Fortigate Cookbook 54 PDF
Fortigate Cookbook 54 PDF
Fortigate Cookbook 54 PDF
February-18-16
Copyright 2016 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and
certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other
Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or
company names may be trademarks of their respective owners. Performance and other metrics contained herein
were attained in internal lab tests under ideal conditions, and actual performance and other results may vary.
Network variables, different network environments and other conditions may affect performance results. Nothing
herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or
implied, except to the extent Fortinet enters a binding written contract, signed by Fortinets General Counsel, with
a purchaser that expressly warrants that the identified product will perform according to certain expressly-
identified performance metrics and, in such event, only the specific performance metrics expressly identified in
such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to
performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that
any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants,
representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to
change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the
publication shall be applicable.
ii
Fortinet Cookbook - http://cookbook.fortinet.com
Please report errors or omissions in this or any Fortinet technical document to techdoc@fortinet.com.
iii
Table of Contents
Change Log 8
Introduction 9
Tips 10
Getting Started 12
Installing a FortiGate in NAT/Route mode 13
Installing a FortiGate in Transparent mode 18
VDOM configuration 23
Troubleshooting your FortiGate installation 36
Creating security policies 40
Creating a virtual wire pair 47
Limiting bandwidth with traffic shaping 52
Managing FortiSwitches with a FortiGate 58
Security 60
Sandboxing with FortiSandbox and FortiClient 61
Protection from Botnet C&C attacks 70
Enforcing network security using a FortiClient Profile 76
Why you should use SSL inspection 84
Preventing certificate warnings 87
Protecting web applications 97
Troubleshooting web filtering 102
WiFi 103
WiFi network on a schedule 104
Extending WiFi range with mesh topology 107
Assigning WiFi users to VLANs dynamically 114
WiFi RADIUS authentication with FortiAuthenticator 123
Authentication 130
802.1X with VLAN Switch interfaces on a FortiGate 131
VPNs 136
iv
IPsec VPN with FortiClient 137
Site-to-site IPsec VPN with two FortiGates 145
IPsec troubleshooting 151
SSL VPN using web and tunnel mode 153
SSL VPN troubleshooting 165
Expert 167
Single Sign-On using LDAP and FSSO agent in advanced mode 168
Single Sign-On using FSSO agent in advanced mode and FortiAuthenticator 176
SSO using a FortiGate, FortiAuthenticator, and DC Polling 187
Configuring ADVPN in FortiOS 5.4 194
Glossary 205
v
Change Log
Date Change description
Change Log 8
Introduction
FortiGate is a network security appliance that can apply a number of features to your network traffic, providing a
consolidated security solution to match the needs of any network, big or small.
Some recipes are part of more than one of the above sections. When a recipe is part of multiple sections, it is
located in the section that appears first in the Cookbook.
This version of the complete FortiGate cookbook was written using FortiOS 5.4.0.
Introduction 9
Tips
Before you get started, here are a few tips about using the FortiGate Cookbook:
For example, some FortiGate have a default interface called lan, while on other FortiGate models this interface is
called internal.
Ports
The specific ports being used in the documentation are chosen as examples. When you are configuring your unit,
you can substitute your own ports, provided that they have the same function.
For example, in most recipes, wan1 is the port used to provide the FortiGate with access to the Internet. If your
FortiGate uses a different port for this function, you should use that port in the parts of the configuration that the
recipe uses wan1.
Tips 10
Text elements
Bold text indicates the name of a GUI field or feature. When required, italic text indicates information that you
must enter. Italics are also used for notes, which contain information you may find useful.
Selecting OK/Apply
Always select OK or Apply when you complete a GUI step. Because this must be done frequently, it is an
assumed step and is not included in most recipes.
Also, on some FortiGate models, certain features are only available using the CLI. For more information about
this, see theFeature/Platform Matrix.
11 Tips
Getting Started
This section contains information about basic tasks to get a FortiGate unit up and running, including installation,
as well common roles and configurations a FortiGate unit can have in your network.
Installation
l Installing a FortiGate in NAT/Route mode
l Installing a FortiGate in Transparent mode
l VDOM configuration
l Troubleshooting your FortiGate installation
Common configurations
l Limiting bandwidth with traffic shaping
Getting Started 12
Installing a FortiGate in NAT/Route mode
In this example, you will learn how to connect and configure a new FortiGate unit in NAT/Route mode to securely
connect a private network to the Internet.
In NAT/Route mode, a FortiGate unit is installed as a gateway or router between two networks. In most cases, it
is used between a private network and the Internet. This allows the FortiGate to hide the IP addresses of the
private network using network address translation (NAT).
Getting Started 13
1. Connecting the network devices and logging onto the FortiGate
Connect the FortiGates Internet-facing
interface (typically WAN1) to your ISP-
supplied equipment and Connect a PC to
the FortiGate using an internal port
(typically port 1).
Getting Started 14
2. Configuring the FortiGates interfaces
Go to Network > Interfaces and edit the
Internet-facing interface (in the example,
wan1).
If you have ISP equipment between your FortiGate and the Internet (for example, a router), then the wan1 IP will
also use a private IP assigned by the ISP equipment. If this equipment uses DHCP, set Addressing Mode to
DHCP to get an IP assigned to the interface.
If the ISP equipment does not use DHCP, your ISP can provide you with the correct private IP to use for the
interface.
15 Getting Started
3. Adding a default route
Go to Network > Static Routes and
create a new route.
5. Creating a policy to allow traffic from the internal network to the Internet
Some FortiGate models include an IPv4 security policy in the default configuration. If you have one of these
models, edit it to include the logging options shown below, then proceed to the results section.
Getting Started 16
Go to Policy & Objects > IPv4 Policy
and create a new policy. Give the policy
a Name that indicates that the policy will
be for traffic to the Internet (in the
example, Internet).
5. Results
You can now browse the Internet using
any computer that connects to the
FortiGates internal interface.
17 Getting Started
Installing a FortiGate in Transparent mode
In this example, you will learn how to connect and configure a new FortiGate unit in Transparent mode to securely
connect a private network to the Internet.
Transparent mode is used if you want to apply security scanning to traffic without applying routing or network
address translation (NAT), such as when a FortiGate is used as an Internal Segmentation Firewall (ISFW).
Getting Started 18
1. Changing the FortiGates operation mode
From the PC on the internal network,
connect to the FortiGates web-based
manager using either FortiExplorer or an
Internet browser (for information about
connecting to the web-based manager,
please see your models QuickStart
Guide).
Go to the Dashboard and enter the following command into the CLI console widget, substituting your own IP
addresses where necessary:
config system settings
set opmode transparent
set manageip 192.168.200.111 255.255.255.0
set gateway 192.168.200.99
end
Getting Started 19
2. (Optional) Setting the FortiGates DNS servers
The FortiGate units DNS Settings are
set to use FortiGuard DNS servers by
default, which is sufficient for most
networks. However, if you need to
change the DNS servers, go to Network
> DNS, select Specify, and add Primary
and Secondary DNS servers.
3. Creating a policy to allow traffic from the internal network to the Internet
Some FortiGate models include an IPv4 security policy in the default configuration. If you have one of these
models, edit it to include the logging options shown below, then proceed to the results section.
20 Getting Started
4. Connecting the network devices
Go to the Dashboard and locate the System Resources widget. Select Shutdown to power off the FortiGate
unit.
Alternatively, you can enter the following command in the CLI Console:
execute shutdown
Wait until all the lights, except for the power light, on your FortiGate have turned off. If your FortiGate has a
power button, use it to turn the unit off. Otherwise, unplug the unit.
Getting Started 21
5. Results
You can now browse the Internet using
any computer that connects to the
FortiGates internal interface.
22 Getting Started
VDOM configuration
This example illustrates how to use virtual domains (VDOMs) to host multiple FortiOS instances on a single
FortiGate.
In this example, two companies (called Company A and Company B) use the same FortiGate but have different
Internet service providers (ISPs). To provide both departments with network and Internet connectivity, each
company has its own VDOM (called VDOM-A and VDOM-B) that are managed independently.
The root VDOM will be used to manage the FortiGate's global settings.
23
1. Switching to VDOM mode and creating two VDOMs
Connect a PC to FortiGate using an
Ethernet cable, as described in your
model's QuickStart Guide.
Certain FortiGate models will not show the above option in the System Information widget. For these models, go
to the Dashboard and enter the following command in the CLI Console:
config system global
set vdom-admin enable
end
You will be required to re-login to the GUI after enabling virtual domains because the GUI menu options change.
24
Make sure that Global is selected from
dropdown menu located in the top-left
corner. This allows you to make changes
to the global configuration.
25
Go to System > Administrators and edit
the admin account.
If an interface is used in an existing FortiGate configuration, its VDOM assignment cannot be changed.
Because some FortiGate models have a default configuration, you may need to delete existing policies and
routes in order to add a particular interface.
If your FortiGate is directly connecting to your ISP, set Addressing Mode to Manual and set the IP/Netmask
to the public IP address your ISP has provided you with (in the example, 172.20.121.46/255.255.255.0).
26
If you have some ISP equipment between your FortiGate and the Internet (for example, a router), then the wan1
IP will also use a private IP assigned by the ISP equipment. If this equipment uses DHCP, set Addressing
Mode to DHCP to get an IP assigned to the interface.
If the ISP equipment does not use DHCP, your ISP can provide you with the correct private IP to use for the
interface.
27
Go to Network > Interfaces and edit a
physical interface that will be used by
VDOM-B's internal network (in the
example, port5).
28
5. Adding administrators to each VDOM
Go to System > Administrators. Create
an administrator for VDOM-A, called
admin-a.
29
6. Configuring VDOM-A
Access VDOM-A's configuration using
the dropdown menu and go to Network >
Static Routes to add a default route.
30
Go to Policy & Objects > IPv4 Policies
and create a new policy to allow Internet
access for VDOM-A. Give the policy a
Name that indicates that the policy will
be for traffic to the Internet (in the
example, Internet-VDOM-A).
31
7. Configuring VDOM-B
Access VDOM-B's configuration using
the dropdown menu and go to Network >
Static Routes to add default route.
32
Go to Policy & Objects > IPv4 Policies
and create a new policy to allow Internet
access for VDOM-B. Give the policy a
Name that indicates that the policy will
be for traffic to the Internet (in the
example, Internet-VDOM-B).
33
8. Results
Using a PC located on VDOM-A's
internal network, browse to the IP of the
LAN-A interface (in the example,
https://192.168.100.1).
34
Logout of the VDOM, then attempt to
login using the global admin's
credentials. You will not be able to log in.
You can also not log in using admin-b's
credentials.
35
Troubleshooting your FortiGate installation
If your FortiGate does not function as desired after completing the installation, try the following troubleshooting
methods.
Most methods can be used for FortiGates in both NAT/Route and Transparent mode. Any exceptions are marked.
4. Verify that you can connect to the internal IP address of the FortiGate unit
(NAT/Route mode).
Connect to the web-based manager from the FortiGates internal interface by browsing to its IP address. From the
PC, try to ping the internal interface IP address; for example, ping 192.168.1.99.
If you cannot connect to the internal interface, verify the IP configuration of the PC. If you can ping the interface
but cant connect to the web-based manager, check the settings for administrative access on that interface.
5. Verify that you can connect to the management IP address of the FortiGate unit
(Transparent mode).
From the internal network, attempt to ping the management IP address. If you cannot connect to the internal
interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other
36
devices on the network are powered on and operating. Go to the next step when you can connect to the internal
interface.
If you are using NAT/Route mode, check the configuration of the policy to make sure that NAT is turned on and
that Use Destination Interface Address is selected.
10. Verify that you can connect to the gateway provided by your ISP.
Ping the default gateway IP address from a PC on the internal network. If you cannot reach the gateway, contact
your ISP to verify that you are using the correct gateway.
11. Verify that you can communicate from the FortiGate unit to the Internet.
Access the FortiGate CLI and use the command execute ping 8.8.8.8. You can also use the execute
traceroute 8.8.8.8 command to troubleshoot connectivity to the Internet.
37
12. Verify the DNS configurations of the FortiGate unit and the PCs.
Check for DNS errors by pinging or using traceroute to connect to a domain name; for example: ping
www.fortinet.com. If the name cannot be resolved, the FortiGate unit or PC cannot connect to a DNS server
and you should confirm that the DNS server IP addresses are present and correct.
13. Confirm that the FortiGate unit can connect to the FortiGuard network.
Once registered, the FortiGate unit obtains antivirus and application control and other updates from the FortiGuard
network. Once the FortiGate unit is on your network, confirm that it can reach FortiGuard.
First, check the License Information widget to make sure that the status of all FortiGuard services matches the
services that you have purchased. Go to your FortiGuard settings and expand Web Filtering and Email
Filtering Options. Select Test Availability. After a minute, the GUI should show a successful connection.
14. Consider changing the MAC address of your external interface (NAT/Route
mode).
Some ISPs do not want the MAC address of the device connecting to their network cable to change and so you
may have to change the MAC address of the Internet-facing interface using the following CLI command:
To list the existing bridge instances on the FortiGate unit, use the following CLI command:
38
3 4 [glossary_exclude]wan1[/glossary_exclude] 00:09:0f:cb:c2:77 88
3 4 [glossary_exclude]wan1[/glossary_exclude] 00:26:2d:24:b7:d3 0
3 4 [glossary_exclude]wan1[/glossary_exclude] 00:13:72:38:72:21 98
4 3 internal 00:1a:a0:2f:bc:c6 6
1 6 [glossary_exclude]dmz[/glossary_exclude] 00:09:0f:dc:90:69 0 Local Static
3 4 [glossary_exclude]wan1[/glossary_exclude] c4:2c:03:0d:3a:38 81
3 4 [glossary_exclude]wan1[/glossary_exclude] 00:09:0f:15:05:46 89
3 4 [glossary_exclude]wan1[/glossary_exclude] c4:2c:03:1d:1b:10 0
2 5 [glossary_exclude]wan2[/glossary_exclude] 00:09:0f:dc:90:68 0 Local Static
If your devices MAC address is not listed, the FortiGate unit cannot find the device on the network. Check the
devices network connections and make sure they are connected and operational.
16. Either reset the FortiGate unit to factory defaults or contact the technical assist-
ance center.
If all else fails, reset the FortiGate unit to factory defaults using the CLI command execute factoryreset.
When prompted, type y to confirm the reset.
Resetting the FortiGate unit to factory defaults puts the unit back into NAT/Route mode.
You can also contact the technical assistance center. For contact information, go to support.fortinet.com.
39
Creating security policies
In this recipe, you will create and order multiple security policies in the policy table, to apply the appropriate policy
to various types of network traffic.
A fourth policy, the default Implicit Deny policy, will also be used.
40
1. Configuring the Internet policy
Go to Policy & Objects > IPv4 Policy
and edit the policy allowing outgoing
traffic. Set Name to Internet.
41
2. Creating the Mobile policy
Go to Policy & Objects > IPv4 Policy
and create a new policy. Set Name to
Mobile.
Enable NAT.
42
3. Defining SysAdminPC
Go to User & Device > Custom
Devices & Groups and create a new
device. This will identify the system
administrator's PC.
43
4. Creating the Admin policy
Go to Policy & Objects > IPv4 Policy
and create a new policy. Set Name to
Admin.
44
5. Ordering the policy table
Go to Policy & Objects > IPv4 Policy to
view the policy table. Select the By
Sequence view, which shows the
policies in the order that they are used by
the FortiGate.
6. Results
Browse the Internet using the system administrators PC, a different PC, and a mobile device.
(Optional) Attempt to make an SSL connection to a web server with all three devices. Only the system
45
administrators PC will be able to connect.
46
Creating a virtual wire pair
In this example, you will create a virtual wire pair (consisting of port3 and port4) to make it easier to protect a web
server that is behind a FortiGate operating as an Internal Segmentation Firewall (ISFW). Users on the internal
network will access the web server through the ISFW over the virtual wire pair.
A virtual wire pair consists of two interfaces that have no IP addresses and all traffic received by one interface in
the pair can only be forwarded out the other; as controlled by firewall policies. Since the interfaces do not have IP
addresses, you can insert a virtual wire pair into a network without having to make any changes to the network.
In FortiOS 5.4, virtual wire pair replaces the feature port pairing from earlier firmware versions. Unlike port pairing,
virtual wire pair can be used for a FortiGate in NAT/Route mode, as well as Transparent mode.
47
1. Adding a virtual wire pair
Interfaces used in a virtual wire pair
cannot be used to access the ISFW
FortiGate. Before creating a virtual wire
pair, make sure you have a different port
(in the example, port1) configured to
allow admin access using your preferred
protocol.
48
2. Adding virtual wire pair firewall policies
Go to Policy & Objects > IPv4 Virtual
Wire Pair Policy and create a policy will
allow users on the internal network to
connect to the server. Give the policy an
appropriate name (in the example,
Network-server-access).
49
Create a second virtual wire pair policy
allowing traffic from port4 to exit out of
port3. This policy allows the server to
connect to the Internet, in order to
download updates.
50
3. Results
To test both virtual wire pair policies, connect to the web server from a PC on the internal network, and also
connect to the Internet from the web server.
51
Limiting bandwidth with traffic shaping
When a particular IP address uses too many resources, you can prevent that IP from consuming your bandwidth
indiscriminately. In this recipe, you learn how to use Traffic Shaping on your FortiGate to limit the bandwidth for a
specific IP address.
This recipe also explains how to configure traffic shaping to set a maximum bandwidth limit for uploads and/or
downloads to 200 kb/s.
52
1. Enabling Traffic Shaping
Go to System > Feature Select and
under Additional Features enable
Traffic Shaping.
Enter the name limited_bandwidth for your shaper and set the Traffic Priority to Medium.
53
Setting a Traffic Priority will only have an impact if you have enabled Traffic Shaping in ALL your other Internet
access policies using the same two interfaces. There must also be some variation, for example you will not see
any differences while all policies are set to the default setting (High).
Select Max Bandwidth and enter 200 kb/s (0.2 Mbps). If you would like to set a Guaranteed Bandwidth
make sure the rate is lower than the Max Bandwidth. Apply your changes.
54
Sessions for testing purposes.
55
Order your traffic shaping policies so
that your more granular limited_
bandwidth policy is above your general
high-priority Internet access policy.
5. Results
When a computer with the IP you have
specified, 192.168.10.10, browses the
Internet from your internal network, its
bandwidth will be restricted by the
amount you set in your shaper.
The IP address you have specified will receive limited-bandwidth treatment and may experience dropped
bytes. Your limited-bandwidth shaper should not exceed 200kbps. Note that the results show the Bytes
(Sent/Received) in Megabytes (MB) and the Bandwidth in kilobits per second (kbps).
56
You can also view these results in a
bubble graph by changing the graph type
in the drop down menu. Sort by
Bandwidth to verify that your regular
traffic is using more bandwidth.
57
Managing FortiSwitches with a FortiGate
Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs
and configure port information. The connection between the FortiSwitch and the FortiGate is called a FortiLink.
Prerequisites
A. Connect a cable from any FortiSwitch port to an unused internal port on the FortiGate.
1. If necessary, enable the port for FortiLink auto-discovery (using the FortiSwitch CLI).
-> In general, the last four copper ports on the FortiSwitch are enabled for auto-detect by default.
Refer to the documents below for specific details.
B. You may need to enable the Switch Controller using the FortiGate web-based manager.
1. Go to System > Config > Features.
2. Turn on the WiFi & Switch Controller feature.
3. Select Apply.
C. This recipe is applicable to FortiSwitchOS 3.3.0 and above.
Procedure
From the FortiGate web-based manager:
1. Go to System > Network > Interfaces and edit the new FortiLink port.
2. Set Addressing mode to Dedicate to Extension Device.
3. Select OK.
4. Go to WiFi & Switch Controller > Managed Devices > Managed FortiSwitch.
-> This page displays the faceplate for each managed FortiSwitch. The FortiLink for the new managed
switch will display as a dashed line (FortiLink connection not established).
-> After a short delay (while FortiGate sets up the connection), the FortiLink displays as a solid line
(FortiLink established). For smaller FortiSwitch models, such as FS-108D-POE, the delay may be up to 3
minutes.
Notes
1. In FortiOS 5.4, new FortiLink features include:
a. POE configuration from the FortiGate.
b. Link Aggregation Group (LAG) support for Fortilink.
58
c. Auto-detect the switch FortiLink ports
d. Improved user interface for Managed FortiSwitches, switch ports and VLANs.
2. Refer to the document below to see the FortiSwitch and FortiGate models that support FortiLink.
59
Security
This section contains information about using a FortiGates security features, including antivirus, web filtering,
application control, intrusion protection (IPS), email filtering, and data leak prevention (DLP). This section also
includes information about using SSL inspection to inspect encrypted traffic.
AntiVirus
l Sandboxing with FortiSandbox and FortiClient
DNS Filtering
l Protection from Botnet C&C attacks
Endpoint Control
l Enforcing network security using a FortiClient Profile
SSL Inspection
l Why you should use SSL inspection
l Preventing certificate warnings
Web Filtering
l Sandboxing with FortiSandbox and FortiClient
l Troubleshooting web filtering
Security 60
Sandboxing with FortiSandbox and FortiClient
In this recipe, you will set up sandboxing to send suspicious files to a FortiSandbox Appliance for further
inspection. The FortiSandbox tests the files for threats that can get past other detection methods using a variety of
virtual machines (VMs).
You will also configure your FortiGate to automatically receive signature updates from FortiSandbox and add the
originating URL of any malicious file to a blocked URL list. Finally, you will configure FortiClient to use extended
scanning that includes FortiSandbox.
This recipe was tested using FortiOS 5.4 Beta 4, FortiSandbox 2.1.0, and FortiClient for Windows 5.4 Beta 2.
Security 61
1. Connecting the FortiSandbox
Connect the FortiSandbox to your
FortiGate as shown in the diagram, so
that port 1 and port 3 on the FortiSandbox
are on different subnets.
FortiSandbox port 3 is used for outgoing communication triggered by the execution of the files under analysis. It
is recommended to connect this port to a dedicated interface on your FortiGate (in the example, port 15), to
protect the rest of the network from threats currently being investigated by the FortiSandbox.
Security 62
Once the FortiSandbox has access to
the Internet through port 3, it will begin to
activate its VM licenses.
63 Security
If you select Test Connectivity, the
Status shows as Service is not
configured because the FortiGate has
not been authorized to connect to the
FortiSandbox.
Security 64
3. Configuring sandboxing in the default AntiVirus profile
Go to Security Profiles > AntiVirus and
edit the default profile.
65 Security
4. Configuring sandboxing in the default Web Filter profile
Go to Security Profiles > Web Filter
and edit the default profile.
Security 66
Enable Use FortiSandbox signatures
to make sure new virus signatures and
blocked URLs from the FortiSandbox are
added to FortiClient's databases.
This profile will be pushed to any device running FortiClient that is registered to your FortiGate. These settings
can also be configured from within FortiClient's AntiVirus settings.
67 Security
7. Results
If your FortiGate discovers a suspicious
file, it will now be sent to the
FortiSandbox. To view information about
the files that have been sent on the
FortiGate, go to FortiView >
FortiSandbox to see a list of file names
and current status.
Security 68
The PC is now quarantined by FortiClient
and cannot connect to the Internet or
other network devices.
If the PC had downloaded a suspicious file that the FortiSandbox determined was malicious, quarantine would
be applied automatically.
The quarantine can only be released from the FortiClient Monitor on the FortiGate.
69 Security
Protection from Botnet C&C attacks
This recipe uses a new FortiGuard feature: the Botnet C&C (command and control) database to protect your
network from Botnet C&C attacks.
For this recipe, you will create a new DNS Filter Profile called Botnet&Facebook, block access to all known C&C
addresses, and block access to the Social Networking FortiGuard category. In addition, you will enhance this with
a Static Domain Filter in order to block access to www.facebook.com, and all of its affiliated subdomains.
For this recipe to work, your device must be licensed for the FortiGuard Web Filtering service. DNS filtering is only
available when Inspection Mode is Proxy-based.
Security 70
1. Enabling the DNS Filter Security Feature
Go to System > Feature Select, and
enable DNS Filter under Security
Features. Select Apply.
2. Creating the DNS Filter Profile and enabling Botnet C&C database
Go to Security Profiles > DNS Filter,
and create a new profile called
Botnet&Facebook.
Security 71
3. Configuring Static Domain Filter in DNS Filter Profile
In the DNS Filter Profile, enable Domain
Filter under Static Domain Filter. You
will now be able to add domains of your
choosing.
72 Security
4. Creating a DNS Filtering firewall policy
Go to Policy & Objects > IPv4 Policy,
and create a firewall policy that allows
Internet access.
Security 73
5. Results
To confirm that the DNS Filter Profile has
been added, go to Policy & Objects >
IPv4 Policy. The policy will now have the
DNS filter icon in the Security Profiles
column.
74 Security
To confirm that the known Botnet C&C
feature is working correctly, browse to a
known Botnet site the example is
nateve.us. Again, the DNS request will
be blocked.
Security 75
Enforcing network security using a FortiClient Profile
In this recipe, you will learn how to enforce a FortiClient Profile on an internal network such that only internal
devices registered with FortiClient can access the Internet and the corporate network. You will edit the default
FortiClient Profile to enforce realtime antivirus protection and malicious website blocking.
This recipe requires you to enable FortiHeartBeat on a FortiGate interface. When you enable FortiHeartBeat on an
interface, the option to enforce FortiClient registration becomes available. Devices connecting to that interface are
forced to register to the FortiGate and install FortiClient before getting access to network services.
FortiGates come with a free FortiClient license allowing a limited number of devices to register to the FortiGate
and download FortiClient. Your FortiGate gets the latest version of FortiClient for Mac and for Windows from
FortiGuard. When devices register with the FortiGate they download and install one of these copies of FortiClient.
You can see the status of your FortiClient licensing and purchase additional FortiClient licenses from the License
Information Dashboard Widget.
Security 76
1. Enabling endpoint control on the FortiGate
On the FortiGate, go to System >
Feature Select and make sure that
Endpoint Control is enabled.
You can add additional FortiClient Profiles to define exceptions to the default profile. The configuration of the
exception profiles includes devices, users, or addresses to which the exception applies.
Security 77
Go to Security Profiles > FortiClient
Profiles and edit the default profile to
provide realtime antivirus protection that
scans files as they are downloaded or
copied to the device, block malicious
websites and block attack channels.
78 Security
4. Results
In this image, an internal device has
FortiClient installed but not registered
with a FortiGate. This is indicated by the
Attention banner, and also because the
option to Register Endpoint is available.
Security 79
A download link is provided at the bottom
of the page. When the user clicks on this
link, the FortiGate responds with a
download of the latest FortiClient
software.
By comparison, a registered device appears below. The device shows as registered, with a lock icon next to the
device name in the upper right corner.
80 Security
FortiClient should automatically attempt
to register to the nearest FortiGate,
provided that FortiHeartBeat has been
enabled and registration enforced.
FortiClient displays the device's On-Net/Off-Net status, Hostname, Domain, registered FortiGate's serial
number (SN), and IP address.
Security 81
Depending on the FortiClient Profile, the
user may also have the option to
Unregister the device. This can be
disabled on the FortiGate in Security
Profiles > FortiClient Profiles, under the
Advanced tab.
82 Security
To verify the status of the endpoints on
the FortiGate, go to User & Device >
Device List.
By default, this list shows On-Net/Off-Net Status, endpoint Device (Hostname and device name), endpoint IP
Address, and the device's operating system (OS).
Security 83
Why you should use SSL inspection
Most of us are familiar with Hypertext Transfer Protocol Secure (HTTPS) and how it protects a variety of activities
on the Internet by applying Secure Sockets Layer (SSL) encryption to the web traffic.
The benefits of HTTPS are obvious, as encryption keeps your private data safe from prying eyes. However, there
are risks associated with its use, since encrypted traffic can be used to get around your normal defenses.
For example, you might download a file containing a virus during an e-commerce session. Or you could receive a
phishing email containing a seemingly harmless downloader file that, when launched, creates an encrypted
session to a command and control (C&C) server and downloads malware onto your computer. Because the
sessions in these attacks are encrypted, they might get past your network's security measures.
To protect your network from these threats, SSL inspection is the key your FortiGate uses to unlock encrypted
sessions, see into encrypted packets, find threats, and block them. SSL inspection not only protects you from
attacks that use HTTPS, but also from other commonly used SSL-encrypted protocols, such as SMTPS, POP3S,
IMAPS, and FTPS.
Security 84
Full SSL inspection
To make sure that all SSL encrypted content is inspected, you must use full SSL inspection (also known as deep
inspection). When full SSL inspection is used, the FortiGate impersonates the recipient of the originating SSL
session, then decrypts and inspects the content. The FortiGate then re-encrypts the content, creates a new SSL
session between the FortiGate and the recipient by impersonating the sender, and sends the content to the
sender.
When the FortiGate re-encrypts the content it uses a certificate stored on the FortiGate. The client must trust this
certificate to avoid certificate errors. Whether or not this trust exists depends on the client, which can be the
computers OS, a browser, or some other application, which will likely maintain its own certificate repository. For
more information about this, see the recipe Preventing certificate warnings.
l Uses a server certificate (which can be uploaded using the Certificates menu) to protect a single server.
l Typically used on inbound policies to protect servers available externally through Virtual IPs
l Since this is typically deployed outside-in (clients on the Internet accessing server(s) on the internal side
of the FortiGate), server certificates using the public FQDN of the server are often purchased from a com-
mercial Certificate Authority and uploaded to the FortiGate. This avoids client applications generating SSL
certificate errors due to certificate mismatch.
More detail is available in the FortiOS Handbook. Also, check the Fortinet Knowledge Base for these technical
notes:
l How to Enable SSL inspection from the CLI and Apply it to a Policy
l How to block web-based chat on Gmail webmail using App Sensor + SSL inspection
Certificate inspection is used to verify the identity of web servers and can be used to make sure that HTTPS
protocol isn't used as a workaround to access sites you have blocked using web filtering.
85 Security
The only security feature that can be applied using SSL certificate inspection mode is web filtering. However,
since only the packet is inspected, this method does not introduce certificate errors and can be a useful alternative
to full SSL inspection when web filtering is used.
Troubleshooting
The most common problem with SSL inspection is users receiving SSL errors when the CA certificate is not
trusted. This is because by default the FortiGate uses a certificate that is not trusted by the client. There are two
ways to fix this:
1. All users must import the FortiGates default certificate into their client applications as a trusted certificate.
2. Configure the FortiGate to use a certificate that is already trusted by your clients. For example, a cer-
tification signed by a CA that your clients already trust.
The first method can be more labor intensive because you have to distribute a certification to all clients. This can
also be an ongoing problem as new clients are added to your network. The second method is usually less work but
may require paying for a CA. Both of these methods are covered in the recipe Preventing Certificate Warnings.
If you choose to install the certificate on client applications, this can be done with greater ease in a Microsoft
Active Directory domain environment by using Group Policy Objects to install the certificate on domain members.
Check that the Group Policy has propagated to all computers by opening Internet Explorer on a workstation PC,
opening Tools > Internet Options > Content > Certificates >Trusted Root Certification Authorities, and
ensuring that the FortiGate's certificate is present.
For corporate-owned mobile devices, MDM solutions like AirWatch, MobileIron, or Fiberlink, use Simple
Certificate Enrollment Protocol (SCEP) to ease certificate enrollment.
Best practices
Because all traffic needs to be decrypted, inspected, and re-encrypted, using SSL inspection can reduce overall
performance of your FortiGate. To make sure you aren't using too many resources for SSL inspection, do the
following:
l Know your traffic Know how much traffic is expected and what percent of the traffic is encrypted. You
can also limit the number of policies that allow encrypted traffic.
l Be selective Use white lists or trim your policy to apply SSL inspection only where it is needed.
l Use hardware acceleration - FortiGate models with either the CP6 or CPU processor have an SSL/TLS
protocol processor for SSL content scanning and SSL acceleration. For more information about this, see
the Hardware Acceleration handbook.
l Test real-world SSL inspection performance yourself - Use the flexibility of FortiGates security policy
to gradually deploy SSL inspection, rather than enabling it all at once.
Security 86
Preventing certificate warnings
In this recipe, you will prevent users from receiving a security certificate warning when your FortiGate applies full
SSL inspection to incoming traffic.
When full SSL inspection is used, your FortiGate impersonates the recipient of the originating SSL session, then
decrypts and inspects the content. The FortiGate then re-encrypts the content, creates a new SSL session
between the FortiGate and the recipient by impersonating the sender, and sends the content to the end user. This
is the same process used in "man-in-the-middle" attacks, which is why a user's device may show a security
certificate warning.
For more information about SSL inspection, see Why you should use SSL inspection.
Often, when a user receives a security certificate warning, they simply select Continue without understanding
why the error is occurring. To avoid encouraging this habit, you can prevent the warning from appearing in the first
place.
There are two methods for doing this, depending on whether you are using Using the default certificate or Using a
self-signed certificate.
Security 87
Using the default certificate
All FortiGates have a default certificate that is used for full SSL inspection. This certificate is also used in the
default deep-inspection profile. To prevent your users from seeing certificate warnings, you can install this
certificate on your users' devices.
If you have the right environment, you can distribute the certificate and have it installed automatically.
Security 88
If you are using Windows 7/8/10, double-
click on the certificate file and select
Open. Select Install Certificate to
launch the Certificate Import Wizard.
89 Security
If you have the right environment, the certificate can be pushed to your users' devices. However, if Firefox is
used, the certificate must be installed on each individual device, using the instructions below.
3. Results
Before installing the certificate, an error
message would appear in the browser
when a site that used HTTPS was
accessed (the example shows an error
message appearing in Firefox).
Security 90
After you install the certificate, you
should not experience a certificate
security issue when you browse to sites
on which the FortiGate unit performs SSL
content inspection.
91 Security
Using a self-signed certificate
In this method, a self-signed certificate is created using OpenSSL. This certificate will then be installed on the
FortiGate for use with SSL inspection.
Using Command Prompt (CMD), navigate to the BIN folder (in the example, the command is cd
c:\OpenSSL\openssl-0.9.8h-1-1bin\bin.
This RSA key uses AES 256 encryption and a 2058-bit key.
When prompted, enter a pass phrase for encrypting the private key.
Use the following command to launch OpenSSL, submit a new certificate request, and sign the request:
openssl req - new -x509 -days 3650 -extensions v3_ca -key fgcaprivkey.pem -
out fgcacert.pem - config openssl.cnf
The result is a standard x509 binary certificate that is valid for 3,650 days (approx. 10 years)
When prompted, re-enter the pass phrase for encryption, then enter the details required for the certificate
request, such as location and organization name.
Two new files have been created: a public certificate (fgcacert.pem) and a private key (in the example,
fgcaprivkey.pem).
Security 92
3. Importing the self-signed certificate
Go to System > Certificates and select Import >
Local Certificate.
93 Security
The above browsers use the operating system's certificate store for Internet browsing. If your users will be using
these applications, you must install the certificate into the certificate store for your OS.
Security 94
If you have the right environment, the certificate can be pushed to your users' devices. However, if Firefox is
used, the certificate must be installed on each individual device, using the instructions below.
6. Results
Before installing the certificate, an error message
would appear in the browser when a site that used
HTTPS was accessed (the example shows an error
message appearing in Firefox).
95 Security
If you view information about the certificate in the
browser, you will see that your self-signed certificate is
used.
Security 96
Protecting web applications
In this recipe, you will use a Web Application Firewall profile to protect web applications, such as Internet
browsers, from being attacked. In this example, the default profile will be targeted to block SQL injection attempts,
as well as generic attacks.
Security 97
1. Enabling Web Application Firewall
Go to System > Features and enable
Web Application Firewall. Select Show
More and enable Multiple Security
Profiles.
You can also use a Web Application Firewall profile to enforce an HTTP method policy, which controls the
HTTP method allowed when accessing websites that match the specified pattern.
Security 98
Go to Security Profiles > Web
Application Firewall and edit the default
profile.
99 Security
3. Applying the profile to a security policy
Go to Policy & Objects > IPv4 Policies
and edit the policy that allows
connections from the internal network to
the Internet.
4. Results
Long URLs, such as this link, can be
used to simulate an attack on your web
browser.
Security 100
Go to Log & Report > Web Application
Firewall and filter for Action: block to
view information about blocked traffic.
5. Offloading to a FortiWeb
If you have a FortiWeb, you may be able to offload the functions of the Web Application Control to your
FortiWeb. To find out if this option is available, refer to the FortiOS or FortiWeb Release Notes for information
about device compatibility.
101 Security
Troubleshooting web filtering
This section contains tips to help you with some common challenges of FortiGate web filtering.
If web filtering is enabled in a policy, go to your FortiGuard settings and expand Web Filtering. Under Port
Selection, select Use Alternate Port (8888). Select Apply to save the changes. Check whether the license is
shown as active. If it is still inactive/expired, switch back to the default port and check again.
Security 102
WiFi
These recipes describe how to use FortiAPs to add WiFi (or Wi-Fi) services to your network.
FortiAPs, managed by FortiGates, provide a full suite of WiFi features. Small offices can use FortiAPs to quickly
add WiFi. Enterprises and educational institutions can take advantage of FortiAP access control features. Each
WiFi network, or SSID, is represented by a WiFi network interface to which you can apply firewall policies,
security profiles, and other features in the same way you would for wired networks.
WiFi authentication
l Assigning WiFi users to VLANs dynamically
l WiFi RADIUS authentication with FortiAuthenticator
WiFi 103
WiFi network on a schedule
In this example, a school enables its WiFi network only during school hours. The school is open from 8am to 6pm
Monday through Friday.
A schedule applied in the security policy would control access to the Internet, but outside of the scheduled period
the SSID would still be visible and clients could associate with it. In this example, the schedule is applied in the
SSID configuration. The SSID is available only during the scheduled hours.
This configuration was tested with FortiOS 5.4 Beta 3 and FortiAP v5.2-build0245.
WiFi 104
1. Create the schedule
Go to Policy & Objects > Schedules.
Create a recurring schedule for school
hours (in the example, 8am-6pm,
Monday through Friday).
WiFi 105
Set Schedule to the new schedule, and
configure the other WiFi Settings as
required.
Results
Verify that mobile devices can connect to the Internet outside of class time, when the schedule group is valid.
Verify that the SSID is not available after scheduled times.
106 WiFi
Extending WiFi range with mesh topology
In this example, a second FortiAP are used to extend the range of a WiFi network. The second FortiAP is
connected to the FortiGate WiFi controller through a dedicated WiFi backhaul network.
In this example, both FortiAPs provide the example-staff network to clients that are in range.
More mesh-connected FortiAPs could be added to further expand the coverage range of the network. Each AP
must be within range of at least one other FortiAP. Mesh operation requires FortiAP models with two radios, such
as the FortiAP-221C units used here.
WiFi 107
1. Creating the backhaul SSID
Go to WiFi Controller > SSID.
WiFi 108
3. Creating the FortiAP Profile
109 WiFi
4. Configuring the security policy
Go to Policy & Objects > IPv4 Policy
and create a new policy.
WiFi 110
6. Preauthorizing FortiAP-1
Go to WiFi Controller > Managed
FortiAPs and create a new entry.
Log in with the username admin, then enter the following CLI commands, substituting your SSID and password
where necessary:
111 WiFi
cfg -a MESH_AP_TYPE=1
cfg -a MESH_AP_SSID=fortinet.mesh.root
cfg -a MESH_AP_PASSWD=hardtoguess
cfg -c
exit
WiFi 112
9. Results
Go to Monitor > WiFi Client Monitor. Both backhaul and client SSIDs are shown. Click Refresh as needed to
see updated information.
113 WiFi
Assigning WiFi users to VLANs dynamically
Virtual LANs (VLANs) are used to assign wireless users to different networks without requiring the use of multiple
SSIDs. Each user's VLAN assignment is stored in the user database of the RADIUS server that authenticates the
users.
This example creates dynamic VLANs for the Techdoc and Marketing departments. The RADIUS server is a
FortiAuthenticator.
WiFi 114
1. Configure the FortiAuthenticator
WiFi 115
For each user, add these RADIUS
attributes which specify the VLAN
information to be sent to the FortiGate.
Tunnel-Private-Group-Id specifies the
VLAN ID.
116 WiFi
Set up DHCP service.
WiFi 117
4. Create the VLAN interfaces
118 WiFi
Create the VLAN interface for marketing-
100 and set up DHCP service.
WiFi 119
Create the VLAN interface for techdoc-
200 and set up DHCP service.
120 WiFi
In Logging Options, enable logging for
all sessions.
WiFi 121
7. Connect and authorize the FortiAP
Go to Network > Interfaces and choose an unused interface. Set Addressing mode to Dedicated to Extension
Device. Connect the FortiAP unit to the this interface and apply power.
Results
The SSID will appear in the list of available wireless networks on the users devices. Both twhite and jsmith can
connect to the SSID with their credentials and access the Internet. (If a certificate warning message appears,
accept the certificate.)
122 WiFi
WiFi RADIUS authentication with FortiAuthenticator
In this example, you use a RADIUS server to authenticate your WiFi clients.
The RADIUS server is a FortiAuthenticator (v4.00-build0008) that is used authenticate users who belong to the
employees user group.
WiFi 123
1. Create the user accounts and user group on the FortiAuthenticator
Go to Authentication > User
Management > Local Users and create
a user account.
WiFi 124
2. Register the FortiGate as a RADIUS client on the FortiAuthenticator
Go to Authentication > RADIUS
Service > Clients and create a client
account.
125 WiFi
4. Create the SSID and set up authentication
Go to WiFi Controller > SSID and define
your wireless network.
WiFi 126
Configure WPA2 Enterprise security that
uses the RADIUS server.
127 WiFi
Connect the FortiAP unit. Go to WiFi
Controller > Managed FortiAPs.
WiFi 128
6. Create the security policy
Go to Policy & Objects > IPv4 Policy
and add a policy that allows WiFi users
to access the Internet.
Results
Connect to the example-staff network
and browse Internet sites.
129 WiFi
Authentication
This section contains information about authenticating users and devices.
Authentication, the act of confirming the identity of a person or device, is a key part of network security. When
authentication is used, the identities of users or host computers must be established to ensure that only
authorized parties can access the network.
External authentication
l 802.1X with VLAN Switch interfaces on a FortiGate
WiFi authentication
l Assigning WiFi users to VLANs dynamically
l WiFi RADIUS authentication with FortiAuthenticator
Authentication 130
802.1X with VLAN Switch interfaces on a FortiGate
This recipe follows on from the general introductory video, Managing FortiSwitch from FortiGate, which uses the
FortiLink protocol.
Using 802.1X with VLAN Switch interfaces on the FortiGate secures the network at the switch port by requesting
a connecting user to authenticate. In most deployments the user database will be external to the FortiGate.
This example uses FortiAuthenticator for the RADIUS authentication server, however the example is generic
enough to be adapted to any authentication server supported by the FortiGate and the EAP protocol. Also this
example can be adapted for other products which make use of 802.1X, such as wireless access points.
1. Configuring a CA
In this example we configure EAP-TTLS which requires, as a minimum, server certificate validation. To do this
we use FortiAuthenticator, we create a CA root, self signed, and a service certificate for the authentication
server. The supplicant requires access to the CA certificate in order to validate the server authentication.
131 Authentication
On FortiAuthenticator, go to Certificate Management
> Certificate Authorities > Local CAs and create a
new Local CA. Enter a Certificate ID and Name (CN).
Leave all other settings default.
Authentication 132
Go to Authentication > User Management > Local
Users and create a local user and password.
133 Authentication
Edit your wired connection and select 802.1X security.
Chose Tunneled TLS (TTLS), your CA certificate,
MSCAPv2 for Inner authentication, and the
Username.
4. Results
Check FortiAuthenticator's log messages, look for
802.1x authentication successful.
Authentication 134
Using ifconfig, you should see that you have been
allocated an address from the DHCP server.
135 Authentication
VPNs
This section contains information about configuring a variety of different Virtual Private Networks (VPNs), as well
as different methods of authenticating VPN users. FortiGates support two types of VPNs: IPsec and SSL.
IPsec VPNs use Internet Protocol Security (IPsec) to create a VPN that extends a private network across a public
network, typically the Internet. In order to connect to an IPsec VPN, users must install and configure an IPsec
VPN client (such as FortiClient) on their PCs or mobile devices.
SSL VPNs use Secure Sockets Layer (SSL) to create a VPN that extends a private network across a public
network, typically the Internet. Connections to an SSL VPN are done through a web browser and do not require
any additional applications.
IPsec
l IPsec VPN with FortiClient
l Site-to-site IPsec VPN with two FortiGates
l IPsec troubleshooting
SSL
l SSL VPN using web and tunnel mode
l SSL VPN troubleshooting
VPNs 136
IPsec VPN with FortiClient
In this example, you will allow remote users to access the corporate network using an IPsec VPN that they
connect to using FortiClient for Mac OS X, Windows, or Android. Traffic to the Internet will also flow through the
FortiGate, to apply security scanning.
VPNs 137
1. Creating a user group for remote users
Go to User & Device > User Definition.
Create a local user account for an IPsec
VPN user.
VPNs 138
2. Adding a firewall address for the local network
Go to Policy & Objects > Addresses
and create an address for the local
network.
139 VPNs
Set Local Interface to an internal
interface (in the example, lan) and set
Local Address to the local LAN
address.
VPNs 140
4. Creating a security policy for access to the Internet
The IPsec wizard automatically created a security policy allowing IPsec VPN users to access the internal
network. However, since split tunneling is disabled, another policy must be created to allow users to access the
Internet through the FortiGate.
141 VPNs
5. Configuring FortiClient
Open FortiClient, go to Remote Access
and Add a new connection.
VPNs 142
6. Results
On FortiClient, select the VPN, enter the
username and password, and select
Connect.
143 VPNs
On the FortiGate unit, go to Monitor >
IPsec Monitor and verify that the tunnel
Status is Up.
VPNs 144
Site-to-site IPsec VPN with two FortiGates
In this example, you will allow transparent communication between two networks that are located behind different
FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using
the VPN Wizards Site to Site FortiGate template.
In this example, one office will be referred to as HQ and the other will be referred to as Branch.
VPNs 145
1. Configuring the HQ IPsec VPN
On the HQ FortiGate, go to VPN > IPsec
Wizard.
VPNs 146
In the Policy & Routing step, set the
Local Interface. The Local Subnets
will be added automatically. Set Remote
Subnets to the Branch FortiGate's local
subnet (in the example, 5.5.5.5/24).
147 VPNs
2. Configuring the Branch IPsec VPN
On the Branch FortiGate, go to VPN >
IPsec Wizard.
VPNs 148
In the Policy & Routing step, set the
Local Interface. The Local Subnets
will be added automatically. Set Remote
Subnets to the HQ FortiGate's local
subnet (in the example, 10.10.10.1/24).
3. Results
On either FortiGate, go to Monitor >
IPsec Monitor to verify the status of the
VPN tunnel. Right-click under Status
and select Bring Up.
149 VPNs
A user on either of the office networks should be able to connect to any address on the other office network
transparently.
If you need to generate traffic to test the connection, ping the Branch FortiGate's internal interface from the HQ's
internal network.
VPNs 150
IPsec troubleshooting
This page contains tips to help you with some common challenges of IPsec VPNs.
If you are still unable to connect to the VPN tunnel, run the following diagnostic command in the CLI:
VPNs 151
diag debug application ike -1
diag debug enable
The resulting output may indicate where the problem is occurring. When you are finished, disable the diagnostics
by using the following command:
152 VPNs
SSL VPN using web and tunnel mode
In this example, you will allow remote users to access the corporate network using an SSL VPN, connecting
either by web mode or tunnel mode and with FortiClient. This allows users to access network resources, such as
the Internal Segmentation Firewall (ISFW) used in this example.
For users connecting via tunnel mode, traffic to the Internet will also flow through the FortiGate, to apply security
scanning to this traffic.
During the connecting phase, the FortiGate will also verify that the remote users antivirus software is installed
and up-to-date.
VPNs 153
1. Creating a user and a user group
Go to User & Device User Definition.
Create a local user account for a SSL
VPN user.
VPNs 154
2. Creating an SSL VPN portal for remote users
Go to VPN > SSL-VPN Portals. Edit the
full-access portal. The full-access portal
allows the use of tunnel mode and/or web
mode.
155 VPNs
3. Configuring the SSL VPN tunnel
Go to VPN > SSL-VPN Settings and set
Listen on Interface(s) to wan1.
VPNs 156
4. Adding an address for the local network
Go to Policy & Objects > Addresses.
157 VPNs
5. Adding security policies for access to the internal network and Internet
Go to Policy & Objects > IPv4 Policy.
Add a security policy allowing access to
the internal network through the VPN
tunnel interface. Set a policy name that
will identify what this policy is used for (in
the example, SSL-VPN-internal)
VPNs 158
Add a second security policy allowing
SSL VPN access to the Internet.
159 VPNs
6. Setting the FortiGate unit to verify users have current AntiVirus software
Go to the Dashboard. In the CLI Console widget, enter the following commands to enable the host to check
for compliant AntiVirus software on the remote users computer:
config vpn ssl web portal
edit full-access
set host-check av
end
7. Results
Web mode:
Using a supported Internet browser,
connect to the SSL VPN web portal
using the remote gateway configured in
the SSL VPN settings (in the example,
172.20.121.46:10443)
VPNs 160
The web portal appears.
161 VPNs
To connect to the Internet, select Quick
Connection. Select HTTP/HTTPS, then
enter the URL and select Launch.
VPNs 162
An SSH connection will open in your
browser, connecting to the requested
Host.
Tunnel mode:
If you have not done so already,
download FortiClient from
www.forticlient.com.
Select Add.
163 VPNs
Connect to the VPN using the SSL VPN
user's credentials.
VPNs 164
SSL VPN troubleshooting
This page contains tips to help you with some common challenges for SSL VPN.
You receive an error stating that the web page cannot be found.
Check the URL you are attempting to connect to. It should follow this pattern:
https://<FortiGate IP>:<Port>/remote/login
Ensure that you are using the correct port number in the URL.
When you attempt to connect using FortiClient or in Web mode, you receive the fol-
lowing error message: Unable to logon to the server. Your user name or pass-
word may not be configured properly for this connection. (-12).
Ensure that cookies are enabled in your browser. Also, if you are using a remote authentication server, ensure that
the FortiGate is able to communicate with it.
You can connect remotely to the VPN tunnel but are unable to access the network
resources.
Examine the policy allowing VPN access to the local network. If the destination address is set to all, create a
firewall address for the internal network. Change the destination address and attempt to connect remotely again.
VPNs 165
Users are unable to download the SSL VPN plugin.
Go to the VPN Portal to make sure that the option to Limit Users to One SSL-VPN Connection at a Time is
disabled. This allows users to connect to the resources on the portal page while also connecting to the VPN
through FortiClient.
166 VPNs
Expert
FortiGate units can be deployed in many ways to meet a wide range of advanced requirements. This section
contains recipes and articles (which discuss topics in greater depth than a recipe) about a variety of these
configurations.
Recipes and articles in this section are intended for users with a high degree of background knowledge about
FortiGates and computer networking, such as users who have completed Fortinets Network Security Expert
(NSE) 4 level of training.
Authentication
l Single Sign-On using LDAP and FSSO agent in advanced mode
l Single Sign-On using FSSO agent in advanced mode and FortiAuthenticator
l SSO using a FortiGate, FortiAuthenticator, and DC Polling
VPN
l Configuring ADVPN in FortiOS 5.4
Expert 167
Single Sign-On using LDAP and FSSO agent in
advanced mode
This recipe illustrates FortiGate user authentication with FSSO and a Windows DC LDAP server. In this example,
user authentication controls Internet access.
Expert 168
1. Integrating the FortiGate with the Windows DC LDAP server
Go to User & Device > LDAP Servers
to configure the LDAP server.
Expert 169
In the Collector Agent IP address field,
enter the IP address of the Windows AD
server.
170 Expert
Next, select the users you do not wish to
monitor.
Expert 171
Upon reboot, the collector agent will start
up.
172 Expert
5. Adding a policy to the FortiGate
Go to Policy & Objects > IPv4 Policy
and create a policy allowing "FortiOS_
Writers" to navigate the Internet with
appropriate security profiles.
Expert 173
9. Results
Have users log on to the domain, go to
the FSSO agent, and select Show
Logon Users.
174 Expert
Select an entry for details.
Expert 175
Single Sign-On using FSSO agent in advanced mode
and FortiAuthenticator
This recipe demonstrates FortiGate user authentication with FSSO agent installed on a Windows Domain
Controller, and the use of a FortiAuthenticator as an LDAP server. In this example, user authentication controls
Internet access.
Expert 176
1. Configuring an LDAP directory on the FortiAuthenticator
Go to Authentication > User
Management > Local Users to create a
user list. Make sure to enable Allow
LDAP browsing.
Expert 177
Go to Authentication > User
Management > User Groups to create
a user group and add users to it.
"FortiOS_Writers" user group is used in
this example.
178 Expert
2. Integrating the FortiGate with the FortiAuthenticator
On the FortiGate, go to User & Device >
LDAP Servers to configure the LDAP
server.
Expert 179
Select the Advanced access method for
Windows Directory.
180 Expert
Select the domain you wish to monitor.
Expert 181
Under Working Mode, select DC Agent
Mode.
182 Expert
Upon reboot, the collector agent will start
up.
Expert 183
6. Adding a policy to the FortiGate
Go to Policy & Objects > IPv4 Policy
and create a policy allowing "FortiOS_
Writers" to navigate the Internet with
appropriate security profiles.
184 Expert
7. Results
Have users log on to the domain, go to
the FSSO agent, and select Show
Logon Users.
Expert 185
Upon successful authentication, from the
FortiGate, go to Monitor > Firewall User
Monitor and verify FSSO Logons.
186 Expert
SSO using a FortiGate, FortiAuthenticator, and DC
Polling
This recipe demonstrates FortiGate user authentication with a FortiAuthenticator as a Single Sign-On server. In
this example, the FortiAuthenticator is configured to collect the user logon by polling the Domain Controller logs.
User authentication controls Internet access.
Expert 187
1. Configuring the FortiAuthenticator
Go to Fortinet SSO Methods > SSO >
General and configure these general
settings.
Expert 188
Go to Authentication > Remote Auth.
Servers > LDAP to set the Windows AD
as an LDAP server. This will be useful to
import SSO Filtering Objects from
Windows AD to the FortiAuthenticator.
189 Expert
When selecting the Users/Groups field,
the SSO user groups initially polled by
the FortiAuthenticator from the Domain
Controller appear.
Expert 190
4. Adding a policy on the FortiGate
Go to Policy & Objects > IPv4 Policy
and create a policy allowing "FortiOS_
writers" to navigate the Internet with
appropriate security profiles.
191 Expert
Go to Logging > Log Access > Logs to
verify logs.
Expert 192
6. Results from the FortiGate
Upon successful authentication, go to
Monitor > Firewall User Monitor and
verify FSSO Logons.
193 Expert
Configuring ADVPN in FortiOS 5.4
In this recipe, we will explore a new VPN feature introduced in FortiOS 5.4.0: ADVPN.
ADVPN (Auto Discovery VPN) is an IPsec technology based on an IETF RFC draft
(https://tools.ietf.org/html/draft-sathyanarayan-ipsecme-advpn-03). In simple terms, ADVPN allows a traditional
hub and spoke VPN's spokes to establish dynamic, on-demand direct tunnels between each other so as to avoid
routing through the topology's hub device. ADVPN requires the use of dynamic routing in order to function and
FortiOS 5.4 supports both BGP and RIP. This recipe will focus on using BGP and its route-reflector mechanism as
the dynamic routing solution to use with ADVPN.
ADVPN's primary advantages is that it provides the full meshing capabilities to a standard hub and spoke
topology, greatly reducing the provisioning effort required for full spoke to spoke low delay reachability and
addressing the scalability issues associated with very large fully meshed VPN networks.
BGP (and specifically, iBGP) is a natural fit for ADVPN as its route reflector mechanism resides on the VPN hub
device and mirrors routing information from each spoke peer to each other. Furthermore, dynamic group peers
result in near zero-touch hub provisioning when a new spoke is introduced in the topology.
Expert 194
As pictured, while the static configuration will involve both spoke FortiGate units to connect to our circular hub
FortiGate, Spoke A will be able to establish a dynamic on-demand shortcut IPSec tunnel to Spoke B (and vice
versa) if a host behind either spoke attempts to reach a host behind the other spoke. We will complete the
configuration below and our verification step below will include reachability from 192.168.2.1 (spoke A) to
192.168.3.1 (spoke B) over the dynamically created shortcut link.
This recipe is documented in CLI as configuration such as BGP and ADVPN are best done using the command
line interface. We are assuming basic IP and default routing configuration has been completed on the devices.
195 Expert
1. Configure the Hub FortiGate
Using the CLI, config vpn ipsec phase1-interface
configure phase edit "ADVPN"
set type dynamic
1 parameters. set interface "wan1"
set proposal aes128-sha1
The auto- set add-route disable
discovery set dhgrp 2
commands set auto-discovery-sender enable
enable the set psksecret fortinet
next
sending and
end
receiving of
shortcut
messages to
spokes (the hub
is responsible
for lettings the
spokes know
that they should
establish those
tunnels).
Note:
aggressive
mode is not
supported
currently for
ADVPN.
Expert 196
requires that end
tunnel IPs be
configured on
each device
connecting to
the topology.
Those IP
addresses need
to be unique for
each peer. A
particularity of
the hub is that it
needs to define
a bogus remote-
IP address
(10.10.10.254 in
our example).
This address
should be
unused in the
topology and it
will not be
actually
considered as
part of the
configuration for
the hub.
197 Expert
and configuring set prefix 192.168.1.0 255.255.255.0
a dynamic client next
end
group to reduce end
provisioning
requirements.
While we are
advertising our
LAN network
directly ("config
network"
command),
route
redistribution is
a perfectly valid
alternative.
Expert 198
set status enable
next
end
199 Expert
This is a static set router-id 10.10.10.2
standard config neighbor
edit "10.10.10.1"
configuration set soft-reconfiguration enable
and as stated for set remote-as 65000
the hub, next
redistribution end
config network
could be used
edit 1
instead of set prefix 192.168.2.0 255.255.255.0
explicit route next
advertisement. end
end
Expert 200
Configure config firewall policy
policies. edit 0
set name "OUT ADVPN"
set srcintf "lan"
set dstintf "ADVPN"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set status enable
next
edit 0
set name "IN ADVPN"
set srcintf "ADVPN"
set dstintf "lan"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set status enable
next
end
Results
We can validate B 192.168.1.0/24 [200/0] via 10.0.0.1, ADVPN, 22:30:21
B 192.168.3.0/24 [200/0] via 10.0.0.3 (recursive via 10.0.0.1), 22:30:21
the behaviour of
our configuration
using a few
commands. We
are going to run
these
commands from
SPOKE A.
201 Expert
the recursive
routing - a result
of our spoke's
required static
route. In this
case, there has
not been any
traffic between
our local subnet
(192.168.2.0/24)
and the other
spoke's subnet,
as the routes are
both going
through the hub.
Our routing
Expert 202
information now
displays the
remote subnet
as being
available
through the
spoke directly,
through
interface
ADVPN_0, a
dynamically
instantiated
interface going
to that spoke.
203 Expert
replaywin=2048
seqno=5ba esn=0
life: type=01 bytes=0/0 timeout=43148/43200
dec: spi=9a487db2 esp=aes key=16 4f70d27edad656cfcacbae61b23d4b11
ah=sha1 key=20 b19ea87c90dd92d1cab58cbf24ae8fe12ee927cb
enc: spi=b3dde355 esp=aes key=16 efbb4440df75018610b4ba8f5756167d
ah=sha1 key=20 81cc9cee3bee1c2dba0eb1e7ac66e9d34b67bde9
dec:pkts/bytes=1465/90152, enc:pkts/bytes=1465/187560
------------------------------------------------------
Expert 204
Glossary
BGP: Border Gateway Protocol is primarily used to connect the networks of large organizations that have two or more
ISP connections, or between other autonomous systems. If used in such a situation, a FortiGate can use BGP
for routing.
BYOD: Bring Your Own Device (also called device management) is the practice of allowing network users to access an
organizations (usually wireless) network with their own computers, smart phones, tablets and other devices.
BYOD has a major impact on networks with large and diverse user bases, such as educational institutions, but
also affects large and small business networks.
CA: A certificate authority (CA) is an entity that issues digital certificates, which are used to establish secure
connections over a network, typically the Internet. The CA acts as a trusted third-party by verifying the identity of
a certificates owner: for example, the certificate found when you go to https://www.facebook.com is verified as
belonging to Facebook.
Certificates: In networking, certificates (including public key certificates, digital certificates, and identity certificates) provide
digital signatures for websites or other electronic communication and allow you to verify whether a digital identity
is legitimate.. A FortiGate can use certificates for many things, including SSL inspection and user authentication.
CLI: The Command Line Interface is a text-based interface used to configure a FortiGate unit. Most steps in the
FortiGate Cookbook use the Graphical User Interface (see GUI), but some configuration options are only
available using the CLI.
DHCP: Dynamic Host Configuration Protocol is a networking protocol that allows devices to request network
parameters, such as IP addresses, automatically from a DHCP server, reducing the need to assign these
settings manually. A FortiGate can function as a DHCP server for your network and can also receive its own
network parameters from an external DHCP server.
Dial-up/dynamic A dial-up VPN, also called a dynamic VPN, is a type of IPsec VPN where one of the endpoints has a dynamic IP
VPN: address.
DMZ: A Demilitarized Zone is an interface on a FortiGate unit that provides external users with secure access to a
protected subnet on the internal network without giving them access to other parts of the network. This is most
commonly done for subnets containing web servers, which must be accessible from the Internet. The DMZ
interface will only allow traffic that has been explicitly allowed in the FortiGates configuration. FortiGate models
that do not have a DMZ interface can use other interfaces for this purpose.
DNS: Domain Name System is used by devices connecting to the Internet to locate websites by mapping a domain
name to a websites IP address. For example, a DNS server maps the domain name www.fortinet.com to the IP
address 66.171.121.34. Your FortiGate unit controls which DNS servers the network uses. A FortiGate can also
function as a DNS server.
DSR: In a typical load balancing scenario, server responses to client requests are routed through a load balancer on
their way back to the client. The load balancer examines the headers of each response and can insert a cookie
before sending the server response on to the client. In a Direct Server Return (DSR) configuration, the server
receiving a client request responds directly to the client IP, bypassing the load balancer. Because the load
balancer only processes incoming requests, load balancing performance is dramatically improved when using
Glossary 205
DSR in high bandwidth applications. In such applications, it is not necessary for the load balancer to receive and
examine the servers responses. So the client makes a request and the server simply streams a large amount of
data to the client.
Dynamic IP A dynamic IP address is one that can change without the devices user having to do anything. Dynamic IP
address: addresses allow networks to control the IP addresses of devices that connect to them. This allows you to connect
portable devices to different networks without needing to manually change their IP addresses.
ECMP: Equal Cost Multipath Routing allows next-hop packet forwarding to a single destination to occur over multiple
best paths that have the same value in routing metric calculations. ECMP is used by a FortiGate for a variety of
purposes, including load balancing.
Explicit Proxy: Explicit proxy is a type of configuration where all clients are configured to allow requests to go through a proxy
server, which is a server used as an intermediary for requests from clients seeking resources from other
servers. When a FortiGate uses explicit proxy, the clients sending traffic are given the IP address and port
number of the proxy server.
FortiAP: A FortiAP unit is a wireless Access Point that can be managed by a FortiGate. Most FortiAP functions can also
been accomplished using a FortiWiFi unit.
FortiClient: The FortiClient software provides a variety of features, including antivirus, web filtering, firewall, and parental
controls, to individual computers and mobile devices. It can also be used to connect to a FortiGate using either an
SSL or IPsec VPN.
FortiClient is available for Windows, Mac OSX, iOS, and Android, and can be set up quickly. After being installed,
it automatically updates its virus definition files, does a full system scan once per week, and much more.
FortiOS: FortiOS is the operating system used by FortiGate and FortiWiFi units. It is also referred to as firmware.
FTP: File Transfer Protocol is a standard protocol used to transfer computer files from one host to another host over a
computer network, usually the Internet, using FTP client and server applications.
Gateway: A gateway is the IP address that traffic is sent to if it needs to reach resources that are not located on the local
subnet. In most FortiGate configurations, a default route using a gateway provided by an Internet service
provider must be set to allow Internet traffic.
GUI: The Graphical User Interface, also known as the web-based manager, is a graphics-based interface used to
configure a FortiGate unit and is an alternative to using the Command Line Interface (see CLI). You can connect
to the GUI using either a web browser or FortiExplorer. Most steps in the FortiGate Cookbook use the GUI.
Hardware A hardware switch is a virtual interface that groups different interfaces together, allowing a FortiGate to treat the
switch: group as a single interface. Many FortiGate models have a default hardware switch, called either lan or internal.
HTTP: Hypertext Transfer Protocol is a protocol used for unencrypted communication over computer networks,
including the Internet, where it is used to access websites. FortiGate units handle more HTTP traffic than any
other protocol.
206 Glossary
HTTPS: Hypertext Transfer Protocol Secure is a protocol that secures HTTP communications using the Secure Sockets
Layer (SSL) protocol. HTTPS is the most commonly used secure communication protocol on the Internet.
Interfaces: Interfaces are the points at which communication between two different environments takes place. These points
can be physical, like the Ethernet ports on a FortiGate, or logical, like a VPN portal.
ISFW: An Internal Segmentation Firewall (ISFW) is a FortiGate in that sits at strategic internal points of the internal
network, rather than on the network edge. This allows extra security measures to be taken around key network
components, such a servers that contain valuable intellectual property.
IPaddress: An Internet Protocol address is a numerical label assigned to each device participating in a computer network
that uses the Internet Protocol for communication. FortiGate units can use IP addresses to filter traffic and
determine whether to allow or deny traffic. Both IP version 4 and IP version 6 (see IPv4 and IPv6) are supported
by your FortiGate.
IPsec: Internet Protocol Security is used to for securing IP communications by authenticating and encrypting each
packet of a session. A FortiGate primarily uses this protocol to secure virtual private networks (see VPN).
IPv4: Internet Protocol version 4 is the fourth version of the Internet Protocol (IP), the main protocol used for
communication over the Internet. IPv4 addresses are 32-bit and can be represented in notation by 4 octets of
decimal digits, separated by a period: for example, 172.16.254.1.
IPv6: Internet Protocol version 6 is the sixth version of the Internet Protocol (IP), the main protocol used for
communication over the Internet (IPv5 never became an official protocol). IPv6 was created in response to the
depletion of available IPv4 addresses. IPv6 addresses are 128-bit and can be represented in notation by 8
octets of hexadecimal digits, separated by a colon: for example, 2001:db8:0000:0000:0000:0000:0000:0000.
IPv6 addresses can be shortened if all the octets are 0000; for example, the previous address can also be
written as 2001:db8::
LAN/internal: The LAN/internal interface is an interface that some FortiGate models have by default. This interface contains a
number of physical ports that are all treated as a single interface by the FortiGate unit. This allows you to
configure access for the entire Local Area Network at the same time, rather than configuring each port
individually.
LDAP: Lightweight Directory Access Protocol is a protocol used for accessing and maintaining distributed directory
information services over a network. LDAP servers are commonly used with a FortiGate for user authentication.
MAC address: A Media Access Control address is a unique identifier assigned to a network interface used for network
communication. A MAC address is assigned to a device by the manufacturer and so this address, unlike an IP
address, is not normally changed. MAC addresses are represented in notation by six groups of two hexadecimal
digits, separated by hyphens or colons: for example, 01:23:45:67:89:ab. Your FortiGate can identify network
devices using MAC addresses.
Multicast: Multicast is a method of group communication where information is addressed to a group of destinations
simultaneously. A FortiGate can use multicast traffic to allow communication between network devices.
NAT: Network Address Translation is a process used to modify, or translate, either the source or destination IP
address or port in a packet header. The primary use for NAT is to allow multiple network devices on a private
network to be represented by a single public IP address when they browse the internet. FortiGate also supports
many other uses for NAT.
Glossary 207
Packet: A packet is a unit of data that is transmitted between communicating devices. A packet contains both the
message being sent and control information, such as the source address (the IP address of the device that sent
the packet) and the destination address (the IP address of the device the packet is being sent to).
Ping: Ping is a utility used to test whether devices are connected over a IP network and to measure how long it takes
for a reply to be received after the message is sent, using a protocol called Internet Control Message Protocol
(ICMP). If ICMP is enabled on the destination interface, you can ping the IP address of a FortiGate interface to
test connectivity between your computer and the FortiGate. You can also use the CLI command execute ping
to test connectivity between your FortiGate and both internal and external devices.
Port numbers: Port numbers are communication endpoints used to allow network communication. Different ports are used for
different application-specific or process-specific purposes; for example, HTTP protocol commonly uses port 80.
Pre-shared key: In cryptography, a pre-shared key is a character string (like a password) known by two parties, and used by
those parties to identify each other. Pre-shared keys are commonly used for granting access to IPsec VPNs and
WiFi networks.
Pre-shared keys are different from regular passwords because they are not normally associated with a specific
individuals credentials.
RADIUS: Remote Authentication Dial In User Service is a protocol that provides centralized Authentication, Authorization,
and Accounting (AAA) management for users that connect and use a network service. RADIUS servers are
commonly used with a FortiGate for user authentication, including single-sign on.
RTSP: The Real Time Streaming Protocol is a media control protocol that is used for controlling streaming audio and
video streams. RTSP has a wide range of uses and is often leveraged by other media-related services such as
SIP. It most commonly uses TCP and UDP port 554 but additional ports are used by the actual media controlled
by RTSP.
FortiOS includes an RSTP session helper that opens the ports used by individual RTSP-controlled streams.
FortiRecorder and FortiCamera use RTSP for video streaming.
SCTP: The Stream Control Transmission Protocol is a transport layer protocol (protocol number 132) used most often
for sending telephone signalling messages over carrier IP networks.
Session: A session is the dialogue between two or more communicating devices that include all messages that pass
between the devices; for example, a session is created when a user browses to a specific website on the Internet
for all communication between the users computer and the web server that hosts the site. Sessions are tracked
by a FortiGate unit in order to create logs about the network traffic.
SIP: Session Initiation Protocol is used for controlling multimedia communication sessions such as voice and video
calls over Internet Protocol networks. FortiGate units use this protocol for voice over IP (see VoIP).
Site-to-site A site-to-site VPN allows two networks that are each behind a VPN gateway (for example, a FortiGate unit), to
VPN: establish secure connections with each other over a public network, typically the Internet.
Site-to-site VPNs most often use IPsec and can be established between two FortiGates, or between a FortiGate
and any other IPsec VPN gateway, such as a Cisco ASA or Microsoft Azure.
208 Glossary
SLAAC: Stateless Address Autoconfiguration is a feature of IPv6 that allows devices on an IPv6 network to automatically
get IPv6 addresses. SLAAC is similar to DHCP except that DHCP requires you to run and configure a DHCP
server. SLAAC is built into IPv6 and requires only minor additional configuration. SLAAC is defined by RFC
2462.
SNMP: Simple Network Management Protocol is a protocol that monitors hardware on your network. A FortiGate can
use SNMP to monitor events such as high CPU usage, VPN tunnels going down, or hardware becoming
disconnected.
SSH: Secure Shell is a protocol used for secure network services between two devices, including remote command-
line access. SSH can be used to access a FortiGates command line interface (CLI).
SSID: A Service Set Identifier is the name that a wireless access point broadcasts to wireless users. Wireless users
select this name to join a wireless network.
SSL: Secure Sockets Layer is a protocol for encrypting information that is transmitted over a network, including the
Internet. SSL can be used for secure communications to a FortiGate, as well as for encrypting Internet traffic
(see HTTPS) and for allowing remote users to access a network using SSL virtual private network (see VPN).
SSLinspection: Secure Sockets Layer inspection is used by your FortiGate to scan traffic or communication sessions that use
SSL for encryption, including HTTPS protocol.
SSO: Single Sign-On is a feature that allows a user to login just once and remembers the credentials to re-use them
automatically if additional authentication is required. A FortiGate supports both Fortinet single sign-on (FSSO)
and single sign-on using a RADIUS server (RSSO).
Static IP Static IP addresses require user intervention to change. Normally a device that always has a wired connection to
address: an Ethernet network has a static IP address.
Static route: A static route is a manually-configured routing entry that is fixed and does not change if the network is changed
or reconfigured.
Subnet: A subnetwork, or subnet, is a segment of the network that is separated physically by routing network devices
and/or logically by the difference in addressing of the nodes of the subnet from other subnets. Dividing the
network into subnets helps performance by isolating traffic from segments of the network where it doesnt need
to go, and it aids in security by isolating access. The addressing scope of a subnet is defined by its IP address and
subnet mask and its connection to other networks is achieve by the use of gateways.
Subnet Mask: A subnet mask is the part of an IP address that is used to determine if two addresses are on the same subnet by
allowing any network enabled device, such as a FortiGate, to separate the network address and the host
address. This lets the device determine if the traffic needs to be sent through a gateway to an external network
or if it is being sent to host on the local network.
URL: A Uniform Resource Locator is a text string that refers to a network resource. The most common use for URLs is
on the Internet, where they are also known as web addresses.
URLs are used by a FortiGate to locate websites on the Internet and can also be used in web filtering to block
specific sites from being accessed.
VDOM: Virtual Domains are used to divide a single FortiGate unit into two or more virtual instances of FortiOS that
function separately and can be managed independently.
Glossary 209
VLAN: Virtual Local Area Networks are used to logically divide a single local area network (LAN) into different parts that
function independently. A FortiGate uses VLANs to provide different levels of access to users connecting to the
same LAN.
VoIP: Voice over Internet Protocol is a protocol that is used to allow voice communications and multimedia sessions
over Internet Protocol sessions, including the Internet. VoIP protocol is used by a FortiGate when traffic needs to
reach a connected VoIP phone or FortiVoice unit.
VPN: A Virtual Private Network is a private network that acts as a virtual tunnel across a public network, typically the
Internet, and allows remote users to access resources on a private network. There are two main types of VPNs
that can be configured using a FortiGate unit: IPsec VPN (see IPsec) and SSL VPN (see SSL).
WAN/WAN 1: The WAN or WAN1 port on your FortiGate unit is the interface that is most commonly used to connect the
FortiGate to a Wide Area Network, typically the Internet. Some FortiGate models have a WAN2 port, which is
commonly used for redundant Internet connections.
210 Glossary
The FortiGate Cookbook contains a variety of step-by-step examples of how to integrate a FortiGate
unit into your network and apply features such as security profiles, wireless networking, and VPN.
Using the FortiGate Cookbook, you can go from idea to execution in simple steps, configuring a
secure network for better productivity with reduced risk.
Fortinet.com