Fortigate
Fortigate
Fortigate
Features
FortiGate as a DHCP server
Default Route
PORT 6 - WAN
Firewall Policy
Internet Services
Policy Table
Create Policy
Using Firewall authentication
Without firewall authentication, the only information that Fortigate knows about the user that is
originating the traffic is their source IP address, which Fortigate cannot use to determine the user
identity.
To configure firewall authentication, you add a source user or user group to the firewall policy.
This requires that users enter credentials at the beginning of the session. Fortigate then uses the
identity of the user, along with the other rules in the firewall policy, to determine if the traffic
should be allowed or denied.
Authentication methods
The difference between these two methods is on whether the user credentials are stored on
Fortigate or on a remote authentication server.
When you use firewall authentication, you need to create individual accounts for every user who
requires access to the network. A local user account contains both the username and a password.
You can also create local user groups to group together users who require the same level of
access. You might want to group employees by business area, such as finance or HR, or by
employee type, such as contractors or guests. In most cases, it is the best practice to use a group
in a firewall policy rather than individual user accounts.
Guest accounts
You can also use authentication for guest groups, which contain temporary user accounts that
expire. Administrators can manually create guest accounts or create many guest accounts at once
using randomly generated user IDs and passwords.
Remote authentication
This method is desirable when multiple Fortigate devices need to authenticate the same users or
user groups, or when adding Fortigate to a network that already contains an authentication server.
To use firewall authentication, you need to include a user account or user group in the source
definition for a firewall policy, along with the internal subnet.
Lab simulation
HTTPS offers protection by applying encryption to web traffic; however, it also introduces a
potential security risk because attackers may attempt to use encrypted traffic to get around your
network’s normal defenses.
Certificate Inspection
Deep inspection
Certificate Inspection
When you use SSL certificate inspection, Fortigate inspects the SSL/TLS handshake when a session
begins. By doing this, Fortigate verifies the identity of the web server and makes sure that the
HTTPS protocol is not used as a workaround to access sites you have blocked using web filtering.
Deep inspection
Also known as full inspection, Fortigate impersonates the recipient of the originating SSL session,
then decrypts and inspects the content to find threats and block them. If the content is safe,
Fortigate re-encrpyts the content and sends it to the real recipient.
LAB SIMULATION
LAB SIMULATION 2
Avoid warning certifications
Risk of Malware
FortiGuard Labs
Antivirus scan detects known malware and is the first, fastest, and the simplest way to detect
malware. FortiGate detects viruses that are an exact match for a signature in the FortiGuard
antivirus database.
You can configure antivirus settings as part of an antivirus profile. In the antivirus profile, you can
define what FortiGate should do if it detects an infected file. After you configure an antivirus
profile, you must apply it in the firewall policy.
Configure Antivirus Protection
Second, enable antivirus scanning on a firewall policy and select the correct profile.
LAB SIMULATION
Learning objectives
For web filtering, FortiGate can use FortiGuard category filters to control web access.
Each category contains websites or web pages that have been assigned based on their dominant
web content.
FortiGate works with FortiGuard categories to determine how websites are filtered.
Rather than block or allow websites individually, FortiGuard category filtering looks at the
category, with which website has been rated.
Task 4: Apply the web filter security profile to a firewall policy to start inspecting web traffic. Also,
enable logs.
Lab simulation
Authenticate action
Configuring the FortiGate Intrusion Prevention System (IPS)
To identify malicious traffic, FortiGate uses its top-of-the-line IPS engine and IPS sensors.
An IPS sensor is a collection of IPS signatures and filters that define the scope of what the IPS
engine scans when the IPS sensor is applied to a firewall policy.
Protocol Decoders
Signatures
Configuring the FortiGate IPS
Step 1: select the required IPS sensor or create a new custom one.
Step 2: select the required signatures and filters for the sensor and decide whether you want
sensor to block malicious URL and botnet command-and-control (C&C) traffic.
Application control can identify network traffic that is generated from specific applications and
take the appropriate actions, such as monitor and block traffic or apply traffic shaping for all or
specific users of a firewall policy.
How does FortiGate application control work to limit access?
Peer-to-peer protocols use evasive techniques to bypass traditional firewall policies. Therefore,
FortiGate application control involves the matching of known patterns to the transmission
patterns of the application. The database for application control signature is provided by
FortiGuard Labs. The traffic analysis is performed through the IPS engine, which uses flow-based
inspection.
IPsec VPNs
IPsec is a suite of industry standard protocols that is used to create secure connections between
devices located on different, and often geographically distant, networks
Types of VPNs
Site-to-site VPNs
Internet Key Exchange (IKE) Protocol
IKEV1 Protocol
For a successful Phase1, the following parameters must match in at least one of the proposals on
each peer device:
Phase 2:
Both peer devices determine which traffic must be sent over the VPN, and how it will be
authenticated and encrypted. The following parameters must match in at least one of the
proposals on each peer device:
IKEv2 Protocol
Secure sockets layer virtual private network (SSL VPN) is a type pf VPN that uses SSL encryption to
create a secure and encrypted connection between a client device and a device acting as a VPN
server.
Benefits
How does SSL VPN work?
Web mode
Tunnel mode
Web mode
Tunnel Mode
Step 1: Create the users and groups that will be authorized to connect
Step 2: review, edit or create SSL VPN portals.
Demonstration
Fortigate System Maintenance and Monitoring
LAB SIMULATION
Upgrade firmware
Task 2: Examining traffic logs
Configuring the Fortinet Security
The Fortinet Security Fabric is an enterprise architecture that helps manage this complexity by
providing a single-pane-of-glass view of the organization’s security posture.
Benefits
Step 1: configure one of the centralized logging platforms. Configure FortiAnalyzer, or one of the
supported cloud logging platforms, to accept logs from devices in the fabric.
Demonstration