP IP address(es) and port number(s).
Multiple virtual IP groups can be added on the FortiGate device and the
appropriate group can be selected when creating a policy.
To view the list of available virtual IP groups on the FortiGate unit, go to Firewall >
Virtual IP > VIP Group.
To view or modify any individual groups in the list, select the group and click Edit
( ) or double-click the entry.
New virtual IP groups can be defined by clicking Create New ( ) on the Virtual IP
Group List page or by selecting [Multiple...] from the Destination Address drop-
down list on the New Policy page. Complete the parameters of the service group
as needed.
Load Balancing
FortiGate load balancing intercepts incoming traffic and shares it across available
servers. By doing so, the FortiGate unit enables multiple servers to respond as if
they were a single device or server, allowing more simultaneous requests to be
handled.
Because the load is distributed across multiple servers, the service being
provided can be highly available. If one of the servers breaks down, the load can
still be handled by the other servers. If the load increases substantially, more
servers can be added behind the FortiGate unit in order to cope with the
increased load.
Virtual servers are configured on the FortiGate unit (load balancer) and bound to a
cluster of real servers. Up to eight real servers can be bound to one virtual server.
The topology of the cluster is transparent to end users, and the users interact with
the system as if it were only a single virtual server. The real servers may be
interconnected by high-speed LAN or by a geographically dispersed WAN. The
FortiGate unit schedules requests to the different servers and makes parallel
services of the cluster to appear as a virtual service on a single IP address.
Internet
User
FortiGate
LAN/WAN
Real Server
Persistence
Persistence is the process of ensuring that a user is connected to the same server
every time they make a request within the boundaries of a single session.
Depending on the type of protocol selected for the virtual server, the following
persistence options are available:
None
No persistence option is selected.
HTTP Cookie
When HTTP Cookies is selected, persistence time is equal to the cookie age.
Cookie ages are set in the CLI using config firewall vip.
SSL Session ID
When SSL Session ID is selected, persistence time is equal to the SSL sessions.
SSL session states are set in the CLI using config firewall vip.
Virtual Servers
Configure a virtual server’s external IP address and bind it to a FortiGate unit
interface. When the virtual server’s external IP address is bound to an interface on
the FortiGate unit, the network interface responds to ARP requests for the bound
IP address by default.
Multiple virtual servers can be added on the FortiGate device and the appropriate
virtual server can be selected when creating a policy.
To view the list of available virtual servers on the FortiGate unit, go to Firewall >
Load Balance > Virtual Server.
To view or modify any individual virtual servers in the list, select the server and
click Edit ( ).
New virtual servers can be defined by clicking Create New ( ) on the Virtual
Server List page. Complete the parameters of the virtual server as needed.
Real Servers
Real servers must be configured and bound to a virtual server.
Multiple real servers can be added on the FortiGate device. To view the list of
available real servers on the FortiGate unit, go to Firewall > Load Balance > Real
Server.
To view or modify any individual real servers in the list, expand the name for the
virtual server, select the real server and click Edit ( ) or double-click the entry.
New real servers can be defined by clicking Create New ( ) on the Real Server
List page. Complete the parameters of the real server as needed.
To view or modify any individual health check monitors in the list, expand the type
of monitor, select the health check monitor and click Edit ( ) or double-click the
entry.
New health check monitors can be defined by clicking Create New ( ) on the
Health Check Monitors List page. Complete the parameters of the monitor as
needed.
Monitors
The Load Balance Monitor List displays the status of virtual and real servers and
presents an option to start or stop the servers.
DoS policies are examined in detail in Course 301 - Secure Network Deployment
and IPSec VPN.
General
The settings for a firewall policy should be as specific as possible. Use subnets or
specific IP addresses for source and destination addresses and use individual
services or service groups.
Use a 32-bit subnet mask when creating a single host address, for example,
255.255.255.255.
Use the external IP of 0.0.0.0 when creating a VIP for a FortiGate unit where
the external interface IP address is dynamically assigned.
Traffic shaping bandwidth management is in kilobytes; multiply by eight to
calculate the kilobits.
Policies
Arrange firewall policies in the policy list from more specific to more general. The
firewall searches for a matching policy starting at the top of the policy list. For
example, a very general policy matches all connection attempts. When creating
exceptions to a general policy, add them to the policy list above the general policy.
If all policies are removed from the firewall there are no policy matches and all
connections are dropped.
NAT
For security purposes, NAT mode is preferred because all the internal or DMZ
networks can have secure private addresses. NAT mode policies use network
address translation to hide the addresses in a more secure zone from users in a
less secure zone.
Do not enable source NAT for inbound traffic unless it is required by an
application. If, for example, NAT is enabled for inbound SMTP traffic, the SMTP
server might act as an open relay.
FortiGate units running FortiOS version 3.0 or greater can use Fortinet Discovery
Protocol (FDP), a UDP protocol, to locate a FortiAnalyzer unit. When a FortiGate
administrator selects Automatic Discovery, the FortiGate unit uses HELO packets
to locate FortiAnalyzer units on the network within the same subnet. If FDP has
been enabled for its interface to that subnet, the FortiAnalyzer unit will respond.
Once the FortiGate unit discovers a FortiAnalyzer unit, the FortiGate unit
automatically enables logging to the FortiAnalyzer and begins sending log data.
Depending on its configuration, the FortiAnalyzer unit may then automatically
register the device and save its data, add the device but ignore its data, or ignore
the device entirely.
The Syslog protocol (UDP port 514) is used by default by the FortiGate unit to
transport log messages to the FortiAnalyzer unit. TCP port 514 (OFTP) is used for
the transfer of the content-archive and the remote viewing of log files and reports.
If logging data is traversing a public network, an IPSec tunnel can be used to
secure the communication between the FortiGate and the FortiAnalyzer devices.
The FortiGate unit can send all log message types, as well as quarantine files, to
a FortiAnalyzer unit for storage. Log files stored on a FortiAnalyzer unit can be
uploaded to an FTP server for archival purposes.
Tasks
In this lab, you will complete the following tasks:
• Exercise 1 Creating Firewall Policy Objects
• Exercise 2 Creating Firewall Policies
• Exercise 3 Testing Firewall Policies
• Exercise 4 Configuring Virtual IP Access
• Exercise 5 Debug Flow
Timing
Estimated time to complete this lab: 45 minutes
Click OK to save.
2 Go to Firewall > Service > Group. Click Create New to configure a new group
with the services shown below.
To select the services for the web group, click or to move them between
the Available Services and Members lists:
3 Go to Firewall > Schedule > Recurring. Click Create New to configure a new
recurring schedule using the following parameters:
Name office_hours
Day Monday to Friday
Start Hour: 08
Minute: 00
Stop Hour: 20
Minute: 00
Click OK.
Note: When using schedules, make sure that the system time is at the correct local
setting. From the CLI type the exec time command or go to System > Dashboard >
Status in Web Config and view the System Information widget.
3 Create a new firewall policy that will be used to provide general Internet
access.
Go to Firewall > Policy > Policy. Click Create New and configure the following
settings:
Source Interface/Zone internal
Source Address all-dept
Destination Interface/Zone wan1
Destination Address all
Schedule office_hours
Service web
Action ACCEPT
Log Allowed Traffic Enabled
Enable NAT Enabled
Comments General Internet access
Click OK after entering all the parameters.
This new all-dept policy will be displayed in the section view of the Policy List
under internal Æ wan1.
Click OK.
This new support-dept policy will be displayed in the section view of the Policy
List under internal Æ wan1.
5 Select the support-dept policy created in step 4 and click Move ( ) to place
this policy above the all-dept general Internet access policy created in step 3.
In the Move Policy window, click Before and type the Policy ID of the general
Internet policy and click OK.
The re-ordered policy list will be displayed.
6 Create a policy allowing Internet access during a specific time period using the
settings below:
Click OK.
This new support-dept lunch time policy will be displayed in the section view of
the Policy List under internal Æ wan1.
7 Use Move to place the support-dept lunch time policy above the support-dept
office hours policy.
The section view of the firewall Policy List should appear as follows:
8 View the CLI configuration for the firewall policies created above:
show firewall policy
View the CLI configuration for a single firewall policy:
show firewall policy <ID>
Obtain the ID number of the policy from the show firewall policy output
used above.
Note: Be mindful of testing the firewall policy schedule outside of the specified hours.
3 Check the traffic log at Log&Report > Log Access > Traffic to see evidence of
the FortiGate action, including the ID of the policy being used.
4 Change the action for the policies to Deny and ensure that Log Violation Traffic
is enabled.
5 Visit another web site. Access should be denied.
6 Return to the traffic log at Log&Report > Log Access > Traffic to see evidence
of the traffic violation.
7 Set the policy actions back to Accept.
8 **IMPORTANT** Before proceeding to the next exercise, go to Firewall >
Policy > Policy and re-enable the unrestricted policy by checking the policy in
the Status column of the firewall Policy List.
Name special-web
External Interface internal
Type Static NAT
External IP Address 192.168.1.209
Mapped IP Address Enter the IP address of
www.fortinet.com
Port Forwarding Enable
Protocol TCP
External Service Port 8088
Map to Port 80
Note: The Service setting for this policy is ANY. Due to the VIP port mapping, only the
configured ports will be allowed so it is unnecessary to further restrict traffic with the
Service setting.
Click OK.
4 Position this all-dept policy at the top of the internal Æ wan1 list as it has a
narrower scope compared to the other policies.
Note: This guest PC would need to be further secured by limiting the user
access to only the web browser and removing administrative access and the
ability to run other programs. These additional measures are operating-system
dependent.
2 Type the CLI commands shown below to configure the debug flow to trace the
route selection and session establishment for an HTTP connection to
www.fortinet.com.
Use nslookup to confirm the address for www.fortinet.com.
Enter the following commands:
diag debug enable
diag debug flow filter addr <IP address of
www.fortinet.com>
diag debug flow show console enable
diag debug flow show function-name enable
diag debug flow trace start 100
3 From a web browser connect to the following URL and observe the debug flow
trace.
http://www.fortinet.com
Depending on the FortiGate model being used, the output displayed may vary
slightly.
SYN packet received:
id=36870 trace_id=1 func=resolve_ip_tuple_fast line=3395
msg="vd-root received a packet(proto=6,
192.168.1.110:1849->208.70.202.225:80) from internal."
SYN sent and a new session is allocated:
id=36870 trace_id=1 func=resolve_ip_tuple line=3522
msg="allocate a new session-00000483"
Lookup for next-hop gateway address:
id=36870 trace_id=1 func=vf_ip4_route_input line=1595
msg="find a route: gw-192.168.3.254 via wan1"
Source NAT, lookup next available port:
id=36870 trace_id=1 func=get_new_addr line=1615 msg="find
SNAT: IP-192.168.3.10, port-44977"
Matched firewall policy. Check to see which policy this session matches:
id=36870 trace_id=1 func=fw_forward_handler line=463
msg="Allowed by Policy-1: SNAT"
Apply source NAT:
id=36870 trace_id=1 func=__ip_session_run_tuple line=1840
msg="SNAT 192.168.1.110->192.168.3.10:44977"
SYN ACK received:
id=36870 trace_id=2 func=resolve_ip_tuple_fast line=3395
msg="vd-root received a packet(proto=6,
208.70.202.225:80->192.168.3.10:44977) from wan1."
231
www.fortinet.com
Authentication
Lesson 4 Authentication
The computer network should only be used by those who are authorized to do so,
therefore there must be a measure in place to detect and exclude any
unauthorized access. On a FortiGate unit, access to network resources can be
controlled by defining lists of authorized users, called user groups. To use a
particular resource, the user must belong to one of the user groups that is allowed
access and correctly provide credentials to prove his or her identity if asked to do
so.
The FortiGate unit can be configured to prompt for credentials during the following
operations:
• When a user attempts to access a resource through an interface with a firewall
policy with the Action set to ACCEPT.
• When a user attempts remote access to a private network using an SSL VPN
connection.
• When a remote user attempts remote access to a private network through an
IPSec VPN dialup group.
• When an administrator attempts to log into the Web Config or CLI interface.
When user authentication is enabled, the user is presented with a request for
authentication when trying to access the protected resource. The way in which the
request is presented to the user depends on the method of access to that
resource.
Authentication Methods
Depending on the service requiring authentication, different mechanisms can be
configured to prompt the user for credentials.
Local Users
A local user is a user configured on a FortiGate unit. The FortiGate unit stores the
user names and passwords of the users and uses them to authenticate users.
Remote Users
In an enterprise environment, it might be more convenient to use the same system
that provides authentication for local area network access, email, and other
services. Users who access the corporate network from home or while traveling
could use the same user name and password that they use at the office.
If using authentication servers, the servers must be configured before configuring
FortiGate users or user groups that require them.
The FortiGate unit can be configured to work with external authentication servers
in two different ways:
• Add the authentication server to a user group.
Anyone in the server’s database is a member of the user group. This is a
simple way to provide access to the corporate VPN for all employees, for
example. Individual users do not need to be configured on the FortiGate unit.
• Specify the authentication server instead of a password.
The user name must exist on both the FortiGate unit and authentication server.
User names that exist only on the authentication server cannot authenticate on
the FortiGate unit. This method enables access only to selected employees,
for example.
These two uses of an authentication server cannot be combined in the same user
group. If adding the server to the user group, adding individual users with
authentication to that server is redundant. To use external authentication servers,
configure them before configuring users and user groups.
RADIUS
Remote Authentication and Dial-in User Service (RADIUS) servers provide
authentication, authorization, and accounting functions.
Using RADIUS authentication, the FortiGate unit forwards the user’s credentials to
the RADIUS server for authentication. If the RADIUS server can authenticate the
user, the user is successfully authenticated with the FortiGate unit. If the RADIUS
server cannot authenticate the user, the connection is refused by the FortiGate
unit.
LDAP
Lightweight Directory Access Protocol (LDAP) is an Internet protocol used to
maintain databases of user names, passwords, email addresses, and other
information. If a user is required to authenticate using an LDAP server, the
FortiGate unit contacts the LDAP server for authentication.
To authenticate with the FortiGate unit, the user enters a user name and
password. The FortiGate unit sends this user name and password to the LDAP
server. If the LDAP server can authenticate the user, the user is successfully
authenticated with the FortiGate unit. If the LDAP server cannot authenticate the
user, the connection is refused by the FortiGate unit.
FortiGate LDAP supports all LDAP servers compliant with LDAP v3. In addition,
FortiGate LDAP supports LDAP over SSL/TLS. FortiGate LDAP support does not
extend to proprietary functionality, such as notification of password expiration, that
is available from some LDAP servers. FortiGate LDAP support does not supply
information to the user about why authentication failed.
Public-Key Infrastructure
Public Key Infrastructure (PKI) authentication utilizes digital certificates for
authentication; no username or password are necessary. For certificate
authentication, customized certificates will be installed on the FortiGate unit and
the end users can also have customized certificates installed on their browsers.
Directory Services
A Directory stores information about network objects, such as users, systems and
services. On networks that use Windows Active Directory (AD) or Novell
eDirectory servers for authentication, FortiGate units can transparently
authenticate users without asking them for their user name and password. The
Fortinet Server Authentication Extensions (FSAE) must be installed on the
network and the FortiGate unit configured to retrieve information from the
supported Directory.
TACACS+
Terminal Access Controller Access-Control System (TACACS+) is a remote
authentication protocol used to communicate with an authentication server.
TACACS+ allows a client to accept a username and password and send a query
to a TACACS+ authentication server. The server host determines whether to
accept or deny the request and sends a response back that allows or denies
network access to the user. The default port for a TACACS+ server is 49.
Authenticated Operations
Firewall Authentication
When a firewall policy is created, the option to require authentication can be
enabled. When authentication is enabled in a firewall policy, network users must
respond to a firewall authentication challenge, and successfully authenticate,
before the FortiGate unit will allow any other traffic matching the firewall policy.
This option requires that the firewall Action setting be ACCEPT or SSL-VPN and
that an identity-based policy be configured for the allowed group.
Protocol Support
When authentication is enabled for a firewall policy, the authentication challenge
is issued for any of the four protocols (depending on the connection protocol):
• HTTP (can also be set to redirect to HTTPS)
• HTTPS
• FTP
• Telnet
The selections made in the Protocol Support list of the Authentication Settings
window control which protocols support the authentication challenge.
For each protocol, adding non-standard authentication ports does not change the
standard authentication port; use this command to add additional nonstandard
authentication ports. The standard authentication port is still valid and cannot be
changed.
If the FortiGate unit is operating with virtual domains enabled, each VDOM has a
different non-standard authentication port configuration.
This example illustrates firewall authentication on a non-standard port of 8080.
diagnose sys session list
Sample output:
session info: proto=6 proto_state=05 expire=107 timeout=3600
flags=00000000 sockflag=00000000 sockport=0 av_idx=0 use=4
origin-shaper=
reply-shaper=
ha_id=0 hakey=46703
policy_dir=0 tunnel=/
user=test group=Firewall_User state=may_dirty authed rem
statistic(bytes/packets/allow_err): org=30202/629/1
reply=1727262/1201/1 tuples=2
orgin->sink: org pre->post, reply pre->post dev=6->3/3->6
gwy=192.168.182.88/10.177.0.23
hook=post dir=org act=snat 10.177.0.23:3597-
>192.168.182.88:8080(192.168.182.108:42639)
hook=pre dir=reply act=dnat 192.168.182.88:8080-
>192.168.182.108:42639(10.177.0.23:3597)
pos/(before,after) 0/(0,0), 0/(0,0)
misc=0 policy_id=1 auth_info=1 chk_client_info=0 vd=0
serial=00156a95 tos=ff/ff app=0
dd_type=0 dd_rule_id=0
IPSec Authentication
The FortiClient application can establish an IPSec tunnel with a FortiGate unit
configured to act as a dialup server. When the FortiGate unit acts as a dialup
server, it does not identify the client using the phase 1 remote gateway address.
The IPSec tunnel is established if authentication is successful and the IPSec
firewall policy associated with the tunnel permits access.
The options for authentication of an IPSec connection include:
• Permit access only for remote peers or clients who use certificates that are
recognized.
This is available only if the FortiGate unit authenticates using certificates.
When a VPN peer or dialup client is configured to authenticate using digital
certificates, it sends the DN of its certificate to the FortiGate unit. This DN can
be used to allow VPN access for the certificate holder. That is, a FortiGate unit
can be configured to deny connections to all remote peers and dialup clients
except the one having the specified DN.
• Permit access only for remote peers or clients that have certain peer identifier
(local ID) value configured.
This is available with both certificate and preshared key authentication.
Whether certificates or pre-shared keys are used to authenticate the FortiGate
unit, remote peers or clients can be required to have a particular peer ID. This
adds another piece of information that is required to gain access to the VPN.
More than one FortiGate/FortiClient dialup client may connect through the
same VPN tunnel when the dialup clients share a preshared key and assume
the same identifier. A peer ID is not required for a remote peer or client that
uses a pre-shared key and has a static IP address.
• Permit access to remote peers or dialup clients who each have a unique
preshared key.
Each peer or client must have a user account on the FortiGate unit. Access
can be permitted only to remote peers or dialup clients that have pre-shared
keys and/or peer IDs configured in user accounts on the FortiGate unit. If two
VPN peers (or a FortiGate unit and a dialup client) are required to accept
reciprocal connections based on peer IDs, enable the exchange of their
identifiers when defining the phase 1 parameters.
• Permit access to remote peers or dialup clients who each have a unique peer
ID and a unique preshared key.
Each peer or client must have a user account on the FortiGate unit. The client
must have an account on the FortiGate unit and be a member of the dialup
user group. The FortiGate dialup server compares the local ID specified at
each dialup client to the FortiGate user-account user name. The dialup-client
preshared key is compared to a FortiGate user-account password.
Extended Authentication
Extended Authentication (XAuth) increases security by requiring authentication of
the user of the remote dialup client in a separate exchange at the end of phase 1.
XAuth draws on existing FortiGate user group definitions and uses established
authentication mechanisms such as PAP, CHAP, RADIUS and LDAP to
authenticate dialup clients. A FortiGate unit can be configured to function either as
an XAuth server or an XAuth client.
A FortiGate unit can act as an XAuth server for dialup clients. When the phase 1
negotiation completes, the FortiGate unit challenges the user for a user name and
password. It then forwards the user’s credentials to an external RADIUS or LDAP
server for verification.
If the FortiGate unit acts as a dialup client, the remote peer, acting as an XAuth
server, might require a user name and password. The FortiGate unit can be
configured as an XAuth client, with its own user name and password, which it
provided when challenged.
Administrator Authentication
Administrators can be authenticated using a password stored on the FortiGate
unit, a RADIUS, LDAP, or TACACS+ server, or digital certificates. The RADIUS
server authenticates users and authorizes access to internal network resources
based on the access profile of the user. To authenticate an administrator with an
LDAP or TACACS+ server, the server must be created, included in a user group,
and associated with the administrator with the user group. Users authenticated
with the PKI-based certificate are permitted access to internal network resources
based on the user group they belong to and the associated access profile.
Trusted Hosts
Setting trusted hosts for administrators increases the security of the network by
further restricting administrative access. In addition to knowing the password, an
administrator must connect only through the subnet or subnets specified. The
administrator can even restrict access to a single IP address if defined with only
one trusted host IP address with a netmask of 255.255.255.255.
When trusted hosts are set for all administrators, the FortiGate unit does not
respond to administrative access attempts from any other hosts. This provides the
highest security. If even one administrator is left unrestricted, the unit accepts
administrative access attempts on any interface that has administrative access
enabled, potentially exposing the unit to attempts to gain unauthorized access.
The trusted hosts defined apply both to the web-based manager and to the CLI
when accessed through telnet or SSH. CLI access through the console connector
is not affected. The trusted host addresses all default to 0.0.0.0/0. If one of the
trusted host addresses is set to a non-zero address, the other 0.0.0.0/0 will be
ignored. The only way to use a wildcard entry is to leave the trusted hosts at
0.0.0.0/0. However, this configuration is less secure.
Users
A user is an identity configured on the FortiGate unit or on an external
authentication server. Users can access resources that require authentication
only if they are members of an allowed user group.
An identity can be:
• A local user account with a user name and password stored on the FortiGate
unit
• A local user account with a password stored on an external RADIUS, LDAP, or
TACACS+ server
• A user account with a digital certificate stored on the FortiGate unit
• A RADIUS, LDAP, or TACACS+ server. All user identities stored on the server
will be able to authenticate.
• A user group defined on a Microsoft Active Directory or Novell eDirectory
server
To view the list of users available on the FortiGate unit, go to User > Local >
Local.
To view or modify any individual users in the User List, select them and click Edit
( ) or double-click the entry.
New users can be added by clicking Create New on the User List page. Complete
the parameters of the user as needed.
In most cases, the FortiGate unit authenticates users by requesting their user
name and password. The FortiGate unit checks local user accounts first. If a
match is not found, the FortiGate unit checks the RADIUS, LDAP and TACACS+
servers that belong to the user group. Authentication succeeds when a matching
user name and password are found.
User Groups
User groups have users or authentication servers as members. Firewall policies
and SSL VPNs allow access to user groups, not to individual users. An
administrator will need to determine the number and membership of user groups
appropriate to the authentication requirements of the organization.
The FortiGate unit will check user authentication based on top-to-bottom scan of
user groups listed in identify-based policies. Authentication succeeds when a
matching user name and password are found.
User groups are assigned one of two types:
• Firewall
• Directory Service
To view the list of available user groups on the FortiGate unit, go to User > User
Group > User Group.
Expand each user group type in the list to view the member groups.
To view or modify any individual firewall user groups in the list, select them and
click Edit ( ) or double-click the entry.
New firewall user groups can be added by clicking Create New on the list page.
Complete the parameters of the firewall user group as needed.
To view or modify any individual Directory Service user groups in the list, select
them and click Edit ( ) or double-click the entry.
New Directory Service user groups can be added by clicking Create New on the
list page. Complete the parameters of the Directory Service user group as
needed.
Identity-Based Policies
Identity-based policies enforce authentication options for firewall policies with an
Action set to ACCEPT or SSL-VPN.
Identity-based policies are optional for ACCEPT policies, but will be enforced in
SSL-VPN policies.
Authentication Rules
Authentication Rules define aspects of the authentication being enforced,
including the user groups affected by the policy, services to which the policy will
apply as well as the schedule, threat management, traffic shaping and logging
options.
When identity-based policies are enabled, threat management elements are
defined in the authentication rules.
An Implicit_Deny authentication rule is added by default to the list of rules.
In the Policy window with Identity-Based Policy enabled, click Add to define the
Authentication Rules.
Lab 4 Authentication
Objectives
In this lab, a new policy to implement user authorization will be added for after-
hours Internet web access. User disclaimer messages will also be added to the
Internet-bound policies and sessions will be redirected to a specified URL.
Tasks
In this lab, the following tasks will be completed:
• Exercise 1 Creating an Identity-Based Firewall Policy
• Exercise 2 Testing the Firewall Policy For Web Traffic
• Exercise 3 Adding User Disclaimers and Redirecting URLs
Timing
Estimated time to complete this lab: 20 minutes
Name auth-user
Type Firewall
Members Select the user created in step 1
from the Available Users Group list
and use the right arrow to move it to
the Members list.
3 Go to Firewall > Policy > Policy and configure a new policy with the following
settings:
Click OK.
4 Move this new all-dept policy to the top of the internal Æ wan1 policy list.
5 Enable Authentication Keep-alive for the web traffic firewall policies using the
CLI commands below.
config system global
set auth-keepalive enable
end
Note: Authentication keepalive extends the time of the session when traffic is
present. In this mode it acts as an idle timer rather than a hard timeout.
2 In the Authentication Keepalive window, click the Logout link and attempt to
browse to another web site.
Click OK.
2 Clear all authenticated sessions using the CLI command:
diagnose firewall iprope resetauth
3 In a new web browser window, access a web site. When the first user
disclaimer message appears. Click Yes, I agree.
When prompted by the authentication login page, log in as the user created in
Exercise 1.
After logging in, an authentication keep-alive page opens. Click the new
window link. This directs the user to the redirect URL specified in the firewall
policy created in Step 1.
259
www.fortinet.com
SSL VPN FortiGate VPN
FortiGate VPN
The FortiGate unit supports SSL, and IPSec VPN technologies. Each combines
encryption and VPN gateway functions to create private communication channels
over the Internet which helps to defray physical network costs and enables an
administrator to define and deploy network access and firewall policies using a
single management tool. In addition, they support simple client/user
authentication processes (including X.509 digital certificates).
An organization has the freedom to use either of the VPN technologies, however,
one may be better suited to their requirements.
SSL VPN
SSL VPNs are a good choice for roaming users who depend on a wide variety of
thin-client computers to access enterprise applications and/or company resources
from a remote location. SSL is typically used for secure web transactions. After a
secure HTTP link has been established between the web browser and web
server, application data is transmitted directly between selected client and server
applications through the tunnel.
When the SSL VPN feature is used, all client traffic is encrypted and sent to the
SSL VPN. This includes both traffic intended for the private network and Internet
traffic that is normally sent unencrypted. Split tunneling ensures that only the
traffic for the private network is sent to the SSL VPN gateway. Internet traffic is
sent through the usual unencrypted route. This conserves bandwidth and
alleviates bottlenecks.
SSL supports sign-on to a web portal front-end, from which a number of different
enterprise applications may be accessed. The Fortinet implementation enables a
specific port to be assigned for users to log in to the web portal and to customize
the login page, if desired.
SSL forms a connection between two end points such as a remote client and an
enterprise network. Transactions involving three (or more) parties are not
supported because traffic only passes between client and server applications.
To access server-side applications with SSL VPN, the remote user must have a
web browser and if Telnet/VNC/RDP are used, the Sun Java Runtime
Environment (JRE) must be enabled. Tunnel-mode client computers must also
have ActiveX (IE) or Java Platform enabled.
SSL VPNs provide secure access to certain applications. Web-only mode
provides remote users with access to server applications from any thin-client
computer equipped with a web browser. Tunnel-mode gives remote users the
ability to connect to the internal network from laptop computers, as well as airport
kiosks, Internet cafes, and hotels. Access to SSL VPN applications is controlled
through user groups.
IPsec VPN
FortiGate units support Internet Protocol Security (IPSec), a framework for the
secure exchange of packets at the IP layer, to authenticate and encrypt traffic.
FortiGate units implement the Encapsulated Security Payload (ESP) protocol in
tunnel mode. The encrypted packets look like ordinary packets that can be routed
through any IP network. Internet Key Exchange (IKE) is performed automatically
based on pre-shared keys or X.509 digital certificates. As an option, manual keys
can be specified.
IPSec VPNs are a good choice for site-to-site connections where appliance-based
firewalls are used to provide network protection and company-sanctioned client
computers are issued to users. IPSec is well suited to network-based legacy
applications that are not web-based. As a layer 3 technology, IPSec creates a
secure tunnel between two host devices. IP packets are encapsulated by the VPN
client and server software running on the hosts.
The FortiGate IPSec VPN feature is compatible with the VPN client feature of the
FortiClient Host Security application. A FortiGate unit can act as a policy server,
enabling FortiClient users to download and apply VPN settings automatically.
Because FortiGate units support industry standard IPSec VPN technologies, an
IPSec VPN can be configured between a FortiGate unit and most third-party
IPSec VPN devices or clients. IPSec supports multiple connections to the same
VPN tunnel (a number of remote VPN devices effectively become part of the
same network).
Dedicated IPSec VPN software must be installed on all IPSec VPN peers and
clients and the software has to be configured with compatible settings.
IPSec VPNs provide secure network access only. Access to the network
resources on a corporate IPSec VPN can be enabled for specific IPSec peers
and/or clients. The amount of security that can be applied to users is limited.
SSL VPN
Operating Modes
The operating mode of the SSL VPN to be used depends on the number and type
of applications installed on the remote computer. The following modes of SSL
VPN operation are only supported on FortiGate units running in NAT/Route mode:
• Web-only mode
• Tunnel mode
When a remote client connects to the FortiGate unit, the FortiGate unit
authenticates the user based on user name, password, and authentication
domain. A successful login determines the access rights of remote users
according to user group. The user group settings specify whether the connection
will operate in web-only mode or tunnel mode.
Web-Only Mode
Web-only mode is for thin, remote clients equipped with only a web browser.
When the FortiGate unit provides services in web-only mode, a secure web
connection between the remote client and the FortiGate unit is established using
the SSL VPN security in the FortiGate unit and the SSL security in the web
browser. After the connection has been established, the FortiGate unit provides
access to selected services and network resources through a web portal.
Web-only mode provides remote users with a fast and efficient way to access
server applications from any thin client computer equipped with a web browser. It
offers true clientless network access using any web browser that has built-in SSL
encryption and the Sun Java Runtime Environment.
Support for SSL VPN web-only mode is built into the FortiOS operating system.
The feature comprises an SSL daemon, running on the FortiGate unit, and a web
portal which provides users with access to network services and resources
including HTTP/HTTPS, Telnet, FTP, SMB/CIFS, VNC, and RDP.
In web-only mode, the FortiGate unit acts as a secure HTTP/HTTPS gateway and
authenticates remote users as members of a user group. After successful
authentication, the FortiGate unit redirects the web browser to the web portal
home page and the user can access the server applications behind the FortiGate
unit.
Configuring the FortiGate unit involves enabling SSL VPN, setting up an
appropriate policy and selecting web-only mode access in the user group settings.
The user group settings determine which server applications can be accessed.
SSL encryption is used to ensure traffic confidentiality.
The remote client computer must be equipped with the following software:
• Microsoft Windows 2000/XP/2003/Vista/7, Linux, or UNIX operating system
• Internet Explorer, Firefox or any other supported browser
• If Telnet/VNC or RDP are used, a Sun Java Runtime Environment 1.4 (or
later), with Java, JavaScript, and Accept Cookies enabled.
Web browsers offer different SSL security capabilities. The FortiGate unit offers
an SSL version 2 option through the CLI, if required, to support older browsers. In
addition, the FortiGate unit supports a range of cipher suites for negotiating SSL
communications with a variety of web browsers. The web browser must, at a
minimum, support a 64-bit cipher length.
Tunnel Mode
Tunnel mode is used for remote computers that run a variety of client and server
applications. In tunnel mode, a secure SSL connection is established initially for
the FortiGate unit to download SSL VPN client software to the web browser. After
the user installs the SSL VPN client software, they can initiate a VPN tunnel with
the FortiGate unit whenever the SSL connection is open. Where users have
complete administrative rights over their computers and use a variety of
applications, tunnel mode allows remote clients to access the local internal
network as if they were connected to the network directly.
Tunnel mode offers remote users the freedom to connect to the internal network
using the traditional means of web-based access from laptop computers, as well
as from airport kiosks, hotel business centers, and Internet cafés. If the
applications on the client computers used within a user community vary greatly,
deploy a dedicated SSL VPN client to any remote client through the web browser.
The SSL VPN client encrypts all traffic from the remote client computer and sends
it to the FortiGate unit through an SSL VPN tunnel over the HTTPS link between
the web browser and the FortiGate unit. Split tunneling is also available which
ensures that only the traffic for the private network is sent to the SSL VPN
gateway. Internet traffic is sent through the usual unencrypted route. This
conserves bandwidth and alleviates bottlenecks.
In tunnel mode, remote clients connect to the FortiGate unit and the web portal
login page using a web browser. The FortiGate unit acts as a secure
HTTP/HTTPS gateway and authenticates remote users as members of a user
group. After successful authentication, the FortiGate unit redirects the web
browser to the web portal home page. The user can then download the SSL VPN
client (available as an ActiveX, Java or stand alone application) and install it using
controls provided through the web portal.
When the user initiates a VPN connection with the FortiGate unit through the SSL
VPN client, the FortiGate unit establishes a tunnel with the client and assigns the
client a virtual IP address from a range of reserved addresses. The client uses the
assigned IP address as its source address for the duration of the connection. After
the tunnel has been established, the user can access the network behind the
FortiGate unit.
Configuring the FortiGate unit to establish a tunnel with remote clients involves
enabling SSL VPN, setting up an appropriate policy and selecting tunnel-mode
access in the user group settings. The firewall policy and threat management
profiles on the FortiGate unit ensure that inbound traffic is screened and
processed securely.
The remote computer must be equipped with the following software:
• Microsoft Windows 2000/XP/2003/Vista/7, Linux or Macintosh
• Microsoft Internet Explorer with ActiveX enabled or another supported web
browser with Java enabled
User Groups
User groups provide access to firewall policies that require SSL VPN access.
Local user accounts, or users with accounts in remote LDAP, RADIUS or
TACACS+ servers can be members of a user group. If all accounts in a remote
server are to be added to the user group, add the server itself to the group. The
FortiGate unit requests the user name and password when the user accesses the
SSL VPN web portal. The user group settings include the choice of portals to be
used by user group members.
User groups whose members will have access to the SSL VPN will have Allow
SSL-VPN Access enabled along with the type of portal to be presented to those
users.
To view the list of available user groups available on the FortiGate unit, go to User
> User Group > User Group and expand Firewall.
To view or modify any individual user groups in the User Group List, select the
group and click Edit ( ) or double-click the entry.
New user groups can be added to the list by clicking Create New on the User
Group List page. Complete the parameters of the user group as needed.
Portals
A portal is the web page that is displayed when a member of a user group logs
into the SSL VPN.
The FortiGate unit includes the following pre-defined portal types:
• Web-Access
• Tunnel-Access
• Full-Access
The portal displays a collection of widgets which allow access to functionality on
the portal.
Web-Access Portal
The Web-Access portal allows members of a user group to access a Web-Only
Mode SSL VPN.
Click a bookmarked link on the portal page to access a web site. Bookmarks are
hyperlinks to frequently accessed web pages or server applications that can be
used to start any session from the home page. The FortiGate unit forwards the
client requests to servers on the Internet or internal network.
Users can click Add to create new bookmarks or Edit to modify existing
bookmarks.
Tunnel-Access Portal
The Tunnel-Access Portal allows access to a Tunnel-Only Mode SSL VPN.
Click Connect to create the tunnel to the destination IP address identified in the
Tunnel Mode policy.
A link is presented to allow users to download a stand-alone application used to
create the Tunnel Mode link to the destination IP address. The application is
downloaded to the local hard drive and must be manually installed.
Full-Access Portal
The Full-Access Portal combines the functionality of the Web and Tunnel-Access
Portals.
Authentication Rules
Authentication Rules define the authentication options and other parameters for
users affected by the SSL VPN policy.
Tasks
In this lab, the following tasks will be completed:
• Configuring SSL VPN for Full Access
Timing
Estimated time to complete this lab: 25 minutes
Name SSLVPN
Type Firewall
Allow SSL-VPN Access Enable and select the full-access
portal from the list.
Available Users/Groups Move the Test SSL user from the
Available Users/Groups list to the
Members list.
Click OK.
4 Create a new firewall policy to allow access to the SSL VPN and authenticate
the user. Go to Firewall > Policy > Policy. Click Create New to configure a
policy with the following settings:
Click Add to configure a new identity-based policy with the following settings:
Available User Groups Move SSLVPN from the Available
User Groups list to the Selected
User Groups list.
Service Move ANY from the Available
Services list to the Selected
Services list.
Schedule always
Log Allowed Traffic Enabled
Click OK.
5 Move this SSLVPN policy to the top of the internal Æ wan1 policy list.
6 Test the SSL VPN by connecting to the portal by typing the following address
in the web browser:
https://192.168.1.99:10443/
Confirm the first-time Security Alert that is displayed.
Note: By default, the SSL VPN gateway listens to port 10443. In an actual deployment,
use port 443 as this port is typically open on Firewalls allowing easy remote access
using SSL. This can be changed by going to System > Admin > Settings and changing
the Web Admin HTTPS service from 443 to a different port number (for example,
8443). Then, change the SSL VPN login port from 10443 to 443.
7 When prompted, log in as the Test SSL user with the password of 123456.
Name Fortinet
Type HTTP/HTTPS
Location http://www.fortinet.com
Description Optional
SSO Disabled
Click OK.
9 Click the newly created bookmark. A new window displays the selected web
site.
Note the URL of the web site in the web browser address bar:
https://192.168.1.99:10443/proxy/http/www.fortinet.com
The first part of the address, https://192.168.1.99:10443, is the
encrypted link to the FortiGate SSL VPN gateway.
The second part of the address, /proxy/http is the instruction to use the
SSL VPN HTTP proxy.
The final part of the address, /www.fortinet.com, is the destination of the
connection from the HTTP proxy.
In this example, the connection is encrypted up to the SSL VPN gateway. The
connection to the final destination from the HTTP proxy is unencrypted.
10 Examine the PC’s current routing table by typing the following command from
a DOS command prompt:
route print
Note that the current default gateway is 192.168.1.99.
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.99 192.168.1.xxx 10
11 If this is the first time an SSL VPN tunnel is used on the PC, install the Fortinet
SSL VPN Client plug-in for the browser. Click the Click here to download and
install it link that appears in the Tunnel Model widget.
Download the client software to the PC desktop and close the web browser.
12 Run the installation application for the client software from the PC desktop.
13 Reopen the web browser and enter the address of the VPN portal:
https://192.168.1.99:10443/
14 Click the Connect button in the Tunnel Mode widget. When the tunnel is active,
the local interface fortissl will be listed as UP. Return to the routing table
through the DOS prompt and note that the default gateway is now 10.0.0.1,
which is the local tunnel endpoint. Because split tunnelling is not enabled, a
default route is displayed for the tunnel interface
.
Note: Split tunneling is a computer networking concept which allows a VPN
user to access a public network, for example, the Internet, and a local LAN or
WAN at the same time, using the same physical network connection. This
connection service is usually facilitated through a program such as a VPN
client software application.
15 Open a new web browser window and attempt to connect to the following web
site:
www.fortiguard.com
Note that the connection fails when tunnel mode is active.
In addition to the SSL VPN policy, additional objects must be created to allow
access from the ssl.root interface which is the source of all SSL VPN tunnel
traffic.
16 To observe the cause of the configuration problem run a packet sniffer
command in the CLI with the following filter and observe the output while trying
to reload the webpage.
diag sniffer packet any "port 80" 4
If not using DNS forwarding on the FortiGate and DNS queries are forwarded
from the PC to external DNS servers, test using the servers IP address. Use
the nslookup command to get the IP address of the server before testing in
this case.
TCP SYN packets should be observed incoming to the ssl.root interface. The
ssl.root interface represents the clients from the SSL VPN tunnel. To allow
these packets, this session must be accepted by creating a policy from the
ssl.root interface to the wan1 interface. We also need to define a route back to
the SSL VPN client for both RPF criteria and new session establishment.
17 Logout of the SSL VPN portal by clicking Logout ( ).
18 Create a static route for the SSL VPN tunnel client IP address. In Web Config,
go to Router > Static > Static Route and click Create New.
Configure the static route with following settings:
Destination IP/Mask 10.0.0.1/24
Device ssl.root
Leave the remaining default settings and click OK.
19 Create a new firewall policy from the sslvpn tunnel interface, this time using a
regular Accept action.
Click OK.
This new ssl.root Æ wan1 policy will be displayed in the Policy list.
20 Log back into the SSL VPN portal and click Connect to activate the SSL VPN
tunnel.
21 From the DOS prompt, confirm that the default route is now the tunnel
endpoint (10.0.0.1).
22 Connect directly to the following web site through the web browser:
www.fortiguard.com
The connection should be successful.
23 Run the packet sniffer command once again to verify that the traffic from the
ssl.root interface is now permitted.
24 Disable the two SSL policies created in this lab.
285
www.fortinet.com
FortiGuard Subscription Services FortiGuard Distribution Network
Alternately, the UDP port used for Service Point communication can be switched
to port 8888 through Web Config. If the default FortiGuard Service Point
hostname must be changed, use the system fortiguard hostname
CLI command. The FortiGuard Service Point hostname can not be changed
through Web Config.
If the FortiGate unit is unable to connect to the FortiGuard Distribution Network,
check the configuration. For example, routes may need to be added to the
FortiGate routing table of the network to allow the FortiGate unit to use HTTPS on
port 443 to connect to the Internet.
FortiGate
The server list is initially ordered by weight. The weight is equal to the time zone
difference between the FortiGate unit and the FortiGuard servers multiplied by 10.
The top servers on the list have the best round-trip time. All other servers are
listed by weight. The server list can be viewed in the CLI using the following
command:
diag debug rating
Lesson 8 - Antivirus of this course will discuss antivirus filtering in further detail.
The 301 - Secured Network Deployment and IPSEc VPN course discusses the
Intrusion Prevention System in further detail.
Lesson 10 - Web Filtering of this course will discuss web filtering in further detail.
Lesson 9 - Email Filtering of this course will discuss email filtering in further detail.
Subscription services that are properly registered and are receiving updates are
identified with a green check mark ( ). Services that are not valid or expired are
identified with a red X ( ).
Scheduled Updates
On the System > Maintenance > FortiGuard page, expand AntiVirus and IPS
Options. The Schedule Update options include the ability to check for updates to
the antivirus and IPS definitions at the following times:
• Hourly: Specify the number of hours and minutes between each update
request.
• Daily: Specify the time of day to check for updates.
• Weekly: Specify the day of the week and the time of day to check for updates.
Override Server
If the organization provides updates to the FortiGuard Subscription Services using
their own FortiGuard server (for example, through a FortiManager device) or if a
connection to the FortiGuard Distribution Network can not be made, the Use
override server address option may be used. When enabled, enter the IP address
or domain name the server to be used, for example, the IP address of a
FortiManager configured to provide FortiGuard services.
Push Updates
The FortiGuard Distribution Network can push antivirus and IPS updates to
FortiGate units to provide the fastest possible response to critical situations. The
FortiGate unit must be registered before it can receive push updates.
When a FortiGate unit is configured to allow push updates, it sends a SETUP
message to the FortiGuard Distribution Network. The next time new antivirus or
IPS definitions are released, the FortiGuard Distribution Network notifies all
FortiGate units that are configured for push updates that a new update is
available. Within 60 seconds of receiving a push notification, the FortiGate unit
requests an update from the FortiGuard Distribution Network.
When the network configuration permits, configuring push updates is
recommended in addition to configuring scheduled updates. On average the
FortiGate unit receives new updates sooner through push updates than if the
FortiGate unit receives only scheduled updates.
Enabling push updates is not recommended as the only method for obtaining
updates. The FortiGate unit might not receive the push notification. Also, when the
FortiGate unit receives a push notification it makes only one attempt to connect to
the FortiGuard Distribution Network and download updates.
The SETUP message that the FortiGate unit sends when push updates are
enabled include the IP address of the FortiGate interface to which the FortiGuard
Distribution Network connects. The interface used for push updates is the
interface configured in the default route of the static routing table.
The FortiGate unit sends the SETUP message if the IP address of this interface is
changed manually or if the interface addressing mode has been set to DHCP or
PPPoE and the DHCP or PPPoE server changes the IP address. The FortiGuard
Distribution Network must be able to connect to this IP address for the FortiGate
unit to be able to receive push update messages.
If redundant connections to the Internet are available, the FortiGate unit also
sends the SETUP message when one Internet connection goes down and the
FortiGate unit fails over to the other Internet connection.
Internet
Manual Updates
The FortiGuard antivirus and IPS definitions can be updated manually at any time
if a connection to the Fortinet Distribution Network is available
Click Update Now in the Antivirus and IPS Options to force a manual update to
the antivirus and IPS definitions.
Port Selection
FortiGuard services are reachable over port 53. An alternate port of 8888 can be
used. Click Test Availability to verify that FortiGuard Services are available
through either the default or alternate port.
Caching
Caching is available for web filtering and antispam. Caching is strongly
recommended as it improves performance by reducing FortiGate unit requests to
the FortiGuard server. The cache uses a small percentage of the FortiGate
system memory.
When the cache is full, the last recently used IP address or URL is deleted.
A Time To Live (TTL) setting controls the number of seconds webfilter and
antispam query results are stored in the cache before contacting the server again.
FortiGuard Center
The FortiGuard Center is a comprehensive on-line resource providing a rich
security knowledge base and technical resources including:
• Spyware, virus, intrusion prevention, web content filtering, and antispam attack
library
• Vulnerability encyclopedia which provides detailed descriptions of popular
operating systems and applications
• Virus, spyware, spam, and dangerous Web URL Submission Service
The Fortinet FortiGuard Center is where to find timely threat and vulnerability
information, as well as other online resources provided by Fortinet's Global Threat
Response Team. The FortiGuard Center is updated around-the-clock as new
information becomes available.
The FortiGuard Center is accessed at the following address:
http://www.FortiGuard.com
Note: This exercise can only be completed if the FortiGate unit has already been
registered on the Fortinet Support web site (https://support.fortinet.com).
Tasks
In this lab, the following task will be completed:
• Exercise 1 Enabling FortiGuard Services and Updates
Timing
Estimated time to complete this lab: 10 minutes
Note: Antivirus and IPS updates can also be set to be pushed automatically to the
FortiGate unit. To allow push updates, expand AntiVirus and IPS Options and enable
Allow Push Update and set the update schedule required, for example, every 4 hours.
Note: The update-now command is only for updating antivirus and IPS definitions only
and not for upgrading the system firmware.
4 View the CLI settings by entering the following commands in the CLI:
get system autoupdate schedule
get system fortiguard
The defined FortiGuard autoupdate interval was set to 4 hours through Web
Config but the CLI shows 4:60. This means that the additional minutes interval
will be randomly picked from 0 to 59 minutes. This helps to spread out the
request load on the FortiGuard server. An exact hour and minute interval can
be set through the CLI as illustrated in this example:
config system autoupdate schedule
set time 4:0
end
5 On the FortiGuard Distribution Network page, expand Web Filtering and Email
Filtering Options and configure the following FortiGuard service settings:
Click Apply.
6 Confirm that the FortiGuard Services are reachable by expanding Web
Filtering and Email Filtering Options once again and clicking Test Availability to
establish connectivity between the FortiGate unit and the FDN server.
Note: By default, FortiGuard uses UDP/53, because this port is almost always open for
DNS traffic. If there is another IPS device on the network that is decoding DNS data on
port 53, the FortiGuard request/response may trigger an alert, as the data is encrypted.
Change to UDP/8888 for FortiGuard communication and ensure upstream devices
permit this traffic to pass.
7 Before proceeding to the next lab, save the changes to the FortiGate
configuration.
Go to System > Dashboard > Status and in the System Information widget
click the Backup link. Save the file to the local hard disk and change the
backup file name to reflect that this backup was created at the end of Lab 7.
309
www.fortinet.com
Threat Management Content Scanning Techniques
Flow-Based Scanning
Flow-based scanning is a technique where data is inspected as it enters the
organization at a packet-by-packet level. This technique uses signatures to match
the data being received; if data in the flow matches an exisiting signature, the data
is deemed to be malicious and the transfer is cancelled.
Hackers, aware of the operation of flow-based scanners, will deliberately
compress or archive their malicious files and content to evade these scanners.
Once the file is received by a browser, the file is decompressed for display or
execution.
Flow-based scanners, and their reliance on static signatures are at best guessing
the contents of the file, increasing the likelihood of false positives and potentially
blocking legitimate file traffic. Flow-based scanning vendors may defend the
method by claiming that it is easy to write signatures to match the compressed or
uncompressed files. Some viruses, however, are considered to be polymorphic,
meaning they are programmed to mutate themselves by randomizing the use of
different algorithms and keying information to create multiple permutations of a
virus. This can pose some scalability issues in that the number of signatures
developed by the vendor to catch the original and mutant viruses can increase
significantly. The signature database will in turn grow to the point where system
performance is affected. Flow-based techniques do offer marginal performance
gains, but these gains are often negated by having to match the stream of data
against a large and ever swelling database of virus variants. The perfomance
gains are also weighed against the price of lower detection rates.
Flow-based scanning can be enabled on certain specific FortiGate devices
through the CLI.
File-Based Scanning
The FortiGate device uses an alternate technique where files are reassembled
before application-aware proxy methods are used for file analysis. This approach
allows the FortiGate unit to counteract evasion techniques by unpacking and
decrypting files prior to inspection.
As data is transferred between the hosts, the FortiGate system intercepts the file
fragments as they are delivered to the client who requested the file download.
Once all the fragments have been received, the FortiGate unit reassembles the
complete file for analysis. If the file is found to be compressed, an unpacker is
called upon to expose the true contents of the file. If the file is encrypted, the
FortiGate unit emulates the file execution to decrypt the data to the point where
the contents are exposed and can be accurately analyzed for threats. The final
exposed data is subject to application-specific scanning, designed to best capture
and thwart any threat.
By using emulation routines, the FortiGate unit requires just one signature to
detect any variation of the polymorphic virus. Only the signature of the exposed
file needs to be checked, removing the need to manage a collection of signatures
for each permutation of the virus.
By going the extra length to unpack and decrypt files, the FortiGate method
delivers higher detection and accuracy rates.
Using deep-file analysis and proxy-based application engines, the FortiGate unit
subjects files to multple layers of content, protocol and heuristic analysis allowing
the system to detect even the most sophisticated polymorphic content.
The FortiGate unit’s file-based scanning technique has proven to be very effective
and monthly testing by an independent third-party organization (ICSA) shows a
100% capture rate for active viruses on the Internet, a claim that can not be made
by stream-based vendors. Fortinet’s solution provides protection beyond wild list
viruses to include heuristics analysis and file emulation techniques to dynamically
detect polymorphic virus and new threat variants.
Proxies
Application Proxies
Each protocol that can be inspected has a dedicated transparent proxy in the
FortiOS architecture. This proxy sits between the client and the server
intercepting all connections (requests and responses).
Tasks performed by the application proxies include:
Making Decisions
The proxy, in cooperation with the inspection daemons (antivirus, antispam or
webfiltering) is responsible for making the decision to buffer, pass or block data
passing through the FortiGate based on the policies in place.
Buffering Files
When a client connects to a server and makes a request, it expects to receive
data in response. The proxy for certain protocols will buffer the server's response
before flushing it to the client. While buffering and flushing, the proxy sends no
information to the client and server.
A problem arises if the server response is large, or the proxy to server or proxy to
client connection is slow since the buffering or flushing stage can take a relatively
long time. This delay can be longer than the minimum timeout dictated by the
application protocol. As well, some clients do not follow standards and may close
a connection before the minimum timeout interval has elapsed. The client
therefore closes the connection without receiving a response.
Splicing is a technique that keeps the client from timing out and closing the
connection. This features sends some of the server's response to the client while
buffering it. The final part is withheld from the client while the proxy inspects it. If
the response is clean the final part is sent; if the inspection daemon identifies this
portion as infected the client and server connections are closed after sending any
appropriate error responses or replacement message. Depending on the details
of the application protocol, the client either discards the incomplete response or
accepts the substituted infection notification. Splicing is used for FTP uploads, or
for email protocols such as SMTP, POP and IMAP.
To avoid timeouts on HTTP and FTP upload a similar technique called client
comforting can be used. Client comforting can be fine tuned by configuring the
following parameters:
• Interval: time in seconds before client comforting starts after the download or
upload has begun. It is also the time between subsequent intervals.
• Amount: number of bytes sent at each interval.
SSL Proxy
To provide antivirus, antispam and web filtering inspection on SSL encrypted data
streams, an SSL proxy has been introduced. The SSL proxy is used to
encrypt/decrypt data streams before feeding them to the standard application
proxies.
Web Proxy
The FortiGate device can be configured to operate as an explicit web proxy for
HTTP and HTTPS sessions through the use of an internal web proxy.
IPS Engine
The IPS engine is responsible for examining traffic and comparing it against
known and customized intrusion signatures. The IPS engine and signature
database on the FortiGate unit are updated automatically through the FortiGuard
Distribution Network.
Scanunit Daemon
The scanunit daemon is responsible for much of the functionality of the threat
management system. The scanunit daemon performs the first level of parsing on
data arriving at the FortiGate unit. The antivirus engine is invoked by the daemon
to perform scanning on the data and communicate the result of the scan back to
the proxies. Based on this result, the proxies will decide which action to take.
The scanunit daemon will decompress or unpack files received by the FortiGate
unit and will examine the files to determine their final uncompressed size. This
information is returned to the proxies to allow it to determine if the file is over the
size limits in place.
The scanunit will also examine data to determine if any banned words have been
used or if any banned ActiveX and Java applets have been used.
If file pattern filtering has been configured on the FortiGate unit, the scanunit
daemon will be responsible for checking if the patterns exist.
When file quarantine is configured, the scanunit will determine if the file matches
the quarantine requirements.
The file checksum values will be calculated and compared to the values for known
viruses.
The antispam engine is also invoked by the daemon to perform various filtering
techniques depending on the mailing protocol used.
URLFilter Daemon
The URLFilter Daemon will query the FortiGuard service for URL ratings on behalf
of the proxy and will calculate and forward the appropriate action as described in
the protection profile.
Update Daemon
The update daemon will query for, and download, signature and engine updates.
When a virus is detected, the update daemon will report its existence back to the
FortiGuard Service in order to maintain the active and extended virus database
contents.
317
www.fortinet.com
Antivirus Virus Types
Lesson 8 Antivirus
The antivirus capabilities of the FortiGate unit detect and eliminate viruses,
trojans, worms and spyware, in real-time. The FortiGate unit scans incoming and
outgoing email attachments (SMTP, POP3, IMAP) and all FTP and HTTP traffic,
including web-based email, without degrading web performance. Antivirus
gateways close the vulnerability window by stopping viruses, trojans, spyware and
worms before they enter the network.
Virus Types
A computer virus infects a computer without the permission or knowledge of the
user. While the term virus is used generically to define any infectious software,
threats can vary.
Virus
A true virus is a self-replicating piece of programming code spread through the
network when executable code is passed to another computer by a user on the
infected computer. The user unknowingly sends the data over the network or the
Internet, or carries it on a removable device such as a CD, DVD, or USB drive.
Viruses are usually malicious, and can cause a variety of damage to the infected
computer such as deleting data, reformatting the hard drive or passing control of
the computer to a hacker.
Trojan
An application contains a trojan when it unloads hidden programs, scripts, or any
number of commands without the user's knowledge or consent. Malicious trojans
conceal and install applications on an affected computer. A trojan is not really a
virus, since the code is not self-replicating. Trojans often appear to perform a
desirable function, but in fact, perform undisclosed malicious functions, such as
allowing unauthorized access to the host machine.
Worm
A worm is a self-replicating computer program that exploits network weaknesses
to send copies of itself to other computers on the network without any user
intervention. Unlike a virus, worms do not need to attach themselves to an
existing program. Worms almost always cause at least some harm to the network,
if only by consuming bandwidth, whereas viruses almost always corrupt or modify
files on a targeted computer.
The FortiGate unit uses virus definitions to detect and remove viruses, worms,
trojans, and other threats from content as it passes through the FortiGate unit.
Antivirus Elements
The antivirus elements work in sequence to provide an efficient method of
scanning incoming files. Some elements have specific functions, while heuristics
is used to cover any new, previously unknown, virus threats. These elements work
together to offer the network unparalleled virus protection. To ensure that the
system is providing the most protection available, all virus definitions and
signatures are up dated regularly through the FortiGuard Subscription Services.
The FortiGate unit performs antivirus processing in the following order:
• File size
• File pattern
• Virus scan
• File type
• Grayware
• Heuristics
The antivirus scan starts from the least resource-intensive element to the most
resource-intensive element. If a file fails any of the elements of the antivirus scan,
no further scans are performed. For example, if the file fakefile.exe, is recognized
as a blocked pattern, the FortiGate unit will send the end user a replacement
message and the file will be deleted or quarantined. The virus scan, grayware and
heuristic scans will not be performed as the file has already been found to be a
threat and has been dealt with; there is no need to use further system resources
on the file at this time.
File Size
The size of a file will be checked against preset thresholds and will be blocked if it
is outside the allowed range. This scan is performed first as further checks against
the file will not be necessary on oversized files, saving system resources for other
processing operations. File size checks are enabled though Protocol Options.
File Pattern
Once the full file is received, the FortiGate unit verifies the file against the file
pattern filter. If the file is a blocked pattern, .exe for example, then it is stopped
and a replacement message is sent to the end user. No other levels of protection
are applied. If the file is not a blocked pattern or type, the next level of protection is
applied. File filters should be configured to block all files that are a potential threat
and to prevent active computer virus attacks.
Virus Scan
If the file is passed by the file pattern filter, a virus scan will be applied to it. The
virus definitions are kept up to date through the FortiGuard Subscription Services.
File Type
In addition to file pattern checking, the FortiGate unit can be configured to analyze
the file and determine its type, regardless of the file name. A list predefined types
is available on the FortiGate unit.
Grayware
Once past the file pattern filter, file type filter and the virus scan, the incoming file
will be checked for grayware. Grayware programs are unsolicited commercial
software programs that get installed on computers, often without the user’s
consent or knowledge. Grayware programs are generally considered an
annoyance, but these programs can cause system performance problems or be
used for malicious ends.
Heuristics
After an incoming file has passed the grayware scan, it is subjected to a heuristics
scan. The FortiGate heuristic engine performs tests on the file to detect virus-like
behavior or known virus indicators. In this way, heuristic scanning may detect new
viruses, but may also produce some false positive results.
File Filters
File filters are configured to block files that are a potential threat and to prevent
active computer virus attacks.
Files can be blocked by name, extension, or any other pattern. For example,
adding *.exe to the File Pattern List will block any files ending in .exe. File pattern
entries are not case sensitive. In addition to the built-in patterns provided by
default on the FortiGate unit, customized file patterns can be added to the File
Pattern List.
In addition to file pattern checking, the FortiGate unit can analyze a file and
determine its type, regardless of the file name. The list of types available to filter
against is pre-configured on the FortiGate unit.
Allow
If the file filter action is set to Allow, a matching file will be allowed to pass and the
next antivirus action will be performed.
Files are compared to enabled file patterns from top to bottom. If a file does not
match any specified patterns, it is passed along to antivirus scanning. In effect,
files are allowed if not explicitly blocked. Using the Allow action, this behavior can
be reversed with all files being blocked unless explicitly passed. Simply enter all
the file patterns to be passed with the Allow attribute. At the end of the list, an all-
inclusive wildcard (*.*) can be added with a Block action. Files that were allowed
continue to antivirus scanning while files not matching any allowed patterns are
blocked by the wildcard at the end.
Block
If the file filter action is set to Block, the file will be stopped and a replacement
message will be sent to the user.
If both File Filter and Virus Scan are enabled, the FortiGate unit will block files that
match the enabled file filters and will not pass the files along to be scanned for
viruses.
When the file is blocked by the file filter, the FortiGate unit writes a message to the
virus log and sends an alert email message if configured to do so.
To view or modify any individual file filter, click to select the filter from the list and
click Edit ( ) or double-click the entry.
New file filters can be defined by clicking Create New on the File Filter List page
and assigning a name for the filter.
Click OK.
To create a new file pattern filter, click Create New and define the parameters of
the file pattern filter as needed.
Only supported file types can be used in the filter. File types available for selection
include:
Archive arj, cab, lzh, rar, tar, zip, bzip, gzip,
bzip2
Batch File bat
Common Console Document msc
Encoded Data uue, mime, base64, binhex
Executable elf, exe
HTML Application hta
HTML File html
Java Application Descriptor jad
Java Compiled Bytecode cod
Javascript File javascript
Microsoft Office msoffice
Packer fsg, upx, petite, aspack
Palm OS Application prc
Symbian Installer System File sis
Windows Help File hlp
activemime activemime
Images jpeg, gif, tiff, png, bmp
Ignored Filetype ignored
Unknown Filetype unknown
The Ignored Filetype is used for traffic that the FortiGate unit typically does not
scan, including streaming audio and video.
The Unknown Filetype is used for any file type that is not listed in the table.
Virus Databases
The FortiGate unit uses virus definitions to detect threats as content passes
through the FortiGate unit. The virus definitions on the FortiGate unit are
refreshed every time the FortiGate unit receives an update from the FortiGuard
Server. A valid FortiGuard Subscription Services license is required to receive
antivirus definition updates once the initial one-month trial period has expired.
Three different virus databases can be enabled on the FortiGate unit.
To view the database information, go to UTM > Antivirus > Virus Database.
Grayware
The FortiGate unit scans for known grayware executable programs. The list is
refreshed whenever the FortiGate unit receives a virus update package. Grayware
detection is enabled through the Virus Database list.
Grayware Categories
Grayware filtering is applied to a variety of program types. All Grayware
categories are filtered on when Grayware Detection is enabled.
Adware
Adware is usually embedded in freeware programs and causes ads to pop up
whenever the program is opened or used. This advertising content may take many
forms, but is typically in the form of browser pop-up advertisements. Under most
circumstances a user is not aware of the adware component being installed on the
local machine, it may be surreptitiously installed along with a desired piece of
software or as an upgrade for additional functionality in one's web browsing
software. There can be a fine line between Adware and Spyware, as often adware
contains a spyware component.
Dialers
Dialers can be used to make unwanted calls through a user's modem or Internet
connection. As with most forms of spyware it is typically installed without the
user's knowledge, or educated consent. In the event that a dialer is installed a
user may discover unexpected toll charges on their phone bill as dialers allow
others to use the PC modem to call premium numbers or make long distance
calls.
Downloaders
Downloaders are malicious applications that retrieve files, such as advertising and
dial software from a remote location. Typically the files are for local installation. A
downloader application is under most circumstances stealthily installed without
user consent or knowledge. There are also times when a downloader will be
installed during the installation of a desired program. One of the signs that a
downloader is operating on a host is the detection of a spurious connection
attempt by a personal firewall. Under many circumstances this connection is
initiated by an unrecognized application.
Games
Games are computer programs that are intended for computer users' pastime.
Games are usually joke or nuisance games that could be blocked from network
users.
Hacker Tools
Hacker tools are typically used for security auditing and analysis. They do,
however, have an alternative purpose. Such tools are typically used to subvert
existing network and host security. Hacker tools can also be downloaded to crack
server password files, or overwhelm network servers. Many corporate
environments have policies prohibiting the possession of such software.
Hijackers
These are applications that manipulate the web browser or other settings to
change the user's favorite or bookmarked sites, start pages, or menu options.
Some hijackers have the ability to manipulate DNS settings to reroute DNS
requests to a malicious DNS server.
Jokes
These are applications typically received by email. The intent of joke software is to
cause the user confusion and/or distress. Jokes will often cause undesired visual
effects on the user's display. Some jokes alter the look of the display by changing
color schemes or backgrounds. Others will open a large number of Internet
browser windows, or display inappropriate content on the screen. Jokes have
been reported that analyze the host system seemingly scanning for viruses. Once
finished the joke may inform the user that a selection of randomly selected files
are viruses. Joke programs can include custom cursors and programs that appear
to affect the system.
Keyloggers
Keyloggers are applications that log input to the computer through the keyboard
and/or mouse. Keylogging applications under many circumstances are
downloaded and installed purposefully by a malicious user. These applications
can be used to capture passwords, record instant messaging conversations, send
email and so forth. The keylogger may record the information locally for later
retrieval. Alternatively, some keyloggers will transmit data to a third party in a
remote location. Typically, keylogger applications are operating in an obscured
manner.
Misc
These applications or components are uncategorized due to multiple
functionalities, or otherwise non-malicious behavior. These applications may also
qualify as Grayware.
NMT
These are applications that could be used for malicious purposes. They may
function as applications that alter network settings, disrupt network security, or
possibly cause other forms of network disruption. These applications could also
be used for legitimate purposes or in-house research such as risk management
amplitude tests.
P2P
These are applications that are installed to perform file exchanges. P2P, while a
legitimate protocol, is synonymous with file sharing programs that are used to
swap music, movies, and other files. Some P2Ps are being used as an entry point
for viruses.
Plugins
These are applications that are aimed to add additional programs or features to an
existing application in an attempt to control, record, and send browsing
preferences or other information back to an external destination.
Spyware
Spyware typically refers to the component of an adware that is responsible for
tracking a user's activities. Under most circumstances, the activities the author of
the spyware is interested in, are those performed online. The spyware component
will usually report online activities to a central server, or network. This network can
then compile a profile of the user's activities. Targeted advertising can then be
displayed based on the user's online habits. Under rare circumstances the
spyware can be particularly malicious in that it can report very detailed activities to
a third party. This may include personally identifiable data.
Toolbars
Toolbars are applications installed into a user's Internet browser. Under most
circumstances Toolbars are not hidden from plain view. Toolbars are often
installed to augment the capabilities of Internet browsing software. Toolbars are
offered by many legitimate companies for harmless reasons; often allowing easier
or faster access to content. This may take the form of offering such things as a
search box, or perhaps buttons allowing access to often-visited web sites.
Toolbars can however be used to cause undesired browser behavior. Some
toolbars work with adware. Still others, like BHOs, may re-direct search results, or
send personally identifying data or user browsing habits to a third party.
Heuristics
After an incoming file has passed the first three antivirus elements, it is subjected
to a heuristics inspection. The FortiGate heuristic engine performs tests on the file
to detect virus-like behavior or known virus indicators. In this way, heuristic
scanning may detect new viruses, but may also produce some false positive
results.
Quarantine
FortiGate units with a local disk can quarantine blocked and infected files. The
Quarantined File List displays the file name and status information about the file
that has been quarantined. Also, specific files can be submitted and file patterns
added to the AutoSubmit list for automatic uploading to Fortinet for further
analysis.
FortiGate units without a local disk can quarantine blocked and infected files to a
FortiAnalyzer unit. Files stored on the FortiAnalyzer unit can be retrieved for
viewing.
Quarantine Options
Infected, suspicious and blocked files can be quarantined based on their protocol.
Go to UTM > Antivirus > Quarantine to configure the quarantine options.
When quarantining to a local disk, define the attributes for the quarantined files.
Antivirus Profiles
Antivirus operations to be applied to network traffic are defined through antivirus
profiles. The antivirus profiles are in turn enabled within firewall policies; any traffic
being examined by the policy will have the antivirus operations applied to it.
The view the list of antivirus profiles on the FortiGate unit, go to UTM > Antivirus >
Profile.
To vew or modify an antivirus profiles in the list and click Edit ( ) or double-click
the entry.
New antivirus profiles can be defined by clicking Create New on the Antivurs
Profile List. Define the parameters of the profile.
Click to enable UTM filtering in the policy. Click to enable Antivirus filtering and
select the name of the antivirus profile. Click Edit ( ) to modify the attributes of
the antivirus profile directly from the New Policy window.
A Protocol Options list must be selected when Antivirus is enabled.
Scanning (General)
To optimize performance, avoid scanning files twice. This is of particular
importance with email. Where possible, scan email either as it arrives at the mail
server or is retrieved by the client, rather than on both occasions.
Quarantine
Use quarantine if false positives are anticipated and there is a need to be able to
release files to end users or conduct further antivirus analysis/submission.
Content Archive
Full content archiving can place great demands on storage capacity and on the
network used to transmit the data.
Consider using summary-level content archiving and/or use content archiving
selectively unless transaction archiving is required for auditing purposes.
If full archiving for all traffic is required, make sure that any remote logging device
is located in close proximity to the FortiGate unit using a dedicated network
interface on the FortiGate device.
Tasks
In this lab, the following tasks will be completed:
• Exercise 1 Configuring Global Antivirus Settings
• Exercise 2 Configuring an Antivirus Profile
• Exercise 3 Testing Antivirus Scanning for HTTP
Timing
Estimated time to complete this lab: 20 minutes
Note: The update may take several minutes to complete. In the meantime, continue
with the lab.
The equivalent CLI commands to invoke an FDN check and AV/IPS update are
as follows:
exec update-av
exec update-now
4 To help slow the spread of potentially malicious viruses and unauthorized
program applications from being installed, all *.exe and *.com files will be
blocked from being downloaded from the web, by FTP as well as all email
attachments.
In Web Config, go to UTM > AntiVirus > File Filter. Select the builtin-patterns
list and click Edit ( ) or double click the entry in the list. Expand File Patterns
and select the *.exe and *.com file patterns. Click Enable ( ).
Click OK.
5 Go to UTM > AntiVirus > Virus Database. Enable Grayware Detection to scan
for malicious grayware-type installers.
Click Apply.
6 File quarantine is available if the FortiGate unit model has an internal hard disk
or if a FortiAnalyzer device is available. Go to UTM > AntiVirus > Quarantine
and enable quarantine to Disk. (If using a FortiGate device without a hard disk,
enable quarantine to the online FortiAnalyzer device.)
Configure the quarantine settings as follows:
Click Apply.
7 Replacement messages are substituted for the infected file when the FortiGate
antivirus engine detects a virus. Go to System > Config > Replacement
Message. Expand HTTP. Click Edit ( ) to view the default Virus message and
File block messages for HTTP.
Alternately, display the same Replacement Messages in the CLI with the
following commands:
show system replacemsg http [http-virus/http-block/...]
Note: Some replacement messages are stored in raw HTML code. Make sure that the
correct syntax is used and preserve the existing HTML tags. An external HTML editor
can be used to create the replacement message and then copy and paste the resulting
HTML code into the FortiGate replacement message text windows.
Note: There may be policies in place from previous exercises that could allow the files
to be downloaded. If the above steps do not work, go to the firewall policies and ensure
that all other policies other than the default are disabled.
4 Go to Log&Report > Log Access > Antivirus. Click Disk to view the Antivirus
event messages.
349
www.fortinet.com
Mail Filtering
Tag
To affix the tag to the subject line, the FortiGate unit will convert the entire subject
line, including the tag, to UTF-8 by default. This improves the display for some
email clients that cannot properly display subject lines that use more than one
encoding.
Discard
For SMTP, if virus scanning is enabled, spam email can only be discarded.
Discarding immediately drops the connection. If virus scanning is not enabled
SMTP spam can be either tagged or discarded.
IP Address Check
FortiGuard provides a spam IP address blacklist. Fortinet keeps the FortiGuard IP
blacklist up-to-date as new spam sources are found. The FortiGuard service
extracts the SMTP mail server source address and sends the IP address to a
FortiGuard server to see if this IP address matches the list of known spammers. If
the IP address is found, FortiGuard terminates the session. If FortiGuard does not
find a match, the mail server sends the email to the recipient.
URL Check
FortiGuard Subscription Services provides a spam URL blacklist. Fortinet keeps
the FortiGuard URLs up-to-date as new spam sources are found. The FortiGuard
service checks the body of email messages to extract any URL links. These URL
links are sent to a FortiGuard server to see if any are listed. Spam messages
often contain URL links to advertisements (also called spamvertizing). If a URL
match is found, The Fortigate unit terminates the session. If FortiGuard does not
find a match, the mail server sends the email to the recipient.
Black/White List
The Black/White list can check incoming IP and email addresses against the
configured spam filter IP and Email Address List (SMTP only). An administrator
can add to and edit IP and email addresses to the list and can configure the action
to take as spam, clear, or reject for each IP address. An IP address can be placed
anywhere in the list. The filter checks each IP address in sequence.
Banned Word
Spam can be controlled by blocking email messages containing specific words or
patterns. If enabled in the email filter profile, the FortiGate unit searches for words
or patterns in email messages. If matches are found, values assigned to the
words are totalled. If a threshold value is exceeded, the message is marked as
spam. If no match is found, the email message is passed along to the next filter.
Perl regular expressions or wildcards can be when adding banned word patterns
to the list.
The language to scan against must be defined as well as whether to search the
email body, subject, or both as well as the action to take for each word.
Global Filters
FortiGuard Subscription Services provides databases to be used as global filters.
FortiIP is a sender IP reputation database while FortiSig are spam signature
databases. These global filters are constantly updated and enable the FortiGate,
FortiClient and FortiMail products to detect and filter most prevailing spam in the
Internet.
FortiSig1
The FortiSig1spam signature database contains spamvertised URLs. About 90%
of spam has one or more URLs in the message body. These URLs are links to
spammers' web sites promoting their products and services. In phishing spam,
these URLs direct one to a fake bank or other financial institution's web site
preying for private financial information. FortiGuard collects spam samples
through the Fortinet global spam trap network and spam sample submissions
received from customers and partners. The URLs are then extracted from the
spam samples which go through rigorous QA processing before they are injected
into the FortiSig Database. The URLs are then subject to a continuous aging
process where obsolete ones are promptly removed.
FortiSig2
The FortiSig2 spam signature database contains spamvertised email addresses.
This database is similar to the spamvertised URLs. Most spam messages have an
email address in the message body that prompts one to contact the spammers.
By extracting these email addresses from the spam sample, these spamvertised
email addresses provide another powerful global filter to identify and filter spam.
FortiSig3
The FortiSig3 spam signature database contains spam object checksums. Using
a proprietary algorithm, objects in spam are identified and a fuzzy checksum is
calculated from each object. The object can be part of the message body or an
attachment. The checksum is then added into the FortiSig database, providing
another highly effective global filter with virtually no false positives.
FortiRule
This global filter uses dynamically updated heuristic rules to identify spam,
exploiting various attributes in the spam message header, body, mime header,
and attachments. With manually crafted heuristic rules for specific spam attacks,
FortiRule further increases the catch rate with virtually no false positives.
Customized Filters
Various customized spam filters are provided to compliment the email filtering
solution on the FortiGate, FortiClient and FortiMail devices. These customized
filters range from banned word filters, local white and black lists of sender email
address, heuristic rules, to techniques such as Bayesian training available with
FortiMail units.
Banned Word
Spam can be controlled by blocking email messages containing specific words or
patterns. If enabled in the email filter profile, the FortiGate unit searches for words
or patterns in email messages. If matches are found, values assigned to the
words are totalled. If a user-defined threshold value is exceeded, the message is
marked as spam. If no match is found, the email message is passed along to the
next filter. Perl regular expressions or wildcards can be used to add banned word
patterns to the list.
Banned words can be one word or a phrase up to 127 characters long. For a
single word, the FortiGate unit blocks all email containing the word. For a phrase,
the FortiGate unit blocks all email containing the exact phrase. To block any word
in a phrase, use Perl regular expressions.
To view or modify any individual Banned Word List, click to select from the list and
click Edit ( ) or double-click the entry.
New Banned Word Lists can be defined by clicking Create New and assigning a
name for the list.
Click Create New to define new banned words to appear in the list.
Edit the Banned Words List at any time to add new words or edit or disable any
entries in the list.
Word Boundary
In Perl regular expressions, the pattern does not have an implicit word boundary.
For example, the regular expression test not only matches the word test but also
any word that contains test such as atest, mytest, testimony, atestb. The
notation \b specifies the word boundary. To match exactly the word test, the
expression should be \btest\b.
Case Sensitivity
Regular expression pattern matching is case sensitive in the web and antispam
filters. To make a word or phrase case insensitive, use the regular expression /i.
For example, /bad language/i will block all instances of bad language regardless
of case.
Examples
To block any word in a phrase use this format:
/block|any|word/
Spammers often insert other characters between the letters of a word to fool spam
blocking software. To block purposely misspelled words use this format:
/^.*v.*i.*a.*g.*r.*o.*$/i
/cr[eéèêë][\+\-
\*=<>\.\,;!\?%&§@\^°\$£€\{\}()\[\]\|\\_01]dit/i
To block common spam phrases use this format: (These phrases are some
examples of common phrases found in spam messages.)
/try it for free/i
/student loans/i
/you’re already approved/i
/special[\+\-\*=<>\.\,;!\?%&~#§@\^°\$£€\{\}()\[\]\|\\_1]offer/i
IP Address Filtering
The FortiGate unit uses both an IP Address List and an Email Address List to filter
incoming email.
When performing an IP address check, the FortiGate unit compares the IP
address of the message’s sender to the IP Address List in sequence. If a match is
found, the action associated with the IP address is taken. If no match is found, the
message is passed to the next enabled spam filter.
To view or modify any individual IP Address List, select the list and click Edit ( )
or double-click the entry.
New IP Address Lists can be defined by clicking Create New on the IP Address
List page and assigning a name for the list.
Edit the Banned Words List at any time to add new words or edit or disable any
entries in the list.
IP Trust
If the FortiGate unit sits behind a company’s Mail Transfer Units (MTU), it may be
unnecessary to check email IP addresses because they are internal and trusted.
The only IP addresses that need to be checked are those from outside of the
company. In some cases, external IP addresses may be added to the IP trust
table if it is known that they are not sources of spam. Use the iptrust command
from the CLI to add an entry to a list of trusted IP addresses.
To view or modify any individual Email Address List, click to select the list and
click Edit ( ) or double-click the entry.
New Email Address Lists can be defined by clicking Create New on the Email
Address List page and assigning a name.
Click OK.
Click Create New to add a new email address to the list.
Edit the Email Address List at any time to add new addresses or edit or disable
any entries in the list.
To vew or modify any email filter profiles in the list, select the item and click Edit
( ) or double-click the entry.
New email filter profiles can be defined by clicking Create New on the Email Filter
Profile List page. Define the parameters of the profile.
Click to enable UTM filtering in the policy. Click to enable Email Filter and select
the name of the email filter profile. Click Edit ( ) to modify the attributes of the
email filter profile directly from the New Policy window.
When email filtering is enabled in the policy, a Protocol Options list must be
selected.
381
www.fortinet.com
Web Filtering Web Filtering Elements
URL Filter
Access to specific URLs can be allowed or blocked by adding them to the URL
Filter list. Patterns can be added using text, regular expressions or wildcard
characters, to allow or block URLs. If the FortiGate unit blocks web pages
matching any specified URLs or patterns, a replacement message is displayed in
its place.
To view or modify any individual URL filters, click to select the filter from the list
and click Edit ( ) or double-click the entry.
New URL Filter Lists can be defined by clicking Create New on the URL Filter
page and assigning a name for the filter.
Click OK.
Type the top-level URL or IP address to control access to all pages on that web
site. For example, www.example.com or 192.168.144.155 controls
access to all pages at this web site.
Enter a top-level URL followed by the path and filename to control access to a
single page on a web site. For example, www.example.com/news.html or
192.168.144.155/news.html controls the news page on this web site.
To control access to all pages with a URL that ends with example.com, add
example.com to the filter list. For example, adding example.com controls
access to www.example.com, mail.example.com,
www.finance.example.com, etc.
Access to all URLs that match patterns created can be controlled using text along
with regular expressions or wildcard characters. For example, example.*
matches example.com, example.org, and example.net.
URLs with an action set to Exempt are not scanned for viruses. If users on the
network download files through the FortiGate unit from a trusted website, add the
URL of this website to the URL Filter List with an action set to Exempt so the
FortiGate unit does not apply virus scanning to files downloaded from this URL.
FortiGate URL blocking supports standard regular expressions (see Using Perl
Regular Expressions in Lesson 9 - Email Filtering).
FortiGuard Web Filtering Categories are defined in a web filter profile. Expand
FortiGuard Web Filtering, and identify the action on specific categories or
classifications..
Class Description
Cached Contents Web pages that are stored or cached in a second
website, generally a search engine website.
Image Search Websites providing a search of images or photos, or the
results of image or photo searches.
Audio Search Websites providing a search of audio clips or the results
of audio searches.
Video Search Websites providing a search of video clips or the results
of video searches.
Multimedia Search Websites providing a mixed search of images, photos,
audio, and video materials or the results of such
searches.
Spam URL Websites or web pages whose URLs are found in spam
emails. These web pages often advertise sex sites,
single clubs, and other potentially nuisance or offensive
materials.
Unclassified This class includes all other web pages that do not fall
into one of the above classes, including regular web
searches and others.
Override Scope The scope defines who may use the override rule. Select
one of the following choices from the list:
• User
• User Group
• IP
• Profile
• Ask
Override Type The type defines the level of access to sites where an
override has been applied. Select one of the following
choices from the list:
• Exact Domain
• Categories
• Ask
• Directory
Off-site URLs This option defines whether the override web page will
display the images and other contents from the blocked
offsite URLs.
Allow
Deny
Ask
Override Time Specifies when the override rule will end.
User Group If User Group has been specified in Override Scope,
select the user group in the Available column and move
that group to the Selected column.
Administrative Overrides
Administrative overrides are defined by an administrator to allow access to
blocked web sites based on directory, domain name, or category. These overrides
are backed up with the main configuration and managed by the FortiManager
system. Administrative overrides are not cleaned up when they expire and these
override entries can be reused by extending their expiry dates. Administrative
overrides can be created using both the CLI and Web Config
To view the overrides, or to add Override Rules, go to UTM > Web FIlter >
Override.
Select Administrative Overrides from the list and click Edit ( ) or double-click the
entry.
Override Rules
Override Rules allow access to blocked web sites based on a directory, domain
name, or category.
On the Administrative Overrides page, click Create New to configure the new rule.
Category Rules
Category Rules allow an override based on FortiGuard Categories. Select
Categories from the Type drop-down list. Click in the Override column to enable
the Categories and Classifications to be overriden.
User Overrides
Entries are added to the user override list when a user authenticates to enable a
user override. User overrides are not backed up as part of the FortiGate unit
configuration, and are purged when they expire. An administrator can view and
delete user overrides.
To view the user overrides select User Overrides and click Edit ( ) or double-
click the entry..
Local Ratings
Local Ratings override the rating or classification applied to a URL by the
FortiGuard Web Filtering Service. This allows an administrator to assign any URL
to a different category, which will appear in reports as Local Category.
To view the local rating configured on the FortiGate device, go to UTM > Web
Filter > Local Ratings.
Local Categories
Local Categories can be created for applying Local Ratings. Administrator-
created categories will appear in the Local Ratings window, allowing ratings to be
applied.
Go to UTM > Web Filter > Local Categories. Type the name of the Local Category
and click Create New.
The new Local Category will be displayed in the New Local Rating window by
expanding the Local Categories item.
To view or modify any individual Web Content Filter Lists, click to select the filter
and click Edit ( ) or double-click the entry.
New Web Content Filter Lists can be defined by clicking Create New and
assigning a name for the filter.
Click OK.
Click Create New and define the parameters of the Web Content Filter.
To vew or modify any web filter profiles in the list, select the profile and click Edit
( ) or double-click the entry.
To create a new web filter profile, click Create New on the Web Filter Profile List
page and define the parameters of the profile.
HTTP Post Action Select the post action from the drop-
down list.
Provide Details for Blocked HTTP When enabled for HTTP, the FortiGate
4xx and 5xx Errors unit will replace 4xx and 5xx HTTP errors
with its own internal pages.
Rate Images by URL Blocks images that have been rated by
FortiGuard Subscription Services.
Blocked images are replaced on the
originating web pages with blanks. Rated
image types are GIF, JPEG, PNG, BMP,
and TIFF.
Allow Websites When a Rating When enabled for HTTP or HTTPS, the
Error Occurs FortiGate unit will allow users to access
websites that returned an error when
queried for a rating from FortiGuard
Subscription Services.
Strict Blocking When enabled for HTTP or HTTPS, web
site access is disallowed if any
classification or category matches the
block rating or lists. When disabled, web
site access is allowed if any classification
or category matches the allowed list.
Rate URLs by Domain and IP When enabled for HTTP and HTTPS,
Address this option sends both the URL and the
IP address of the requested site for
checking, providing additional security
against attempts to bypass the
FortiGuard system. However, because
IP rating is not updated as quickly as
URL rating, some false ratings may
occur.
Block HTTP Redirects by Rating When enabled for HTTP and HTTPS,
this option applies the rating of the
original web site to redirections. Many
web sites use HTTP redirects
legitimately; however, in some cases,
redirects may be designed specifically to
circumvent web filtering as the initial web
page could have a different rating than
the destination web page of the redirect.
Daily log of remaining quota Enable to generate a daily log entry with
remaining quota values.
Click to enable UTM filtering in the policy. Click to enable the web filter and select
the name of the web filter profile. Click Edit ( ) to modify the attributes of the web
filter profile directly from the New Policy window.
When Web Filter is enabled, a Protocol Options list must be selected.
Tasks
In this lab, the following tasks will be completed:
• Exercise 1 Configuring Local Web URL and Content Filtering
• Exercise 2 Testing Web Category Filtering
• Exercise 3 Web Filtering Overrides
Timing
Estimated time to complete this lab: 35 minutes
Note: ^.*$ means “at the beginning of the line” (^) match any single character (.)
followed by the same preceding match (*) until the end of the line ($). There are many
references on the web for Regular Expressions or Perl compatible regular expressions,
for example, http://perldoc.perl.org or
http://www.regexlib.com/CheatSheet.aspx.
Click OK.
3 Go to UTM > Web Filter > Profile.
Click Create New and enter the name URL_Profile. Enable HTTP, HTTPS, and
Logging for Web URL Filter. Select the URL filter called URL_List from the
Options list.
Click OK.
4 Go to Firewall > Policy > Policy. Select the default internal Æ wan1 policy and
click Edit ( ) or double-click the entry.
5 Click to enable UTM. Enable Web Filter and select the URL_Profile web filter
profile. When Web Filter is enabled, a Protocol Options list must be selected.
Select the default list and click OK.
6 Open a new web browser window and browse to a random web site. Note that
all web sites are now blocked and that the URL Filter Block Replacement
Message is displayed.
Note: Web browser caching may interfere with web filtering. If the web site is not
blocked, clear the cache in the web browser and try again.
7 Go to System > Config > Replacement Message. Expand HTTP. Edit the URL
block message and add a custom message.
8 Go to UTM > Web Filter > URL Filter. Click to select the URL List filter and
click Edit ( ) or double click the entry.
9 Click Create New and add the following filter:
URL www.fortinet.com
Type Simple
Action Allow
Enable enable
Note: Ensure that the words selected do not appear as part of the graphics or flash
movies on this web page. For example, chose technology, program, or partner.
Word 1
Word 2
Word 3
Phrase
13 Go to UTM > Web Filter > Web Content Filter. Click Create New. Enter the
name Content_Filter and click OK.
On the Content_Filter page, click Create New and add Word 1 to the content
pattern list as follows:
Action Block
Pattern <Word 1>
Pattern Type Wildcard
Language Western
Score 5
Enable enabled
Click OK.
14 Go to UTM > Web Filter > Profile and edit URL_Profile. Enable HTTP and
Logging for Web Content Filter. Select the Content_Filter from the Options list
Set the Threshold to 5.
Click OK to save the changes.
15 Reload www.fortinet.com to test that this page is blocked and that the
Banned Word Block Replacement Message is displayed.
(If the page appears, clear the cache on the browser and try again.)
16 Go to Log&Report > Log Access > Web Filter. Check the Disk log messages
for the web content block entry.
17 Go to UTM > Web Filter > Web Content Filter. Click to select Content_Filter
and click Edit ( ).
Click to select the Word 1 pattern and click Disable ( ) before continuing.
18 Click Create New to add Word 2 to the web content filter list as follows:
Action Block
Pattern Type Word 2 using the form: /Word/i
Pattern Type Regular Expression
Language Western
Score 5
Enable enabled
20 Go to UTM > Web Filter > Web Content Filter. Click to select Content_Filter
and click Edit ( ).
Click Create New to add an exempt pattern to the web content filter list as
follows:
Action Exempt
Pattern Type the phrase chosen earlier.
Pattern Type Regular Expression
Language Western
Enable enabled
Click OK.
21 Test the access to www.fortinet.com.
The web page should be displayed because of the exempt phrase.
22 Add Word 3 to the web content filter list with a score of 5 and test.
The page should still pass even if the threshold has been reached since the
exempt phrase is tested first.
Note: Some parts of an allowed web page may be blocked if off-site URLs are used
that are not in the allowed category.
Name web-override
Type Firewall
Members Enter the User Name of the sample
user created in the Authentication
lab.
Click OK.
2 Go to UTM > Web Filter > Profile and edit the Category_Test profile. Expand
FortiGuard Web Filtering and enable Allow Override for all categories.
3 Expand FortiGuard Web Filtering Overrides and enable HTTP and HTTPS.
Set the following:
Override Scope IP
Override Type Exact Domain
Off-site URL Deny
Override Time Constant/15 minutes
User Group web-override
Click OK.
Note: Do not use a web proxy, otherwise the Web Category Override web page will not
work.
4 Try to visit a blocked category website. This time the blocked page
replacement message will have an Override link.
Click the Override link to view a Web Filter Block Override. Enter the user
name of and the password of a sample user created in Lab 5 - Authentication.
Note that other fields are grayed out as they are set by the override user
group. After completing the required fields that will grant access to the desired
website, click Continue.
5 Go to UTM > Web Filter > Override. Click to select User Overrides and click
Edit ( ) (or double-click the entry) to view the web filter override list. Note the
Expiry Date column of the dynamically added entries.
6 Go to Log&Report > Log Access > Web Filter.
Locate the log messages related to category blocking. Scroll or page down to
locate the log messages from the URL and content filtering performed earlier
in this lab.
7 Disable the web filter profile in the firewall policy.
421
www.fortinet.com
Data Leak Prevention Monitored Data Types
Regular Rules
A regular rule contains a single parameter used to define data to be protected.
Rules can define the types of data to look for, for example strings, cookies, or
URLs. Rules also describe where to look for this data for example file types or
transaction types in addition to where the data is originating from, or being
requested.
Multiple regular rules can be added on the FortiGate device, and combined to
create compound rules or added directly to a DLP sensor.
To view the list of DLP regular rules currently available on the FortiGate unit, go to
UTM > Data Leak Prevention > Rule.
There are some built-in DLP regular rules available to help illustrate how rules
could be used to address certain data leak issues using known patterns, for
example credit card numbers.
To view or modify any individual regular rules, click to select the rule from the list
and click Edit ( ) or double-click the entry.
New DLP regular rules can be defined by clicking Create New on the DLP Rules
List page. Assign a name for the rule, select the protocol and define the parameter
by selecting the rule and defining the rule criteria.
A variety of rule types are available for use in regular rules.
Email Rules
Email rules are used to scan SMTP, IMAP and POP3 traffic and contains criteria
common to mail messages.
HTTP Rules
HTTP rules contain criteria common to HTTP POST and GET traffic.
HTTPS Rules
HTTPS rules contains a single criteria which is always enabled.
FTP Rules
FTP rules contain criteria common to FTP PUT and GET traffic.
NNTP Rules
NNTP rules contain criteria common to NNTP traffic.
Compound Rules
DLP regular rules can be combined into compound rules that can be included in
sensors. If regular rules are specified directly in a sensor, traffic matching any
single rule will trigger the configured action. If the rules are first combined into a
compound rule and then specified in a sensor, every rule in the compound rule
must match the traffic to trigger the configured action. Compound rules allow an
administrator to group individual rules to specify far more detailed activation
conditions. Each included rule is configured with a single attribute, but every
attribute must be present before the rule is activated.
Individual regular rules in a sensor are linked with an implicit OR condition while
rules within a compound rule are linked with an implicit AND condition.
To view the list of DLP compound rules currently available on the FortiGate unit,
go to UTM > Data Leak Prevention > Compound.
There are some built-in compound rules available to help illustrate how compound
rules could be used to address certain data leak issues.
To view or modify any individual compound rules, click to select the rule from the
list and click Edit ( ) or double-click the entry.
New DLP compound rules can be defined by clicking Create New on the DLP
Rules List page. Assign a name for the compound rule, select the protocol and
regular rules to be included.
For each protocol selected, select the individual regular rules to be included in the
compound rule. Click to add an additional regular rule to the compound rule.
Click to remove a regular rule from the compound rule.
Rule Processing
When a DLP rule is configured, traffic passes through the proxies as usual. Some
of the rules are matched in the proxies (for example URL, cookie content, CGI
parameters, HTTP header, hostname, server, user, and user group), while others
are matched in the scanunit (for example, body, subject, sender, receiver,
attachment size, attachment text, file text, binary patterns, encrypted, attachment
type and file type).
DLP rules differ from other types of rules on the FortiGate unit in that it is not the
first rule matched which determines the behavior, but instead the proxy and
scanunit work together to match as many of the rules as possible. The order of the
rules is not important, all the rules are combined to determine the resulting action.
Some actions, such as Block will affect the current request, others such as Ban or
Quarantine will affect future requests.
• Traffic coming into the FortiGate unit along the network connection passes
through the proxy. The headers in the data are examined and some DLP rules
may be matched. No action is taken at this point.
• The files associated with that session are sent to the scanunit for scanning and
archiving (if required).
• The results are sent back to the proxy and final action is determined if all the
DLP rules matched.
Rule Priority
If multiple DLP rules are matched, the order of priority for the rules are as follows:
1 If archive is selected, it will always be performed
2 Exempt overrides all other actions
3 Ban and quarantine
Actions in this grouping will be simultaneously applied. The actions are listed in
order from most restrictive to least restrictive:
• Quarantine interface
• Quarantine IP
• Ban IP
• Ban user
• Ban sender
4 Block
5 None
There are some built-in sensors available to help illustrate how sensors could be
used to address certain data leak issues.
To view or modify any individual sensors, click to select the sensor from the list
and click Edit ( ) or double-click the entry.
New DLP sensors can be defined by clicking Create New on the Sensor List page
and assigning a name for the sensor.
Click OK.
None
This prevents the DLP rule from taking any action on network traffic. Other
matching rules in the same sensor and other sensors may still operate on
matching traffic.
Block
This action prevents the traffic matching the rule from being delivered.
Exempt
This action prevents any DLP sensors from taking action on matching traffic. This
action overrides any other action from any matching sensors.
Ban
This action will block all traffic using the protocol that triggered the rule if the user
is authenticated. If the user is not authenticated, all traffic using the protocol that
triggered the rule will be blocked.
Ban Sender
This action will add the sender of matching email/IM messages to the Banned
User list. This action is available only for IM and email protocols.
Quarantine IP address
This action is a more restrictive approach and will block access to the network
from any IP address that sends traffic matching a sensor with this action.
Quarantine Interface
This action will block access to the network from any client on the interface that
sends traffic matching a sensor with this action.
Any ban or quarantine actions will place an entry in the Banned User list. If an
entry is listed in the Application Protocol column of the Banned User list, the item
has had a ban action applied. If the protocol is not listed, then a quarantine action
has been applied because it applies to all protocols, not just the ones mentionned.
To view the Banned User list, go to User > Monitor > Banned User.
Note: DLP for instant messaging (IM) requires that application control be enabled since
application detection is performed before handing off to the IM proxy. Due to data
latency issues, only file transfers performed through instant messaging will be subject
to DLP filtering, not the content of the messages exchanged.
The text of IM messages can be archived, however. To indicate that text should also be
archived, be sure to add a DLP rule which specifies transfer size >=0 and then select
the Archive option when applying this rule to the DLP sensor.
Click to enable UTM filtering in the policy and enable DLP Sensor. Select the
name of the sensor to be used from the list. Click Edit ( ) to modify the attributes
of the DLP sensor directly from the New Policy window.
Any DLP-triggered log entries will be displayed in Log&Report > Log Access >
DLP.
Tasks
In this lab, the following tasks will be completed:
• Exercise 1 Blocking Encrypted Files
• Exercise 2 Blocking Leakage of Credit Card Information
• Exercise 3 Blocking Oversize Files by Type
• Exercise 4 DLP Banning and Quarantining
Timing
Estimate time to complete this lab: 40 minutes
4 Edit the default internal Æ wan1 policy. Enable UTM and DLP Sensor. Select
the Block_Encrypted DLP sensor.
When DLP Sensor is enabled, a Protocol Options list must be defined. Select
the default list. Disable any other UTM elements that are enabled from
previous exercises and click OK.
5 Using a web-based file transfer tool (for example, www.yousendit.com or
www.sendspace.com) attempt to send the dlp-test-encrypt.zip file to an
email address.
The DLP block replacement message should be presented.
6 Locate the DLP log entry for this action.
7 Change the extension on the file name to *.txt and attempt to send the file
again. The file should still be blocked.
447
www.fortinet.com
Application Control
Application Types
Application Control on the FortiGate unit supports over 100 applications, grouped
into 18 categories.
Application Category Description Examples
Instant Messaging Includes IM (Instant Messaging) software and online AIM, Google.Talk, MSN, Yahoo
chatting applications.
Peer-to-Peer Includes P2P (Peer to Peer) applications and associated BitTorrent, Edonkey, Gnutella,
P2P protocols, which can establish a P2P network to Kazaa, Skype
provide fast data sharing.
Voice over IP Includes voice communication software using VoIP H.245, MGCP, Net2phone,
technologies (e.g. SIP, H.323, etc.), which can deliver Netmeeting, SIP.TCP
voice over network.
File Transfer Includes file transfer applications and associated FTP, HTTP.Audio, HTTP.EXE,
protocols, which enable two or more people to exchange RapidShare, YouSendIt
files over the network.
Video/Audio Includes streaming video/audio applications and iTunes, Peercast, PPStream,
Streaming associated protocols, which can provide online Quicktime, RealPlayer
video/audio.
Internet Proxy Includes proxy software and websites, which can make Ghostsurf, Hamachi,
indirect network connections to other networks and HTTP.Tunnel, Tor.Web.Proxy,
bypass the firewall policy. Ultrasurf
Remote Access Includes remote management software and associated Gotomypc, MS.RDP.Request,
Connection protocols, which can be used to log in and operate PCAnywhere, Teamviewer,
remote machines. VNC.Request
To view the entire list of applications that can be managed through FortiGate
Application Control, go to UTM > Application Control > Application List.
Columns can be filtered to help limit the display of applications in the list. Click
Filter ( ) for a specific column and edit the filters as needed.
To view or modify any individual Application Control Lists, click to select the list
and click Edit ( ) or double-click the entry.
New Application Control Lists can be created by clicking Create New on the
Application Control List page and assigning a name for the list.
Click OK.
Note: Depending on the Application and Action selected, different parameters may
become available for configuration. For example, when certain applications are set with
an Action of Pass, traffic shaping parameters may become available for configuration.
Click to enable UTM filtering in the policy. Click to enable Application Control and
select the name of the Application Control List, or select [Create New...] to define
a new list. Click Edit ( ) to modify the attributes of the Application Control List
directly from the New Profile window.
Tasks
In this lab, the following tasks will be completed:
• Exercise 1 Creating an Application Control List
• Exercise 2 Testing Application Control
Timing
Estimated time to complete this lab: 10 minutes
Category: web
Application: Myspace
Action: Block
Logging: Enabled
3 Go to Firewall > Policy > Policy and edit the default policy. Enable UTM, and
Application Control. Select the App_Control_Lab control list. Click OK.
5 Edit the App_Control_Lab Application Control List and set the action for
youtube.com to Block.
6 In a web browser, attempt to play a video on youtube.com once again.
7 Locate the log entry for this action in the Application Control log. Double-click
the entry to view the details of the log entry.
459
www.fortinet.com
Endpoint Control Endpoint Network Access Control
Application Sensors
Application sensors describe the applications to be allowed, denied or monitored
through FortiGate Endpoint NAC.
Applications available for use within the sensors are predefined on the FortiGate
device. To view the list of predefined application available on the FortiGate
device, go to Endpoint > NAC > Application Database.
There are some built-in sensors available to help illustrate how sensors could be
used to control application use on client computers.
To view or modify any application sensor in the list, select the sensor and click
Edit ( ) or double-click the entry.
FortiClient Compliance
The use of FortiClient Endpoint Security can be enforced on network through
Endpoint NAC. This will ensure that clients have both the most recent version of
the FortiClient software and the most up-to-date antivirus signatures.
The FortiGate unit retrieves FortiClient software and antivirus updates from
FortiGuard servers. If the FortiGate unit contains a hard disk drive, these files are
cached to more efficiently serve downloads to multiple end points.
Go to Endpoint > NAC > FortiClient to see the software and antivirus signature
versions that the Endpoint NAC will enforce.
To create a new endpoint NAC profile, click Create New and define the
parameters of the profile.
Click to enable Endpoint NAC. Select an appropriate endpoint NAC profile from
the list. Click Edit ( ) to modify the attributes of the endpoint NAC profile directly
from the New Policy window.
Vulnerability Scanning
A vulnerability scan can help determine whether an organization’s client
computers are vulnerable to attack. Scans are perfomed against configured hosts
and information is summarized for review by an administrator.
The FortiGuard Vulnerability Management Service provides a database of
common vulnerabilties for which to scan. This database is kept up to date through
a subscription service to ensure that new vulnerabilities are added to the
database as they are discovered, allowing hosts to be scanned for the most
current security risks.
Assets
Before the FortiGate unit can scan for vulnerabilties, an administrator must
identify the client computers to be included in the scan. The client computers can
be identified using a specific IP address or a range of IP addresses. The FortiGate
unit can search an IP range to automatically discover assets to be added to the
scan.
To view the list of assets to be scanned for vulnerabilties, go to Endpoint >
Network Vulnerability Scan > Asset.
To view or modify any assets in the list, select the asset and click Edit ( ) or
double-click the entry.
Asset Discovery
Client computers can be added to the Asset List by using the Asset Discovery
mechanism. Once added to the Asset List, client computer can be scanned
regularly based on the schedule settings.
New assets can be defined by clicking Create New ( ) on the Asset List page.
To discover a specific host computer, click Asset Discover Only. Select Host from
the Type list and identify the IP address of the client computer.
To discover hosts within a range of IP addresses, select Range from the type list
and identify a range of IP addresses to search.
Vulnerability Scan
Any host computer displayed in the Asset List can be scanned regularly based on
the schedule settings that have been defined.
Assets can also be scanned without adding them to the Asset List. To scan a
client computer withought adding it to the Asset List, go to Endpoint > Vulnerability
Scan > Asset.
Clicking Create New ( ) on the Asset List page and identify a host or a range of
IP addresses and click Vulnerbaility Scan. If authentication is used on the client
computer, the administrator username and password must be defined.
Monitoring Endpoints
Administrators can monitor the compliance of client computes through the
endpoint monitor. Compliant or non-compliant client computers, or both, can be
displayed on the monitor list.
To view the endpoint monitor, go to Endpoint > Monitor > Endpoint Monitor.
Select the type of client to be displayed from the View list. Columns can be filtered
to help limit the display of clients in the list. Click Filter ( ) for a specific column
and edit the filters as needed.