Fcnsa - Fortigate Administration - NSE4 I
Fcnsa - Fortigate Administration - NSE4 I
Fcnsa - Fortigate Administration - NSE4 I
Administration
NSE 4 (Fortigate I)
Contents
Graphical Access 1
Password Reset 3
2 Firmware 5
FortiOS Upgrade 5
FortiOS Downgrade 6
Backup 7
Restore 8
3 Firewall Policies 9
Firewall Object 9
Firewall Policy 10
NAT 12
Destination NAT 15
Port Forwarding 18
PAT 19
5 Authentication 20
6 SSL VPN 25
7 IP SEC VPN 31
1. Management Access or Device Management
Graphical Access
Step 1: Connect Management PC to the Port1, Configure Network adapter to receive IP from
DHCP server and then check the connectivity between pc and firewall. Default Fortigate IP is
192.168.1.99
Step 2: Open any browser and type https://192.168.1.99 and press enter. Default Username is
admin password is empty(Nothing)
1
Upon Successful login you must see the below page
2
Password Reset
Step 1: Connect the computer to the firewall via the console port.
Step 3: Reboot the firewall. Wait the firewall name and login prompt to appear.
The terminal window should display something similar to the following:
Step 5: The password is bcpb + the serial number of the firewall (letters of the serial number are in
UPPERCASE format)
Example: bcpbFGT60D4Q16007210
Note: After the login prompt appear, you have only 30sec or less to type in the username and
password. It might, therefore, be necessary to have the credentials ready in a text editor, and then
copy and paste them into the login screen.
3
Step 6: Now you should be connected to the firewall. To change the admin password you follow the
below syntax
config global
config system admin
edit admin
set password <password>
end
4
2. Firmware Upgrade and Downgrade
FortiOS Upgrade
Step 1: After log into the web-based manager as the admin administrative user.
Go to System > Dashboard > Status. Under System Information > firmware Version, select Update.
Step 2: Clicking on Upload firmware, select the file from local disk then select upgrade.
The Fortgate unit uploads the firmware image file, upgrades to the new firmware version,
restarts, and displays the Fortigate login. This process takes a few minutes.
Note: Always remember to backup your configuration before making any changes to the firmware.
5
FortiOS Downgrade
Step 1: After log into the web-based manager as the admin administrative user.
Go to System > Dashboard. Under System Information > firmware Version, select Update.
Step 2: Clicking on Upload firmware, select the file from local disk then select Downgrade.
The FortiGate unit uploads the firmware image file, reverts to the old firmware version,
resets the configuration, restarts, and displays the FortiGate login. This process takes a few minutes.
6
Backup
Step 1: Go to System > Dashboard. On the System Information Widget, select Backup for the
System Configuration.
Step 2: Select to backup to your Local PC or USB Disk (The USB Disk option will be grayed out
If no USB drive is inserted in the USB Port). Then select Encrypt configuration file (encryption
must be enabled on the backup file to backup VPN certificates).
Step 3: Enter a password and enter it again to confirm it. You will need this password to restore
the file. Then select OK
7
Restore
Step 1: Go to System > Dashboard. On the System Information Widget, select Restore for the
System configuration.
Step 2: Clicking on upload, select the configuration file from Local PC or USB Disk, Then enter
Password if required, then click ok.
The FortiGate unit will load the configuration file and restart. Once the restart has completed,
verify that the configuration has been restored.
8
3. Firewall Policies
9
Creating Firewall Policy
Go to the Policy & Objects > IPv4 Policy and Create New Policy.
1. Give the policy a Name that indicates that the policy will be for traffic to the internet from lan.
2. Set the Incoming Interface to the LAN interface and Outgoing Interface to the internet
facing Interface.
3. Set Source, Destination Address, Schedule and Service as required.
4. Make sure the Action is set to ACCEPT, Turn on NAT and make sure Use Outgoing
Interface Address is selected.
5. Scroll down to view the Logging Options. In order to view the results later, enable Log Allowed
Traffic and select All Sessions.
6. Click ok.
10
4. Network Address Translation
Objectives
Configure NAT
Configure Destination NAT using Virtual IPs
Configure Port forwarding
Configure PAT
11
Configure NAT
Step 1: Go to Network > Interfaces and edit the internet-facing interface (WAN). Set Addressing
mode to Manual and set the IP/Netmask.
Step 2: Add Default route (Because of wan interface ip address manually configured).
Go to Network > Routing and Create New route. Set Destination to Subnet, Destination
IP/Mask to 0.0.0.0/0.0.0.0, the Device to the Internet-facing interface (WAN1), and the
Gateway to the gateway (or default route) provided by your ISP or to the next hop router,
depending on your network requirements.
12
Step 3: Go to Network > Interfaces and edit the DMZ interface. Set Addressing mode to Manual
and set the IP/Netmask.
13
Step 5: Create New Policy with NAT
Go to the Policy & Objects > IPv4 Policy and Create New Policy.
14
Destination NAT
Step 1: Create New Virtual IPs for Web Server and FTP Server
Go to Policy & Objects > Virtual IPs and Create New Virtual IP
15
Step 2: Create New Policy for Web server and FTP Server.
Go to the Policy & Objects > IPv4 Policy and Create New Policy.
If anyone browse from wan interface with 192.168.3.248 service is HTTP it would be
translate to 172.24.10.100
If anyone browse from wan interface with 192.168.3.247 service is FTP it would be
translate to 172.24.10.50
16
Step 3: Verify the Results
Open Browser from pc that located in wan interface side type http://192.168.3.248
and ftp://192.168.3.247
17
Port Forwarding
Step 1: Create or Edit web server and ftp server
Go to Policy & Objects > Virtual IPs edit the web server. Set the external IP Address is
Wan interface IP Address and enable Port forwarding set the port numbers.
Go to Policy & Objects > Virtual IPs edit the ftp server. Set the external IP Address is
Wan interface IP Address and enable Port forwarding set the port numbers.
18
Step 2: Go to Fortiview > Source
19
5. Authentication
Objectives
Create Local Users
Integrate LDAP Server into the Fortigate
Local Users & Remote Users add into one Group
Authentication via a Firewall Policy
20
Step 1: Create Local Users
Go to User & Device > User Definition, select Create New
21
Step 2: LDAP Server Integration
Go to User & Device > LDAP Servers, select Create New
22
23
Step 4: Create a Policy for sales group to access the internet
Go to the Policy & Objects > IPv4 Policy and Create New Policy.
Step 5: Open Browser from Sales group LAN, access any website, it will automatically redirect to
authentication page.
24
6. SSL VPN
Objectives
Configure and connect to an SSL VPN
Enable Authentication Security
Configure policies for access to private network resources
25
Step 1: Create Bookmarks for users access remote desktop or web portal from the internet
Go to VPN > SSL-VPN Portals, select create new or edit Web-access mode. After enter into
the Web-access mode create bookmarks for RDP & web page access.
26
Step 2: Create New group for SSL VPN users.
Go to User & Device > User Groups, select create new
Step 3: Edit into SSL VPN settings, add unused port number on Listen Port and mapping SSL users
group and portal.
27
Mapping SSL Users group and Portal
28
Step 4: Create an SSL VPN security policy with SSL VPN user authentication to allow SSL VPN traffic.
29
Step 5: Access the https://192.168.3.249:8081 from any remote PC you will get the below portal
Enter the login credentials automatically bookmarks SSL-VPN Portal Page will open.
30
7. IP SEC VPN
Objectives
Site to Site VPN
31
HQ
Step 1: On the HQ Fortigate, go to VPN > IP SEC Wizard and select site to site Fortigate.
Step 2: In the Authentication step, set the Branch FortiGate IP as the Remote Gateway, after
you enter the gateway, an available interface will be assigned as the Outgoing Interface. Set secure
Pre-shared Key.
Step 3: In the Policy & Routing section, set local interface to your LAN interface. The local subnet
will be added automatically. Set Remote subnet to branch Fortigate Local subnet.
32
Step 4: A summary page shows the configuration created by the wizard, including firewall addresses,
Firewall address groups, static route, and security policies.
Branch Office
Step 1: On the Branch Fortigate, go to VPN > IP SEC Wizard and select site to site Fortigate.
33
Step 2: In the Authentication step, set the HQ FortiGate IP as the Remote Gateway, after you
enter the gateway, an available interface will be assigned as the Outgoing Interface. Set the same Pre-
Shared key that was used for HQ’s VPN.
Step 3: In the Policy & Routing section, set local interface to your LAN interface. The local subnet
will be added automatically. Set Remote subnet to HQ Fortigate Local subnet.
34
Step 4: A summary page shows the configuration created by the wizard, including firewall addresses,
Firewall address groups, static route, and security policies.
35