Quantcast
Channel: Fortinet Cookbook
Viewing all 690 articles
Browse latest View live

Managing FortiSwitches with a FortiGate (5.4)

$
0
0

Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs and configure port information. The connection between the FortiSwitch and the FortiGate is called a FortiLink.

Prerequisites

  1. Connect a cable from any FortiSwitch port to an unused internal port on the FortiGate. 
    1. If necessary, enable the port for FortiLink auto-discovery (using the FortiSwitch  CLI).
      -> In general, the last four copper ports on the FortiSwitch are enabled for auto-detect by default. Refer to the documents below for specific details.
  2. You may need to enable the Switch Controller using the FortiGate web-based manager.
    1. Go to System > Config > Features.
    2. Turn on the WiFi & Switch Controller feature.
    3. Select Apply.
  3. This recipe is applicable to FortiSwitchOS 3.3.0 and above.  

Procedure

From the FortiGate web-based manager:

  1. Go to System > Network > Interfaces and edit the new FortiLink port.
  2. Set Addressing mode to Dedicate to Extension Device.
  3. Select OK.
  4. Go to WiFi & Switch Controller > Managed Devices > Managed FortiSwitch
    -> This page displays the faceplate for each managed FortiSwitch. The FortiLink for the new managed switch will display as a dashed line (FortiLink connection not established).
    -> After a short delay (while FortiGate sets up the connection),  the FortiLink displays as a solid line (FortiLink established). For smaller FortiSwitch models, such as FS-108D-POE, the delay may be up to 3 minutes.  

Notes

  1. In FortiOS 5.4, new FortiLink features include:
    1. POE configuration from the FortiGate.
    2. Link Aggregation Group (LAG) support for Fortilink.
    3. Auto-detect the switch FortiLink ports
    4. Improved user interface for Managed FortiSwitches, switch ports and VLANs. 
  2. Refer to the document below to see the FortiSwitch and FortiGate models that support FortiLink.

For additional information, see Managing FortiSwitch with a FortiGate (FortiOS 5.4), which is also available in the FortiOS 5.4 Handbook.

The post Managing FortiSwitches with a FortiGate (5.4) appeared first on Fortinet Cookbook.


SSL VPN using web and tunnel mode

$
0
0

In this example, you will allow remote users to access the corporate network using an SSL VPN, connecting either by web mode or tunnel mode and with FortiClient. This allows users to access network resources, such as the Internal Segmentation Firewall (ISFW) used in this example.

For users connecting via tunnel mode, traffic to the Internet will also flow through the FortiGate, to apply security scanning to this traffic.

During the connecting phase, the FortiGate will also verify that the remote user’s antivirus software is installed and up-to-date.

1. Creating a user and a user group

Go to User & Device User Definition. Create a local user account for a SSL VPN user.

 
   
   
   

Go to User & Device > User Groups. Create a user group for SSL VPN users and add the new user account.

 

2. Creating an SSL VPN portal for remote users

Go to VPN > SSL-VPN Portals. Edit the full-access portal. The full-access portal allows the use of tunnel mode and/or web mode.

Make sure Enable Split Tunneling is not selected, so that all Internet traffic will go through the FortiGate.

Set Source IP Pools to use the default IP range SSLVPN_TUNNEL-ADDR1.

 

Under Predefined Bookmarks, select create new to add a new bookmark. Bookmarks are used as links to internal network resources.

In the example, a bookmark is added to connect to a FortiGate being used as an ISFW, which can be accessed at https://192.168.200.111.

 

3. Configuring the SSL VPN tunnel

Go to VPN > SSL-VPN Settings and set Listen on Interface(s) to wan1.

To avoid port conflicts, set Listen on Port to 10443. Set Restrict Access to Allow access from any host.

In the example, the Fortinet_Factory certificate is used as the Server Certificate. It is, however, recommended that you purchase a certificate for your domain and upload it for use with an SSL VPN.

Under Tunnel Mode Client Settings, set IP Ranges to use the default IP range SSLVPN_TUNNEL-ADDR1.


 

Under Authentication/Portal Mapping, add the SSL VPN user group and map it to the full-access portal.

If necessary, map a portal for All Other Users/Groups.

 

4. Adding an address for the local network

Go to Policy & Objects > Addresses.

Add the address for the local network. Set Type to IP/Netmark, Subnet/IP Range to the local subnet, and Interface to an internal port.

 

5. Adding security policies for access to the internal network and Internet

Go to Policy & Objects > IPv4 Policy. Add a security policy allowing access to the internal network through the VPN tunnel interface. Set a policy name that will identify what this policy is used for (in the example, SSL-VPN-internal)

Set Incoming Interface to ssl.root and Outgoing Interface to the local network interface. Select Source and set Address to all and Source User to the SSL-VPN user group. Set Destination Address to the local network address, Service to ALL, and enable NAT.

Configure any remaining firewall and security options as desired.

 

Add a second security policy allowing SSL VPN access to the Internet.

For this policy, Incoming Interface is set to ssl.root, Outgoing Interface is set to wan1, and Destination is set to all.


 

6. Setting the FortiGate unit to verify users have current AntiVirus software

Go to the Dashboard. In the CLI Console widget, enter the following commands to enable the host to check for compliant AntiVirus software on the remote user’s computer:

config vpn ssl web portal
  edit full-access
    set host-check av
  end

7. Results

Web mode:

Using a supported Internet browser, connect to the SSL VPN web portal using the remote gateway configured in the SSL VPN settings (in the example, 172.20.121.46:10443)

Use the SSL VPN user’s credentials to authenticate.

 

The web portal appears.

 
In this example, selecting the ISFW Bookmark allows you to connect to the ISFW FortiGate.  
To connect to the Internet, select Quick Connection. Select HTTP/HTTPS, then enter the URL and select Launch.  
The website will launch.  
You can also use the Quick Connection for other allowed types of traffic, such as SSH.  

An SSH connection will open in your browser, connecting to the requested Host.

Java is required for an SSH connection.

On the FortiGate, go to Monitor > SSL-VPN Monitor. The user is connected to the VPN.  

Tunnel mode:

If you have not done so already, download FortiClient from www.forticlient.com.

Open the FortiClient Console and go to Remote Access. Add a new connection.

Set VPN Type to SSL VPN, set Remote Gateway to the IP of the listening FortiGate interface (in the example, 172.20.121.46). Select Customize Port and set it to 10443.

Select Add.

 
Connect to the VPN using the SSL VPN user’s credentials.
 
You are able to connect to the VPN tunnel.  
On the FortiGate, go to Monitor > SSL-VPN Monitor. The user is connected to the VPN.  

 

 

If you do select Enable Split Tunneling, traffic not intended for the corporate network will not flow through the FortiGate or be subject to the corporate security profiles. You will also have to set your corporate network’s address as the Routing Address.

The post SSL VPN using web and tunnel mode appeared first on Fortinet Cookbook.

IPsec VPN for Windows Phone 10

$
0
0

In this recipe, you will learn how to create an IPsec VPN on a FortiGate, and connect to it using a Windows Phone 10.

Using the IPsec Wizard, you will create an IPsec VPN tunnel that allows users of Windows devices to securely access an internal network, as well as browse the Internet through the VPN tunnel. You will then add a VPN connection using valid user credentials on a Windows Phone 10, and connect to the IPsec VPN.

This recipe assumes that a user called “dprince” and a user group called “WinPhone_Users have already been created. Access to the VPN is controlled by a pre-shared key, and requires users to supply a user name and password.

A Windows Phone 10 Lumia 930 running build 10581 was used for this configuration.

1. Configuring the IPsec VPN using the IPsec VPN Wizard

Go to VPN > IPSec Wizard, and you will be taken to the VPN Creation Wizard.

Name the VPN connection (in the example, WinPhoneVPN).

Select the Remote Access template, select the Windows Native device type, and select Next.

Set the Incoming Interface to the internet-facing interface (wan1).

Select the Pre-shared Key authentication method and enter a pre-shared key.

Select the user group created earlier and select Next.

Set Local Interface to the internal interface and set Local Address to all.

Enter an IP address range for VPN users in the Client Address Range field, enter a Subnet Mask, and select Create.

Make sure no other interfaces on the FortiGate are using the same address range.

The IPsec VPN Wizard finishes with a summary of created objects.
Go to Policy & Objects > Policy > IPv4 and confirm that the wizard has created two policies: one policy for remote users to access the VPN, and one policy that has Service set to L2TP.

2. Connecting to the IPsec VPN from the Windows 10 Phone

On the Windows Phone 10, go to Settings > Network & wireless > VPN and select Add a VPN connection.

Enter a Connection name and set the Server name or address to the FortiGate’s IP address of the Internet facing interface.

Set VPN type to Automatic and enter the pre-shared key — this key is the same one you added to the FortiGate.

Select Save.

3. Results

You will now connect to the IPsec VPN tunnel. From the VPN screen, select TheOffice.

Sign in and connect using dprince‘s credentials.

You should now be connected to the IPsec VPN.

To verify the connection, on the FortiGate, go to Log & Report > VPN Events.
You may also verify the user’s connection by going to FortiView > VPN.

 

The post IPsec VPN for Windows Phone 10 appeared first on Fortinet Cookbook.

Article 0

802.1X with VLAN Switch interfaces on a FortiGate

$
0
0

This recipe follows on from the general introductory video, Managing FortiSwitch from FortiGate, which uses the FortiLink protocol.

Using 802.1X with VLAN Switch interfaces on the FortiGate secures the network at the switch port by requesting a connecting user to authenticate. In most deployments the user database will be external to the FortiGate.

This example uses FortiAuthenticator for the RADIUS authentication server, however the example is generic enough to be adapted to any authentication server supported by the FortiGate and the EAP protocol. Also this example can be adapted for other products which make use of 802.1X, such as wireless access points.

In this example we will configure EAP-TTLS.

There are three elements to be configured:

  • The supplicant, which identifies the client, in this case a Ubuntu host.
  • The authenticator, which translates EAP to RADIUS messages, and vice-versa. This is the FortiGate switch controller.
  • The authentication server, which processes the RADIUS messages. This is the FortiAuthenticator.

The topology is as shown:flink-802_1X-ext

1. Configuring a CA

In this example we configure EAP-TTLS which requires, as a minimum, server certificate validation. To do this we use FortiAuthenticator, we create a CA root, self signed, and a service certificate for the authentication server. The supplicant requires access to the CA certificate in order to validate the server authentication.

On FortiAuthenticator, go to Certificate Management > Certificate Authorities > Local CAs and create a new Local CA. Enter a Certificate ID and Name (CN). Leave all other settings default.

This creates a root CA certificate that is self signed. This certificate must be copied to the supplicant.

myCA

Go to Certificate Management > End Entities > Local Services and create a new service. Enter a Certificate ID, Issuer (your local CA), and Name (CN). Leave all other settings default.

This creates a certificate for the authentication server.

myCert

2. Configuring RADIUS authentication

The FortiAuthenticator will be the RADIUS sever and the FortiGate the RADIUS client.

On the FortiAuthenticator, go to Authentication > RADIUS Service > Clients and create a new client. Enter the Name, Client name/IP, and shared Secret. For Realms, use the local user realm and set EAP types to use EAP-TTLS.

radius-client-settings

Go to Authentication > User Management > Local Users and create a local user and password.

This is your user account for 802.1X authentication.

user
Go to Authentication > RADIUS Service > EAP and select the local CA and local service certificates for the server’s authentication. eap-cert
On the FortiGate, go to User & Device > RADIUS Servers and create a new server connection. Enter Name, Primary Server IP/Name, and Primary Server Secret. fgt_radius

Go to WiFi & Switch Controller > VLANs

Modify your VLAN and change the admission control authentication method to RADIUS, and select you RADIUS server.

(This example follows on from the local user configuration, given in the video.)

 admission-control

Test the RADIUS configuration from the the FortiGate CLI:

# diagnose test authserver radius myRADIUS mschap2 mike@local mypassword authenticate 'mike@local' against 'mschap2' succeeded, server=primary assigned_rad_session_id=790684157 session_timeout=0 secs idle_timeout=0 secs!

3. Configure the supplicant and test

We will configure the 802.1X supplicant settings on the wired interface of our Ubuntu host. Use the settings in the following screenshot to test your connection.
Edit your wired connection and select 802.1X security. Chose Tunneled TLS (TTLS), your CA certificate, MSCAPv2 for Inner authentication, and the Username. supplicant-settings

4. Results

Check FortiAuthenticator’s log messages, look for 802.1x authentication successful. log-message
Using ifconfig, you should see that you have been allocated an address from the DHCP server. ifconfig
If this does not work, check again the RADIUS client works using the testauth command. If that is ok, check your certificates, paying attention to the valid from date and time.

diag1

ca

The post 802.1X with VLAN Switch interfaces on a FortiGate appeared first on Fortinet Cookbook.

Assigning WiFi users to VLANs dynamically

$
0
0

Virtual LANs (VLANs) are used to assign wireless users to different networks without requiring the use of multiple SSIDs. Each user’s VLAN assignment is stored in the user database of the RADIUS server that authenticates the users.
This example creates dynamic VLANs for the Techdoc and Marketing departments. The RADIUS server is a FortiAuthenticator.

1. Configure the FortiAuthenticator

Go to Authentication > RADIUS Service > Clients to register the FortiGate as a client.
Enter a Secret (a password) and remember it. It will also be used in the FortiGate configuration.
fac-reg-fgt
Go to Authentication > User Management > Local Users and create local user accounts as needed. fac-user
For each user, add these RADIUS attributes which specify the VLAN information to be sent to the FortiGate.
Tunnel-Private-Group-Id specifies the VLAN ID.
In this example, jsmith is assigned VLAN 100 and twhite is assigned VLAN 200.
fac-user-radius-attr

2. Add the RADIUS server to the FortiGate configuration

 Go to User & Device > RADIUS Servers. Select Create New.
Enter the FortiAuthenticator IP address and the server secret that you entered on the FortiAuthenticator. Optionally, you can click Test Connectivity. Enter a RADIUS user’s ID and password. The result should be “Successful”.

radius

 3. Create an SSID with dynamic VLAN assignment

Go to WiFi Controller > SSID. Create a new SSID. ssid-basic
Set up DHCP service. ssid-dhcp
Select WPA2 Enterprise security and select your RADIUS server for authentication.
Set the default VLAN ID to 10. This VLAN is used when RADIUS doesn’t assign a VLAN.
ssid-security
Go to the Dashboard and use the CLI Console to enable dynamic VLANs on the SSID. config wireless-controller vap
  edit example-wifi
    set dynamic-vlan enable
  end

4. Create the VLAN interfaces

Go to Network > Interfaces.

Create the VLAN interface for default VLAN-10 and set up DHCP service.

vlan10

Create the VLAN interface for marketing-100 and set up DHCP service.

vlan100
Create the VLAN interface for techdoc-200 and set up DHCP service. vlan200

5. Create security policies

Go to Policy & Objects > IPv4 Policy.
Create a policy that allows outbound traffic from marketing-100 to the Internet. 
policy-100
In Logging Options, enable logging for all sessions. log-options

Create a policy that allows outbound traffic from techdoc-200 to the Internet.

For this policy too, in Logging Options enable logging for all sessions.

policy-200

6. Create the FortiAP Profile

Go to WiFi Controller > FortiAP Profiles.

Create a new profile for your FortiAP model and select the new SSID for both Radio 1 and Radio 2.

fap-profile

7. Connect and authorize the FortiAP

Go to Network > Interfaces and choose an unused interface.
Set Addressing mode to Dedicated to Extension Device.
Connect the FortiAP unit to the this interface and apply power.

Go to WiFi Controller > Managed FortiAPs.
Right-click on the FortiAP unit. Select Authorize.
Right-click on the FortiAP unit again. Select Assign Profile and select the FortiAP profile that you created.
auth-fap

Results

The SSID will appear in the list of available wireless networks on the users’ devices.
Both twhite and jsmith can connect to the SSID with their credentials and access the Internet.
(If a certificate warning message appears, accept the certificate.)

Go to Log & Report > Forward Traffic.

Note that traffic for jsmith and twhite pass through
different policies.

(The column selections were customized for clarity.)

The security policies could be made different so that Marketing and Techdoc departments were allowed different access, but didn’t think that was fair.

log

 

The post Assigning WiFi users to VLANs dynamically appeared first on Fortinet Cookbook.

WiFi RADIUS authentication with FortiAuthenticator

$
0
0

In this example, you use a RADIUS server to authenticate your WiFi clients.
The RADIUS server is a FortiAuthenticator (v4.00-build0008) that is used authenticate users who belong to the employees user group.

1. Create the user accounts and user group on the FortiAuthenticator

Go to Authentication > User Management > Local Users and create a user account.

User Role settings are available after you click OK.

Create additional user accounts as needed, one for each employee.

user_def_fac
 Go to Authentication > User Management > User Groups and create the local user group “employees” on the FortiAuthenticator.  usergroup_fac

2. Register the FortiGate as a RADIUS client on the FortiAuthenticator

 Go to Authentication > RADIUS Service > Clients and create a client account.

Enable all of the EAP types.

reg_fgt_on_fac

3. Configure FortiGate to use the RADIUS server

Go to User & Device > RADIUS Servers and add the FortiAuthenticator as a RADIUS server. fgt_radius

4. Create the SSID and set up authentication

Go to WiFi Controller > SSID and define your wireless network.  ssid-basic
Set up DHCP for your clients.

ssid-dhcp

Configure WPA2 Enterprise security that uses the RADIUS server. ssid-security

5. Connect and authorize the FortiAP

Go to Network > Interfaces and configure a dedicated interface for the FortiAP. fap-interface
Connect the FortiAP unit. Go to WiFi Controller > Managed FortiAPs. fap-discover
When the FortiAP is listed, select and authorize it. fap-authorize

Go to WiFi Controller > FortiAP Profiles and edit the profile.

This example used a FortiAP-221C, so the FAP221C-default profile applies.

For each radio:

  • Enable Radio Resource Provision.
  • Select your SSID.
fap-profile

6. Create the security policy

Go to Policy & Objects > IPv4 Policy and add a policy that allows WiFi users to access the Internet. internet-policy

Results

Connect to the example-staff network and browse Internet sites.

Go to Monitor > Client Monitor to see that clients connect and authenticate.

client-monitor

 

The post WiFi RADIUS authentication with FortiAuthenticator appeared first on Fortinet Cookbook.

Extending WiFi range with mesh topology

$
0
0

In this example, a second FortiAP are used to extend the range of a WiFi network. The second FortiAP is connected to the FortiGate WiFi controller through a dedicated WiFi backhaul network.

In this example, both FortiAPs provide the example-staff network to clients that are in range.

More mesh-connected FortiAPs could be added to further expand the coverage range of the network. Each AP must be within range of at least one other FortiAP. Mesh operation requires FortiAP models with two radios, such as the FortiAP-221C units used here.

Find this recipe for other [glossary_exclude]FortiOS[/glossary_exclude] versions
5.2 | 5.4

1. Create the backhaul SSID

Go to WiFi Controller > SSID.

Create a new SSID. Set Traffic Mode to Mesh Downlink.

You will need the pre-shared key when configuring the mesh-connected FortiAP.

 bkhaul-ssid

2. Create the client SSID

 Go to WiFi Controller > SSID. Create the WiFi network (SSID) that clients will use.  client-ssid
 Configure DHCP for your clients.  client-dhcp

3. Create the FortiAP Profile

Go to WiFi Controller > FortiAP Profiles and create a profile for the Platform (FortiAP model) that you are using.

Configure Radio 1 for the client channel on the 2.4GHz 802.11n/g Band.

Configure Radio 2 for the backhaul channel on the 5GHz 802.11ac/n Band.

 ap-profile

4. Configure the security policy

 Go to Policy & Objects > IPv4 Policy and create a new policy.  policy

5. Configure an interface dedicated to FortiAP

Go to Network > Interfaces and edit an available interface (in this example, port 15). Set Addressing mode to Dedicate to Extension Device. devintf
 

6. Preauthorize FortiAP-1

Go to WiFi Controller > Managed FortiAPs and create a new entry.

Enter the serial number of the FortiAP unit and give it a name. Select the FortiAP profile that you created earlier.

 fap1-preauth

6. Configure FortiAP-2 for mesh operation

Connect FortiAP-2’s Ethernet port to the FortiGate network interface that you configured for FortiAPs.
Go to WiFi Controller > Managed FortiAPs. Click Refresh every 15 seconds until FortiAP-2 is listed. Do not authorize the device. Note the IP address.  AP2-detect

In the CLI Console, enter
exec telnet 192.168.2.4
(your address might be different) to log in to the FortiAP as admin. Enter these commands:

Disconnect FortiAP-2.

cfg -a MESH_AP_TYPE=1
cfg -a MESH_AP_SSID=fortinet.mesh.root
cfg -a MESH_AP_PASSWD=hardtoguess
cfg -c
exit

7. Connect and authorize the FortiAPs

Connect FortiAP-1. Go to WiFi Controller > Managed FortiAPs. Click Refresh every 15 seconds until FortiAP-1 is listed.

 ap1-detect
Power up FortiAP-2. Periodically click Refresh. With a minute or two, Radio 2 of FortiAP-1 will indicate 1 client and FortiAP-2 will be listed as mesh-connected.  AP1+2-detect

Go to WiFi Controller > Managed FortiAPs. Select FortiAP-2 entry (identified by serial number) and edit it. Enter the Name and select the FortiAP Profile that you created earlier.

 AP2-edit

Authorize FortiAP-2. 

Click Refresh to update the display as needed. Within a minute or two, FortiAP-2 will be listed as Online. 

 AP1+AP2-online

Results

Go to Monitor > WiFi Client Monitor. Both backhaul and client SSIDs are shown. Click Refresh as needed to see updated information.

Connect to the network near FortiAP-2. The FortiAP column shows  the client is associated with the mesh-connected FortiAP-2.

 monitor-2

Connect to the network near FortiAP-1. The FortiAP column shows  the client is associated with FortiAP-1.

monitor-1

 

The post Extending WiFi range with mesh topology appeared first on Fortinet Cookbook.


Installing a FortiGate in NAT/Route mode

$
0
0

In this example, you will learn how to connect and configure a new FortiGate unit in NAT/Route mode to securely connect a private network to the Internet.

In NAT/Route mode, a FortiGate unit is installed as a [glossary_exclude]gateway[/glossary_exclude] or router between two networks. In most cases, it is used between a private network and the Internet. This allows the FortiGate to hide the IP addresses of the private network using network address translation (NAT).

Find this recipe for other [glossary_exclude]FortiOS[/glossary_exclude] versions
5.2 | 5.4

1. Connecting the network devices and logging onto the FortiGate

Connect the FortiGate’s Internet-facing interface (typically WAN1) to your ISP-supplied equipment and Connect a PC to the FortiGate using an internal port (typically port 1).

Power on the ISP’s equipment, the FortiGate unit, and the PC on the internal network.

 

From the PC on the internal network, connect to the FortiGate’s web-based manager using either FortiExplorer or an Internet browser (for information about connecting to the web-based manager, please see your models QuickStart Guide).

Login using an admin account (the default admin account has the username admin and no password).

2. Configuring the FortiGate’s interfaces

Go to Network > Interfaces and edit the Internet-facing interface (in the example, wan1).

If your FortiGate is directly connecting to your ISP, set Addressing Mode to Manual and set the IP/Netmask to the public IP address your ISP has provided you with.

 

If you have some ISP equipment between your FortiGate and the Internet (for example, a router), then the wan1 IP will also use a private IP assigned by the ISP equipment. If this equipment uses DHCP, set Addressing Mode to DHCP to get an IP assigned to the interface. 

If the ISP equipment does not use DHCP, your ISP can provide you with the correct private IP to use for the interface.

Edit the lan interface (called internal on some FortiGate models).

Make sure the interface’s Role is set to LAN.

Set Addressing Mode to Manual and set the IP/Netmask to the private IP address you wish to use for the FortiGate.

 

3. Adding a default route

Go to Network > Static Routes and create a new route.

Set Destination to [glossary_exclude]Subnet[/glossary_exclude]Destination IP/Mask to 0.0.0.0/0.0.0.0, the Device to the Internet-facing interface, and the Gateway to the gateway (or default route) provided by your ISP or to the next hop router, depending on your network requirements.

 

4. (Optional) Setting the FortiGate’s DNS servers

The FortiGate unit’s DNS Settings are set to use FortiGuard DNS servers by default, which is sufficient for
most networks. However, if you need to change the DNS servers, go to Network > DNS, select Specify, and add Primary and Secondary servers.
 

5. Creating a policy to allow traffic from the internal network to the Internet

Go to Policy & Objects > IPv4 Policy and create a new policy. Give the policy a Name that indicates that the policy will be for traffic to the Internet (in the example, Internet).

Set the Incoming Interface to the lan interface and the Outgoing Interface to the Internet-facing interface. Set Source, Schedule, and Services as required.

Make sure the Action is set to ACCEPT. Turn on NAT and make sure Use Outgoing Interface Address is selected.

 
Scroll down to view the Logging Options. In order to view the results later, enable Log Allowed Traffic and select All Sessions.  

5. Results

You can now browse the Internet using any computer that connects to the FortiGate’s [glossary_exclude]internal interface[/glossary_exclude].

You can view information about the traffic being processed by your FortiGate by going to FortiView > All Sessions and selecting the now view.

Select Add Filter and filter for Policy, selecting the name of your new policy. Only traffic flowing through the new policy is displayed.

 

 

This destination type allows you to input a numeric IP address or subnet.
A default route always has a Destination IP/Mask of 0.0.0.0/0.0.0.0. Normally, you would have only one default route. If the static route list already contains a default route, you can
edit it or delete it and add a new one.
Some FortiGate models include an IPv4 security policy in the default configuration. If you have one of these models, edit it to include the logging options shown below, then proceed to the results section.

The post Installing a FortiGate in NAT/Route mode appeared first on Fortinet Cookbook.

Installing a FortiGate in Transparent mode

$
0
0

In this example, you will learn how to connect and configure a new FortiGate unit in Transparent mode to securely connect a private network to the Internet.

Transparent mode is used if you want to apply security scanning to traffic without applying routing or network address translation (NAT), such as when a FortiGate is used as an Internal Segmentation Firewall (ISFW).

Find this recipe for other [glossary_exclude]FortiOS[/glossary_exclude] versions
5.2 | 5.4

1. Changing the FortiGate’s operation mode

From the PC on the internal network, connect to the FortiGate’s web-based manager using either FortiExplorer or an Internet browser (for information about connecting to the web-based manager, please see your models QuickStart Guide).

Login using an admin account (the default admin account has the username admin and no password).

 

Go to the Dashboard and enter the following command into the CLI console widget, substituting your own IP addresses where necessary:

config system settings
  set opmode transparent
  set manageip 192.168.200.111 255.255.255.0
  set gateway 192.168.200.99
end

You can now access the FortiGate using the new Management IP address (in the example, [glossary_exclude]https[/glossary_exclude]://192.168.200.111).

Go to the Dashboard. The System Information widget shows the Operation Mode is Transparent.

 

 

2. (Optional) Setting the FortiGate’s DNS servers

The FortiGate unit’s DNS Settings are set to use FortiGuard DNS servers by default, which is sufficient for
most networks. However, if you need to change the DNS servers, go to Network > DNS, select Specify, and add Primary and Secondary DNS servers.

 

3. Creating a policy to allow traffic from the internal network to the Internet

Go to Policy & Objects > IPv4 Policy and create a new policy. Give the policy a Name that indicates that the policy will be for traffic to the Internet (in the example, Internet).

Set the Incoming Interface to the internal interface (called internal on some FortiGate models) and the Outgoing Interface to the Internet-facing interface (typically wan1). Set Source, Schedule, and Services as required.

Make sure the Action is set to ACCEPT.

 

Scroll down to view the Logging Options. In order to view the results later, enable Log Allowed Traffic and select All Sessions.

 

4. Connecting the network devices

Go to the Dashboard and locate the System Resources widget. Select Shutdown to power off the FortiGate unit.

Alternatively, you can enter the following command in the CLI Console:

execute shutdown

Wait until all the lights, except for the power light, on your FortiGate have turned off. If your FortiGate has a power button, use it to turn the unit off. Otherwise, unplug the unit.

You can now connect the FortiGate unit between the internal network and the router.

Connect the wan1 interface to the router [glossary_exclude]internal interface[/glossary_exclude] and connect the internal network to the FortiGate [glossary_exclude]internal interface[/glossary_exclude] port.

 

Power on the FortiGate unit.

5. Results

You can now browse the Internet using any computer that connects to the FortiGate’s [glossary_exclude]internal interface[/glossary_exclude].

You can view information about the traffic being processed by your FortiGate by going to FortiView > All Sessions and selecting the now view.

Select Add Filter and filter for Policy, selecting the name of your new policy. Only traffic flowing through the new policy is displayed.

 

 

Some FortiGate models include an IPv4 security policy in the default configuration. If you have one of these models, edit it to include the logging options shown below, then proceed to the results section.

The post Installing a FortiGate in Transparent mode appeared first on Fortinet Cookbook.

VDOM configuration

$
0
0

This example illustrates how to use virtual domains (VDOMs) to host multiple FortiOS instances on a single FortiGate.

In this example, two companies (called Company A and Company B) use the same FortiGate but have different Internet service providers (ISPs). To provide both departments with network and Internet connectivity, each company has its own VDOM (called VDOM-A and VDOM-B) that are managed independently.

The root VDOM will be used to manage the FortiGate’s global settings.

1. Switching to VDOM mode and creating two VDOMs

Connect a PC to FortiGate using an Ethernet cable, as described in your model’s QuickStart Guide.

Log in using the admin account (the default admin account has the username admin and no password).

 

Go to the Dashboard and locate the System Information widget. Find Virtual Domain and select Enable.

You will be required to re-login after enabling virtual domains because the GUI menu options change.

 

Certain FortiGate models will not show the above option in the System Information widget. For these models, go to the Dashboard and enter the following command in the CLI Console:

config system global
 set vdom-admin enable
end

Enter y when you are asked if you want to continue.

You will be required to re-login to the GUI after enabling virtual domains because the GUI menu options change.

Make sure that Global is selected from dropdown menu located in the top-left corner. This allows you to make changes to the global configuration.

 

Go to System > VDOM and create two VDOMs: VDOM-A and VDOM-B.

In this example, the Inspection Mode is set to Proxy for VDOM-A. This will allow this VDOM to use both proxy and flow-based security scanning.

The Inspection Mode for VDOM-B is set to Flow-based, so only flow-based security scanning is available.  

2. Configuring the root VDOM for FortiGate management

Go to Network > Interfaces. By default, all interfaces are in the root VDOM.

Edit the interface you wish to use to manage the FortiGate (in the example, mgmt). If you wish to use this interface exclusively for FortiGate management, you can enable Dedicated Management Port.

Set Administrative Access to HTTPS, PING, and SSH.

Go to System > Administrators and edit the admin account.

Select Change Password to add a password to this account.

Enable Restrict login to trusted hosts and add the IP/Netmask of the admin PC. This ensures that the admin must login using the admin PC to be able to manage the FortiGate.


 

3. Adding interfaces to VDOM-A

In this example, two interfaces will be added to VDOM-A: one for Internet access and one for use by the local network.

If an interface is used in an existing FortiGate configuration, its VDOM assignment cannot be changed. Because some FortiGate models have a default configuration, you may need to delete existing policies and routes in order to add a particular interface.

Go to Network > Interfaces and edit the interface that VDOM-A will use for Internet access (in the example, wan1). 

Set Virtual Domain to VDOM-A and Role to WAN.

If your FortiGate is directly connecting to your ISP, set Addressing Mode to Manual and set the IP/Netmask to the public IP address your ISP has provided you with (in the example, 172.20.121.46/255.255.255.0).

 

If you have some ISP equipment between your FortiGate and the Internet (for example, a router), then the wan1 IP will also use a private IP assigned by the ISP equipment. If this equipment uses DHCP, set Addressing Mode to DHCP to get an IP assigned to the interface. 

If the ISP equipment does not use DHCP, your ISP can provide you with the correct private IP to use for the interface.

Go to Network > Interfaces and edit the interface that will be connected to VDOM-A’s internal network (in the example, port1).

Set Virtual Domain to VDOM-A and Role to LAN.

Set Addressing Mode to Manual, assign an IP/Network Mask to the interface (in the example, 192.168.100.1/255.255.255.0), set Administrative Access to HTTPS, PING, and SSH.

 

4. Adding interfaces to VDOM-B

In this example, multiple interfaces will be added to VDOM-B: one for Internet access and four additional interfaces for use by the internal network. These four interfaces will be combined into a hardware switch interface called LAN-B, which the FortiGate treats as a single interface. This example also adds a DHCP server to LAN-B to provide IP addresses for the VDOM-B’s internal network.

Go to Network > Interfaces and edit the interface that VDOM-B will use for Internet access (in the example, wan2).

Set Virtual Domain to VDOM-B and Role to WAN. Set an appropriate Addressing Mode and IP/Netmask (in the example, 172.20.120.100/255.255.255.0).

 

Go to Network > Interfaces and edit a physical interface that will be used by VDOM-B’s internal network (in the example, port5).

Set Virtual Domain to VDOM-B and Role to LAN.

Repeat this process for any other physical interfaces that will be used by VDOM-B (in the example, port6, port7, and port8).

 

Go to Network > Interfaces and create a new interface to be used by VDOM-B’s internal network, called LAN-B.

Set Type to Hardware Switch and Virtual Domain to VDOM-B. Add VDOM-B’s physical interfaces as Physical Interface Members. Set Role to LAN.

Set Addressing Mode to Manual, assign an IP/Network Mask to the interface (in the example, 192.168.200.1/255.255.255.0), set Administrative Access to HTTPS, PING, and SSH and enable DHCP Server.

 

5. Adding administrators to each VDOM

Go to System > Administrators. Create an administrator for VDOM-A, called admin-a.

This administrator will be able to access and configure VDOM-A, without accessing either the root VDOM or VDOM-B. The account will also not be able to affect global settings.

Enter and confirm a Password. Set Type to Local User and Administrator Profile to prof_admin. Remove the root VDOM from the Virtual Domains list, then add VDOM-A.

 

Create an administrator that can access VDOM-B, called admin-b.

Enter and confirm a Password. Set Type to Local User and Administrator Profile to prof_admin. Remove the root VDOM from the Virtual Domains list, then add VDOM-B.

 

6. Configuring VDOM-A

Access VDOM-A‘s configuration using the dropdown menu and go to Network > Static Routes to add a default route.

Set Destination to [glossary_exclude]Subnet[/glossary_exclude]Destination IP/Mask to 0.0.0.0/0.0.0.0, the Device to the Internet-facing interface, and the Gateway to the gateway (or default route) provided by your ISP or to the next hop router, depending on your network requirements.

 

Go to Policy & Objects > IPv4 Policies and create a new policy to allow Internet access for VDOM-A. Give the policy a Name that indicates that the policy will be for traffic to the Internet (in the example, Internet-VDOM-A).

Set Incoming Interface to port1, Outgoing Interface to wan1, Source to all, Destination Address to all, and Service to ALL. Make sure NAT is enabled.

Because this VDOM uses proxy inspection, you can enable a variety of security profiles that use either proxy or flow-based inspection.

For testing purposes, under Logging Options, enable Log Allowed Traffic and select All Sessions.

 

7. Configuring VDOM-B

Access VDOM-B‘s configuration using the dropdown menu and go to Network > Static Routes to add default route.

Set Destination to SubnetDestination IP/Mask to 0.0.0.0/0.0.0.0, the Device to the Internet-facing interface, and the Gateway to the gateway (or default route) provided by your ISP or to the next hop router, depending on your network requirements.

 

Go to Policy & Objects > IPv4 Policies and create a new policy to allow Internet access for VDOM-B. Give the policy a Name that indicates that the policy will be for traffic to the Internet (in the example, Internet-VDOM-B).

Set Incoming Interface to LAN-B, Outgoing Interface to wan2, Source to all, Destination Address to all, and Service to ALL. Make sure NAT is enabled.

Because this VDOM uses flow-based inspection, you can only enable security profiles that use flow-based inspection.

For testing purposes, under Logging Options, enable Log Allowed Traffic and select All Sessions.

 

8. Results

Using a PC located on VDOM-A’s internal network, browse to the IP of the LAN-A interface (in the example, https://192.168.100.1).

Login to the VDOM using admin-a‘s credentials. When the GUI loads, only the options for configuration VDOM-A appear.

 

Generate Internet traffic for VDOM-A.

Go to FortiView > Policies and select the now view. You can see traffic flowing through the Internet-VDOM-A policy.

 

Right-click on the policy, then select Drill Down to Details. You can see more information about the traffic.


 

Logout of the VDOM, then attempt to login using the global admin‘s credentials. You will not be able to log in. You can also not log in using admin-b‘s credentials.

 

Using a PC located on VDOM-B’s internet network, browse to the IP of the LAN-B interface (in the example, https://192.168.200.1).

Login to the VDOM using admin-b‘s credentials. When the GUI loads, only the options for configuration VDOM-B appear.

 

Generate Internet traffic for VDOM-B.

Go to FortiView > Policies and select the now view. You can see traffic flowing through the Internet-VDOM-B policy.

 

 

In the example, the interface’s Link Status is Down because nothing is currently connected to the interface.
This destination type allows you to input a numeric IP address or subnet.

The post VDOM configuration appeared first on Fortinet Cookbook.

Creating security policies

$
0
0

In this recipe, you will create and order multiple security policies in the policy table, to apply the appropriate policy to various types of network traffic.

In the example, three IPv4 policies will be configured:

  • Internet: a policy allowing general Internet access to the LAN
  • Mobile: a policy allowing Internet access while applying web filtering for mobile devices
  • Admin: a policy allowing the system administrator’s PC (named SysAdminPC) to have full access

A fourth policy, the default Implicit Deny policy, will also be used.

Find this recipe for other [glossary_exclude]FortiOS[/glossary_exclude] versions
5.2 | 5.4

1. Configuring the Internet policy

Go to Policy & Objects > IPv4 Policy and edit the policy allowing outgoing traffic. Set Name to Internet.

Set Service to HTTP, HTTPS, and DNS.

Ensure that you have enabled NAT. In order to view the results later, enable Log Allowed Traffic and select All Sessions.

 

2. Creating the Mobile policy

Go to Policy & Objects > IPv4 Policy and create a new policy. Set Name to Mobile.

Set Incoming Interface to lan, Source Device Type to Mobile Devices (a custom device group that includes tablets and mobile phones), Outgoing Interface to your Internet-facing interface, and Service to HTTP, HTTPS, and DNS.

Enable NAT.

Under Security Profiles, enable Web Filter and set it to use the default profile. Enable SSL Inspection and and set it to certificate-inspection to allow HTTPS traffic to be inspected. Doing this will enable Proxy Options; set that to use the default profile. 

Enable Log Allowed Traffic and select All Sessions.

 

3. Defining SysAdminPC

Go to User & Device > Custom Devices & Groups and create a new device. This will identify the system administrator’s PC.

Select an approprate Alias, then set the MAC Address. Set the appropriate Device Type.

 

4. Creating the Admin policy

Go to Policy & Objects > IPv4 Policy and create a new policy. Set Name to Admin.

Set Incoming Interface to lan, Source Device Type to SysAdminPC, Outgoing Interface to your Internet-facing interface, and Service to ALL.

Enable NAT. Enable Log Allowed Traffic and select All Sessions.

 

5. Ordering the policy table

Go to Policy & Objects > IPv4 Policy to view the policy table. Select the By Sequence view, which shows the policies in the order that they are used by the FortiGate.

Currently, the policies are arranged in the order they were created.

 

In order to have the correct traffic flowing through each policy, they must be arranged so that the more specific policies are located at the top.

To rearrange the policies, select the column on the far left (in the example, Seq.#) and drag the policy to the desired position, as shown on the right.

 

6. Results

Browse the Internet using the system administrator’s PC, a different PC, and a mobile device.

Go to FortiView > Policies and select the now view. You can see traffic flowing through all three security policies.

 

Right-click on the Admin policy and select Drill Down to Details.

View the Sources tab to confirm that this policy is being used exclusively by SysAdminPC.

 
(Optional) Attempt to make an SSL connection to a web server with all three devices. Only the system administrator’s PC will be able to connect.

 

In this example, a wireless network has already been configured that is in the same subnet as the wired LAN.
Using a device group will automatically enable device identification on the lan interface.

The post Creating security policies appeared first on Fortinet Cookbook.

Why you should use SSL inspection

$
0
0

Most of us are familiar with Hypertext Transfer Protocol Secure (HTTPS) and how it protects a variety of activities on the Internet by applying Secure Sockets Layer (SSL) encryption to the web traffic. 

The benefits of HTTPS are obvious, as encryption keeps your private data safe from prying eyes. However, there are risks associated with its use, since encrypted traffic can be used to get around your normal defenses. 

For example, you might download a file containing a virus during an e-commerce session.  Or you could receive a phishing email containing a seemingly harmless downloader file that, when launched, creates an encrypted session to a command and control (C&C) server and downloads malware onto your computer. Because the sessions in these attacks are encrypted, they might get past your network’s security measures.

To protect your network from these threats, SSL inspection is the key your FortiGate uses to unlock encrypted sessions, see into encrypted packets, find threats, and block them. SSL inspection not only protects you from attacks that use HTTPS, but also from other commonly used SSL-encrypted protocols, such as SMTPS, POP3S, IMAPS, and FTPS.

Full SSL inspection

To make sure that all SSL encrypted content is inspected, you must use full SSL inspection (also known as deep inspection). When full SSL inspection is used, the FortiGate impersonates the recipient of the originating SSL session, then decrypts and inspects the content. The FortiGate then re-encrypts the content, creates a new SSL session between the FortiGate and the recipient by impersonating the sender, and sends the content to the sender.

When the FortiGate re-encrypts the content it uses a certificate stored on the FortiGate. The client must trust this certificate to avoid certificate errors. Whether or not this trust exists depends on the client, which can be the computer’s OS, a browser, or some other application, which will likely maintain it’s own certificate repository. For more information about this, see the recipe Preventing certificate warnings.

There are two deployment methods for full SSL inspection:

1. Multiple Clients Connecting to Multiple Servers:

  • Uses a CA certificate (which can be uploaded using the Certificates menu).
  • Typically applied to outbound policies where destinations are unknown (i.e. normal web traffic).
  • Address and web category whitelists can be configured to bypass SSL inspection.

2. Protecting SSL Server

  • Uses a server certificate (which can be uploaded using the Certificates menu) to protect a single server.
  • Typically used on inbound policies to protect servers available externally through Virtual IPs
  • Since this is typically deployed “outside-in” (clients on the Internet accessing server(s) on the internal side of the FortiGate), server certificates using the public FQDN of the server are often purchased from a commercial Certificate Authority and uploaded to the FortiGate. This avoids client applications generating SSL certificate errors due to certificate mismatch.

More detail is available in the FortiOS Handbook. Also, check the Fortinet Knowledge Base for these technical notes:

SSL certificate inspection

FortiGates also supports a second type of SSL inspection, called SSL certificate inspection. When certificate inspection is used, the FortiGate only inspects the header information of the packets.

Certificate inspection is used to verify the identity of web servers and can be used to make sure that HTTPS protocol isn’t used as a workaround to access sites you have blocked using web filtering.

The only security feature that can be applied using SSL certificate inspection mode is web filtering. However, since only the packet is inspected, this method does not introduce certificate errors and can be a useful alternative to full SSL inspection when web filtering is used.

Troubleshooting

The most common problem with SSL inspection is users receiving SSL errors when the CA certificate is not trusted. This is because by default the FortiGate uses a certificate that is not trusted by the client. There are two ways to fix this:

  1. All users must import the FortiGate’s default certificate into their client applications as a trusted certificate.
  2. Configure the FortiGate to use a certificate that is already trusted by your clients. For example, a certification signed by a CA that your clients already trust.

The first method can be more labor intensive because you have to distribute a certification to all clients. This can also be an ongoing problem as new clients are added to your network. The second method is usually less work but may require paying for a CA. Both of these methods are covered in the recipe Preventing Certificate Warnings.

If you choose to install the certificate on client applications, this can be done with greater ease in a Microsoft Active Directory domain environment by using Group Policy Objects to install the certificate on domain members. Check that the Group Policy has propagated to all computers by opening Internet Explorer on a workstation PC, opening Tools > Internet Options > Content > Certificates >Trusted Root Certification Authorities, and ensuring that the FortiGate’s certificate is present.  

For corporate-owned mobile devices, MDM solutions like AirWatch, MobileIron, or Fiberlink, use Simple Certificate Enrollment Protocol (SCEP) to ease certificate enrollment.

Best practices

Because all traffic needs to be decrypted, inspected, and re-encrypted, using SSL inspection can reduce overall performance of your FortiGate. To make sure you aren’t using too many resources for SSL inspection, do the following:

  • Know your traffic – Know how much traffic is expected and what percent of the traffic is encrypted. You can also limit the number of policies that allow encrypted traffic.
  • Be selective – Use white lists or trim your policy to apply SSL inspection only where it is needed.
  • Use hardware acceleration – FortiGate models with either the CP6 or CPU processor have an SSL/TLS protocol processor for SSL content scanning and SSL acceleration. For more information about this, see the Hardware Acceleration handbook.
  • Test real-world SSL inspection performance yourself – Use the flexibility of FortiGate’s security policy to gradually deploy SSL inspection, rather than enabling it all at once.

The post Why you should use SSL inspection appeared first on Fortinet Cookbook.

IPsec VPN with FortiClient

$
0
0

In this example, you will allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient for Mac OS X, Windows, or Android. Traffic to the Internet will also flow through the FortiGate, to apply security scanning.

In this example, FortiClient 5.4.0.493 for Mac OS X is used.

1. Creating a user group for remote users

Go to User & Device > User Definition. Create a local user account for an IPsec VPN user.

 
   
   
   
Go to User & Device > User Groups. Create a user group for IPsec VPN users and add the new user account.  

2. Adding a firewall address for the local network

Go to Policy & Objects > Addresses and create an address for the local network.

Set Type to IP/Netmark, Subnet/IP Range to the local subnet, and Interface to an internal port.

 

3. Configuring the IPsec VPN using the IPsec VPN Wizard

Go to VPN > IPsec Wizard and create a new tunnel using a pre-existing template.

Name the VPN connection. Set Template to Remote Access, and set Remote Device Type to FortiClient VPN for OS X, Windows, and Android.

 

Set the Incoming Interface to the internet-facing interface and Authentication Method to Pre-shared Key.

Enter a pre-shared key and select the new user group, then click Next.

 

Set Local Interface to an internal interface (in the example, lan) and set Local Address to the local LAN address.

Enter an Client Address Range for VPN users.

Make sure Enable IPv4 Split Tunnel is not selected, so that all Internet traffic will go through the FortiGate.

 

Select Client Options as desired.

 

After you create the tunnel, a summary page appears listing the objects which have been added to the FortiGate’s configuration by the wizard.

 

4. Creating a security policy for access to the Internet

The IPsec wizard automatically created a security policy allowing IPsec VPN users to access the internal network. However, since split tunneling is disabled, another policy must be created to allow users to access the Internet through the FortiGate.

Go to Policy & Objects > IPv4 Policies and create a new policy. Set a policy name that will identify what this policy is used for (in the example, IPsec-VPN-Internet)

Set Incoming Interface to the tunnel interface and Outgoing Interface to wan1. Set Source to the IPsec client address range, Destination Address to all, Service to ALL, and enable NAT.

Configure any remaining firewall and security options as desired.

 

5. Configuring FortiClient

Open FortiClient, go to Remote Access and Add a new connection.

 

Set the Type to IPsec VPN and Remote Gateway to the FortiGate IP address.

Set Authentication Method to Pre-Shared Key and enter the key below.

 

6. Results

On FortiClient, select the VPN, enter the username and password, and select Connect.

 

Once the connection is established, the FortiGate assigns the user an IP address and FortiClient displays the status of the connection, including the IP address, connection duration, and
bytes sent and received.

 

On the FortiGate unit, go to Monitor > IPsec Monitor and verify that the tunnel Status is Up.

The monitor also shows the IP address of the FortiClient user, under Remote Gateway.

 

Browse the Internet, then go to FortiView > Policies and select the now view. You can see traffic flowing through the IPsec-VPN-Internet policy.


 

Right-click on the policy, then select Drill Down to Details. You can see more information about the traffic.

 

 

The tunnel name may not have any spaces in it and should not exceed 13 characters.
The pre-shared key is a credential for the VPN and should differ from the user’s password.
The IP range you enter here prompts FortiOS to create a new firewall object for the VPN tunnel using the name of your tunnel followed by the _range suffix (in the example, IPsec-FCT_range).
If you do select Enable Split Tunneling, traffic not intended for the corporate network will not flow through the FortiGate or be subject to the corporate security profiles.

The post IPsec VPN with FortiClient appeared first on Fortinet Cookbook.

Viewing the FortiGate or FortiExtender Modem List

$
0
0

This article shows how to view the most recent version of the supported modem list for FortiGate or FortiExtender.

These lists depend on the modem database version, not the version of FortiOS used. The examples shown in this article use screenshots from FortiOS 5.4, but they are also accurate for FortiOS 5.2. Any differences are listed with an asterisk, like this:

You can find a list of supported modems in our Fortinet reference manuals:

You can also view the modem lists in the FortiGate interface by enabling either the modem interface or FortiExtender.

Method 1: Viewing the FortiGate/FortiExtender Modem List

A FortiGate 100D running 5.4 (Interim build) was used in this example.

1. Enabling the FortiGate modem interface

The modem configuration is hidden in the FortiGate GUI by default. Enter the CLI commands shown on the right to enable it. 

Log in and out to refresh the GUI page.

 

config system modem
 set status enable
end

2. Viewing the supported modem lists

Go to Network > Modem and select Configure Modem.  
Click the FortiGuard button to get the latest version of the supported modem lists, and then select the plus button to expand either list. 

 

 

Method 2: Viewing the FortiExtender Modem List

After connecting the FortiExtender to the FortiGate using a QuickStart guide, follow the example below. 

A FortiExtender 100B and a FortiGate 100D running a 5.4 (Interim build) were used in this example.

1. Enabling the FortiGate to show FortiExtender configurations

Enable the Control And Provisioning of Wireless Access Points (CAPWAP) on the port which the FortiExtender is connected to. This allows the FortiExtender to communicate with the FortiGate using CAPWAP. Enter the following CLI commands:

 

config system interface
 edit [port]
  append allowaccess capwap
end

The FortiExtender configuration is hidden in the FortiGate GUI by default. Enter the following CLI commands to enable it:

config system global
 set fortiextender enable
 set wireless-controller enable
end
Go to System > Feature Select and enable FortiExtender features.  

2. Authorizing the FortiExtender

Go to Network > FortiExtender and set the Interface Name to the port the FortiExtender is connected to. Select Authorize.

 

 

3. Viewing the supported modem lists

Go to Network > FortiExtender select Configure Settings.

 

Select Supported Modems to go to the supported modem lists.

Click the FortiGuard button to get the latest version of the supported modem lists, and then select the plus button to expand either list.

For further reading, check out Modem in the FortiOS 5.2 Handbook.

<FortiOS 5.2 notes will appear here>
This feature allows you to use the FortiExtender to connect your FortiGate to a 3G/4G Wireless network.
This step is not necessary in FortiOS 5.2.
In FortiOS 5.2, click the Update Now button and then select the triangle button to expand either list.

The post Viewing the FortiGate or FortiExtender Modem List appeared first on Fortinet Cookbook.


Configuring Grandstream to Function as a Peer Gateway

$
0
0

 

This recipe focuses on how to configure Grandstream to function as a peer gateway.

For this recipe we will be using GXW4104 as an example.
 

Configuring the FortiVoice Unit

Before configuring the Grandstream Gateway, you will need to configure the FortiVoice unit 

  1. Go to Trunks > Office Peers > Office Peers.
  2. Select New.
  3. Enter your Grandstream information. Enter the IP in the Remote server textbox and leave the authentication  settings unchecked.
  4. Go to Call Routing > Outbound > Outbound.
  5. Select New.
  6. Create a new Dialed Number Match. In the example to the right all calls with the prefix “5” are forwarded to the PSTN lines connected to the Grandstream gateway. 
  7. Go to Call Routing > Inbound > Inbound. 
  8. Select New.
  9. Add inbound call routing rules for incoming calls on the GXW4104 gateway. 
  10. Open the From Trunk dropdown menu and select the gateway (peer office) as the incoming trunk.
Adding the GXW4104 gateway as a peer office.

Adding the GXW4104 gateway as a peer office.

Adding outbound call routing rules for direct outgoing calls.

Adding outbound call routing rules for direct outgoing calls.

Adding inbound call routing rules for incoming calls.

Adding inbound call routing rules for incoming calls.

Selecting the gateway as the incoming trunk.

Selecting the gateway as the incoming trunk.

 

Configuring the Grandstream GXW4104 Gateway

Now that the FortiVoice unit is properly configured, we can move to configuring grandstream.

  1. Create an account with the FortiVoice IP address as the SIP server.
  2. Go to Accounts > SIP Settings.
  3. Disable the SIP registration.
  4. Add a channel using the account created above.
  5. Configure the channel settings to unconditionally forward calls from the PSTN to the FortiVoice unit.
  6. Set the dialing method to 1 stage.

Verify the incoming call from PSTN side to SIP side.

 
Creating an account.

Creating an account.

Disabling SIP settings.

Disabling SIP settings.

 

The post Configuring Grandstream to Function as a Peer Gateway appeared first on Fortinet Cookbook.

Configuring Auto Provisioning in FortiVoice Enterprise

$
0
0

Auto provisioning makes it easy for you to connect a phone to your FortiVoice unit. This resume guides you through the process of ensuring each FortiFone you connect to your network properly configures.

Auto provision is only available for supported FortiFones.
 
 

Creating a Spreadsheet

Before we begin, open your preferred spreadsheet software and create a new spreadsheet. Include all of the new extensions with the correct MAC addresses of each phone, as shown in the image to the right. 

Your CSV file must have a headline containing the column names User ID, Extension, Display Name, Phone Type, Mac Address, and Phone Profile.

spreadsheet
 

 

Auto Provisioning Internal Extensions

Open the FortiVoice web UI and perform the following steps 

  1. Go to Extension > Extensions > IP Extensions.
  2. Select Import.
  3. Select Choose File and select the previously created CSV file.
  4. Select OK.
  5. Go to Phone System > Advanced Settings > Auto Provisioning.
  6. Select Enabled and configure the server settings for phone configuration.
  7. Connect the phones to the network and turn them on. The FortiVoice unit will discover phones with factory default settings. After auto provisioning, reboot the phones and register with the FortiVoice unit.

Make a test phone call to verify the extension was provisioned successfully.

 ImportAuto Provision

Auto Provisioning External Extensions

To auto provision external extensions

  1. Go to Phone System > Advanced Settings > Auto Provisioning.
  2. Select Enabled and configure the server settings.
  3. Go to Phone System > Advanced Settings > SIP.
  4. Expand the Networks tab.
  5. Enter the external IP address and port number of the FortiVoice unit. 
  6. Go to Extension > Extensions > IP Extensions.
  7. Configure the external extensions with the correct MAC addresses.
  8. Reboot the external phones.

Make a test call to make sure the extensions are successfully provisioned.

 SIP

The post Configuring Auto Provisioning in FortiVoice Enterprise appeared first on Fortinet Cookbook.

Connecting Multiple FortiFone 870i Phones with FortiVoice Enterprise

$
0
0

This recipe guides you through the process of connecting your FortiFone 870i multi-cell to your FortiVoice Enterprise unit. 

In order for this guide to work you will need to have FVE auto provisioning enabled and the latest FortiFone 870i firmware and FVE build. 
 

Obtaining the IP Addresses

  1. Reset the primary station
  2. Obtain the IP address of the base using the handset. Press Menu and then “47” to start the Search function.
  3. Check the IP address associated to the MAC address of your station
870i 

 

Configuring the Primary Station

Once you have rebooted the base, log in to the FVE interface.

  1. Go to Status > Phone System > Unassigned Phone. 
  2. Select the MAC address of the intended primary station and select Action and then Assign to 870i device.
  3. Set the station as the primary with chain ID and select Create. 
  4. Go to Phone System > Device > 870i Phone Page.
  5. Select the recently created primary station, select Action, and then select Assign new extension or Apply existing extension.
  6. Configure the extension information and enter Handset ID, which should start with 1. Leave the Base MAC address field empty and select Create. See the example to the right.
  7. Add the next extension as needed using a different handset ID.
  8. Repeat the previous step to add all the handsets (one extension per handset) into the system. Once you’re done, you’ll see all the extensions listed for the primary station.
 
Selecting the 870i device.

Selecting the 870i device.

2

Setting the chain ID

adding extensions to the master station

adding extensions to the master station

configuring the extension information

configuring the extension information

Configuring the Secondary Station

Once you have rebooted the primary station you can begin to provision the secondary station.

Factory reset the intended secondary station and connect it to the network. If the network and the FVE are configured properly, the secondary station will appear under the Unassigned Phone page.

  1. Go to Status > Phone System > Unassigned Phone.
  2. Select the unassigned 870i station and then select Action > Assign to 870i device
  3. Set the base station as secondary and select the primary station from the drop down list.
  4. Remove the temporary extension setting on the secondary station and reboot the station.
 

The post Connecting Multiple FortiFone 870i Phones with FortiVoice Enterprise appeared first on Fortinet Cookbook.

Preventing certificate warnings

$
0
0

In this recipe, you will prevent users from receiving a security certificate warning when your FortiGate applies full SSL inspection to incoming traffic.

When full SSL inspection is used, your FortiGate impersonates the recipient of the originating SSL session, then decrypts and inspects the content. The FortiGate then re-encrypts the content, creates a new SSL session between the FortiGate and the recipient by impersonating the sender, and sends the content to the end user. This is the same process used in “man-in-the-middle” attacks, which is why a user’s device may show a security certificate warning.

For more information about SSL inspection, see Why you should use SSL inspection.

Often, when a user receives a security certificate warning, they simply select Continue without understanding why the error is occurring. To avoid encouraging this habit, you can  prevent the warning from appearing in the first place.

There are two methods for doing this, depending on whether you are using your FortiGate’s default certificate or using a self-signed certificate.

Find this recipe for other [glossary_exclude]FortiOS[/glossary_exclude] versions
5.2 | 5.4

Using the default certificate

All FortiGates have a default certificate that is used for full SSL inspection. This certificate is also used in the default deep-inspection profile. To prevent your users from seeing certificate warnings, you can install this certificate on your users’ devices.

If you have the right environment, you can distribute the certificate and have it installed automatically.

1. Downloading the certificate used for full SSL inspection

Go to Security Profiles > SSL/SSH Inspection. Use the dropdown menu in the top right corner to select deep-inspection, the profile used to apply full SSL inspection.

 

The default FortiGate certificate is listed as the CA Certificate. Select Download Certificate.

 

2. Installing the certificate on the user’s browser

Internet Explorer, Chrome, and Safari (on Windows or Mac OS):

The above browsers use the operating system’s certificate store for Internet browsing. If your users will be using these applications, you must install the certificate into the certificate store for your OS.

If you are using Windows 7/8/10, double-click on the certificate file and select Open. Select Install Certificate to launch the Certificate Import Wizard.

Use the wizard to install the certificate into the Trusted Root Certificate Authorities store. If a security warning appears, select Yes to install the certificate.

 

If you are using Mac OS X, double-click on the certificate file to launch Keychain Access.

Locate the certificate in the Certificates list and select it. Expand Trust and select Always Trust. If necessary, enter the administrative password for your computer to make this change.

 

If you have the right environment, the certificate can be pushed to your users’ devices. However, if Firefox is used, the certificate must be installed on each individual device, using the instructions below.

Firefox (on Windows or Mac OS)

Firefox has its own certificate store. To avoid errors in Firefox, then the certificate must be installed in this store, rather than in the OS.

Go to Tools > Options > Advanced or Firefox > Preferences > Advanced and find the Certificates tab.

Select View Certificates, then select the Authorities list. Import the certificate and set it to be trusted for website identification.

 

3. Results

Before installing the certificate, an error message would appear in the browser when a site that used HTTPS was accessed (the example shows an error message appearing in Firefox).

After you install the certificate, you should not experience a certificate security issue when you browse to sites on which the FortiGate unit performs SSL content inspection.

If you view information about the connection, you will see that it is verified by Fortinet.

 

Using a self-signed certificate

In this method, a self-signed certificate is created using OpenSSL. This certificate will then be installed on the FortiGate for use with SSL inspection.

In this recipe, OpenSSL for Windows version 0.9.8h-1 is used.

1. Creating a certificate with OpenSSL

If necessary, download and install Open SSL. Make sure that the file openssl.cnf is located in the BIN folder for OpenSSL.

Using Command Prompt (CMD), navigate to the BIN folder (in the example, the command is cd c:\OpenSSL\openssl-0.9.8h-1-1bin\bin.

Generate an RSA key with the following command:

OpenSSL genrsa -aes256 -out fgcaprivkey.pem 2048 -config openssl cnf

This RSA key uses AES 256 encryption and a 2058-bit key.

When prompted, enter a pass phrase for encrypting the private key.

Use the following command to launch OpenSSL, submit a new certificate request, and sign the request:

openssl req - new -x509 -days 3650 -extensions v3_ca -key fgcaprivkey.pem -out fgcacert.pem - config openssl.cnf

The result is a standard x509 binary certificate that is valid for 3,650 days (approx. 10 years)

When prompted, re-enter the pass phrase for encryption, then enter the details required for the certificate request, such as location and organization name.

Two new files have been created: a public certificate (fgcacert.pem) and a private key (in the example, fgcaprivkey.pem).

2. Enabling certificate configuration in the web-based manager

Go to System > Feature Select. Under Additional Features, enable Certificates and Apply the changes.
 

3. Importing the self-signed certificate

Go to System > Certificates and select Import > Local Certificate.

Set Type to Certificate, then select your Certificate file and Key file. Enter the Password used to create the certificate.


 

The certificate now appears on the Local CA Certificates list.

 

4. Edit the SSL inspection profile

To use your certificate in an SSL inspection profile go to Security Profiles > SSL/SSH Inspection. Use the dropdown menu in the top right corner to select deep-inspection, the profile used to apply full SSL inspection.

 

Set CA Certificate to use the new certificate.

Select Download Certificate, to download the certificate file needed in the next step.

 

5. Importing the certificate into the web browser

Internet Explorer, Chrome, and Safari (on Windows or Mac OS):

The above browsers use the operating system’s certificate store for Internet browsing. If your users will be using these applications, you must install the certificate into the certificate store for your OS.

If you are using Windows 7/8/10, double-click on the certificate file and select Open. Select Install Certificate to launch the Certificate Import Wizard.

Use the wizard to install the certificate into the Trusted Root Certificate Authorities store. If a security warning appears, select Yes to install the certificate.

If you are using Mac OS X, double-click on the certificate file to launch Keychain Access.

Locate the certificate in the Certificates list and select it. Expand Trust and select Always Trust. If necessary, enter the administrative password for your computer to make this change.

 

If you have the right environment, the certificate can be pushed to your users’ devices. However, if Firefox is used, the certificate must be installed on each individual device, using the instructions below.

Firefox (on Windows or Mac OS)

Firefox has its own certificate store. To avoid errors in Firefox, then the certificate must be installed in this store, rather than in the OS.

Go to Tools > Options > Advanced or Firefox > Preferences > Advanced and find the Certificates tab.

Select View Certificates, then select the Authorities list. Import the certificate and set it to be trusted for website identification.

 

6. Results

Before installing the certificate, an error message would appear in the browser when a site that used HTTPS was accessed (the example shows an error message appearing in Firefox).

After you install the certificate, you should not experience certificate errors when you browse to sites on which the FortiGate unit performs SSL content inspection.

If you view information about the certificate in the browser, you will see that your self-signed certificate is used.

 

 

The post Preventing certificate warnings appeared first on Fortinet Cookbook.

Configuring ADVPN in FortiOS 5.4 (Expert)

$
0
0

In this recipe, we will explore a new VPN feature introduced in FortiOS 5.4.0: ADVPN.

ADVPN (Auto Discovery VPN) is an IPsec technology based on an IETF RFC draft (https://tools.ietf.org/html/draft-sathyanarayan-ipsecme-advpn-03). In simple terms, ADVPN allows a traditional hub and spoke VPN’s spokes to establish dynamic, on-demand direct tunnels between each other so as to avoid routing through the topology’s hub device. ADVPN requires the use of dynamic routing in order to function and FortiOS 5.4 supports both BGP and RIP. This recipe will focus on using BGP and its route-reflector mechanism as the dynamic routing solution to use with ADVPN.

ADVPN’s primary advantages is that it provides the full meshing capabilities to a standard hub and spoke topology, greatly reducing the provisioning effort required for full spoke to spoke low delay reachability and addressing the scalability issues associated with very large fully meshed VPN networks.

BGP (and specifically, iBGP) is a natural fit for ADVPN as its route reflector mechanism resides on the VPN hub device and mirrors routing information from each spoke peer to each other. Furthermore, dynamic group peers result in near zero-touch hub provisioning when a new spoke is introduced in the topology.

As pictured, while the static configuration will involve both spoke FortiGate units to connect to our circular hub FortiGate, Spoke A will be able to establish a dynamic on-demand shortcut IPSec tunnel to Spoke B (and vice versa) if a host behind either spoke attempts to reach a host behind the other spoke. We will complete the configuration below and our verification step below will include reachability from 192.168.2.1 (spoke A) to 192.168.3.1 (spoke B) over the dynamically created shortcut link.

This recipe is documented in CLI as configuration such as BGP and ADVPN are best done using the command line interface. We are assuming basic IP and default routing configuration has been completed on the devices.

1. Configure the Hub FortiGate

 

Using the CLI, configure phase 1 parameters.

The auto-discovery commands enable the sending and receiving of shortcut messages to spokes (the hub is responsible for lettings the spokes know that they should establish those tunnels).

Note: aggressive mode is not supported currently for ADVPN.

config vpn ipsec phase1-interface
    edit "ADVPN"
        set type dynamic
        set interface "wan1"
        set proposal aes128-sha1
        set add-route disable
        set dhgrp 2
        set auto-discovery-sender enable
        set psksecret fortinet
    next
end

Configure the phase2 parameters.

This is a standard phase 2 configuration.

config vpn ipsec phase2-interface
    edit "ADVPN-P2"
        set phase1name "ADVPN"
        set proposal aes128-sha1
    next
end

Configure the tunnel interface IP.

ADVPN requires that tunnel IPs be configured on each device connecting to the topology. Those IP addresses need to be unique for each peer. A particularity of the hub is that it needs to define a bogus remote-IP address (10.10.10.254 in our example). This address should be unused in the topology and it will not be actually considered as part of the configuration for the hub.

 
config system interface
    edit "ADVPN"
        set vdom "root"
        set ip 10.10.10.1 255.255.255.255
        set type tunnel
        set remote-ip 10.10.10.254
        set interface "wan1"
    next
end

 Configure iBGP and route-reflection.

iBGP will be our overlay protocol of choice for enabling ADVPN communications. We are using an arbitrary private AS number (65000) in our example, and configuring a dynamic client group to reduce provisioning requirements.

While we are advertising our LAN network directly (“config network” command), route redistribution is a perfectly valid alternative.

config router bgp
    set as 65000
    set router-id 10.10.10.1
    config neighbor-group
        edit "ADVPN-PEERS"
            set remote-as 65000
            set route-reflector-client enable
        next
    end
    config neighbor-range
        edit 1
            set prefix 10.10.10.0 255.255.255.0
            set neighbor-group "ADVPN-PEERS"
        next
    end
    config network
        edit 1
            set prefix 192.168.1.0 255.255.255.0
        next
    end
end

Configure basic policies to allow traffic to flow between the local network and the ADVPN VPN topology. As we generally desire traffic to be allowed between spokes in an ADVPN setup, we must remember to create a policy allowing spoke to spoke communications.

 
config firewall policy
    edit 0
        set name "OUT ADVPN"
        set srcintf "lan"
        set dstintf "ADVPN"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set status enable
    next
    edit 0
        set name "IN ADVPN"
        set srcintf "ADVPN"
        set dstintf "lan"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set status enable
    next
    edit 0
        set name "ADVPNtoADVPN"
        set srcintf "ADVPN"
        set dstintf "ADVPN"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set status enable
    next
end

2. Configure the Spoke FortiGates

Using the CLI, configure phase 1 parameters.

Note that we are configuring only one of the spokes in this example – the parameters that need to change for each spoke are highlighted in red.

config vpn ipsec phase1-interface
 edit "ADVPN"
  set interface "wan1"
  set proposal aes128-sha1
  set add-route disable
  set dhgrp 2
  set auto-discovery-receiver enable
  set remote-gw 10.1.1.1
  set psksecret fortinet
 next
end

Configure the phase2 parameters.

config vpn ipsec phase2-interface
    edit "ADVPN-P2"
        set phase1name "ADVPN"
        set proposal aes128-sha1
	set auto-negotiate enable
    next
end

 

 Configure the tunnel interface IP.

Notice that on the spokes, the remote IP is actually used and points to the IP defined on the hub.

config system interface
    edit "ADVPN"
        set vdom "root"
        set ip 10.10.10.2 255.255.255.255
        set type tunnel
        set remote-ip 10.10.10.1
        set interface "wan1"
    next
end

Config iBGP.

This is a static standard configuration and as stated for the hub, redistribution could be used instead of explicit route advertisement.

config router bgp
    set as 65000
    set router-id 10.10.10.2
    config neighbor
        edit "10.10.10.1"
            set soft-reconfiguration enable
            set remote-as 65000
        next
    end
    config network
        edit 1
            set prefix 192.168.2.0 255.255.255.0
        next
    end
end

Configure a static route for the tunnel IP subnet.

This is an important special step for the spokes as they need a summary route that identifies all tunnel IP used over your topology to point towards the ADVPN interface. In our example, we use 10.10.10.0/24 (if our network planning expects less than 255 sites). Be sure to adequately plan this IP range as it needs to be hardcoded in the spokes.

config router static
    edit 3
        set dst 10.10.10.0 255.255.255.0
        set device "ADVPN"
    next
end

Configure policies.

config firewall policy
    edit 0
        set name "OUT ADVPN"
        set srcintf "lan"
        set dstintf "ADVPN"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set status enable
    next
    edit 0
        set name "IN ADVPN"
        set srcintf "ADVPN"
        set dstintf "lan"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set status enable
    next
end

Results

 

We can validate the behaviour of our configuration using a few commands. We are going to run these commands from SPOKE A.

get router info routing-table bgp will at a minimum display the learned routes from the topology. Note the recursive routing – a result of our spoke’s required static route. In this case, there has not been any traffic between our local subnet (192.168.2.0/24) and the other spoke’s subnet, as the routes are both going through the hub.

B       192.168.1.0/24 [200/0] via 10.0.0.1, ADVPN, 22:30:21
B       192.168.3.0/24 [200/0] via 10.0.0.3 (recursive via 10.0.0.1), 22:30:21

 

However once we initiate a ping between both spokes, we obtain a different display of routing information – routing now goes through a newly established dynamic tunnel directly through the remote spoke rather than through the hub. The ping hiccup that occurs is the tunnel rerouting through a newly negotiated tunnel to the other spoke.

Our routing information now displays the remote subnet as being available through the spoke directly, through interface ADVPN_0, a dynamically instantiated interface going to that spoke.

FG # exec ping-options source 192.168.2.1

FG # exec ping 192.168.3.1
PING 192.168.3.1 (192.168.3.1): 56 data bytes
64 bytes from 192.168.3.1: icmp_seq=0 ttl=254 time=38.3 ms
64 bytes from 192.168.3.1: icmp_seq=1 ttl=254 time=32.6 ms
Warning: Got ICMP 3 (Destination Unreachable)
64 bytes from 192.168.3.1: icmp_seq=2 ttl=255 time=43.0 ms
64 bytes from 192.168.3.1: icmp_seq=3 ttl=255 time=31.7 ms
64 bytes from 192.168.3.1: icmp_seq=4 ttl=255 time=31.2 ms

--- 192.168.3.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 31.2/35.3/43.0 ms

FG # get router info routing-table bgp 

B       192.168.1.0/24 [200/0] via 10.0.0.1, ADVPN, 22:34:13
B       192.168.3.0/24 [200/0] via 10.0.0.3, ADVPN_0, 00:02:28

 

Some additional data can be obtained using the very useful diag vpn tunnel list command. We are highlighting the aspects in the output which convey data specific to ADVPN, in this case the auto-discovery flag and the child-parent relationship of new instantiated dynamic tunnel interfaces.
FG # diag vpn tunnel list
list all ipsec tunnel in vd 0
------------------------------------------------------
name=ADVPN_0 ver=1 serial=a 10.1.1.2:0->10.1.1.3:0
bound_if=6 lgwy=static/1 tun=intf/0 mode=dial_inst/3 encap=none/0
 parent=ADVPN index=0
proxyid_num=1 child_num=0 refcnt=19 ilast=3 olast=604 auto-discovery=2
stat: rxp=7 txp=7 rxb=1064 txb=588
dpd: mode=on-demand on=1 idle=20000ms retry=3 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=ADVPN-P2 proto=0 sa=1 ref=2 serial=1 auto-negotiate adr
  src: 0:0.0.0.0/0.0.0.0:0
  dst: 0:0.0.0.0/0.0.0.0:0
  SA: ref=3 options=2f type=00 soft=0 mtu=1438 expire=42680/0B replaywin=2048 seqno=8 esn=0
  life: type=01 bytes=0/0 timeout=43152/43200
  dec: spi=9a487db3 esp=aes key=16 55e53d9fbc8dbeaa6df1032fbc80c4f6
       ah=sha1 key=20 a1470452c6a444f26a070add087f0d970c18e3a7
  enc: spi=3c37fea7 esp=aes key=16 8fd62a6745a9ba4fda062d4504b76851
       ah=sha1 key=20 44c606f1ef1bf5739ba62f6572031aa956974d0a
  dec:pkts/bytes=7/588, enc:pkts/bytes=7/1064
------------------------------------------------------
name=ADVPN ver=1 serial=9 10.1.1.2:0->10.1.1.1:0
bound_if=6 lgwy=static/1 tun=intf/0 mode=auto/1 encap=none/0
proxyid_num=1 child_num=1 refcnt=22 ilast=8 olast=8 auto-discovery=2
stat: rxp=3120 txp=3120 rxb=399536 txb=191970
dpd: mode=on-demand on=1 idle=20000ms retry=3 count=0 seqno=12
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=ADVPN-P2 proto=0 sa=1 ref=2 serial=1 auto-negotiate adr
  src: 0:0.0.0.0/0.0.0.0:0
  dst: 0:0.0.0.0/0.0.0.0:0
  SA: ref=3 options=2f type=00 soft=0 mtu=1438 expire=4833/0B replaywin=2048 seqno=5ba esn=0
  life: type=01 bytes=0/0 timeout=43148/43200
  dec: spi=9a487db2 esp=aes key=16 4f70d27edad656cfcacbae61b23d4b11
       ah=sha1 key=20 b19ea87c90dd92d1cab58cbf24ae8fe12ee927cb
  enc: spi=b3dde355 esp=aes key=16 efbb4440df75018610b4ba8f5756167d
       ah=sha1 key=20 81cc9cee3bee1c2dba0eb1e7ac66e9d34b67bde9
  dec:pkts/bytes=1465/90152, enc:pkts/bytes=1465/187560
------------------------------------------------------




 

 

The post Configuring ADVPN in FortiOS 5.4 (Expert) appeared first on Fortinet Cookbook.

Viewing all 690 articles
Browse latest View live