Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views43 pages

Basic Fortigate

The document outlines the configuration of network interfaces, firewall policies, and user authentication for a secure network setup. It includes detailed steps for setting up WAN and LAN interfaces, DHCP server, DNS settings, and firewall policies for internet access and malware protection. Additionally, it covers web filtering, application control, and monitoring of network traffic to ensure security and controlled access.

Uploaded by

enrichhn8686
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views43 pages

Basic Fortigate

The document outlines the configuration of network interfaces, firewall policies, and user authentication for a secure network setup. It includes detailed steps for setting up WAN and LAN interfaces, DHCP server, DNS settings, and firewall policies for internet access and malware protection. Additionally, it covers web filtering, application control, and monitoring of network traffic to ensure security and controlled access.

Uploaded by

enrichhn8686
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Configuring Interface and Routing

Configuring Firewall Policies

Authenticated Network User Setup

Blocking Malware

Web Filtering

Controlling Application Access


Configuring Interface and Routing

Internet

AN 19
1. Configuring WAN Interface
W 2. Configuring LAN Interface
2.168.20.0/24 3. Configuring DHCP Server
Port-1

4. Configuring DNS
Port-2
192.168.11.0/24 5. Configuring the default Route
LAN

6. Monitoring

Reference
Configuration LAN Interface and WAN Interface with CLI
WAN Interface Configuration
config system interface
edit port1
set ip 192.168.20.7 255.255.255.0
set mode static
set alias "WAN“
set role wan
end

LAN Interface Configuration


config system interface
edit port2
set ip 192.168.11.1 255.255.255.0
set allowaccess ping https ssh http telnet
set mode static
set alias “LAN“
set role lan
end
WAN Interface Configuration (GUI)
① Network ➔ Interfaces
② Select Port1
③ Alias = WAN
④ Role = WAN
⑤ Address mode = Manual ➔ IP Address = 192.168.20.7/255.255.255.0
OK
WAN Interface Status
① Network ➔ Interfaces
② Check > WAN (Port1)
LAN Interface Configuration (GUI)
① Network ➔ Interfaces
② Select Port2
③ Alias = LAN
④ Role = LAN
⑤ Address mode = Manual ➔ IP Address = 192.168.11.1/255.255.255.0
⑥ Administrative Access = Checked > HTTPS , HTTP , PING , SSH , TELNET
⑦ OK

① ②



DHCP Server on LAN Configuration

① Network ➔ Interfaces ➔ Select and Edit Port (LAN Port)


② DHCP Server = [ Enabled ]
③ Address Range = 192.168.11.2-192.168.11.100
④ Netmask = 255.255.255.0
⑤ Default Gateway = [ Same as Interface IP ]
⑥ OK

① ②



DNS Setting Configuration

① Network ➔ DNS
② DNS Server = [ Specify ]
③ Primary DNS Server = 8.8.8.8 , Secondary DNS Server = 8.8.4.4
④ DNS (UDP/53) = Enable
⑤ Apply


① ③


Default Route Configuration
① Network ➔ Static Routes
② Destination = [ Subnet ]
③ 0.0.0.0/0.0.0.0
④ 192.168.20.1
⑤ Interface = WAN (port1)
⑥ OK






Configuration Firewall Policies Min Zaw Oo

Internet

AN 1
9

1. Create LAN Network Object 2.168.20.0/24


Port-1

2. Configure Firewall policies for Internet Access


Port-2
3. Monitoring Traffic Log 192.168.11.0/24
LAN

Reference
.2 .3 .4 .5 .6
Creating LAN Network Object
① Policy & Objects
② Address
③ Name = [ LAN-Network ]
④ IP/Netmask = 192.168.11.0 255.255.255.0
⑤ Choose ➔ LAN (Port2)
⑥ OK

① ③


② ⑤


Creating Firewall Policy for Internet Access ⑦ Schedule = always
① Policy & Objects ➔ Firewall Policy ⑧ Service = DNS , HTTP , HTTPS
② Name = [ Internet-Access ] ⑨ Action = Accept
③ Incoming Port = LAN (Port2) ⑩ Inspection Mode = Flow-based
④ Outgoing Port= WAN (Port1) ⑪ NAT = [Enable]
⑤ Source = LAN-Network (LAN Network Object) ⑫ IP Pool = Use Outgoing Interface
⑥ Destination = All ⑬ OK

Enable Log Options for All section


Viewing Traffic Log
① Log & Report
② Forward Traffic

Check Traffic Log



Authenticated Network User Setup
Internet

AN 1
9

2.168.20.0/24
Port-1

Port-2
192.168.11.0/24
LAN

Reference Bob Smith Rose James

Sales Project
Create a Local User Account
① User & Authentication ➔ User Definition ➔ Create New
② User Type = Local User ➔ Next
③ Login Credentials = set (Username , Password) ➔ Next
④ Extra Info ➔ User Account Status = [ Enable ] ➔ Summit



User Account Status
① User & Authentication ➔ User Definition
② Check User List


Create a User Group
① User & Authentication ➔ User Groups ➔ Create New
② Name = Sales [ Group Name ]
③ Type = Firewall
④ Members = user
⑤ OK




User Group Status

① User & Authentication ➔ User Groups


② Check Group List


Add Authentication to the firewall policy
① Policy & Object ➔ Firewall Policy ➔ Edit ( Internet Access Rule)
② Source = Sales (Add Group)
③ OK


Testing Internet Access with an allowed User Account
① Access the Internet (www.google.com)
② Login (Username and Password of User in Sales Group)
③ Continue


Blocking Malware Min Zaw Oo

Internet
Task 1 : Create a Antivirus Profile Malware
AN 1

Task 2 : Apply antivirus to Firewall policy 9

Task 3 : Verify antivirus W

2.168.20.0/24
Port-1

Port-2
192.168.11.0/24
LAN

Reference
.2 .3 .4 .5 .6
Create a Antivirus Profile

① Security Profiles
② Antivirus
③ Default
④ Edit

① ③

Create a Antivirus Profile - Continue

⑤ Use FortiGuard outbreak prevention database = [ Enable ]


⑥ OK


Apply antivirus to Firewall policy

① Policy & Objects


② Firewall Policy
③ Select → Internet Access
Rule
④ Edit



Apply antivirus to Firewall policy - Continue

⑤ Antivirus = [ Enable ] and Select Profile


⑥ OK


Verify antivirus

① Browse → www.eicar.org/dow...
② Click →
eicar.com
③ Check Security Alert Message


Verify antivirus - Continue

① Log & Report


② Security Events
③ Inspect the logs


Min Zaw Oo

Web Filtering Internet

AN 1
9

2.168.20.0/24
Port-1
1. Validate FortiGuard Security Subscription license
2. Create an Web Filter profile
xx Port-2
192.168.11.0/24
LAN
3. Add the Web Filter profile to the firewall policy
4. Verify the configuration.
5. Monitor the logs regarding application access

Reference Bob Smith Rose James

Sales Project
Control Web Access Using Web Filter
Task 1:

Task 2:
Task 3:

Task 4:

Task 5:
Validate FortiGuard Security Subscription license

① Dashboard
② Status
③ Web Filter
④ Check Web Filter License



Create or Edit an Web Filter profile
① Security Profiles
② Web Filter
③ Edit [ Web filter Profile (default) ]
④ Social Networking (Right-Click) ③
⑤ Choose Block
⑥ OK



Add the Web Filter profile to the firewall policy
① Policy & Object ➔ Firewall Policy
② Web Filter [ Enable ]
③ Choose Web Filter Profile [Default]
④ OK

② ③


Verify Web Filter
① Open Browser ➔ www.twitter.com


Configure the Authenticate Action for FortiGuard Category Filter

Internet

AN 1
9

• Applythe Authenticated action forthe File Sharing and Storage sub-category W

2.168.20.0/24
Port-1
• Testthe Authenticate action and examine logs
Port-2
192.168.11.0/24
LAN

Preventing File Sharing


and Storage Access

Allow

Deny
Reference Bob Smith Rose James

Sales Project
Apply the Authenticated action for the File Sharing and Storage sub-category
① Security Profiles ➔ Web Filter ➔ Edit [ Web filter Profile (default) ]
② Select File Sharing and Storage
③ Click Authenticate
④ Add User and Group
⑤ OK
⑥ OK


Test the Authenticate action and examine logs
① Open file sharing and storage website (www.onedrive.com)
② Username = User in Sale-Group
③ Password = [ Password ]
④ Continue




Monitoring Web Filter
Controlling Application Access Min Zaw Oo

Internet
Task 1 : Configure Application Control
AN 1
9

Task 2 : Monitor Application Control


W

2.168.20.0/24
Port-1

xx Port-2 xx
192.168.11.0/24
LAN

Filtering Video/Audio
Access from Internet

Reference Bob Smith Rose James

Sales Project
Create Application Control Profile

① Security Profiles
② Application Control
③ Create New


Create Application Control Profile - Continue
④ Write [ Application Control Name ]
⑤ Block Video /Audio
⑥ OK


Add Application Control Profile in Firewall Policy
① Policy & Objects ➔ Firewall Policy ➔ [Edit] Internet Access Policy
② Application Control [ Enable ] and Choose Video_block
③ OK


Verify Application Control

① Browse →
www.youtube.com


Monitoring Application Control
① Log & Report
② Application Control (or) Security Event ➔ Application Control
③ Confirm the Application Control Sensor was used, meaning Block_Video for
YouTube


You might also like