Fortigate Administratior 7.4 Lab Guide
Fortigate Administratior 7.4 Lab Guide
Lab Guide
FortiOS 7.4
Fortinet Training Institute - Library
https://training.fortinet.com
https://docs.fortinet.com
https://kb.fortinet.com
https://fusecommunity.fortinet.com/home
Fortinet Forums
https://forum.fortinet.com
https://support.fortinet.com
FortiGuard Labs
https://www.fortiguard.com
https://www.fortinet.com/nse-training
https://home.pearsonvue.com/fortinet
https://helpdesk.training.fortinet.com/support/home
11/16/2023
TABLE OF CONTENTS
Network Topology 8
Lab 1: System and Network Settings 9
Exercise 1: Configuring FortiGate System Settings 10
Review Local-FortiGate Network Settings 10
Enable the DHCP Server on Local-FortiGate 12
Exercise 2: Working With the CLI 14
Explore the CLI 14
Exercise 3: Generating Configuration Backups 17
Restore a Configuration From a Backup 17
Back Up and Encrypt a Configuration File 19
Restore an Encrypted Configuration Backup 20
Compare the Headers of Two Configuration Files 21
Exercise 4: Configuring Administrator Accounts 23
Configure a User Administrator Profile 23
Create an Administrator Account 24
Test the New Administrator Account 24
Restrict Administrator Access 25
Test the Restricted Access 25
Lab 2: Firewall Policies and NAT 27
Exercise 1: Creating Firewall Address Objects and Firewall Policies 29
Create Firewall Address Objects 29
Create a Firewall Policy 29
Test the Firewall Policy and View the Generated Logs 30
Exercise 2: Reordering Firewall Policies and Firewall Policy Actions 33
Create a Firewall Policy 33
Test the Reordering of a Firewall Policy 34
Exercise 3: Configuring DNAT Settings Using a VIP 37
Create a VIP 37
Create a Firewall Policy 38
Test the VIP Firewall Policy 39
Test SNAT 40
Exercise 4: Using Dynamic NAT With IP Pools 42
Create an IP Pool 42
Edit a Firewall Policy to Use the IP Pool 43
Test Dynamic NAT With IP Pools 44
Lab 3: Routing 45
Exercise 1: Configuring Route Failover 47
Verify the Routing Configuration 47
Configure a Second Default Route 48
Configure the Firewall Policies 49
View the Routing Table 51
Test the Route Failover 52
Restore the Routing Table 54
Exercise 2: Configuring Equal-Cost Multi-Path Routing 56
Configure Administrative Distance 56
Change the ECMP Load Balancing Algorithm 57
Verify Traffic Routing 57
Configure Priority 59
Verify ECMP 59
Lab 4: Firewall Authentication 62
Exercise 1: Configuring an LDAP Server 64
Configure an LDAP Server on FortiGate 64
Assign an LDAP User Group to a Firewall Group 65
Add the Remote User Group to the Firewall Policy 68
Authenticate and Monitor the Authentication 69
Remove the User Group From the Firewall Policy 70
Exercise 2: Configuring a RADIUS Server on FortiGate 72
Configure a RADIUS Server on FortiGate 72
Assign a RADIUS User Group to a Firewall Group 73
Add the Training User Group to the Firewall Policy 75
Authenticate and Monitor the Authentication 76
Remove the User Group From the Firewall Policy 77
Lab 5: Fortinet Single Sign-On Configuration 79
Exercise 1: Configuring FortiGate for FSSO Authentication 81
Review the FSSO Configuration on FortiGate 81
Assign FSSO Users to a Firewall Policy 83
Test FSSO 84
Lab 6: Certificate Operations 87
Exercise 1: Configuring Full SSL Inspection on Outbound Traffic 89
Configure SSL Inspection 89
Enable SSL Inspection in a Firewall Policy 91
Install the Fortinet_CA_SSL Certificate 91
Test Full SSL Inspection 96
Exercise 2: Dealing With Anomalies 97
Manage Invalid Certificates 97
Allow Exceptions to SSL Full Inspection 101
Lab 7: Antivirus 103
Exercise 1: Configuring Flow-Based Antivirus Scanning 105
Configure the Antivirus Profile Inspection Mode 105
Enable the Antivirus Profile on a Firewall Policy 106
Test the Flow-Based Antivirus Profile 107
View the Antivirus Logs 108
Exercise 2: Using Antivirus Scanning in Proxy-Based Inspection Mode 110
Change the Inspection Mode in an Antivirus Profile 110
Change the Inspection Mode in a Firewall Policy 110
Test the Antivirus Configuration 111
Test an Alternate Download Method 112
View the Antivirus Logs 113
Enable SSL Inspection in a Firewall Policy 114
Review the Antivirus History 116
Lab 8: Web Filtering 118
Exercise 1: Configuring FortiGuard Web Filtering 120
Review the FortiGate Settings 120
Determine Web Filter Categories 121
Configure a FortiGuard Category-Based Web Filter 122
Apply the Web Filter Profile to a Firewall Policy 125
Test the Web Filter 126
Create a Web Rating Override 128
Test the Web Rating Override 129
Configure an Authenticate Action 130
Exercise 2: Configuring Static URL Filtering 134
Set Up the Static URL Filter in Flow-Based Inspection Mode 134
To review the web filter logs 136
Lab 9: IPS and Application Control 139
Exercise 1: Blocking Known Exploits 141
Configure IPS Inspection 141
Apply an IPS Sensor to a VIP Firewall Policy 143
Generate Attacks From the Linux Server 145
Monitor the IPS 146
Troubleshoot IPS Activity 146
Exercise 2: Controlling Application Traffic 148
Configure Filter Overrides 148
Apply the Application Control Profile to the Firewall Policy 149
Test the Application Control Profile 150
Configure Application Overrides 151
Test Application Overrides 153
View Logs and Traffic Matching With the Application Control Profile 153
Lab 10: SSL VPN 156
Exercise 1: Configuring SSL VPN Tunnel Mode 158
Configure the SSL VPN Settings 158
Configure the Routing for Tunnel Mode 160
Create a Firewall Policy for SSL VPN 160
Configure FortiClient for SSL VPN Connections 161
Monitor an SSL VPN User 162
Review VPN Events 163
Lab 11: IPsec VPN Configuration 165
Exercise 1: Configuring a Dial-Up IPsec VPN Between Two FortiGate
Devices 168
Create Phase 1 and Phase 2 Negotiations on Local-FortiGate (Dial-Up Server) 168
Create Firewall Policies for VPN Traffic on Local-FortiGate (Dial-Up Server) 170
Create Phase 1 and Phase 2 on Remote-FortiGate (Dial-Up Client) 171
Create a Static Route for VPN Traffic on Remote-FortiGate (Dial-Up Client) 173
Create the Firewall Policies for VPN Traffic on Remote-FortiGate (Dial-Up Client) 174
Test and Monitor the VPN 175
Exercise 2: Configuring a Static IPsec VPN Between Two FortiGate Devices 178
Create Phase 1 and Phase 2 Negotiations on Local-FortiGate 179
Create a Static Route for VPN Traffic on Local-FortiGate 181
Create Firewall Policies for VPN Traffic on Local-FortiGate 181
Test and Monitor the VPN 183
Lab 12: SD-WAN Configuration 185
Exercise 1: Configuring SD-WAN 187
Remove Interface References 187
Configure a Zone and Members for DIA 187
Configure a Performance SLA 189
Configure Rules 191
Configure a Static Route and Firewall Policy 196
Exercise 2: Monitoring the SD-WAN Setup 200
Generate Internet Traffic From the Local-Client VM 200
Monitor DIA Traffic Distribution 200
Check SD-WAN System Events 203
Lab 13: Security Fabric 205
Exercise 1: Configuring the Security Fabric on Local-FortiGate and ISFW 210
Configure FortiAnalyzer Logging on Local-FortiGate (Root) 210
Configure the Security Fabric on Local-FortiGate (Root) 212
Configure the Security Fabric on ISFW 213
Authorize ISFW (Downstream) on Local-FortiGate (Root) 215
Check the Security Fabric Deployment Result 216
Exercise 2: Configuring the Security Fabric on Local-FortiGate and Remote-
FortiGate 219
Configure the Security Fabric on Remote-FortiGate (Downstream) 219
Authorize Remote-FortiGate (Downstream) on Local-FortiGate (Root) 220
Check the Security Fabric Deployment Result 221
Lab 14: High Availability 224
Exercise 1: Configuring HA 227
Configure HA Settings on Local-FortiGate 227
Configure HA Settings on Remote-FortiGate 228
Observe and Verify the HA Synchronization Status 228
Verify FortiGate Roles in an HA Cluster 229
Exercise 2: Triggering an HA Failover 231
Trigger a Failover by Rebooting the Primary FortiGate 231
Verify the HA Failover and FortiGate Roles 232
Trigger an HA Failover by Resetting the HA Uptime 232
Observe HA Leave and Join Messages Using Diagnostic Commands 233
Exercise 3: Configuring the HA Management Interface 235
Access the Secondary FortiGate CLI Through the Primary FortiGate CLI 235
Set Up a Reserved HA Management Interface 236
Configure and Access the Primary FortiGate Using the Reserved HA Management
Interface 237
Configure and Access the Secondary FortiGate Using the Reserved HA Management
Interface 237
Disconnect Remote-FortiGate From the Cluster 238
Restore the Remote-FortiGate Configuration 239
Lab 15: Diagnostics Performance 241
Exercise 1: Determining What Is Happening Now 243
Run Diagnostic Commands 243
Exercise 2: Troubleshooting a Connectivity Problem 245
Identify the Problem 245
Use the Sniffer 245
Use the GUI Debug Flow Tool 246
Fix the Problem 247
Test the Fix 247
Network Topology
Network Topology
In this lab, you will learn about FortiGate basic system and network factory default settings and apply changes and
modify the default factory settings. You will also perform administrative tasks through the CLI and GUI and back
up and restore a configuration file, as well as create a new administrator account and modify administrator access
permissions.
Objectives
l Review and change network settings
l Access the FortiGate CLI
l Back up and restore configuration files
l Locate the FortiGate model and FortiOS firmware build in a configuration file
l Create a new administrator user
l Restrict administrator access
Time to Complete
Estimated: 30 minutes
VM Username Password
In this exercise, you will review the Local-FortiGate system settings and make changes to complete setting up
FortiGate on your network. You will enable the internal network DHCP server to allow hosts to receive the IP
address when connecting to Local-FortiGate.
Some of the settings in this lab have been preconfigured and are not the factory default settings of FortiGate.
You will review the port3 network interface on Local-FortiGate and you will also review the static routes.
You can double-click an object on the FortiGate GUI to view or edit the content of the
object.
4. In the Edit Interface window, review the information available on the right.
FortiGate displays its host name and status without the need to navigate away from your current work.
Why do some of the settings appear or disappear when the role of an interface changes?
Each role reflects the appropriate settings required to configure the interface.The Undefined role displays
all of the settings you can configure on an interface.
The purpose of choosing WAN as the role of the interface is to see that when this
interface is connected to an external connection, you may need to disable some
settings to configure the DHCP server setting.
Notice in the LAN role, the DHCP server appears on the GUI, unlike when the role is
set to WAN.
This command displays basic status information about FortiGate. The output includes the FortiGate serial
number, operation mode, and so on. When the More prompt appears on the CLI, perform one of the following
actions:
Action Command
To exit Type q.
This command shows all options that the CLI will accept after the get command. Depending on the
command, you may need to enter additional words to completely specify a configuration option.
7. Try some of the control key sequences shown in the following table:
Action Command
This command lists all options that the CLI accepts after the execute command.
10. Press the space bar, and then press the Tab key three times.
Each time you press the Tab key, the CLI replaces the second word with the next possible option for the
execute command, in alphabetical order.
You can abbreviate most commands. In lessons and labs, many of the commands
that you see are in abbreviated form. For example, instead of typing execute, you
can type exe.
Use this technique to reduce the number of keystrokes that are required to enter a
command. Often, experts can configure FortiGate faster using the CLI than using the
GUI.
If there are other commands that start with the same characters, your abbreviation
must be long enough to be specific, so that FortiGate can distinguish them.
Otherwise, the CLI displays an error message about ambiguous commands.
11. On a new line, enter the following command to view the port3 interface configuration (hint: try using the shortcuts
you just learned about):
show system interface port3
The show full-configuration command displays all the configuration settings for the interface. The
show command displays only those values that are different from the default values.
In this exercise, you will learn how to generate and restore cleartext and encrypted configuration backups. The
configuration files that backups produce enable you to restore FortiGate to an earlier configuration.
The first time that you log in, you may need to click and drag the screen from the
bottom to bring up the login prompt.
2. On the Local-Client VM, open a browser, and then log in to the Local-FortiGate GUI at 10.0.1.254 with the
username admin and password password.
You can also access the Local-FortiGate GUI from the bookmarks bar in the Mozilla
Firefox browser.
All lab exercises were tested running Firefox on the Local-Client and Remote-Client
VMs. To get consistent results, you should use Firefox to access both the internet and
the FortiGate GUIs in this virtual environment.
3. In the upper-right corner, click admin, and then click Configuration > Restore.
4. Click Upload to select the backup configuration file from your local PC.
5. Click Desktop > Resources > FortiGate-Administrator > Introduction > local-initial.conf, and then
click Select.
6. Click OK.
7. Click OK to reboot.
After your browser uploads the configuration, FortiGate reboots automatically. This takes approximately 30–
45 seconds.
8. When the Local-FortiGate GUI login page reappears after reboot, log in with the username admin and password
password.
9. Click Network > Interfaces, and then verify that the network interface settings were restored.
10. Click Network > Static Routes, and then verify that the default route was restored.
Always back up the configuration before making changes to FortiGate (even if the change seems minor or
unimportant). There is no undo. You should carefully consider the pros and cons of an encrypted backup before
you begin encrypting backups. While your configuration, including things like private keys, remains private, an
encrypted file hampers troubleshooting because Fortinet Support cannot read the file. Consider saving backups in
plaintext, and storing them in a secure place instead.
You will create an encrypted file with the backup of the FortiGate current configuration.
5. Click OK.
The Firefox browser saves the encrypted configuration file in the Downloads folder, by default. Ensure that
you record the password and store it in a secure place.
You can access downloaded files by clicking the download arrow button in the upper-
right corner of the browser.
Restoring from a backup enables you to return FortiGate to a previous configuration. As a word of caution, if you
cannot recall the password required to decrypt an encrypted backup, you will not be able to restore FortiGate to
the backup. Ensure that you record the password and store it in a secure place.
You will restore the configuration backup that you created in the previous procedure.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Compare the Headers of Two Configuration Files on page 21.
3. Browse to your Downloads folder, and then select the configuration file that you created in the previous
procedure.
4. In the Password field, type fortinet, and then click OK.
5. Click OK to confirm that you want to restore the configuration.
FortiGate reboots.
When you troubleshoot issues, or when you restore FortiGate to an earlier OS version or build, it is useful to know
where to find the version and build number in a configuration file. This task shows you where to find this
information.
You will open and compare two configuration files using Notepad++ / TextEditor.
2. Click File > Open, and then browse to the Downloads folder to open the encrypted configuration file.
3. Click File > Open, and then browse to the initial configuration file:
Desktop\Resources\FortiGate-Security\Introduction\local-initial.conf
In both the cleartext and encrypted configuration files, the top line acts as a header,
and lists the firmware and model that this configuration belongs to.
5. Close the two tabs in Notepad++, and then close the application.
FortiGate offers many options for configuring administrator privileges. For example, you can specify the IP
addresses that administrators are allowed to connect from.
In this exercise, you will work with administrator profiles and administrator user accounts. An administrator profile
is a role that is assigned to an administrator user that defines what the user is permitted to do on the FortiGate GUI
and CLI.
You will create a new user administrator profile that has read-only access for most of the configuration settings.
You will create a new administrator account. You will assign the account to the administrator profile you created in
the previous procedure. The administrator will have read-only access to most of the configuration settings.
Field Value
Username Security
Password fortinet
Administrator names and passwords are case sensitive. You can't include characters,
such as < > ( ) # ", in an administrator account name.
You will confirm that the new administrator account has read-write access to only the security profile configuration.
2. Log back in to the Local-FortiGate GUI with the username Security and password fortinet.
3. In the FortiGate Setup window, click Later.
4. Enable Don't show again, and then click OK to close the FortiOS introduction window.
5. Explore the settings that are available on the GUI.
You should see that this account can configure only security profiles.
You will restrict access for FortiGate administrators. Only administrators connecting from a trusted subnet are
allowed access. This is useful if you must restrict the access points that administrators connect to FortiGate from.
You will verify that a Security administrator outside the 10.200.3.0/24 subnet can't access FortiGate.
3. Log in to the Remote-Client VM with the username Administrator and password password.
4. On the Remote-Client VM, open a browser, and then log in to the Local-FortiGate GUI at 10.200.1.1 with the
username Security and password fortinet.
What is the result this time?
Why were you able to log in using the admin account and not the Security account from the Local-Client
VM directly connecting to the Local-FortiGate GUI?
This is because Trusted Host is set on the Security administrator account but not on the admin account.
5. On the Local-FortiGate CLI, log in with the username admin and password password.
6. Enter the following CLI commands to add 10.0.1.0/24 as the second trusted IP subnet (Trusted Host 2) to the
Security administrator account:
config system admin
edit Security
set trusthost2 10.0.1.0/24
end
In this lab, you will configure firewall policies on Local-FortiGate, and then perform various tests on the Local-
Client VM to confirm that traffic is matching the appropriate firewall policies based on the configuration.
You will also examine how to configure and test a firewall policy for destination network address translation
(DNAT) using a virtual IP (VIP) address, and source network address translation (SNAT) using an IP pool. You will
configure and test SNAT using the central SNAT policy, and DNAT using the DNAT policy and VIPs. You can use
network address translation (NAT) to perform SNAT and DNAT for the traffic passing through FortiGate.
Objectives
l Configure firewall objects and firewall policies
l Configure source and destination matching in firewall policies
l Apply service objects to a firewall policy
l Configure firewall policy logging options
l Reorder firewall policies
l Read and understand logs
l Configure DNAT settings using a VIP
l Configure SNAT settings using overload IP pools
Time to Complete
Estimated: 60 minutes
Prerequisites
Before you begin this lab, you must restore configuration files on Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will configure firewall address objects. You will also configure an IPv4 firewall policy that you
will apply firewall address objects to, along with a schedule, services, and log options. Then, you will test the
firewall policy by passing traffic through it and checking the logs for your traffic.
At its core, FortiGate is a firewall, so almost everything that it does to your traffic is related to your firewall policies.
By default, FortiGate has many preconfigured, well-known address objects in the factory default configuration.
However, if those objects don’t meet the needs of your organization, you can configure more.
Field Value
Name LOCAL_SUBNET
Interface any
Type Subnet
IP/Netmask 10.0.1.0/24
5. Click OK.
First, you will disable the existing firewall policy. Then, you will create a more specific firewall policy using the
firewall address object that you created in the previous procedure. You will also select specific services and
configure log settings.
The FortiGate GUI may ask to use the new policy list layout. Click Cancel to continue
using the classic layout. The new policy list layout is ideal to improve performance
when viewing large list of firewall policies.
Field Value
Name Internet_Access
Source LOCAL_SUBNET
Destination all
Schedule always
Tip: Type the service name in the search box to quickly find it, and then
click the service object to add it to the policy.
3. Leave all other settings at the default values, and then click OK to save the changes.
When you create firewall policies, remember that FortiGate is a stateful firewall. As a
result, you need to create only one firewall policy that matches the direction of the
traffic that initiates the session.
Now that you have configured the firewall policy, you will test it by passing traffic through it and viewing the
generated logs.
When sessions close, a separate log entry lists the amount of data that was sent and received.
Enabling Generate Logs when Session Starts in the firewall policy will generate
twice the amount of log messages. You should use this option only when this level of
detail is absolutely necessary.
When you click Show Matching Logs in the firewall policy, it adds the Policy UUID
filter in the forward traffic logs.
5. In the Forward Traffic logs, click X to remove the Policy UUID filter.
When you remove the Policy UUID filter, the logs are displayed unfiltered. You will use the logs in upcoming
labs.
In the applicable interface pair section, FortiGate looks for a matching policy, beginning at the top. Usually, you
should put more specific policies at the top—otherwise, more general policies will match the traffic first, and more
granular policies will never be applied.
In this exercise, you will create a new firewall policy with more specific settings, such as the source, destination,
and service, and you will set the action to DENY. Then, you will move this firewall policy above the existing firewall
policies and observe the behavior that reordering the firewall policies creates.
You will create a new firewall policy to match a specific source, destination, and service, and you will set the action
to DENY.
After you have performed these steps, see Test the Reordering of a Firewall Policy on page 34.
Field Value
Name Block_Ping
Source LOCAL_SUBNET
Destination LINUX_ETH1
Service PING
Tip: Type the service name in the search box to quickly find it, and then
click the service object to add it to the policy.
Action DENY
Now that your configuration is ready, you will test it by moving the Block_Ping firewall policy above the Internet_
Access firewall policy. The objective is to confirm that, after you reorder the firewall policies, the following occurs:
l Traffic is matched to a more specific firewall policy.
l The policy ID remains the same.
To confirm traffic matches a more granular firewall policy after reordering the policies
1. On the Local-Client VM, open a terminal.
2. Ping the destination address (LINUX_ETH1) that you configured in the Block_Ping firewall policy.
ping 10.200.1.254
Why are you still able to ping the destination address, even though you just configured a policy to block it?
The ping should still work because it matches the ACCEPT policy and not the DENY policy that you created.
The Block_Ping policy was never checked because the traffic matched the policy at the top (Internet_
Access). This demonstrates the behavior that FortiGate looks for a matching policy, beginning at the top.
6. Click the settings icon, scroll down to the Select Columns section, select the ID column, and then click Apply.
7. Drag the ID column to the left of the Name column, so it becomes the first column in the table.
Note the current ID values for both the Internet_Access and Block_Ping firewall policies.
8. In the ID column, drag the Block_Ping firewall policy up, and place it above the Internet_Access firewall policy.
When you move the Block_Ping policy up, the ID value remains the same.
If the changes that you made are not displayed, refresh the page. Alternatively, you
can log out of the FortiGate GUI, and then log back in.
9. On the Local-Client VM, review the terminal window that is running the continuous ping.
You should see that the pings now fail.
This demonstrates the outcome of the policy reordering. After moving the more granular policy above the
general access policy, the traffic is matched to the more granular policy and, based on the DENY action, the
traffic stops being processed.
You should see many policy violation logs reporting the blocked ping.
Clear the log filter that you applied in the previous exercise.
VIPs are typically used to translate external, or public, IP addresses to internal, or private, IP addresses.
In this exercise, you will examine how to configure a VIP for the Local-Client VM. Then, you will create an egress-
to-ingress firewall policy and apply the VIP. This allows internet connections to the Local-Client VM. You will also
verify the DNAT and SNAT behavior using CLI commands.
Create a VIP
For DNAT on FortiGate, you use a VIP as the destination address field of a firewall policy.
You will configure the VIP to map the Local-Client VM (10.0.1.10) to 10.200.1.200, which is part of the port1
subnet. To refer to the lab diagram, see Network Topology on page 8.
To create a VIP
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
2. Click Policy & Objects > Virtual IPs, and then click Create New.
3. Configure the following settings:
Field Value
Name VIP-INTERNAL-HOST
Interface port1
4. Click OK.
You will configure a new firewall policy using the VIP that you just created as the destination address.
Field Value
Name Web-Server-Access
Source all
Destination VIP-INTERNAL-HOST
Tip: In the section on the right, in the search box, type the service name,
and then click the services to add.
6. Click OK.
Now that you have configured a firewall policy with the VIP as the destination, you can test your VIP by accessing
it from the Remote-Client VM, which is behind the Remote-FortiGate internal network. A Linux machine acts as a
router between the two FortiGate devices, and routes the traffic from the Remote-FortiGate to the Local-FortiGate.
For more information, see Network Topology on page 8.
You will also test how the source address is translated by the VIP when traffic leaves the Local-Client VM.
2. On the Local-FortiGate CLI, log in with the username admin and password password.
3. Enter the following command to check the destination NAT entries in the session table:
get system session list
The following example shows a sample output:
The HTTP session may have been deleted by the time you run the get system
session list command. You can repeat steps 1–3 to generate a new HTTP
connection and, therefore, another HTTP session through Local-FortiGate.
Test SNAT
As a result of the VIP (which is a static NAT), FortiGate uses the VIP external address as the NAT IP address
when performing SNAT for the internal-to-external direction of the traffic, provided the matching outgoing firewall
policy has NAT enabled. That is, FortiGate doesn't use the egress interface address.
To test SNAT
1. Return to the Local-FortiGate CLI session, and then enter the following command to clear any existing sessions:
diagnose sys session clear
The diagnose sys session clear CLI command clears all sessions, including
the SSH session you created. This is expected behavior.
This clears the session to the Local-FortiGate from the Local-Client VM.
The outgoing connections from the Local-Client VM are now translated with the VIP
address 10.200.1.200, instead of the firewall egress interface IP address
(10.200.1.1).
This is a behavior for SNAT when using a static NAT VIP. That is, when you enable NAT in a policy, the
external address of a static NAT VIP takes precedence over the destination interface IP address, if the source
address of the connections matches the VIP internal address.
IP pools are used to translate the source address to an address from that pool, rather than the egress interface
address.
Currently, Local-FortiGate translates the source IP address of all traffic generated from the Local-Client VM to
10.200.1.200 because the internal address of the VIP matches the address of Local-Client, and the VIP is a static
NAT VIP.
In this exercise, you will examine how to create an IP pool, apply it to the ingress-to-egress firewall policy, and
verify the SNAT address using CLI commands.
Create an IP Pool
You will create an IP pool from the range of public IP addresses available on the egress port (port1).
To create an IP pool
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
2. Click Policy & Objects > IP Pools.
3. Click Create New, and then configure the following settings:
Field Value
Name INTERNAL-HOST-EXT-IP
4. Click OK.
You will apply the IP pool to change the behavior from static NAT to dynamic NAT on the ingress-to-egress firewall
policy.
Field Value
NAT <enable>
6. Click the + sign that appeared when you clicked Use Dynamic IP Pool, and then in the section on the right, click
INTERNAL-HOST-EXT-IP.
Your configuration will look similar to the following example:
7. Click OK.
Now that your configuration is ready, you can test dynamic NAT with IP pools by browsing to a few external sites
on the internet. If successful, you will see that the Local-Client VM IP address (10.0.1.10) is translated to the IP
pool address of 10.200.1.100.
You built the filter to match sessions sourced from 10.0.1.10. This way, when you
run the diagnose sys session clear CLI command, it clears only the sessions
sourced from 10.0.1.10. As a result, your SSH session is not disconnected. This is
why it is important to build the session filter before using the session clear
command.
3. On the Local-Client VM, open a few browser tabs, and then connect to a few websites, such as:
l www.fortinet.com
l www.yahoo.com
l www.bbc.com
4. On the Local-FortiGate CLI, enter the following command to verify the SNAT address that the sessions are using:
get system session list
The following image shows a sample output:
Notice that the SNAT address is now 10.200.1.100, as configured in the IP pool, and the IP pool has
overridden the static NAT VIP.
In this lab, you will configure the router settings and test scenarios to learn how FortiGate makes routing
decisions.
Objectives
l Route traffic based on the destination IP address, as well as other criteria
l Balance traffic among multiple paths
l Implement route failover
l Diagnose a routing problem
Time to Complete
Estimated: 50 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
5. Click OK to reboot.
In the lab network, Local-FortiGate has two interfaces connected to the internet: port1 and port2. In this exercise,
you will configure the port1 connection as the primary internet link and the port2 connection as the backup internet
link. Local-FortiGate should use the port2 connection only if the port1 connection is down. To achieve this
objective, you will configure two default routes with different administrative distances, and then you will disable the
primary default route interface to activate the standby route.
After you complete the challenge, see Configure a Second Default Route on page 48.
Note that, by default, static routes have a Distance value of 10 and a Priority value of 1.
You will create a second default route using the port2 interface. To make sure this second default route remains
the standby route, you will assign it a higher administrative distance than the first default route.
After you complete the challenge, see Configure the Firewall Policies on page 49.
Field Value
Interface port2
Administrative Distance 20
6. Click OK.
FortiGate adds a second default route.
You will modify the existing Full_Access firewall policy to log all sessions. You will also create a second firewall
policy to allow traffic through the secondary interface.
l Continuing on the Local-FortiGate GUI, enable logging for all sessions in the existing Full_Access
firewall policy.
l Create a second firewall policy named Backup_Access.
l Configure the Backup_Access policy to allow traffic from port3 to port2 with NAT enabled.
l Enable logging on the Backup_Access policy for all sessions.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see View the Routing Table on page 51
All Sessions logging ensures that FortiGate logs all traffic, not only sessions that
security profiles inspected. This will assist you in verifying traffic routing using the
Forward Traffic logs.
4. Click OK.
5. Click Create New.
6. Configure a second firewall policy with the following settings:
Field Value
Name Backup_Access
Field Value
Source LOCAL_SUBNET
Destination all
Schedule always
Service ALL
7. Click OK.
The Local-FortiGate configuration now has two default routes with different distances. You will view the routing
table to see which route was installed in the routing table and which route was installed in the routing table
database.
3. Enter the following command to list the routing table database entries:
get router info routing-table database
Only active routes show the > symbol, which means they are the selected and active
routes. The routing table database contains all active, standby, and inactive routes on
FortiGate.
The port2 default route has a higher administrative distance than the port1 default route. When two or more
routes to the same destination have different distances, the higher distance route is not installed in the
routing table, but you can still see it in the routing table database. Routes marked as inactive are marked
inactive when the corresponding interface is down.
First, you will access various websites and use the Forward Traffic logs to verify that the port1 route is being
used. Next, you will force a failover by reconfiguring the port1 interface setting and bringing the interface down.
You will then generate some more traffic, and use the Forward Traffic logs to verify that the port2 route is being
used.
5. On the Local-Client VM, in the browser, open a few new tabs, and then visit a few websites, such as:
l http://neverssl.com
l http://eu.httpbin.org
6. On the Local-FortiGate GUI, click Log & Report > Forward Traffic.
7. Click the refresh icon.
8. Locate the relevant log entries for the websites you accessed, and then verify that the Destination Interface
indicates port1.
This verifies that the port1 route is currently the route in use.
This verifies that the Local-FortiGate is using the port2 default route.
Before you begin the next exercise, you will restore the port1 interface settings and bring it up, which will restore
the port1 default route as the best route in the routing table.
In this exercise, you will configure equal-cost multi-path (ECMP) routing on Local-FortiGate to load balance the
internet traffic between port1 and port2.
To establish ECMP, first, you will configure multiple static routes with the same administrative distance.
After you complete the challenge, see Change the ECMP Load Balancing Algorithm on page 57.
5. Click OK.
By default, the ECMP load balancing algorithm is based on the source IP address. This works well when there are
multiple clients generating traffic. In the lab network, because you have only one client (the Local-Client VM), the
source IP address method does not balance any traffic to the second route. FortiGate always uses only one route.
For this reason, you will change the load balancing method to use both source and destination IP addresses.
Using this method, as long as the traffic goes to multiple destination IP addresses, FortiGate load balances the
traffic across both routes.
You will generate some HTTP traffic and verify traffic routing using the Forward Traffic logs.
l On the Local-Client VM, open a few new browser tabs, and then generate some HTTP traffic.
l Verify the traffic routing on Local-FortiGate, using the Forward Traffic logs.
l Identify why all the outgoing packets are still being routed through port1.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Configure Priority on page 59.
Why are all the outgoing packets still being routed through port1?
The port2 route is not being used to route internet traffic. Why?
At the beginning of this exercise, you set a distance of 10 on the port2 route but you didn't change its priority.
The port2 route priority is still 5, as you configured it in the previous exercise (see Configure a Second
Default Route on page 48). In addition, the port1 route has distance and priority values of 10 and 1,
respectively.
When two routes to the same destination have the same distance, both remain in the routing table.
However, if the priorities are different, FortiGate uses the route with the lowest priority value—port1 in this
case. To achieve ECMP with static routes, the distance and priority values must be the same for all routes.
Configure Priority
You will change the priority value for the port2 route to match the port1 route.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
To configure priority
1. Continuing on the Local-FortiGate GUI, click Network > Static Routes.
2. Double-click the port2 default route to edit it.
3. Click + to expand the Advanced Options section.
4. Change the Priority value to 1.
5. Click OK.
Verify ECMP
Now that both port1 and port2 routes share the same distance and priority values, they are eligible for ECMP.
First, you will verify the routing table, and then you will verify traffic routing using the Forward Traffic logs.
The filter 'tcp[13]&2==2' matches packets with the SYN flag on, so the output will
show all SYN packets for port 80 (HTTP).
The SYN packets are egressing both port1 and port2. This verifies that Local-FortiGate is now load
balancing all internet traffic across both routes.
4. On the Local-FortiGate GUI, click Log & Report > Forward Traffic.
5. Identify the Destination Interface in the relevant log entries for the websites you accessed.
In this lab, you will examine how to configure FortiGate to communicate with remote LDAP and RADIUS servers
for server-based password authentication.
Objectives
l Configure server-based password authentication with an LDAP server
l Configure server-based password authentication with a RADIUS server
Time to Complete
Estimated: 35 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will examine how to configure an LDAP server on FortiGate for remote authentication, create
a remote authentication group for remote users, and then add that group as a source in a firewall policy. Finally,
you will authenticate as one of the remote users, and then monitor the login as the administrator.
You will configure FortiGate to point to a preconfigured FortiAuthenticator acting as an LDAP server for server-
based password authentication.
Field Value
Name External_Server
This is the attribute name used to find the username on the preconfigured
LDAP server.
This is the domain name for the LDAP directory on FortiAuthenticator, with
all users located under the Training organizational unit (ou).
Username uid=adadmin,cn=Users,dc=trainingAD,dc=training,dc=lab
Field Value
Password Training!
This is the password preconfigured for the adadmin user. You must use it
to be able to bind.
You should see a message indicating that the connection was successful.
5. Click OK.
You will assign an LDAP user group (AD_users) that includes two users (aduser1 and aduser2) to a firewall user
group, called Remote-users, on FortiGate. By doing this, you will be able to configure firewall policies to act on
the firewall user group.
Usually, groups are used to more effectively manage individuals who have a shared relationship.
The Remote-users firewall group is preconfigured for you. However, you must modify
it to add the users from the remote LDAP server you configured in the previous
procedure.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you have completed this exercise, see Configuring an LDAP Server on page 64.
2. In the Remote Groups table, click Add to add users from the remote LDAP server.
AD_users has a green check mark beside it, which indicates that it was added.
5. Click OK.
The users in this Active Directory group are now included in the FortiGate Remote-users firewall user group.
Only users from the remote LDAP server that match this user group entry can authenticate.
6. Click OK.
Now that you have added the LDAP server to the Remote-users firewall user group, you can add the group to a
firewall policy. This allows you to control access to network resources, because policy decisions are made for the
group as a whole.
Field Value
3. In the Security Profiles section, enable Web Filter, and then select Category_Monitor.
This web filter was preconfigured and is set to block the following categories: Potentially Liable,
Adult/Mature Content, and Security Risk.
4. In the Logging Options section, ensure Log Allowed Traffic is enabled, and then select All Sessions.
5. Click OK.
Where:
l <LDAP server name> is External_Server (case sensitive)
l <LDAP user name> is aduser1
l <password> is Training!
A message like the following example should appear to indicate that authentication was successful:
You will authenticate through the firewall policy as aduser1. This user is a member of the Remote-users group
on FortiGate. Then, you will monitor the authentication.
Notice that the blocked page displays a replacement message that includes useful information, such as the
URL and Category.
You will see aduser1 listed along with other information, such as User Group and IP Address.
The config user setting CLI command determines how long a user can remain
authenticated. However, you can choose to manually revoke a user authentication by
selecting the user in the Firewall User Monitor list, and then clicking Deauthenticate.
After the user is deauthenticated, the user disappears from the list, because it is
reserved for active users only.
This deauthenticates the user. The user must log in again to access the resources that the firewall policy
protects.
You will remove the user group assigned to the firewall policy for authentication.
In this exercise, you will examine how to configure a RADIUS server on FortiGate for remote authentication,
create a remote authentication group for remote users, and then add that group as a source in a firewall policy.
Finally, you will authenticate as one of the remote users, and then monitor the login as the administrator.
You can configure FortiGate to point to a preconfigured FortiAuthenticator acting as a RADIUS server for server-
based password authentication.
Field Value
Name RADIUS_Server
Secret Training1!
You should see a message indicating that the connection was successful.
5. Click OK.
You will assign a RADIUS user group (Training) that includes a user (radius1) to a firewall user group, called
Training, on FortiGate. By doing this, you will be able to configure firewall policies to act on the firewall user
group.
Usually, groups are used to more effectively manage individuals who have a shared relationship.
The Training firewall group is preconfigured for you. However, you must modify it to
add the users from the remote RADIUS server you configured in the previous
procedure.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you have completed this exercise, see Configuring a RADIUS Server on FortiGate on page 72.
2. In the Training table, click Add to add users from the remote RADIUS server.
5. Click OK.
The user in this RADIUS server group is now included in the FortiGate Training firewall user group. Only
users from the remote RADIUS server that match this user group entry can authenticate.
The remote RADIUS server is configured with using the RADIUS attribute value pair
(AVP) 26, known as a vendor-specific attribute (VSA). This attribute allows the
Fortinet-Group-Name VSA to be included in the RADIUS response. In FortiOS, the
user group must be configured to specifically match this group.
6. Click OK.
Now that you have added the RADIUS server to the Training firewall user group, you can add the group to a
firewall policy. This allows you to control access to network resources, because policy decisions are made for the
group as a whole.
Field Value
3. Click OK.
You will authenticate through the firewall policy as radius1. This user is a member of the Training group on
FortiGate. Then, you will monitor the authentication.
Notice that the blocked page displays a replacement message that includes useful information, such as the
URL and Category.
You will see the user radius1 listed along with other information, such as User Group and IP Address.
The config user setting CLI command determines how long a user can remain
authenticated. However, you can choose to manually revoke a user authentication by
selecting the user in the Firewall User Monitor list, and then clicking Deauthenticate.
After the user is deauthenticated, the user disappears from the list, because it is
reserved for active users only.
This deauthenticates the user. The user must log in again to access the resources that the firewall policy
protects.
You will remove the user group assigned to the firewall policy for authentication.
In this lab, you will test user authentication using Fortinet Single Sign-On (FSSO). The lab uses a demo
environment to emulate the behavior of an active FSSO DC agent from the Local-Client VM using a Python script.
Therefore, you will not configure a DC agent to send logon events from the Local-Client VM.
Objectives
l Review the FSSO configuration on FortiGate
l Test the transparent or automatic user identification by generating user logon events
l Monitor the FSSO status and operation
Time to Complete
Estimated: 35 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will configure FortiGate for FSSO and test user authentication. The lab uses a demo
environment to emulate the behavior of an active FSSO DC agent from the Local-Client VM using a Python script.
Therefore, you will not configure a DC agent to send logon events from the Local-Client VM.
For FortiGate to communicate and poll information from the FSSO collector agent,
you must assign the polled user to a firewall user group, and then add the user group
as a source on a firewall policy.
Finally, you can verify the user logon event that FortiGate collects. This event is
generated after a user logs in to the Windows Active Directory domain. Therefore, no
firewall authentication is required.
You will review the FSSO configuration and FSSO user groups on FortiGate. FSSO allows FortiGate to
automatically identify the users who connect using SSO. Then, you will add FSSO user groups to the firewall
policies.
To review the FSSO server and FSSO user group configuration on FortiGate
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
2. Click Security Fabric > External Connectors.
3. Select TrainingDomain, and then click Edit.
4. In the upper-right corner, review the Endpoint/Identity status, and see that the status is Disconnected.
5. Leave the browser window open.
cd Desktop/FSSO/
python2 fssoreplay.py -l 8000 -f sample.log
2. Keep the terminal window open.
The script continues to run in the background.
Field Value
Name Training
Members TRAININGAD/AD-USERS
The FSSO user is automatically listed because of the selected group type—FSSO.
3. Click OK.
You will assign your FSSO user group as a source in a firewall policy. This allows you to control access to network
resources based on user identity.
To test the connection without assigning the FSSO user group to a firewall policy
1. On the Local-Client VM, open a new browser, and then go to https://www.fortinet.com.
You can see that all users can access the Fortinet website.
Test FSSO
After a user logs in, they are automatically identified based on their IP address. As a result, FortiGate allows the
user to access network resources as policy decisions are made. You will test FSSO.
To test the connection after assigning the FSSO user to the firewall policy
1. On the Local-Client VM, open a new browser tab, and then go to http://support.fortinet.com.
The Python script that is running on the Local-Client VM is already sending user logon
events with the following information:
l user: aduser1
l IP: 10.0.1.10
In this case, the website loads successfully because aduser1 belongs to the
configured user group on a firewall policy.
To review the connection status between the FSSO collector agent and FortiGate
1. On the Local-FortiGate CLI, log in with the username admin and password password.
2. Enter the following commands to show the connection status between FortiGate and each collector agent:
diagnose debug enable
diagnose debug authd fsso server-status
3. Observe the CLI output.
Your FortiGate is connected to the FSSO collector agent.
You generated a logon event on the Local-Client VM using the script, and it was
forwarded to FortiGate.
3. Select a log, and then click Details to view more information about it.
In this lab, you will configure full SSL inspection using a self-signed SSL certificate on FortiGate to inspect
outbound traffic. Next, you will review some situations that prevent full SSL inspection, and implement
workarounds. Finally, you will learn how to deal with some certificate anomalies.
Objectives
l Configure and enable full SSL inspection on outbound traffic
l Deal with certificate anomalies
Time to Complete
Estimated: 40 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
5. Click OK to reboot.
Full SSL inspection on outbound traffic allows FortiGate to inspect encrypted internet traffic and apply security
profiles to that traffic. It protects your network and end users from potential malware that could come from secure
websites, like HTTPS websites, that internal users visit. FortiGate employs a man-in-the-middle (MITM) technique
to inspect the traffic and apply security profiles, such as antivirus, web filter, and application control.
In this exercise, you will configure and enable full SSL inspection on all outbound traffic.
By default, FortiGate includes four security profiles for SSL/SSH inspection: certificate-inspection, custom-
deep-inspection, deep-inspection, and no-inspection. You can modify the settings for the custom-deep-
inspection profile only or create a personalized profile. The other profiles are read-only. Because this exercise
involves configuring full SSL inspection on FortiGate, you will configure a new SSL/SSH inspection profile for this
purpose.
Field Value
Field Value
CA certificate Fortinet_CA_SSL
6. Scroll down to the bottom of the page, and then in the Common Options section, do the following:
l In the Invalid SSL certificates field, select Custom.
l Confirm that the other settings are configured as shown in the following image (default values):
7. Click OK.
You must enable SSL inspection in a firewall policy to start inspecting SSL traffic. In this policy, you will use SSL
inspection associated with web filtering. For the purposes of this lab, you will enable the default web filter security
profile.
4. In the Logging Options section, enable Log Allowed Traffic, and then select All Sessions.
5. Click OK.
FortiGate displays a warning message to highlight that full SSL inspection is activated and might trigger
warnings in users' browsers.
FortiGate includes an SSL certificate, named Fortinet_CA_SSL, that you can use for full SSL inspection. The SSL
inspection profile you created in the previous step uses it. This certificate is signed by a certificate authority (CA)
named FortiGate CA, which is not public. Because the CA is not public, each time a user connects to a secure
website, the browser displays a certificate warning. This is because the browser receives traffic encrypted by
certificates signed by FortiGate, using a CA it does not know and trust.
You can avoid this warning by downloading the Fortinet_CA_SSL certificate and installing it on all workstations as
a public authority.
You will first test access to a secure website without the Fortinet_CA_SSL certificate installed in the browser.
Then, you will install the Fortinet_CA_SSL certificate in the browser and test access to the secure website again.
This warning appears because the browser receives certificates signed by the FortiGate CA private key, and
the corresponding CA certificate is not in the certificate store of the Local-Client VM.
2. If you get the warning message, click Advanced, and then click Accept the Risk and Continue.
3. Click System > Certificates.
4. In the Local CA Certificate section, click Fortinet_CA_SSL, and then click Download.
The browser downloads the certificate to the Downloads folder of your Local-Client VM.
5. Continuing in Firefox, in the upper-right corner, click the Open menu icon, and then click Settings.
9. Click Import.
10. In the Downloads folder, click Fortinet_CA_SSL.cer, and then click Select.
11. In the Downloading Certificate window, select Trust this CA to identify websites, and then click OK.
Now that you have imported the Fortinet_CA_SSL certificate into your browser, you will not receive certificate
warnings when you access a secure website.
The CA that signed this certificate is not public, but your browser trusts it, because you added it as a trusted
authority in the previous procedure.
2. In the browser navigation bar, hover over the lock icon to see details.
You can see that the certificate is signed by Fortinet CA, and that the browser considers it valid.
When you work with certificates, you might face some issues due to invalid or revoked certificates. You might also
have to deal with restrictions that prevent the use of full SSL inspection.
In this exercise, you will learn how to import a certificate revocation list (CRL) on the FortiGate GUI. Next, you will
explore how FortiGate responds when it receives invalid certificates for traffic that match a deep inspection SSL
profile. Finally, you will configure an exception to exclude a website from SSL full inspection.
A certificate can be invalid because it expired or because the CA that issued it revoked it. A company might want
to revoke a certificate because it was compromised, the key was lost, or, for example, because it was assigned to
a user who left the company. To inform others of revoked certificates, CA administrators periodically publish
CRLs. You will import a CRL.
To import a CRL
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
2. Click System > Certificates.
3. In the Remote CA Certificate section, right-click the Fortinet_Wifi_CA certificate, and then select View Details.
4. Scroll down to the Extensions section, and look for X509v3 CRL Distribution Points.
5. Highlight one of the URIs, and then press Ctrl+C to copy it for the distribution point.
8. Enable HTTP, and then paste the URI of the CRL HTTP server that you just copied.
9. Click OK.
The FortiGate GUI briefly displays an acknowledgment message similar to the following example:
10. Wait a few seconds, and then click System > Certificates again to refresh the page.
The CRL section now includes the CRL you just added.
Note that you can load CRLs on the FortiGate only for a CA that FortiGate trusts. If you
want to load the CRL that corresponds to your company CA, you must first load your
company CA certificate on FortiGate.
The Online Certificate Status Protocol (OCSP) is used for obtaining the revocation
status of an X.509 digital certificate. It can be used as an alternative to CRLs. OCSP is
disabled by default on FortiGate.
In this lab, we activated OCSP using the CLI commands shown below to receive
certificate validation from well-known CAs that support OCSP.
config vpn certificate setting
set ocsp-option certificate
set ocsp-status enable
set strict-ocsp-check enable
end
5. Do not make any changes, and then click Cancel to exit the SSL inspection profile menu.
6. Click Cancel to exit the policy configuration menu.
7. Connect to the Local-Client VM, and then log in with the username Administrator and password password.
8. Open a browser, and then visit https://revoked.badssl.com/.
9. In another browser tab, visit https://expired.badssl.com/.
FortiGate blocks access to the website and the browser displays a warning message similar to the following
image:
You can see that the log message is similar for expired and revoked certificates.
When replacing a certificate prevents users from accessing some websites, you can define exceptions and
exclude some websites from full SSL inspection. You can also exclude some websites or website categories from
full SSL inspection for legal reasons. For example, in some countries, it is forbidden to perform deep inspection on
traffic between users and financial institution servers.
You will add an exception to the SSL/SSH deep inspection profile that you have already configured.
Name badssl
Type Subnet
IP/Netmask 104.154.89.105/32
6. Click OK.
7. In the SSL/SSH inspection profile, select the newly created address object badssl.
8. Click OK to save the configuration change of the SSL/SSH inspection profile.
9. Click Policy & Objects > Firewall Policy.
10. Edit the Full_Access policy and set Custom_Full_Inspection as the SSL inspection profile.
11. Click OK.
Usually, you will configure SSL full inspection exceptions only for websites that do not
support MITM and that your company trusts. Those websites should have a valid
certificate and therefore do not trigger a browser warning.
In this lab, you will examine how to configure, use, and monitor antivirus scanning on Local-FortiGate in both flow-
based and proxy-based inspection modes.
Objectives
l Configure antivirus scanning in both flow-based and proxy-based inspection modes
l Understand FortiGate antivirus scanning behavior
l Scan multiple protocols
l Read and understand antivirus logs
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file to Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will configure a firewall policy with an antivirus profile in flow-based inspection mode. Next,
you will perform a test to download a file located on an FTP server. Finally, you will view the logs and summary
information related to the antivirus scanning.
You will verify that the antivirus profile is configured with an inspected protocol of FTP and that flow-based is
selected.
For low-end platforms, the feature is available on the GUI only after you enable the gui-proxy-
inspection CLI command.
5. Connect to the Local-FortiGate CLI, and then log in with the username admin and password password.
6. Enter the following commands:
config system settings
set gui-proxy-inspection enable
end
7. Continuing on the Local-FortiGate GUI, in the upper-right corner, click admin, and then click Logout.
By default, flow-based inspection mode is enabled on the FortiGate firewall policy. You will configure the antivirus
profile in the firewall policy.
4. In the Security Profiles section, enable AntiVirus, and then select default.
5. Keep the default values for the remaining settings, and then click OK to save the changes.
3. In the Remote site section, right-click the eicar.com file, and then select Download.
The client should display an error message that the server terminated the connection. FortiGate sends the
replacement message as a server response.
In flow-based inspection mode, FortiGate does not buffer traffic flowing through the
policy. If FortiGate detects a violation in the traffic, it sends a reset packet to the
receiver, which terminates the connection, and prevents the payload from being sent
successfully.
The purpose of logs is to help you monitor your network traffic, locate problems, establish baselines, and make
adjustments to network security, if necessary. You will view the antivirus logs.
3. Click Security.
The Security tab shows virus information.
To view the logs, you may need to clear the filters in the search bar and increase the
time frame to 1 hour.
2. Locate the antivirus log message from when you tried to access the file using FTP, and then double-click the log
entry to view the security details.
In this exercise, you will examine how to use antivirus in proxy-based inspection mode to understand how
FortiGate performs antivirus scanning. You will observe the behavior of antivirus scanning, with and without deep
inspection, to understand the importance of performing full-content inspection.
You will change the inspection mode in the default antivirus profile, which is applied to the firewall policy, to
inspect traffic.
5. Click OK.
Inspection mode is configured on a per-policy basis on FortiGate. You will change the inspection mode from flow-
based to proxy-based.
After you complete the challenge, see Test the Antivirus Configuration on page 111.
4. In the Protocol Options field, verify that the default profile is selected.
5. In the Security Profiles section, in the AntiVirus field, verify that the default profile is selected.
6. In the SSL Inspection field, keep the default certificate-inspection profile.
The Protocol Options profile provides the required settings to hold traffic in proxy
while the inspection process is carried out. The default profile is preconfigured to
follow the standardized parameters for the common protocols used in networking.
SSL Inspection selects the certificate-inspection profile by default. You can select
any preconfigured SSL inspection profile in the associated field.
7. Keep the default values for the remaining settings, and then click OK to save the changes.
You will download the EICAR test file to your Local-Client VM. The EICAR test file is an industry-standard virus
used to test antivirus detection without causing damage. The file contains the following characters:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
FortiGate should block the download attempt, and insert a replacement message similar to the following
example:
In proxy-based inspection mode, the file is buffered. If a virus is detected, FortiGate can then replace the file
by a message, which provides security information.
You will test the proxy-based antivirus configuration using the Save Link As method to download the EICAR text
file.
4. On your desktop, right-click the eicar.com.txt downloaded file, click Open With Other Application, click
Notepad++, click Select to open the file you downloaded, and then scroll to read the bottom of the text file.
Is the content of the file what it is supposed to be?
Remember, you are using proxy-based inspection mode. When a firewall policy inspection mode is set to
proxy, traffic flowing through the policy is buffered by FortiGate for inspection. This means that FortiGate
holds the packets for a file, email, or web page until the entire payload is inspected for violations (virus,
spam, or malicious web links). After FortiOS has finished the inspection, FortiGate either releases the
payload to the destination (if traffic is clean) or drops and replaces it with a message (if the traffic contains
violations). FortiGate injects the block message into the partially downloaded file. The client can use
Notepad to open and view the file.
5. Close Notepad++.
6. Delete the downloaded eicar.com.txt file from the desktop.
You will check and confirm the logs for the tests you just performed.
4. Click Log & Report > Security Events > AntiVirus to view antivirus security logs.
The logs should be similar to the following example:
You can click Details to view more virus information related to an antivirus log entry.
So far, you have tested unencrypted traffic for antivirus scanning. In order for FortiGate to inspect the encrypted
traffic, you must enable deep inspection in the firewall policy. After you enable this feature, FortiGate can inspect
SSL traffic using a technique similar to a man-in-the-middle (MITM) attack.
l On Local-Client, test the configuration by downloading the eicar.com file using HTTPS, without
enabling the deep-inspection profile in the Full Access firewall policy.
l Configure Local-FortiGate to scan secure protocols by enabling SSL Inspection, using the deep-
inspection profile in the Full Access firewall policy.
l Test the configuration by downloading the eicar.com file using HTTPS.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, seeReview the Antivirus History on page 116.
To test antivirus scanning without SSL inspection enabled in the firewall policy
1. On the Local-Client VM, open a browser, and then go to the following website:
https://10.200.1.254/test_av.html
2. Click Advanced.
3. Click Accept the Risk and Continue.
4. In the Download area section, download the eicar.com sample file.
FortiGate should not block the file, because you did not enable full SSL inspection.
You may also need to clear your cache. In Firefox, click Settings > Privacy &
Security. Scroll to History, click Clear History, and then ensure the time range to
clear is set to Everything. Click OK.
You will check the security history and the virus definition status.
You can click Drill down to view more details about a specific threat.
The output confirms that the device has the latest antivirus packages for correct
protection.
In this lab, you will configure one of the most used security profiles on FortiGate: web filter. This includes
configuring FortiGuard category-based and static URL filters, applying the web filter profile in a firewall policy,
testing the configuration, and performing basic troubleshooting.
Objectives
l Configure web filtering on FortiGate
l Apply the FortiGuard category-based option for web filtering
l Apply the static URL option for web filtering
l Troubleshoot the web filter
l Read and interpret web filter log entries
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must clear the browser history, and then restore a configuration file to Local-
FortiGate.
5. Click OK to reboot.
To configure FortiGate for web filtering based on FortiGuard categories, you must make sure that FortiGate has a
valid FortiGuard security subscription license. The license provides the web filtering capabilities necessary to
protect against inappropriate websites.
Then, you must configure a category-based web filter security profile on FortiGate, and apply the security profile in
a firewall policy to inspect the HTTP traffic.
Finally, you can test different actions that FortiGate has taken, according to the website rating.
You will review the inspection mode and license status according to the uploaded settings. You will also list the
FortiGuard Distribution Servers (FDS) that FortiGate uses to send the web filtering requests.
Because of the reboot following the restoration of the configuration file, the web filter
license status may be Unavailable. In this case, navigate to System > FortiGuard. In
the Filtering section, click Test Connectivity to force an update, and then click OK to
confirm. You can confirm, at the same time, that Web Filter cache is enabled.
7. Click OK.
To configure web filter categories, you must first identify how FortiGuard Web Filtering categorizes specific
websites.
2. Use the Web Filter Lookup tool to search for the following URL:
www.facebook.com
This is one of the websites you will use later to test your web filter.
3. Use the Web Filter Lookup tool again to find the web filter category for the following websites:
l www.skype.com
l www.ask.com
l www.bing.com
You will test your web filter using these websites also.
The following table shows the category assigned to each URL, as well as the action you will configure
FortiGate to take based on your web filter security profile:
You will review the default web filtering profile, and then configure the FortiGuard category-based filter.
Category Action
Category Action
Unrated Block
The Edit Filter window opens, which allows you to modify the warning interval.
Now that you have configured the web filter profile, you must apply this security profile to a firewall policy in order
to start inspecting web traffic.
You will also enable the logs to store and analyze the security events that the web traffic generates.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Test the Web Filter on page 126.
4. Hover over the warning sign that appears beside the SSL Inspection field.
The message should be similar to the following example:
Because web filtering requires URL information and does not inspect the full payload,
you can select certification-inspection instead of deep-inspection.
6. Under Log Allowed Traffic, make sure that Security Events is selected.
7. Keep all other default settings, and then click OK.
You will test the web filter security profile you configured for each category.
The get webfilter status and diagnose debug rating commands show the list of FDS that
FortiGate uses to send web filtering requests. In normal operations, FortiGate sends the rating requests only
to the server at the top of the list. Each server is probed for round-trip time (RTT) every 2 minutes.
Why does only one IP address from your network appear in the server list?
Your lab environment uses a FortiManager at 10.0.1.241, which is configured as a local FDS. It contains
a local copy of the FDS web rating database.
FortiGate sends the rating requests to FortiManager instead of to the public FDS. For this reason, the output
of the command lists the FortiManager IP address only.
3. On the Local-Client VM, open a new browser tab, and then go to www.facebook.com.
A warning appears, according to the predefined action for this website category.
Field Value
URL www.bing.com
3. Click OK.
You will test the web rating override you created in the previous procedure.
The web rating override changes the category. In the default web profile applied in the firewall policy, the
Malicious Websites category is set to Block. As a consequence, the website www.bing.com is now
blocked.
You will set the action for the Malicious Websites FortiGuard category to Authenticate. You will then define a
user in order to test the authenticate action.
Field Value
5. Click OK.
6. Click OK.
To create a user
1. Continuing on the Local-FortiGate GUI, click User & Authentication > User Definition.
2. Click Create New.
3. In the User Type field, select Local User.
4. Click Next, and then configure the following settings:
Field Value
Username student
Field Value
Password fortinet
5. Click Next.
6. Click Next.
7. Enable User Group, and then select Override_Permissions.
8. Click Submit.
The student user is created.
2. Click Proceed.
You might receive a certificate warning at this stage. This is normal and is the result of
using a self-signed certificate. Accept the warning message to proceed with the
remainder of the procedure (click Advanced, and then click Accept the Risk and
Continue).
Field Value
Username student
Password fortinet
4. Click Continue.
The www.bing.com website now displays correctly.
In this exercise, you will configure a static URL filter and apply the security profile to a firewall policy in flow-based
inspection mode. You will then review the web filter logs.
You will create a static URL filter entry and change the inspection mode to flow-based.
Field Value
URL www.bing.com
Type Simple
Action Block
Status Enable
6. Click OK.
Your configuration should match the following example:
7. Click OK.
4. Click OK.
5. Click Policy & Objects > Firewall Policy.
6. Double-click the Full_Access policy to edit it.
7. In the Inspection Mode field, select Flow-based.
8. Click OK.
FortiGate applies the static URL filter before the FortiGuard category filter. The www.bing.com URL
matches the URL filter pattern and therefore is now blocked, and FortiGate displays the corresponding URL
filter message.
1. Return to your browser tab where you are logged in to the Local-FortiGate GUI, and then click Log & Report >
Security Events.
2. Under Summary, click Web Filter.
Why is the first log entry for the www.bing.com website defined as blocked?
Initially, the www.bing.com website has the category Search Engines and Portals, which was set to
Allow and does not generate a security log.
To allow a website and generate a security log at the same time, you must set the category to Monitor.
Then, according to the logs, http://www.bing.com is blocked, but after you clicked Proceed and
authenticated, the logs show a different action: passthrough.
Remember that you overrode the Search Engines and Portals category to Malicious Websites, which
was set to Block, and then to Authenticate.
Because the website is blocked by the static URL filter, FortiGuard does not apply the FortiGuard web
rating, and does not provide the category.
In this lab, you will set up and monitor intrusion prevention system (IPS) profiles. Next, you will configure and use
application control in profile-based mode to apply an appropriate action to specific application traffic. Finally, you
will analyze the generated logs.
Objectives
l Protect your network against known attacks using IPS signatures
l Configure and test application control in NGFW profile mode
l Read and understand application control logs
Time to Complete
Estimated: 40 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file to Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will configure and monitor IPS inspection on Local-FortiGate.
You will configure an IPS sensor that includes the signatures for known attacks based on different severity levels.
10. In the search bar, delete high, and then type critical.
11. Click SEV to select the critical-severity filter.
12. In the search bar, delete critical, and then type Server.
13. Click TGT to select the server-target filter.
Because FortiGate adds all signatures that match the filters to the IPS sensor, you
must configure the filters as specifically as possible.
In this exercise, FortiGate protects an Apache server, and takes the default action for
the corresponding signatures.
You will apply the new IPS sensor to a firewall policy that allows external access to the web server running on the
Local-Client VM.
After you complete the challenge, see Generate Attacks From the Linux Server on page 145
To create a virtual IP
1. Continuing on the Local-Fortigate GUI, click Policy & Objects > Virtual IPs.
2. Click Create New.
3. Configure the following settings:
Field Value
Name VIP-WEB-SERVER
Interface port1
4. Click OK.
Field Value
Name Web_Server_Access_IPS
Source all
Destination VIP-WEB-SERVER
Schedule always
Service ALL
Action ACCEPT
NAT disabled
3. In the Security Profiles section, enable IPS, and then in the IPS field, select WEBSERVER.
4. In the SSL Inspection field, select certificate-inspection.
The policy should look like the following example:
Using full SSL inspection would significantly increase the time required to complete
this lab. Therefore, for the purposes of this exercise, you will not configure full SSL
inspection.
5. Click OK.
You will run a Perl script to generate attacks from the Linux server located in front of Local-FortiGate.
Do not close the LINUX PuTTY session or traffic will stop generating.
You will check the IPS logs to monitor for known attacks that Local-FortiGate is detecting and dropping.
Are the signatures matching the product currently installed on the Local-Client VM?
This information is important to make a note of before you tune the WEBSERVER IPS
sensor. If the signatures do not apply to your product, is it really necessary to inspect
those packets?
On the Local-FortiGate GUI, you can also verify in Log & Report > Security Events
> Intrusion Prevention that no new log entry is generated.
Because you have restarted the IPS engine, the corresponding process ID has
changed and the bypass mode resets to the disable status.
In this exercise, you will create a profile-based application control profile in flow-based inspection mode. Flow-
based and proxy-based inspection modes share identical configuration steps for application control.
You will also view the application control logs to confirm that FortiGate identifies applications. Then, you will
monitor the traffic that matches the application control profile.
The configuration file for this exercise has the application control categories set to Monitor (except for Unknown
Applications). This allows the applications to pass, but also records a log message.
There are 113 cloud-based application signatures available in the application control
signatures database that require deep inspection. This number of cloud-based
application signatures can vary.
The number beside the cloud icon in each category represents the number of cloud
application signatures in a specific category. The number of cloud applications
increases as new applications are added to this list.
4. In the Application and Filter Overrides section, click Create New to add a filter override.
5. On the Add New Override page, in the Type field, select Filter.
6. Click + to add a filter.
7. Under BEHAVIOR, click Excessive-Bandwidth.
8. Click OK.
The configuration should look similar to the following image with the Action set to Block.
9. Click OK.
Now that you have configured the application control profile, you will apply it to the firewall policy.
After you complete the challenge, see Test the Application Control Profile on page 150.
If the FortiGate self-signed, full-inspection certificate has not been imported into the
browser, end users see a certificate warning message. In this lab environment, the
FortiGate self-signed SSL inspection certificate has been imported into the browser.
You will test the application control profile by going to the application that you blocked in the application override
configuration.
2. Return to the Local-FortiGate GUI, and then click Security Profiles > Application Control.
3. Double-click the default application sensor.
4. In the Options section at the bottom of the page, enable Replacement Messages for HTTP-based
Applications.
5. Click OK.
6. On the Local-Client VM, open a new browser tab, and then go to the following URL: http://abc.go.com.
FortiGate should display a block message—it can take up to 2 minutes for the Application Blocked page to
appear because of the change in configuration.
If the Application Blocked page does not appear after 2 minutes, close all browser
tabs, and then restart the browser.
You will configure application overrides. The application overrides take precedence over filter overrides and
application categories.
After you complete the challenge, see Test Application Overrides on page 153.
This application control profile is already applied to a firewall policy that is scanning all
outbound traffic. You do not need to reapply the application control profile for the
changes to take effect.
You will test the application control profile by going to the application that you allowed.
View Logs and Traffic Matching With the Application Control Profile
You will view the logs and traffic that matched the test you just performed.
To view logs
1. Return to the Local-FortiGate GUI, and then click Log & Report > Security Events.
2. Under Summary, click Application Control.
3. Use the Application Name log filter, and then search for ABC.Com.
You will see log messages with the action set to block.
5. Click Log & Report > Forward Traffic, and then search and view the log information for ABC.Com.
You can see more details about the log, including translated IP address, bytes sent, bytes received, action,
and application.
2. Click the line including ABC.Com to select it, and then click Drill down.
The display should be similar to the following example:
3. Click Policies.
The display should be similar to the following example:
You now have the information (bytes, sessions, and policy ID) regarding the traffic that
matched the application ABC.Com.
In this lab, you will examine how to configure an SSL VPN connection in tunnel mode. You will also manage user
groups and portals for an SSL VPN.
Objectives
l Configure and connect to an SSL VPN
l Enable authentication security
l Configure a firewall policy for SSL VPN users to access private network resources
l Configure FortiClient for the SSL VPN connection in tunnel mode
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file to Local-FortiGate.
4. Select the configuration with the comment local-SSL-VPN, and then click Revert.
5. Click OK to reboot.
In this exercise, you will examine how to change the SSL VPN settings to allow remote access to the resources in
the local subnet (10.0.1.0/24), but perform a connection in tunnel mode from the Remote-Client VM.
You will use the remote access module of FortiClient, which supports the Fortinet SSL VPN client.
You will configure the SSL VPN settings to allow the remote connection shown in the following image:
By default, SSL VPN tunnel mode settings and the VPN > SSL-VPN menus are
hidden on the GUI in FortiOS version 7.4. To enable the GUI menu, enter the following
CLI commands:
config system settings
set gui-sslvpn enable
end
The configuration file is preconfigured for you to show the SSL VPN menus.
Username student
Password fortinet
6. Leave the contact information field empty, and then click Next.
7. In the User Account Status field, verify that Enabled is selected.
8. Enable User Group, click +, and then in the section on the right, select SSL_VPN_USERS.
9. Click Submit.
To review the settings of this group, click User & Authentication > User Groups.
Field Value
3. In the Tunnel Mode Client Settings section, verify the following setting:
Field Value
4. In the Authentication/Portal Mapping section, select All Other Users/Groups, and then click Edit.
In tunnel mode, FortiClient establishes one or more routes in the SSL VPN user's host after the tunnel is
connected. Traffic destined to the internal subnets is correctly routed through the tunnel.
4. Click OK.
You will create a firewall policy that allows traffic to the local subnet (10.0.1.0/24) from remote users connected
to the SSL VPN.
Field Value
Name SSL-VPN-Access
Destination LOCAL_SUBNET
Schedule always
Service ALL
Action ACCEPT
NAT Disabled
SSL VPN connections in tunnel mode require FortiClient. You will use FortiClient, which is installed on the
Remote-Client VM, to test your configuration.
Field Value
Server 10.200.1.1
4. Continuing on the FortiClient SSL VPN application, in the User field, type student, and then in the Password
field, type fortinet.
5. Click Connect.
6. Click Continue to accept the certificate.
The tunnel is connected.
You will monitor and disconnect an SSL VPN user from the FortiGate GUI.
You will review the VPN events for the SSL VPN connection you performed in this lab.
The tunnel-up log in the VPN event list shows the SSL VPN connection in tunnel mode through FortiClient.
Notice this log displays two IP addresses:
l Remote IP: IP address of the remote user's gateway (egress interface)
l Tunnel IP: IP address FortiGate assigns to the virtual network adapter fortissl
In this lab, you will configure site-to-site IPsec VPN tunnels between two FortiGate devices. First, you will
configure a dial-up tunnel, and then a static tunnel.
Objectives
l Deploy a site-to-site VPN between two FortiGate devices
l Set up dial-up and static remote gateways
Time to Complete
Estimated: 40 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Remote-FortiGate and Local-FortiGate.
Make sure that you restore the correct configuration file on each FortiGate, using the
following steps. Failure to restore the correct configuration on each FortiGate will
prevent you from doing the lab exercises.
5. Click OK to reboot.
5. Click OK to reboot.
In this exercise, you will configure a dial-up VPN between Local-FortiGate and Remote-FortiGate. Local-FortiGate
will act as the dial-up server and Remote-FortiGate will act as the dial-up client.
You will configure the IPsec VPN by creating phase 1 and phase 2 negotiations.
Field Value
Name ToRemote
4. Click Next.
5. In the Network section, configure the following settings:
Field Value
Interface port1
Field Value
Version 1
Mode Aggressive
Field Value
Peer ID Remote-FortiGate
Setting a peer ID is useful when the FortiGate acting as the dial-up server has multiple
dial-up tunnels, and you want dial-up clients to connect to a specific tunnel.
Field Value
l You do not need to add a static route because it is a dial-up VPN. FortiGate
dynamically adds or removes appropriate routes to each dial-up peer, each time
the peer VPN is trying to connect.
l Even though you could have configured 10.0.2.0/24 as the Remote Address
instead of 0.0.0.0/0, it is more convenient to use the latter for scalability
purposes. That is, when you have multiple remote peers, each with different remote
subnets, using 0.0.0.0/0 as the remote subnet results in the dial-up server
accepting any subnet during the tunnel negotiation. This allows multiple remote
peers to use the same phase 2 selector configuration.
l This exercise has only one remote peer (Remote-FortiGate). Local-FortiGate then
learns about the remote subnet 10.0.2.0/24 when Remote-FortiGate connects
to the tunnel. However, if there are more remote peers with different remote
subnets, you do not need to change the existing dial-up server configuration for the
additional remote peers to be able to connect.
You will create two firewall policies between port3 and To Remote—one for each traffic direction.
Field Value
Name Remote_out
Source HQ_SUBNET
Destination BRANCH_SUBNET
Schedule always
Service ALL
Action ACCEPT
Field Value
Name Remote_in
Source BRANCH_SUBNET
Destination HQ_SUBNET
Schedule always
Service ALL
Action ACCEPT
Field Value
Name ToLocal
4. Click Next.
5. In the Network section, configure the following settings:
Field Value
IP Address 10.200.1.1
Interface port4
Field Value
Version 1
Mode Aggressive
Field Value
Local ID Remote-FortiGate
The local ID should be the same as the peer ID that you configured on Local-
FortiGate, which is acting as the dial-up server.
Note that the Peer ID and Local ID fields are case sensitive.
Field Value
Except for the Local Address and Remote Address settings, all phase 1 and phase 2
settings on both VPN peers mirror each other. For dial-up IPsec VPN, the local and
remote addresses do not have to mirror each other for the tunnel to come up.
You will create one static route on Remote-FortiGate. This step was not necessary on Local-FortiGate because,
as the dial-up server, it automatically adds the route for the remote network after the tunnel comes up.
Field Value
Destination Subnet
10.0.1.0/24
Interface ToLocal
4. Click OK.
You will create two firewall policies between port6 and ToLocal—one for each traffic direction.
Field Value
Name Local_out
Source BRANCH_SUBNET
Destination HQ_SUBNET
Field Value
Schedule always
Service ALL
Action ACCEPT
Field Value
Name Local_in
Source HQ_SUBNET
Destination BRANCH_SUBNET
Schedule always
Service ALL
Action ACCEPT
Now that you configured the VPN on both FortiGate devices, you will test the VPN.
3. Right-click the VPN, and then click Bring Up > All Phase 2 Selectors to bring up the tunnel.
The Name column of the VPN now contains a green up arrow, which indicates that the tunnel is up. If
required, click the refresh button in the upper-right corner to refresh the widget information.
Do you always have to manually bring up the tunnel after you create it?
No. With the current configuration, the tunnel will stay down until you manually bring it up, or there is traffic
that should be routed through the tunnel. Because you are not generating traffic between the 10.0.2.0/24
and 10.0.1.0/24 subnets yet, the tunnel is still down. If you had generated the required traffic while the
tunnel was down, it would have come up automatically.
You can initiate a tunnel only from Remote-FortiGate because it is the dial-up client.
4. On the Remote-Client VM, open a terminal window, and then enter the following command to ping the Local-Client
VM:
ping 10.0.1.10
The ping should work.
7. On the Local-FortiGate GUI, click Dashboard > Network > Static & Dynamic Routing.
8. Find the static route that was dynamically added to the FortiGate.
9. View the route details.
10. Notice the address listed in the Gateway IP column for that route.
In this exercise, you will configure a static VPN between Local-FortiGate and Remote-FortiGate. You will also
configure a static route on Local-FortiGate for VPN traffic.
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
Make sure that you restore the correct configuration on Local-FortiGate, using the
following steps. Failure to restore the correct configuration on Local-FortiGate will
prevent you from doing the lab exercise.
5. Click OK to reboot.
You will configure the IPsec VPN by creating phase 1 and phase 2 negotiations.
Field Value
Name ToRemote
4. Click Next.
5. In the Network section, configure the following settings:
Field Value
Field Value
IP Address 10.200.3.1
Interface port1
Field Value
Version 1
Mode Aggressive
Field Value
Field Value
Destination Subnet
10.0.2.0/24
Interface ToRemote
4. Click OK.
You will create two firewall policies between port3 and ToRemote—one for each traffic direction.
Field Value
Name Remote_out
Source HQ_SUBNET
Destination BRANCH_SUBNET
Schedule always
Service ALL
Action ACCEPT
You will see the new reverse policy. By default, the policy is disabled.
Field Value
Source BRANCH_SUBNET
Destination HQ_SUBNET
Schedule always
Service ALL
Action ACCEPT
3. Right-click the VPN, and then click Bring Up > All Phase 2 Selectors.
4. In the upper-right corner, click the refresh button to refresh the widget information.
The Name column of the VPN now contains a green up arrow, which indicates that the tunnel is up.
5. On the Remote-Client VM, open a terminal window, and then enter the following command to ping the Local-Client
VM:
ping 10.0.1.10
The ping should work.
In this lab, you will configure the following basic SD-WAN direct internet access (DIA) setup on Local-FortiGate.
Then, you will generate internet traffic on Local-Client and monitor the traffic distribution and events on the
FortiGate GUI.
Objectives
l Configure SD-WAN members and an SD-WAN zone
l Configure routes
l Configure SD-WAN rules for an internet service
l Configure firewall policies
l Verify SD-WAN traffic distribution and events
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will configure a basic DIA setup using the FortiGate GUI. You will create a zone for port1 and
port2 on Local-FortiGate, and then configure SD-WAN rules to steer traffic for critical and non-critical internet
applications.
Before you can add port1 and port2 as SD-WAN member interfaces, you must remove all firewall policies that
reference the two interfaces.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Configure a Zone and Members for DIA on page 187.
You will configure the underlay zone, and then add port1 and port2 as members.
After you complete the challenge, see Configure a Performance SLA on page 189
4. Click OK.
5. Click Create New > SD-WAN Member.
6. Configure the following settings:
Field Value
Interface port1
Gateway 10.200.1.254
Status Enabled
7. Click OK.
8. Click Create New > SD-WAN Member.
9. Configure the following settings:
Field Value
Interface port2
Gateway 10.200.2.254
Status Enabled
You will configure a performance SLA for monitoring the health of port1 and port2.
Field Value
Name Level3_DNS
Server 4.2.2.1
FortiGate can reach the detect server through port1 and port2, and displays a green arrow for Packet Loss,
Latency, and Jitter.
6. To check the routing table, click Dashboard > Network, and then click the Static & Dynamic Routing widget.
Your page should look similar to the following example:
There are no routes to 4.2.2.1 and 4.2.2.2, yet the performance SLA shows that port1 and port2 are up.
Why?
To route the health check probes, FortiOS installs special routes in the forwarding information base (FIB)
using the gateway information of members. These routes are not displayed in the routing table, but you can
enter the get router info kernel CLI command to see them.
Configure Rules
You will configure two SD-WAN rules. One rule will be used to steer the traffic of critical applications. The other
rule will be used to steer the traffic of non-critical applications. Both rules will use manual mode.
By default, application detection for SD-WAN rules is not visible on the GUI. This
feature has been enabled for you on the Local-FortiGate GUI.
The commands to enable the visibility of application detection for SD-WAN rules are:
config system global
set gui-app-detection-sdwan enable
end
To configure rules
1. Continuing on the Local-FortiGate GUI, click Network > SD-WAN, and then click the SD-WAN Rules tab.
2. Click Create New to add a rule.
3. Configure the following settings:
Field Value
Name Critical-DIA
Field Value
You can combine the traffic detection for Internet service and Application in the
same rule.
When you select Internet service, FortiGate uses the Internet Service Database
(ISDB) list of IP addresses and protocols for each application. The FortiGuard server
regularly updates and loads this list on FortiGate.
When you select Application, FortiGate detects the application according to the first
packets exchanged with the initial session.
Your page should look similar to the following example. Note that you might not be able to view the application
icons at this stage.
Field Value
Name Non-Critical-DIA
port1 is the preferred member for rule 1, and port2 is the preferred member for rule 2. Why?
port1 is the preferred member for rule 1 because it is configured first in the list and it is alive. port2 is the
preferred member for rule 2 because it is the only member for this rule and it is alive.
You will configure a static route and firewall policy for routing and allowing SD-WAN traffic. Both objects will
reference the underlay zone.
Field Value
Destination Subnet
0.0.0.0/0.0.0.0
Interface underlay
4. Click OK.
Your page should look similar to the following example:
You don't need to configure a gateway when you use an SD-WAN zone as the
outgoing interface for a static route. FortiGate automatically uses the gateway
configured for each interface of the SD-WAN zone.
The static route table shows two routes. The default route through the SD-WAN zone underlay that you
have configured, and a static route through port1 that was already configured. Is this a valid configuration?
Yes, this configuration is valid. You can configure static routes for each SD-WAN zone and routes for each
SD-WAN member for additional granularity.
Field Value
Name DIA
Source LOCAL_SUBNET
Destination all
Schedule always
Service ALL
Action Accept
NAT Enable
Logging Options Enable Log Allowed Traffic, and then select All Sessions.
4. Verify that both default routes, through port1 and port2, have the same distance value and are active in the routing
table.
After you create a static route for an SD-WAN zone, FortiGate automatically adds
individual routes, with the same distance value, for all member interfaces. This ensures
that all routes are active in the routing table, which makes them eligible for traffic
steering.
In this exercise, you will generate internet traffic from the Local-Client VM. Next, you will monitor DIA traffic
distribution and logs using the SD-WAN tools available on the FortiGate GUI.
You will generate internet traffic from the Local-Client VM using a script.
The script takes about 2 minutes to complete, and then the terminal window displays Script was
successfully completed. You can move to the next task while the script is running.
You will use the SD-WAN page on the FortiGate GUI to monitor the DIA traffic distribution. Next, you will view the
traffic logs to obtain additional details.
4. Hover over each graph to display the bandwidth that each member (port1 and port2) uses.
5. Click the Volume and Sessions graphs to explore them.
3. Notice the green arrows beside port1 and port2 in the Packet Loss, Latency, and Jitter columns.
They indicate that the port is up and that the measured performances are within acceptable values.
2. On the Local-FortiGate GUI, click Log & Report > Forward Traffic.
3. Hover over the upper-left corner of the log table to display the table column settings icon.
A gear icon is displayed.
4. Click the gear icon, select Destination Interface, select SD-WAN Quality, and then select SD-WAN Rule Name.
5. Click Apply.
6. For the display time period, select 1 hour.
7. To simplify the view, beside a DNS log message, right-click DNS, and then select the Not exact match filter.
Logs for all other traffic (DNS, HTTP_BROWSER, and so on) show no information in the SD-WAN Quality
and SD-WAN Rule Name columns. Why?
The traffic doesn't match any of the configured SD-WAN rules. As a result, it matches the implicit SD-WAN
rule. The SD-WAN implicit rule load balances sessions based on the source and destination IP addresses
and the FIB contents.
You will use the System Events log page on the FortiGate GUI to review some messages related to SD-WAN
activity.
6. On the Summary page, scroll down, and then click the SD-WAN Events summary widget to expand it.
You can see that FortiGate directs the traffic only to member 2 after you switched off port1.
9. Double-click the second Service will be redirected in sequence order message received, and then review the
details.
When both interfaces are back up, the member sequence order corresponds to the configured order—
member 1, and then member 2.
10. Close the Local-FortiGate GUI session and the terminal window on the Local-Client VM.
In this lab, you will learn how to configure the Fortinet Security Fabric. After you configure the Security Fabric, you
will access the physical and logical topology views.
Objectives
l Configure the Security Fabric on Local-FortiGate (root) and ISFW (downstream)
l Configure the Security Fabric on Local-FortiGate (root) and Remote-FortiGate (downstream)
Time to Complete
Estimated: 30 minutes
Topology
In this lab, you will learn how to configure the Security Fabric on all FortiGate devices in the topology. Local-
FortiGate and Remote-FortiGate are connected through an IPsec tunnel. Local-FortiGate is the root FortiGate in
the Security Fabric, and Remote-FortiGate and ISFW are downstream FortiGate devices. FortiAnalyzer is behind
Local-FortiGate and will be used in the Security Fabric.
Prerequisites
Before you begin this lab, you must restore configuration files on Remote-FortiGate, Local-FortiGate, ISFW, and
FortiAnalyzer.
Make sure you restore the correct configuration file on each FortiGate, using the
following steps. Failure to restore the correct configuration file on each FortiGate will
prevent you from doing the lab exercises.
5. Click OK to reboot.
5. Click OK to reboot.
5. Click OK to reboot.
2. Log in to the FortiAnalyzer GUI with the username admin and password password.
3. In the System Information section, click the icon to restore from an existing configuration.
4. Disable the Overwrite current IP and routing settings option, and then click Add Files.
5. Browse to Desktop > Resources > FortiGate-Administrator > Security-Fabric, select FAZ-SF.dat, and then
click Select.
6. Click OK.
7. Wait until FortiAnalyzer restarts.
In this exercise, you will configure the Security Fabric between Local-FortiGate (root) and ISFW (downstream).
You will configure the root of the Security Fabric to send all logs to FortiAnalyzer. These settings will be
automatically replicated to all downstream devices when they become members of the Security Fabric.
For this lab, FortiAnalyzer is already preconfigured to accept the registration requests
that originate from all FortiGate devices in the topology.
6. Click OK.
7. In the verification window that appears, click Accept.
8. Verify that the status of Security Fabric > Fabric Connectors > Logging & Analytics is Connected.
6. Click OK.
7. Click Network > Interfaces, and then expand port1.
8. Click the To-Remote-HQ2 interface, and then click Edit.
9. In the Administrative Access section, select the Security Fabric Connection checkbox.
10. Click OK.
Why do you need to enable the Security Fabric Connection checkbox on the port3 and To-Remote-HQ2
interfaces on Local-FortiGate?
This is because both downstream FortiGate devices are connected to the root FortiGate (Local-FortiGate)
through these ports, respectively. To join the Security Fabric, the root FortiGate must allow the Security
Fabric connection on these ports.
Field Value
5. Click OK.
You will configure ISFW to join the Security Fabric as a downstream FortiGate.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see To enable the Security Fabric on ISFW (downstream) on page 214.
6. Click OK.
8. Click OK.
9. Click OK to confirm the settings.
It may take a few minutes to authorize. You may need to refresh the page, or log out of the Local-FortiGate
GUI and log in again.
After authorization, ISFW appears in the Security Fabric topology section, which
means ISFW joined the Security Fabric successfully.
3. Hover over the ISFW icon to display a summary of the firewall settings, and then verify that it is correctly registered
in the Security Fabric.
You will check the Security Fabric deployment result on Local-FortiGate (root).
Your topology view might not match exactly what is shown in this example.
In this exercise, you will add another FortiGate to the Security Fabric tree. In this topology, the downstream
Remote-FortiGate connects to the root Local-FortiGate over IPsec VPN to join the Security Fabric.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Authorize Remote-FortiGate (Downstream) on Local-FortiGate
(Root) on page 220.
You will configure Remote-FortiGate to join the Security Fabric as a downstream FortiGate over the IPsec VPN.
7. Click OK.
8. Click OK to confirm.
It may take a few minutes to authorize. You may need to refresh the page, or log out of the Local-FortiGate
GUI and log in again.
After authorization, Remote-FortiGate appears in the topology. Now, both ISFW and
Remote-FortiGate are shown as downstream devices of the root, Local-FortiGate.
Your configuration should look like the following example:
You may need to refresh the page to match the image above.
You will check the Security Fabric deployment result on the root, Local-FortiGate.
You may need to click the Update Now button to refresh the topology. Your topology view might not match
what is shown in this example.
You may need to click the Update Now button to refresh the topology.
Your topology view might not match what is shown in this example. At a minimum, you
should see Local-FortiGate, Remote-FortiGate, and ISFW in the topology view.
You can generate some traffic from the Linux VMs to have them shown in the
topology.
In this lab, you will examine how to set up a FortiGate Clustering Protocol (FGCP) high availability (HA) cluster of
FortiGate devices. You will explore active-passive HA mode and observe FortiGate HA behavior. You will also
perform an HA failover and use diagnostic commands to observe the election of a new primary device in the
cluster. Finally, you will configure management ports on FortiGate devices to reach each FortiGate individually for
management purposes.
Objectives
l Set up an HA cluster using FortiGate devices
l Observe HA synchronization and interpret diagnostic output
l Perform an HA failover
l Manage individual cluster members by configuring a reserved management interface
Time to Complete
Estimated: 40 minutes
Lab HA Topology
After you upload the required configurations to each FortiGate, the logical topology will change to the following:
Prerequisites
Before you begin this lab, you must restore a configuration file to Local-FortiGate and Remote-FortiGate.
You must restore the configuration file on Local-FortiGate first, and then on Remote-
FortiGate.
5. Click OK to reboot.
You must wait until Local-FortiGate finishes rebooting before you can restore the
configuration on Remote-FortiGate in the next step.
5. Click OK to reboot.
FortiGate HA uses FGCP, which uses a heartbeat link for HA-related communications to discover other FortiGate
devices in the same HA group, elect a primary device, synchronize configuration, and detect failed devices in an
HA cluster.
In this exercise, you will examine how to configure HA settings on both FortiGate devices. You will observe the HA
synchronization status, and use diagnose commands to verify that the configuration is in sync on both FortiGate
devices.
Field Value
Mode Active-Passive
Group ID 5
Password Fortinet
3. Click OK.
Now that you have configured HA on both FortiGate devices, you will verify that HA is established and that the
configurations are fully synchronized.
The checksums for all cluster members must match for the FortiGate devices to be synchronized.
3. When prompted, log back in to the Remote-FortiGate CLI with the username admin and password password.
4. Enter the following command to check the HA synchronization status:
diagnose sys ha checksum show
5. On the Local-FortiGate CLI, enter the following command to check the HA synchronization status:
diagnose sys ha checksum show
7. Alternatively, you can run the following CLI command on any member to view the checksums of all members:
diagnose sys ha checksum cluster
After the checksums of both FortiGate devices match, you will verify the cluster member roles to confirm the
primary and secondary devices.
2. On both FortiGate devices, view the Current HA mode line, and then write down the device serial number
(Serial-Number).
Notice that Local-FortiGate is a-p primary and Remote-FortiGate is a-p secondary.
In the primary election process, FGCP first checks the number of connected monitored ports. Because you
didn't configure monitored ports, FGCP then checks the next criterion.
As the override setting is disabled, FGCP checks the HA uptime next. Because you enabled HA on both
devices about the same time, the HA uptime difference is less than 5 minutes.
Local-FortiGate has a priority of 200, which is greater than Remote-FortiGate, which has a priority of 100.
The result is that FGCP elects Local-FortiGate as the primary.
3. On the Local-FortiGate CLI , enter the following command to confirm the reason for the primary election:
get system ha status
4. In the output, look for the Primary selected using section to identify the reason for the latest primary election
event.
Your output should look similar to the following example:
The output confirms that FGCP elected Local-FortiGate as the primary because of its
higher priority.
If you see that the election reason is a higher uptime, then that is probably because
you rebooted one of the members, and as a result, the HA uptime of that device was
reset. The reboot then caused the HA uptime difference to be more than 5 minutes.
You set up an HA cluster. In this exercise, you will examine how to trigger an HA failover, and observe the
renegotiation among devices to elect a new primary device.
You will reboot the primary FortiGate in the cluster to trigger a failover.
After you have performed these steps, see Verify the HA Failover and FortiGate Roles on page 232.
4. On the Local-FortiGate CLI, enter the following command to reboot Local-FortiGate and trigger a failover:
execute reboot
You will verify the HA failover, and check the roles of FortiGate in an HA cluster.
When Local-FortiGate finishes rebooting and rejoins the cluster, does it rejoin as the secondary device, or
resume its initial role of the primary device?
5. On any FortiGate in the cluster, enter the following command to see the status of all cluster members:
get system ha status
You should see that Local-FortiGate rejoins the cluster as a secondary device. It lost its role as the primary
device.
Local-FortiGate becomes the secondary device in the cluster because it has a lower
HA uptime than Remote-FortiGate. In addition, the HA uptime difference between the
members is more than 5 minutes.
Also, the override setting is disabled, so priority does not take precedence over
uptime.
You will trigger a failover by resetting the HA uptime on the current primary FortiGate—which should be Remote-
FortiGate—and then you will verify the role of Remote-FortiGate in the HA cluster.
The HA synchronization process is responsible for FGCP packets that communicate cluster status and build the
cluster. You will use real-time diagnostic commands to observe this process.
The diagnose debug application hatalk 0 command stops the debug. You
will use this command later.
The sanitized output shows that the current primary FortiGate is sending heartbeat packets and trying to
synchronize its configuration with the configuration of the secondary FortiGate.
5. Press the up arrow key twice, select the second-last command (in this case, diagnose debug application
hatalk 0), and then press Enter to stop the debug output on Local-FortiGate.
In this exercise, you will examine how to configure a spare interface in the cluster as a reserved HA management
interface. This allows both FortiGate devices to be reachable for management purposes regardless of the
member role.
If you don't configure a reserved HA management interface, the primary FortiGate handles your cluster
management connections. However, you can access the CLI of the secondary FortiGate from the primary
FortiGate CLI, or by using the console connection of the secondary FortiGate.
You can also configure an in-band HA management interface, which is an alternative to the reserved HA
management interface, and does not require reserving an interface that is only for management access.
Access the Secondary FortiGate CLI Through the Primary FortiGate CLI
You will connect to the secondary FortiGate CLI through the primary FortiGate CLI.
To access the secondary FortiGate CLI through the primary FortiGate CLI
1. On the Local-FortiGate CLI, log in with the username admin and password password.
2. Enter the following command to access the secondary FortiGate CLI through the primary FortiGate heartbeat
interface:
execute ha manage <id> admin
4. Enter the following command to get the status of the secondary FortiGate:
get system status
You will use an unused interface on the FortiGate devices in an HA cluster to configure a reserved HA
management interface and a unique IP address for each member. This way, you can access each member
directly, regardless of its role.
4. Enable Management Interface Reservation, and then in the Interface field, select port7.
5. Click OK.
You will configure and verify access to the primary FortiGate using the reserved HA management interface.
To configure and verify access to the primary FortiGate using the reserved HA management
interface
1. On the Local-FortiGate CLI, log in with the username admin and password password.
2. Enter the following commands to configure port7:
config system interface
edit port7
set ip 10.0.1.253/24
set allowaccess ping ssh snmp http https
end
Even though this address overlaps with port3, which is not allowed by default
(FortiGate does not allow overlapped subnets by default), it is allowed here because
the routing entries for the reserved HA management interface are excluded from the
routing table.
3. On the Local-Client VM, open a browser, and then log in to the Local-FortiGate GUI at 10.0.1.253 (note the IP
address) with the username admin and password password.
This verifies connectivity to port7.
You will configure and verify access to the secondary FortiGate using the reserved HA management interface.
After the configuration is ready, see Disconnect Remote-FortiGate From the Cluster on page 238.
To configure and verify access to the secondary FortiGate using the management interface
1. On the Remote-FortiGate CLI, enter the following command to verify that the reserved HA management interface
is synchronized with the secondary device:
show system ha
Look for ha-mgmt-status and config ha-mgmt-interfaces. These should already be set.
4. On the Local-Client VM, open a browser, and then log in to the Remote-FortiGate GUI at 10.0.1.252 (note the IP
address) with the username admin and password password.
This will verify connectivity to port7.
Each device in the cluster now has its own management IP address for monitoring purposes.
You will disconnect Remote-FortiGate from the cluster. Remote-FortiGate will prompt you to configure an IP
address on any port on Remote-FortiGate so that you can access it after the disconnection.
Field Value
Interface port3
IP/Netmask 10.0.1.251/24
5. Click OK.
This removes the FortiGate from the HA cluster.
You will restore the Remote-FortiGate configuration, so that you can use Remote-FortiGate in the next labs.
Failure to perform these steps will prevent you from doing the next exercises.
5. Click OK to reboot.
Failure to perform these steps will prevent you from doing the next exercises.
In this lab, you will run diagnostic commands to learn about the current status of FortiGate. You will also use the
sniffer and debug flow tools to troubleshoot and fix a connectivity problem.
Objectives
l Monitor for abnormal behavior, such as traffic spikes
l Diagnose problems at the physical and network layers
l Diagnose connectivity problems using the GUI debug flow tool
l Diagnose resource problems, such as high CPU or memory usage
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must restore a configuration file on Local-FortiGate.
5. Click OK to reboot.
In this exercise, you will use CLI commands to get information about FortiGate, such as traffic volume, CPU
usage, memory usage, and the ARP table.
You will run some diagnostic commands and make a note of some of the information displayed.
Field Value
Current HA mode
Host name
CPU utilization
Memory utilization
Enter the following CLI commands to find the information requested above:
get system status
get system performance status
get hardware nic port1
get system arp
diagnose sys top 1
(Press Shift+P to order the processes by CPU usage, Shift+M to order them by
memory usage, or Q to stop.)
In this exercise, you will use the sniffer and debug flow tool to troubleshoot a network connectivity problem.
As you will see in this procedure, there is a network connectivity problem between the Local-Client VM and the
Linux server.
The ping is failing. You will use the sniffer and debug flow tool on Local-FortiGate to find out why.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Test the Fix on page 247.
You will start troubleshooting by sniffing the ICMP traffic going to the Linux server.
The packets are arriving on FortiGate, but FortiGate is not routing them.
You will run the GUI debug flow tool to get information about why FortiGate is dropping the packets.
Field Value
IP address 10.200.1.254
Protocol ICMP
FortiGate receives the ICMP packet from 10.0.1.10 to 10.200.1.254 from port3.
vd-root:0 received a packet(proto=1, 10.0.1.10:6->10.200.1.254:2048) tun_id=0.0.0.0
from port3. type=8, code=0, id=6, seq=34033.
It drops the packet. The debug flow shows the error message.
Denied by forward policy check (policy 0)
The Denied by forward policy check message indicates that a firewall policy denied the traffic. It
could be either a denied policy that the administrator explicitly configured, or the implicit denied policy for
traffic that does not match a configured policy.
The policy 0 indicates that the default implicit policy denied the traffic. If an explicitly configured policy
blocked the traffic, its policy ID number would be indicated in this output, instead of 0.
Now that you have found the cause of the problem, you will fix it.
You will test to confirm that the configuration change fixed the problem.
4. Continuing on the Local-FortiGate GUI, click Network > Diagnostics, and then click the Debug Flow tab.
5. In the Number of packets field, change the value to 3 packets.
6. Enable Filters, and then configure the following settings:
Field Value
IP address 10.200.1.254
Protocol ICMP
8. Return to the terminal window, and then start the ping again.
ping 10.200.1.254
It is a bit different now. The error message is not displayed and you can see a few new logs.
Additionally, you can see the debug flow logs from the return (ping reply) packets.
vd-root:0 received a packet(proto=1, 10.200.1.254:60424->10.200.1.1:0) tun_id=0.0.0.0
from port1. type=0, code=0, id=60424, seq=1.
Find an existing session, id-00010feb, reply direction
DNAT 10.200.1.1:0->10.0.1.10:7
find a route: flag=00000000 gw-0.0.0.0 via port3
The procedure in this exercise describes what you should usually do when
troubleshooting connectivity problems on FortiGate. Sniff the traffic first to check that
the packets are arriving on FortiGate and that FortiGate is routing them correctly. If the
sniffer shows that FortiGate is dropping the traffic, use the debug flow tool to find out
why.