Quantcast
Channel: Fortinet Cookbook
Viewing all 690 articles
Browse latest View live

Blocking Tor traffic

$
0
0

In this recipe, you will block users on your network from accessing the Internet who use the Tor browser.

The Tor network allows users to browse the Internet anonymously by bouncing traffic around a distributed network of relays located around the world. Observers are unable to determine the source and destination of Tor traffic since it doesn’t take a direct route from source to destination.

This recipe uses the default Application Control signatures for the Tor client and web-based Tor.  These signatures only match unmodified versions of the Tor application.

Find this recipe for other FortiOS versions:
5.2 | 5.4

1. Enabling Application Control

Go to System > Feature Select to ensure that Application Control is enabled.

2. Blocking Tor traffic in Application Control using the default profile

Go to Security Profiles > Application Control to edit the default profile.

Under Application Overrides, select Add Signatures.

Filter by Category: Tor and Proxy: Name to search for Tor.

Two signatures will appear: one for the web-based Tor usage and one for the Tor client.

Highlight both signatures and click Use Selected Signatures.

Both signatures now appear in the Application Overrides list, with the Action set to Block.

3. Adding application control to your security policy

Go to Policy & Objects > IPv4 Policy to edit the policy that allows connections from the internal network to the Internet.

Set Source to all.

Under the Security Profiles heading, enable Application Control and use the default profile. Enable SSL/SSH Inspection and use deep-inspection.

4. Results

Browse the Internet using the Tor browser. The Tor browser will be blocked.

Go to Log & Report > Application Control. You will see that Tor traffic has been blocked. 

For further reading, check out Application Control in the FortiOS 5.4 Handbook.

Using the deep-inspection profile may cause certificate errors. See Preventing certificate warnings for more information.

The post Blocking Tor traffic appeared first on Fortinet Cookbook.


Configuring Administrator Accounts and Profiles in FortiVoice Enterprise

$
0
0

FortiVoice Enterprise features a single administrator account by default. FortiVoice units, however, support multiple administrator accounts. This recipe guides you through the process of creating additional administrator accounts with restricted permissions.

 

Configuring Administrator Accounts

To configure administrator accounts

  1. Go to System > Admin > Administrators.
  2. Select New to add an account or double-click an existing account.
  3. Enter the name of the administrator account 
  4. Select the extension of the administrator account from the Sing sign-on manager dropdown menu. Once you select the desired extension, the Managed departments section appears.
  5. Expand the Managed departments section. Select the call center departments you want the administrator to manage and then select the right arrow to move it to the Selected section.

    Providing the administrator access to specific call center departments allows the admin to view information like recorded calls and reports. 

  6. Select your preferred authentication type. If you select LDAP, you will need to configure an LDAP profile.
  7. Enter an IPv4 or IPv6 address into the Trusted hosts field. If you want the administrator to access the FortiVoice unit from any IP address, use 0.0.0.0/0.0.0.0.
  8. Select the name of an admin profile that determines which functional areas the administrator account may view or affect and  then select the language and theme. 
  9. Select Create
 admin-account

Configuring Administrator Profiles

The Admin Profile tab displays a list of administrator access profiles.

Administrator profiles govern which areas of the web-based manager and CLI that an administrator can access and modify.

To configure administrator access profiles

  1. Go to System > Admin > Admin Profile
  2. Select New or modify an existing profile.
  3. Enter a profile name.
  4. Select the desired privileges you wish the administrator to be able to access and modify.
  5. Select Create.
 privileges

The post Configuring Administrator Accounts and Profiles in FortiVoice Enterprise appeared first on Fortinet Cookbook.

Overriding a web filter profile

$
0
0

In this recipe, one user is temporarily allowed to override a web filter profile in order to access sites that would otherwise be blocked. Web filtering blocks the Bandwidth Consuming category for all users, except those who can override the filter.

Find this recipe for other FortiOS versions:
5.2 | 5.4

1. Enabling web filtering and multiple profiles

Go to System > Feature Select to enable Web Filter and Multiple Security Profiles.

Apply changes if necessary.

2. Creating a user group and two users

Go to User & Device > User Groups. Create a new group for users who can override web filtering (in this example, web-filter-override).  
Go to User & Device > User Definition to create two users (in this example, ckent and bwayne).

 

 

 
Assign ckent to the web-filter-override group, but not bwayne.

3. Creating a web filter profile and an override

Go to Security Profiles > Web Filter to create a new profile (block-bandwidth-consuming).

Enable FortiGuard category based filter, then right-click Bandwidth Consuming and select Block.

Go to Security Profiles > Web Filter to enable Allow users to override blocked categories.

Set Groups that can override to web-filter-overrideProfile can switch to defaultSwitch applies to User Group, and Switch Duration to Ask.

4. Adding the new web filter profile to a security policy

Go to Policy & Objects > IPv4 Policy to edit the policy that allows connections from the internal network to the Internet.

Set Source all, bwayne, and web-filter-override.

Under Security Profiles, enable Web Filter and select the block-bandwidth-consuming profile.

5. Results

Browse to youtube.com, a website that is part of the Bandwidth Consuming category.

Authenticate using the bwayne account. The website is blocked.

Go to Monitor > Firewall User Monitor and De-authenticate bwayne.

Browse to youtube.com again, this time authenticating the ckent account. You can access the website until the override expires.

For further reading, check out the Web Filter chapter in the FortiOS 5.4 Handbook.

The post Overriding a web filter profile appeared first on Fortinet Cookbook.

Configuring Alert Emails in FortiVoice Enterprise

$
0
0

What if your hard disk space fills up and you end up missing out on recording some important information during a call? What if you just want the FortiVoice unit to inform you when something goes wrong? FortiVoice Enterprise has you covered!

In FortiVoice Enterprise you can configure your unit to notify you or other users through email when specific events occur and are logged. So, for example, if your hard disk is full, the unit will send an automatic email message to whoever you’ve selected to be notified.

This recipe will guide you through the easy process of configuring both the alert email recipients and the type of event that will trigger the alert.

 Alert email messages also require that you supply the FortiVoice unit with the IP address of at least one DNS server. The FortiVoice unit uses the domain name of the SMTP server to send alert email messages. To resolve this domain name into an IP address, the FortiVoice unit must be able to query a DNS server. For information on DNS, see “Configuring DNS” in the FortiVoice administrator guide.
 

 Configuring Alert Recipients

Before the FortiVoice unit begins sending out alerts, you’ll first need to establish who should be on the alert recipient list.

To configure recipients of alert email messages

  1. Go to Log > Alerts > Configuration.
  2. Select New to add the email address of the recipient.
  3. Enter the email address of the individual you wish to be notified and then select Create.

    Repeat the process to add more users.


  

 

 Establishing Alert Types

So now that we’ve established who will receive an email when an event occurs, we’re going to need to configure the alert categories to determine what events will trigger the email messages.

To establish alert types

  1. Go to Log > Alerts > Categories.
  2. Select one or more of the events by selecting the appropriate checkbox.

    Let’s go over a few of the ones that may not be self-explanatory:
    Critical events: Whenever the FortiVoice unit detects a system error that could impact its operation, like a hardware failure.
    Deferred email quota: Selecting this option will have the FortiVoice unit send you an email letting you know that you’ve exceeded the email message queue.
    Daily call summary: This is a great way to get a summary of a variety of different call information, like the total amount of calls, the number of long distance calls, and the amount of international calls.
    Trunk lines are saturated: Sends an alert amil when the SIP/PSTN/PRI trunk lines are fully occupied. SIP trunk alert only works if you select Overflow check when configuring the SIP trunk.

  3. Select Apply.


  

 

The post Configuring Alert Emails in FortiVoice Enterprise appeared first on Fortinet Cookbook.

Episode 7: FSSO

Guest WiFi Accounts (Video)

$
0
0

In this video, you’ll learn how to setup accounts for guests to connect to your WiFi network for a limited amount of time. The accounts will allow guests to connect to your FortiGate’s WiFi network after authenticating using a captive portal.To make management easier, you’ll also create a separate administrative account for creating and managing guest accounts. In this example, a FortiAP in Tunnel mode is used to provide WiFi access to guests.

The recipe for this video is available here.

Watch more videos

The post Guest WiFi Accounts (Video) appeared first on Fortinet Cookbook.

SSL VPN single sign-on using LDAP-integrated certificates

$
0
0

In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate solely with a certificate. We will configure a PKI peer object in order to search our LDAP using the certificate’s UserPrincipalName in order to determine group memberships of the user. We will then be able to base our SSL VPN policies on LDAP group membership, without the need to explicitly request the user’s LDAP credentials during the client VPN session establishment.

This recipe was tested with a Windows 2012R2 Active Directory acting as both the user certificate issuer, the certificate authority and the LDAP server.

While it is possible to force explicit LDAP authentication for the user during VPN establishment, this cookbook article’s goal is to offer a true “single-sign on” approach in which we use pre-established credentials (the user’s issued certificate) while maintaining the ability to know what Active Directory groups the connecting user belongs to based on the username found in the certificate.

Note that this article skims over the basics of SSL VPN configuration – refer to other more basic articles if you need a refresher on the basic mechanics related to SSL VPN or other features found in this article.

1. Windows 10 certificate

While it is not the goal of this article to cover Microsoft’s Certificate Authority and its operation, suffice to note that our test user (user1) has been issued a standard “User” template certificate for which he has enrolment permissions for.

 

 

In our case, we duplicated the standard “User” template and made certain that we have the User Principal Name included in the subject name of the issued certificate – this is the user field we will be using to search LDAP during the connection attempt.

For reference, UPN designates the format “user@domain”, with domain being the Active Directory domain.

2. Requesting and installing a server certificate for FortiOS

Using our Microsoft Certificate Authority’s web interface, we request a “Web Server” type certificate and use the CSR generated from FortiOS’s GUI to obtain a trusted certificate. Do note that “trusted” in this example is limited in scope to the organization’s assets – you would use a public CA to generate a certificate for FortiOS if you expect non-corporate assets to connect to the SSL VPN as those are unlikely to trust the Active Directory CA we are using in our example.

While the below process goes through the manual certificate request process, FortiOS is SCEP capable which can be used to automate the certificate request process with a SCEP-compliant CA server (Microsoft CA does support SCEP).

Export the CA certificate from your CA using the available methods. In our case, we use the Windows CA web interface to download our CA cert in BASE64 format.

Go to System > Certificates and select Import > CA Certificate.

Select the Microsoft CA certificate file.

 

The CA certificate now appears in the list of Certificates. Note that it is named “G_CA_Cert_1″ – keep that in mind as we refer to this later in the article.

Next, we generate a CSR on FortiOS which we will use to obtain a signed certificate from our CA, again in our case the Microsoft CA. The domain name used should match the domain name users will be connecting to using FortiClient and is generally what resolves to the IP of the interface listening for SSL VPN.

Download the generated CSR, which is a text file containing the BASE64 certificate request.

We again use our Microsoft CA web interface to submit our CSR and obtain a certificate of type “Web Server”.

Download the resulting signed request in BASE64 format.

Finally, import that signed request as a local certificate on FortiOS to finalize our SSL VPN server certificate. 

Our request is complete and our certificate is now usable. We will use this certificate later in our SSL VPN configuration.

3. Configuring LDAP, PKI and a group

As we will be validating incoming VPN requests using the UserPrincipalName found in the trusted certificates used by clients, we need to define our LDAP server.

Go to User & Device > LDAP Servers and create a new LDAP server definition.

This definition is common, except for the fact that we will be using UserPrincipalName as our Common Name Identifier – the UPN field is what we are extracting from the certificates and need to match to locate users in LDAP.

 

Next, head to the CLI. This is the only part of this article that requires a CLI definition.

Create a PKI “peer” object as shown. This is a relatively static object which will not require frequent visits to the CLI.

 

config user peer
    edit "FORTIQC_CERTS"
        set ca "G_CA_Cert_1"
        set ldap-server "FORTIQC"
        set ldap-mode principal-name
    next
end

A PKI “peer” object is created in order to instruct FortiOS to match an incoming certificate’s UserPrincipalName to a target LDAP server object, providing that certificate is signed by the designated CA and is valid. You will recognize the G_CA_Cert_1 as the name of the CA certificate we imported earlier.

The “ldap-mode” parameter is important as it dictates that authentication is not explicit (the user does not need to pass a username and password) and instead is based on validating that the UserPrincipalName found in the certificate does exist. We will extend  this in a moment to also request that the user be a member of a specific LDAP group.

4. Configuring a group

 

Next, we configure the group object that will assemble our previously configured LDAP and PKI objects together.

Go to User & Device > User groups and create a new group.

Add the PKI peer object previously created as a local member of the group.

Next add a remote group on the LDAP server and select the group of interest you need these users to be members of using the LDAP browser window.

 

 What just happened here?

This configuration is counter-intuitive at first glance as matching against a group object generally means matching at least one of its members.

However when using a PKI object in the “member” field, the group object’s behaviour change and instead, the group will only match if the PKI object is true (the certificate is valid and trusted and the user exists in LDAP) AND the group memberships obtained from LDAP for the user also match one of the remote LDAP groups defined.

We will look at connection debug information later to see this process happening.

5. Configuring the SSL VPN settings

Go to VPN > SSL-VPN Settings.

Ensure that the “Require Client Certificate” option is checked.

Select the certificate we generated earlier for FortiOS.

If needed, map our newly created group to a specific portal definition. This is only necessary if the default portal (designated by “All Other Users/Groups” entry) is not the right one. In our case, it wasn’t necessary to define the group to portal mapping as the default portal was the same.

 

6. Configuring the policy

Finally, under Policy & Objects > IPv4 Policy create or modify your existing SSL VPN policies to incorporate your new group.

 

 

7. Results

 

Our FortiClient is configured with the target hostname and local certificate issued to the user. Connecting to the VPN requires neither username or password – only the user’s certificate.

 

 

Lets look at the output of “diag debug app fnbamd -1” while the user connects. We have shortened the output of the diag in a few locations to focus on the important parts.

We can see the lookups being done to find the group memberships (3 groups total) of the user and that the correct group being found results in a match.

We can also use “diag firewall auth list” to validate that a firewall user entry exists for our SSLVPN user and is part of the right groups.

As a reference, fnbamd is short for “Fortinet Non-Blocking Authentication Management Daemon” and is the process responsible for the vast majority of explicit authentication duties found in FortiOS.

MN140D-1 (root) # diag debug reset
diag debug
MN140D-1 (root) # diag debug app fnbamd -1
Debug messages will be on for 30 minutes.

[1590] cert_check_group_list-checking group type 1 group name 'FORTIQC_PKI_GrpCertAuth'
[1425] quick_check_peer-Cert subject 'CN = user1'
[1483] check_add_peer-check peer user 'FORTIQC_CERTS' in group 'FORTIQC_PKI_GrpCertAuth', result is 4
[1614] cert_check_group_list-Status pending for group 'FORTIQC_PKI_GrpCertAuth'
[804] resolve_ldap_FQDN-Resolved address 192.168.129.40, result 192.168.129.40
[1185] fnbamd_ldap_init-search filter is: (&(userPrincipalName=user1@fortiqc.local)
    (!(UserAccountControl:1.2.840.113556.1.4.803:=2)))

[1189] fnbamd_ldap_init-search base is: dc=fortiqc,dc=local

[258] start_search_dn-base:'dc=fortiqc,dc=local' filter:(&(userPrincipalName=user1@fortiqc.local)
    (!(UserAccountControl:1.2.840.113556.1.4.803:=2)))
...
[306] get_all_dn-Found 1 DN's
[556] start_user_attrs_lookup-Adding attr 'memberOf'
[577] start_user_attrs_lookup-base:'CN=user1,CN=Users,DC=fortiqc,DC=local' filter:cn=*
...
[1851] fnbamd_ldap_get_result-Going to DONE state res=0
[141] __ldap_copy_grp_list-copied CN=GrpCertAuth,CN=Users,DC=fortiqc,DC=local
[141] __ldap_copy_grp_list-copied CN=testgroup,CN=Users,DC=fortiqc,DC=local
[141] __ldap_copy_grp_list-copied CN=Domain Users,CN=Users,DC=fortiqc,DC=local
[1845] __match_ldap_group-Matching server 'FORTIQC' - 'FORTIQC'
[1853] __match_ldap_group-Matching group 
       'CN=GrpCertAuth,CN=Users,DC=fortiqc,DC=local' - 'CN=GrpCertAuth,CN=Users,DC=fortiqc,DC=local'
[1953] fnbamd_auth_cert_poll-Result for ldap svr[0] '192.168.129.40' is SUCCESS
[1959] fnbamd_auth_cert_poll-matched user 'FORTIQC_CERTS', matched group 'FORTIQC_PKI_GrpCertAuth'
...


MN140D-1 (root) # diag firewall auth list

10.212.134.200, cn=user1, FORTIQC_PKI_GrpCertAuth
	type: fw, id: 0, duration: 181, idled: 0
	expire: 28797, allow-idle: 28797
	flag(a0): idle sslvpn
	packets: in 1427 out 1505, bytes: in 291364 out 359030
	group_id: 2
	group_name: FORTIQC_PKI_GrpCertAuth

----- 1 listed, 0 filtered ------


 

 

8. Logs

Finally, our logs show our LDAP user’s traffic:

9. Summary

This article presented a technique allowing for “credential-less” VPN connectivity using certificates while maintaining the ability to authorize access with policies that are based on LDAP groups. As a side note, this technique may not be suitable to the levels of security requirements of all environments as it foregoes explicit authentication in addition to PKI authentication. Your organization’s security versus ease-of-use requirements ultimately dictate the requirements.

The post SSL VPN single sign-on using LDAP-integrated certificates appeared first on Fortinet Cookbook.

The Bring-Your-Own-HW FortiRecorder

$
0
0

FortiRecorder is available in VM versions for several virtualization platforms. Typically this form of deployment is used in the higher-end segment when a customer uses VM-based IT services in their data center. FortiRecorder then runs on a powerful, fully managed server platform.

The per-channel licensing model for FortiRecorder-VM allows perfectly matching the camera channel number with the number of cameras installed. It is a very cost-effective solution that allows easy growth as demand increases over time. The same cost benefits and more can also be realized in a scenario that requires smaller local camera installations with distributed recorders.

This article will explain how to take the advantages of a VM deployment and build a custom FortiRecorder appliance using it.

The idea is to build a FortiRecorder appliance based on a standard workstation or server platform, a virtualization layer, and a VM version of FortiRecorder. This allows customizing the hardware to specific project needs. The amount of HD storage, for example, can be scaled exactly to specification. As long as the hardware is compatible with the specific virtualization platform, the options are limitless.

There are two types of Virtual Machine solutions, type 1 and type 2. Type 1 Virtual Machines run directly on the server hardware with a Hypervisor system in between (bare metal installation). On top of the Hypervisor, one or multiple Guest OS or Appliances can be run. Type 2 Virtual Machines require an Operating System. On top of that Operating System runs the Hypervisor and then the guest Operating Systems above the Hypervisor.

 

Figure 1. Two Types of Hypervisors to Achieve Virtualization

 

Both types of Virtual Machines can be used for free, but Type 2 still requires an Operating System installed before installing the Hypervisor. That is an additional cost for the OS and installation procedure in order to build a video recorder appliance.

With the Type 1 solution, FortiRecorder can be deployed without extra cost on a customized platform and licensed for exactly the amount of channels needed. There are more benefits such as better management of the server resource and performance monitoring.

Customization allows for more storage or higher/lower CPU performance compared to using one of the standard FortiRecorder appliances. The following virtualization solutions are suitable for building an appliance based on FortiRecorder-VM and a bare metal Hypervisor.

 

VMware

VMware vSphere ESXi Hypervisor is free to use; however, it requires registration to obtain the software and the license key. You can download the VMware vSphere Hypervisor from here. Please also download VMware vSphere Client and install on a Windows computer to manage the VMware vSphere Hypervisor.

VMware supports unlimited CPU and up to 32 GB of RAM/CPU. Its hardware compatibility guide can be found from here.

 

XenServer

XenServer is free to use, and the disk image can be downloaded from here. Registration is not required. Please also download XenCenter Windows Management Console and install on a Windows computer to manage XEN.

Some limitations of XenServer are Virtual CPU per VM is 32, virtual NIC per VM is 7, and virtual disk size is 2 TB. They should be more than needed by FortiRecorder. XenServer 7.0 configuration limits can be found here.

 

Hyper-V Server

Hyper-V Server 2012 R2 by Microsoft is free to use; Hyper-V Server 2016 is for evaluation only. They can be downloaded here. Please note registration is required.

Hyper-V Manager is the management tool and can be added as a Windows feature on Windows 7 or 10 Pro editions. [1]

Figure 2. Enable the Hyper-V Manager Feature in Windows 10

Some hints:

  • Please make sure the hardware is compatible with the specific virtualization platform.
  • The FortiRecorder-VM installation guide can be downloaded here.
  • All Type 1 Hypervisor downloads are .iso disk image files. Once downloaded, it can be burned into a CD or DVD disk to boot up the server. Please remember to change the setting in BIOS to boot from the CD or DVD drive.
  • Here is a free tool and an explanation on how to burn a .iso image to disk.
  • Configure the Hypervisor so it starts the FortiRecorder-VM automatically upon boot.

[1] https://technet.microsoft.com/en-us/library/dn632582(v=ws.11).aspx

The post The Bring-Your-Own-HW FortiRecorder appeared first on Fortinet Cookbook.


Config drive with ESX vCenter VMware

$
0
0
In this recipe, you will learn how to bootstrap a FortiGate-VM in VMware vCenter using config drive. If you find yourself deploying VMs on VMware vCenter or standalone ESX and want to set up  the FortiGate VM you have come to the right recipe.

Make sure to verify the config drive functionality available for your FortiGate VM version in the release notes. FortiGate VM 5.4.1 and above support version 2 of the config-drive capabilities. Cloud-Init config drive was initially created for OpenStack and other cloud environments — and it is a capability available on the FortiGate-VM (FGT-VM) even when booting within a VMware vCenter or standalone ESX environment. Config drive also allows the administrator to pass both day zero configuration scripts and FGT-VM licenses to the FortiGate on initial boot.
 
In order to pass a config drive to the FGT-VM, first you need to create a directory structure, and place the license file and configuration script file in the appropriate places. Here is the directory structure you will need:
 
 
For more information on the directory structure, please see this PDF.
 
License file: 
 
The contents of the FGT-VM license file go into the 0000 file. Generally one would cat the license file and redirect the output into config-drive/openstack/content/0000 file. 
 
aaberra@ubuntu:/var/tmp$  
aaberra@ubuntu:/var/tmp$ cat config-drive/openstack/content/0000

-----BEGIN FGT VM LICENSE—— 

#-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-# 
#-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-# 
#-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-REDACTED-# 

-----END FGT VM LICENSE—— 

aaberra@ubuntu:/var/tmp$

1. FortiGate Configuration Script

The configuration script for a FGT-VM is in standard CLI syntax. The key thing to remember is to enter a #<comment> in the first line, and then the fill the following lines with standard CLI syntax. Here is a simple example below, where the hostname is Example-Day0 and port1 is configured to use DHCP to get an IP address.

aaberra@ubuntu:/var/tmp$ cat config-drive/openstack/latest/user_data

#Example FGT Day0 Configuration

 

config system global

   set hostname Example-Day0

end

 

config system interface

edit port1

set mode dhcp

set allowaccess https ssh ping

end

aaberra@ubuntu:/var/tmp$
Warning: The #<comment> line is mandatory!

2. Create the Config Drive ISO

  
To create the config-drive ISO you will need to use the xorriso utility and refers to the config-drive directory created above with the relevant license file and configuration script. Here is an example of creating a config-drive ISO on an Ubuntu host:
 
aaberra@ubuntu:/var/tmp$ xorriso -as mkisofs -V config-2 -o Day0-CFG-Drive.iso config-drive/

xorriso 1.3.2 : RockRidge filesystem manipulator, libburnia project.

Drive current: -outdev 'stdio:Day0-CFG-Drive.iso'

Media current: stdio file, overwriteable

Media status : is blank

Media summary: 0 sessions, 0 data blocks, 0 data, 14.3g free

xorriso : WARNING : -volid text does not comply to ISO 9660 / ECMA 119 rules

Added to ISO image: directory '/'='/var/tmp/config-drive'

xorriso : UPDATE : 5 files added in 1 seconds

xorriso : UPDATE : 5 files added in 1 seconds

ISO image produced: 185 sectors

Written to medium : 185 sectors at LBA 0

Writing to 'stdio:Day0-CFG-Drive.iso' completed successfully.

aaberra@ubuntu:/var/tmp$
 
aaberra@ubuntu:/var/tmp$ ls -l Day0-CFG-Drive.iso

-rw-rw-r-- 1 aaberra aaberra 378880 Feb 15 13:32 Day0-CFG-Drive.iso

aaberra@ubuntu:/var/tmp$
Now that the configuration drive has been created, the next steps are to place the ISO on our data store so we can use it to instantiate FortiGate VMs.   
Deploy the FortiGate VM using an OVF template.
We won’t get into the details of how to deploy an OVF template. Generally you’ll accept the EULA, define your storage policy along with the virtual disk format, and pick the network configuration. Once you reach the end of the OVF template deployment make sure to deselect Power on after deployment. This is so we can attach our config-drive ISO as a cdrom device before initial boot. 
 
Edit the virtual machine settings 
Add a new device: CD/DVD drive and make sure to select Connect at power on.
Then attach the Day0-CFG-Drive.iso ISO you created earlier. 
Complete your changes then navigate to the VM to boot it. 

3. Results

Upon booting the VM, go to the console to verify that the VM is booting and utilizing the license file and day zero configuration file that was provided. Follow the verifications steps below:
Power on the VM. 
Go to the Console. Verify that you see the VM license install succeeded message and the subsequent reboot.
Upon completion of the boot sequence, you should notice that the FGT-VM hostname has changed to Example-Day0. Also notice that the license file has been verified and the license registration status has changed to VALID.
Upon login we see that the license is valid when you run get system status

command.

Further we see that ForiGate-VM’s port1, which was configured in DHCP mode, has received an IP from the DHCP server. We are also able to ping fortiguard.net from our newly booted VM. 
You have the option of only providing a license file or a configuration script if you don’t want to provide both options.

The post Config drive with ESX vCenter VMware appeared first on Fortinet Cookbook.

Episode 8: FortiMail

$
0
0

 

Take our FortiCast feedback survey to help us improve the show!

This episode features two discussions about FortiMail. First, Carl Windsor and Brian Schwarzkopf talk about FortiMail and its features. This is followed by a discussion between Carl and Khaled Hassan about different FortiMail deployments.

FortiMail resources

Subscribe to FortiCast

        

The post Episode 8: FortiMail appeared first on Fortinet Cookbook.

Configuring Auto Attendants in FortiVoice Enterprise (Video)

$
0
0

What if you need FortiVoice to answers calls and direct users to various departments within your office? An auto attendant can answer calls with a prerecorded message and then guide the user to the department they desire with a simple press of a button.

The following video that guides you through the process of configuring an auto attendant in FortiVoice Enterprise.

The post Configuring Auto Attendants in FortiVoice Enterprise (Video) appeared first on Fortinet Cookbook.

Cookbook Annual Report for 2016

Configuring Alert Emails in FortiVoice Enterprise (Video)

Deploying FortiAnalyzer-VM in AWS

$
0
0

In this recipe, you will deploy FortiAnalyzer-VM in Amazon Web Services (AWS).

This deployment will use an existing FortiAnalyzer template. In order to receive this template, you must contact your account team.

1. Subscribing to FortiAnalyzer-VM

Go to the AWS Marketplace’s page for FortiAnalyzer-VM. Select Continue.  
On the next page, select Manual Launch, then select Accept Software Terms.  
A message appears confirming you subscription.  

2. Uploading the FortiAnalyzer template

Log in to your AWS account and select CloudFormation.

Select Create Stack.

 
On the next page, select Upload a template to Amazon S3 and set it to upload the FortiAnalyzer template provided by your account team.  

Complete the Specify Details form with the values shown.

Select Next.

 
On the Options page, create a Tag for the FortiAnalyzer.  
Review all properties. If they are correct, select Create.

 

3. Logging into the FortiAnalyzer

 

When the deployment is complete, select the Output tab to view your login information.  
To get the public address for the FortiAnalyzer instance, go to EC2 in the AWS Portal.

Browse to the address using HTTPS.  
Use your credentials to log into the FortiAnalyzer.  
A licensing notice appears. Select your desired option.  

4. Results 

The FortiAnalyzer-VM can now be configured.  

The post Deploying FortiAnalyzer-VM in AWS appeared first on Fortinet Cookbook.

Setting up a WiFi bridge with FortiAP (Video)


Configuring a Property Management System in FortiVoice Enterprise

$
0
0

Whether it’s the hospitality industry, commercial property, or local government, managing properties requires a lot of organization and a lot of work. Thankfully, FortiVoice Enterprise can help manage your properties easily and efficiently.

This recipe guides you through the process of connecting the Property Management System (PMS) to the FortiVoice unit. For the purpose of this recipe, we’ll be focusing on the hospitality industry and showing you how to configure hotel management settings, like establishing wake-up calls and configuring hotel room status.

 
 

 Configuring PMS Settings

First we’ll need to configure PMS settings. 

  1. Go to Hotel Management Settings > Setting > PMS.
  2. Select the Enabled box.
  3. Select FortiVoice from the dropdown Protocol menu.
  4. Enter the port number that connects to the PMS.

    Note: You need to use an adapter for the FortiVoice-PMS connection. We recommend using iPocket 232 by Precidia.

  5. Enter the IP address and netmask of the PMS. You can enter multiple trusted hosts if you have multiple property management systems. 
  6. Select Apply.

  

 

 Establishing Hotel Management Options

Now we’ll need to configure management check in and check out actions. 

  1. Go to Hotel Management > Setting > Option.
  2. Select the guest information to make a room check-in ready. Privilege enables phone call restrictions. Guest name displays the room or guest name on the room extension. Room condition clears any condition set for the room.
  3. Set the guest information and room condition to make a room check-out ready. Voice mail clears all voicemail for the room extension and Wake-up call clears all wake-up calls setup for the room extension. 
  4. Select the first item clients select when placing an order from the front desk. For example, if you selected code first and the client wanted two waters (code 4), the client would dial 4*2. 
  5. Select Apply.
  6. Select the Mini Bar Code tab.
  7. Select New.
  8. Enter the item name, for example, Water and then enter the item’s code, for example, 4. 
  9. Select Create.

 

 

 

 Configuring Hotel Room Status

Now that we have the PMS and the FortiVoice unit properly connected, we can configure the hotel room statuses.

To batch-configure hotel room statuses

  1. Go to Hotel Management > Room Status > Room Status.

    A green dot in the top menu bar indicates that the FortiVoice unit is connected with the PMS. 
  2. Select the rooms you wish to edit. A green dot indicates the guest’s room extension is bound with the room.
  3. Select Edit.
  4. Select the Guest Phone checkbox to make the room a guest room.
  5. Select the room status to configure: Checked-out or Checked-in.
  6. Enter the Guest name (if you selected Checked-in) and set their privilege. 
  7. Select DND if the guest does not want to be disturbed and VIP if f they should receive special treatment.
  8. Select OK.

 

  

 

The post Configuring a Property Management System in FortiVoice Enterprise appeared first on Fortinet Cookbook.

Automatic Dialing in FortiVoice Enterprise (Video)

$
0
0

The FortiVoice Enterprise auto dialing system provides a significant time and resource savings for your organization by assisting you when you need to reach multiple contacts quickly and efficiently. 

This recipe guides you through the quick and easy process of setting up your auto dialer and establishing your contact list.

The post Automatic Dialing in FortiVoice Enterprise (Video) appeared first on Fortinet Cookbook.

Configuring Conference Calls in FortiVoice Enterprise

$
0
0

FortiVoice Enterprise features conference call, which allows multiple clients to join a live group discussion. 

This recipe details how to create both an ongoing conference call (static) and a one-time conference call (dynamic).

 
 

 Configuring a Static Conference Call

A static conerference call would be one that may occur on a regular schedule.

To configure a static conference call

  1. Go to Call Features > Conferencing > Conferencing.
  2. Select New.
  3. Select Enabled if not already activated.
  4. Enter an extension number that callers can call and enter the user PIN to join the conference call.
  5. Enter a descriptive name for the conference call extension. For example, HR.
  6. Enter a user PIN, which will be the password clients must enter to join the conference call. A caller needs to dial the conference number and then enter the password.
  7. Enter the Admin PIN, which is the password used by an admin to begin a conference call.
  8. Enable Recursive Schedules if you want conference calls to be on a repeated schedule.  For example, a recursive schedule will make sure that users can only join the conference call during the scheduled time period by entering the configured password.
  9. Enable One Time Schedules if you only want users to have access to a single conference call without the use of passwords.
  10. Select Create.

  

 

 Configuring a Dynamic Conference Call

A dynamoic conference call would be one that is likely to only occur once.

To configure a dynamic conference call

  1. Go to Call Features > Conferencing > Conferencing.
  2. Select New.
  3. Enter the conference call name.
  4. Enter the conference call extension number that callers enter to join the call.
  5. Enter the displayed name that will appear on the call extension, such as HR.
  6. Enable Quite mode if you don’t want the call to announce and record the participant’s name. 
  7. Select Create.
  8. Select your newly created conference call.
  9. enter the extension number that callers can call and enter their user PIN.
  10. Double-click the date to schedule an event and select OK.

 

 

 

 

The post Configuring Conference Calls in FortiVoice Enterprise appeared first on Fortinet Cookbook.

Episode 9: Wireless Controller

FortiManager: Exporting a Policy Package from one FortiManager to Another

$
0
0

In this example, you will learn how to export a policy package from one FortiManager to another FortiManager.

1. Select a FortiManager Policy Package and Installation Target you want to export

Select a FortiManager Policy Package and its installation target.

For example, 

Policy Package PP_001
Installation Target Device1

2. Download the Latest Revision

  1. Go to Device Manager > Device & Groups > double-click the Installation Target Device.
  2. Go to System: Dashboard > Configuration and Installation Status > Total Revisions
  3. Download the latest revision.
    For example, Revision 1.

For example,

  1. Go to Device Manager > Device & Groups > double-click Device1
  2. System: Dashboard > Configuration and Installation Status > Total Revisions.

3. Add Device to the second FortiManager

    1. Go to your second FortiManager.
    2. Go to Device Manager > Device & Groups > click Add Device. The Add Device wizard is displayed.
      Its SN must be similar to the one you got the revision from. It can be the same as the original SN or you can take the SN prefix (the first six characters) and append 10 digits to it.
    3. Select Add Model Device and complete the wizard.

    For example, FG200D12345985242 is the original SN.

    Prefix FG200D
    Appended 10 Digits 0000000001

     

    The new SN will be: FG200D0000000001. 

    4. Import the Revision to the second FortiManager

    1. On your second FortiManager device, go to Device Manager > Device & Groups and double-click the Model Device. The Device Dashboard is displayed.
    2. Go to System: Dashboard > Configuration and Installation Status > Total Revisions
    3. Right-click the empty revision list, and select Import Revision > Revision 1
    4. Go to Device Manager > Device & Groups.
    5. Right-click your Model Device and select Import Policy. The wizard is displayed.
    6. Complete the wizard. 
    7. Go to Policy & Objects. The policy package and its used objects will be displayed.

    For further FortiManager information, refer to the FortiManager Administration Guides available on the Fortinet Document Library.

    The post FortiManager: Exporting a Policy Package from one FortiManager to Another appeared first on Fortinet Cookbook.

    Viewing all 690 articles
    Browse latest View live