FortiOS 5.0 Handbook
FortiOS 5.0 Handbook
FortiOS 5.0 Handbook
S
w
it
c
h
A
S
w
it
c
h
B
B
r
a
n
c
h
O
f
f
ic
e
M
a
in
O
f
f
ic
e
F
r
a
m
e
V
L
A
N
1
0
0
V
L
A
N
2
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
S
w
S
w
it it
c
h
c
h
AA
S
w
S
w
it it
c
h
c
h
BB
8
0
2
.
1
Q
t
r
u
n
k
l
i
n
k
P
o
r
t
s
1
-
4
P
o
r
t
s
5
-
7
P
o
r
t
s
4
,
5
P
o
r
t
8
P
o
r
t
8
Fortinet Technologies Inc. Page 181 Install and System Administration for FortiOS 5.0
VLAN layer-3 routing
Routers are layer-3 devices. Layer 3 refers to the third layer of the OSI networking model, the
Network layer. FortiGate units in NAT mode act as layer-3 devices. As with layer 2, FortiGate
units acting as layer-3 devices are 802.1Q-compliant.
The main difference between layer-2 and layer-3 devices is how they process VLAN tags.
Layer-2 switches just add, read and remove the tags. They do not alter the tags or do any other
high-level actions. Layer-3 routers not only add, read and remove tags but also analyze the data
frame and its contents. This analysis allows layer-3 routers to change the VLAN tag if it is
appropriate and send the data frame out on a different VLAN.
In a layer-3 environment, the 802.1Q-compliant router receives the data frame and assigns a
VLAN ID. The router then forwards the data frame to other members of the same VLAN
broadcast domain. The broadcast domain can include local ports, layer-2 devices and layer-3
devices such as routers and firewalls. When a layer-3 device receives the data frame, the device
removes the VLAN tag and examines its contents to decide what to do with the data frame. The
layer-3 device considers:
source and destination addresses
protocol
port number.
The data frame may be forwarded to another VLAN, sent to a regular non-VLAN-tagged
network or just forwarded to the same VLAN as a layer-2 switch would do. Or, the data frame
may be discarded if the proper security policy has been configured to do so.
Layer-3 VLAN example
In this example, switch A is connected to the Branch Office subnet, the same as subnet 1 in the
layer-2 example. In the Main Office subnet, VLAN 300 is on port 5 of switch B. The FortiGate
unit is connected to switch B on port 1 and the trunk link connects the FortiGate units port 3 to
switch A. The other ports on switch B are unassigned.
This example explains how traffic can change VLANs originating on VLAN 100 and arriving at a
destination on VLAN 300. Layer-2 switches alone cannot accomplish this, but a layer-3 router
can.
1. The VLAN 100 computer at the Branch Office sends the data frame to switch A, where the
VLAN 100 tag is added.
Fortinet Technologies Inc. Page 182 Install and System Administration for FortiOS 5.0
2. Switch A forwards the tagged data frame to the FortiGate unit over the 802.1Q trunk link,
and to the VLAN 100 interfaces on Switch A.
Up to this point everything is the same as in the layer-2 example.
3. The FortiGate unit removes the VLAN 100 tag, and inspects the content of the data frame.
The FortiGate unit uses the content to select the correct security policy and routing options.
4. The FortiGate units security policy allows the data frame to go to VLAN 300 in this example.
The data frame will be sent to all VLAN 300 interfaces, but in the example there is only port 1
S
w
itc
h
A
S
w
itc
h
B
B
r
a
n
c
h
O
ffic
e
M
a
in
O
ffic
e
P
o
r
t 1
V
L
A
N
3
0
0
F
r
a
m
e
V
L
A
N
3
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
S
w
S
w
it itc
h
c
h
AA
S
w
S
ww
S
w
S
w
it it it it it tc
h
c
h
c
h
cc
h
c
h
BBB
8
0
2
.1
Q
tr
u
n
k
lin
k
P
o
r
ts
1
-
4
P
o
r
ts
5
-
7
P
o
r
t 1
P
o
r
t 5
P
o
r
t 3
P
o
r
t 8
P
o
r
t t
1111111
3
0
0 000
0
0
r
t
3
S
w
itc
h
A
S
w
itc
h
B
B
r
a
n
c
h
O
ffic
e
M
a
in
O
ffic
e
P
o
r
t 1
V
L
A
N
3
0
0
F
r
a
m
e
V
L
A
N
3
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
S
w
S
w
it itc
h
c
h
AA
S
w
S
ww
S
w
S
w
it it iit it tc
h
c
h
c
h
cc
h
c
h
BBB
8
0
2
.1
Q
tr
u
n
k
lin
k
P
o
r
ts
1
-
4
P
o
r
ts
5
-
7
P
o
r
t 1
P
o
r
t 5
P
o
r
t 3
P
o
r
t 8
P
o
r
t t
111111
3
0
0000
0
0
r
t
3
Fortinet Technologies Inc. Page 183 Install and System Administration for FortiOS 5.0
on the FortiGate unit. Before the data frame leaves, the FortiGate unit adds the VLAN ID 300
tag to the data frame.
This is the step that layer 2 cannot do. Only layer 3 can retag a data frame as a different
VLAN.
5. Switch B receives the data frame, and removes the VLAN ID 300 tag, because this is the last
hop, and forwards the data frame to the computer on port 5.
In this example, a data frame arrived at the FortiGate unit tagged as VLAN 100. After checking
its content, the FortiGate unit retagged the data frame for VLAN 300. It is this change from
S
w
itc
h
A
S
w
itc
h
B
B
r
a
n
c
h
O
ffic
e
M
a
in
O
ffic
e
P
o
r
t 1
V
L
A
N
3
0
0
V
L
A
N
3
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
S
w
S
w
it itc
h
c
h
AA
S
w
S
ww
S
w
S
w
it it it it it tc
h
c
h
c
h
c
h
c
h
c
h
BBBB
8
0
2
.1
Q
tr
u
n
k
lin
k
P
o
r
ts
1
-
4
P
o
r
ts
5
-
7
P
o
r
t 1
P
o
r
t 5
P
o
r
t 3
P
o
r
t 8
P
o
r
t t
111111
3
0
0 000
0
0
r
t
3
F
r
a
m
e
S
w
itc
h
A
S
w
itc
h
B
B
r
a
n
c
h
O
ffic
e
M
a
in
O
ffic
e
P
o
r
t 1
V
L
A
N
3
0
0
F
r
a
m
e
V
L
A
N
3
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
S
w
S
w
it itc
h
c
h
AA
S
w
S
ww
S
w
S
w
it it iit it tc
h
c
h
c
h
cc
h
c
h
BBBB
8
0
2
.1
Q
tr
u
n
k
lin
k
P
o
r
ts
1
-
4
P
o
r
ts
5
-
7
P
o
r
t 1
P
o
r
t 5
P
o
r
t 3
P
o
r
t 8
P
o
r
t t
1111111
3
0
0 000
0
0
r
t
3
F
r
a
m
e
Fortinet Technologies Inc. Page 184 Install and System Administration for FortiOS 5.0
VLAN 100 to VLAN 300 that requires a layer-3 routing device, in this case the FortiGate unit.
Layer-2 switches cannot perform this change.
VLANs in NAT mode
In NAT mode the FortiGate unit functions as a layer-3 device. In this mode, the FortiGate unit
controls the flow of packets between VLANs, but can also remove VLAN tags from incoming
VLAN packets. The FortiGate unit can also forward untagged packets to other networks, such
as the Internet.
In NAT mode, the FortiGate unit supports VLAN trunk links with IEEE 802.1Q-compliant
switches, or routers. The trunk link transports VLAN-tagged packets between physical subnets
or networks. When you add VLAN sub-interfaces to the FortiGate unit physical interfaces, the
VLANs have IDs that match the VLAN IDs of packets on the trunk link. The FortiGate unit directs
packets with VLAN IDs to sub-interfaces with matching IDs.
You can define VLAN sub-interfaces on all FortiGate physical interfaces. However, if multiple
virtual domains are configured on the FortiGate unit, you will have access to only the physical
interfaces on your virtual domain. The FortiGate unit can tag packets leaving on a VLAN
subinterface. It can also remove VLAN tags from incoming packets and add a different VLAN
tag to outgoing packets.
Normally in VLAN configurations, the FortiGate unit's internal interface is connected to a VLAN
trunk, and the external interface connects to an Internet router that is not configured for VLANs.
In this configuration the FortiGate unit can apply different policies for traffic on each VLAN
interface connected to the internal interface, which results in less network traffic and better
security.
Adding VLAN subinterfaces
A VLAN subinterface, also called a VLAN, is a virtual interface on a physical interface. The
subinterface allows routing of VLAN tagged packets using that physical interface, but it is
separate from any other traffic on the physical interface.
Adding a VLAN subinterface includes configuring:
Physical interface
IP address and netmask
VLAN ID
VDOM
Physical interface
The term VLAN subinterface correctly implies the VLAN interface is not a complete interface by
itself. You add a VLAN subinterface to the physical interface that receives VLAN-tagged
packets. The physical interface can belong to a different VDOM than the VLAN, but it must be
connected to a network router that is configured for this VLAN. Without that router, the VLAN
will not be connected to the network, and VLAN traffic will not be able to access this interface.
The traffic on the VLAN is separate from any other traffic on the physical interface.
When you are working with interfaces on your FortiGate unit, use the Column Settings on the
Interface display to make sure the information you need is displayed. When working with
VLANs, it is useful to position the VLAN ID column close to the IP address. If you are working
with VDOMs, including the Virtual Domain column as well will help you troubleshoot problems
more quickly.
To view the Interface display, go to System > Network > Interface.
Fortinet Technologies Inc. Page 185 Install and System Administration for FortiOS 5.0
IP address and netmask
FortiGate unit interfaces cannot have overlapping IP addresses. The IP addresses of all
interfaces must be on different subnets. This rule applies to both physical interfaces and to
virtual interfaces such as VLAN subinterfaces. Each VLAN subinterface must be configured with
its own IP address and netmask pair. This rule helps prevent a broadcast storm or other similar
network problems.
VLAN ID
The VLAN ID is part of the VLAN tag added to the packets by VLAN switches and routers. The
VLAN ID is a number between 1 and 4094 that allow groups of IP addresses with the same
VLAN ID to be associated together. VLAN ID 0 is used only for high priority frames, and 4095 is
reserved.
All devices along a route must support the VLAN ID of the traffic along that route. Otherwise, the
traffic will be discarded before reaching its destination. For example, if your computer is part of
VLAN_100 and a co-worker on a different floor of your building is also on the same VLAN_100,
you can communicate with each other over VLAN_100, only if all the switches and routers
support VLANs and are configured to pass along VLAN_100 traffic properly. Otherwise, any
traffic you send your co-worker will be blocked or not delivered.
VDOM
If VDOMs are enabled, each VLAN subinterface must belong to a VDOM. This rule also applies
for physical interfaces.
VLAN subinterfaces on separate VDOMs cannot communicate directly with each other. In this
situation, the VLAN traffic must exit the FortiGate unit and re-enter the unit again, passing
through firewalls in both directions. This situation is the same for physical interfaces.
A VLAN subinterface can belong to a different VDOM than the physical interface it is part of.
This is because the traffic on the VLAN is handled separately from the other traffic on that
interface. This is one of the main strengths of VLANs.
The following procedure will add a VLAN subinterface called VLAN_100 to the FortiGate internal
interface with a VLAN ID of 100. It will have an IP address and netmask of
172.100.1.1/255.255.255.0, and allow HTTPS, PING, and TELNET administrative access.
Note that in the CLI, you must enter set type vlan before setting the vlanid, and that the
allowaccess protocols are lower case.
To add a VLAN subinterface in NAT mode - web-based manager
1. If Current VDOM appears at the bottom left of the screen, select Global from the list of
VDOMs.
2. Go to System > Network > Interface.
If you are unable to change your existing configurations to prevent IP overlap, enter the CLI
command config system global and set ip-overlap enable to allow IP address
overlap. If you enter this command, multiple VLAN interfaces can have an IP address that is part
of a subnet used by another interface. This command is recommended for advanced users
only.
Interface-related CLI commands require a VDOM to be specified, regardless of whether the
FortiGate unit has VDOMs enabled.
Fortinet Technologies Inc. Page 186 Install and System Administration for FortiOS 5.0
3. Select Create New to add a VLAN subinterface.
4. Enter the following:
5. Select OK.
To view the new VLAN subinterface, select the expand arrow next to the parent physical
interface (the internal interface). This will expand the display to show all VLAN subinterfaces on
this physical interface. If there is no expand arrow displayed, there are no subinterfaces
configured on that physical interface.
For each VLAN, the list displays the name of the VLAN, and, depending on column settings, its
IP address, the Administrative access you selected for it, the VLAN ID number, and which
VDOM it belongs to if VDOMs are enabled.
To add a VLAN subinterface in NAT mode - CLI
config system interface
edit VLAN_100
set interface internal
set type vlan
set vlanid 100
set ip 172.100.1.1 255.255.255.0
set allowaccess https ping telnet
end
Configuring security policies and routing
Once you have created a VLAN subinterface on the FortiGate unit, you need to configure
security policies and routing for that VLAN. Without these, the FortiGate unit will not pass VLAN
traffic to its intended destination. Security policies direct traffic through the FortiGate unit
between interfaces. Routing directs traffic across the network.
Configuring security policies
Security policies permit communication between the FortiGate units network interfaces based
on source and destination IP addresses. Interfaces that communicate with the VLAN interface
need security policies to permit traffic to pass between them and the VLAN interface.
VLAN Name VLAN_100
Type VLAN
Interface internal
VLAN ID 100
Addressing Mod Manual
IP/Netmask 172.100.1.1/255.255.255.0
Administrative Access HTTPS, PING, TELNET
Fortinet Technologies Inc. Page 187 Install and System Administration for FortiOS 5.0
Each VLAN needs a security policy for each of the following connections the VLAN will be using:
from this VLAN to an external network
from an external network to this VLAN
from this VLAN to another VLAN in the same virtual domain on the FortiGate unit
from another VLAN to this VLAN in the same virtual domain on the FortiGate unit.
The packets on each VLAN are subject to antivirus scans and other UTM measures as they
pass through the FortiGate unit.
Configuring routing
As a minimum, you need to configure a default static route to a gateway with access to an
external network for outbound packets. In more complex cases, you will have to configure
different static or dynamic routes based on packet source and destination addresses.
As with firewalls, you need to configure routes for VLAN traffic. VLANs need routing and a
gateway configured to send and receive packets outside their local subnet just as physical
interfaces do. The type of routing you configure, static or dynamic, will depend on the routing
used by the subnet and interfaces you are connecting to. Dynamic routing can be routing
information protocol (RIP), border gateway protocol (BGP), open shortest path first (OSPF), or
multicast.
If you enable SSH, PING, TELNET, HTTPS and HTTP on the VLAN, you can use those protocols
to troubleshoot your routing and test that it is properly configured. Enabling logging on the
interfaces and using CLI diagnose commands such as diagnose sniff packet
<interface_name> can also help locate any possible configuration or hardware issues.
Example VLAN configuration in NAT mode
In this example two different internal VLAN networks share one interface on the FortiGate unit,
and share the connection to the Internet. This example shows that two networks can have
separate traffic streams while sharing a single interface. This configuration could apply to two
departments in a single company, or to different companies.
There are two different internal network VLANs in this example. VLAN_100 is on the
10.1.1.0/255.255.255.0 subnet, and VLAN_200 is on the 10.1.2.0/255.255.255.0 subnet. These
VLANs are connected to the VLAN switch, such as a Cisco 2950 Catalyst switch.
The FortiGate internal interface connects to the VLAN switch through an 802.1Q trunk. The
internal interface has an IP address of 192.168.110.126 and is configured with two VLAN
subinterfaces (VLAN_100 and VLAN_200). The external interface has an IP address of
172.16.21.2 and connects to the Internet. The external interface has no VLAN subinterfaces.
Fortinet Technologies Inc. Page 188 Install and System Administration for FortiOS 5.0
Figure 15:FortiGate unit with VLANs in NAT mode
When the VLAN switch receives packets from VLAN_100 and VLAN_200, it applies VLAN ID
tags and forwards the packets of each VLAN both to local ports and to the FortiGate unit across
the trunk link. The FortiGate unit has policies that allow traffic to flow between the VLANs, and
from the VLANs to the external network.
This section describes how to configure a FortiGate unit and a Cisco Catalyst 2950 switch for
this example network topology. The Cisco configuration commands used in this section are IOS
commands.
It is assumed that both the FortiGate unit and the Cisco 2950 switch are installed and
connected and that basic configuration has been completed. On the switch, you will need to be
able to access the CLI to enter commands. Refer to the manual for your FortiGate model as well
as the manual for the switch you select for more information.
It is also assumed that no VDOMs are enabled.
General configuration steps
The following steps provide an overview of configuring and testing the hardware used in this
example. For best results in this configuration, follow the procedures in the order given. Also,
note that if you perform any additional actions between procedures, your configuration may
have different results.
1. Configure the FortiGate unit
Configure the external interface
Add two VLAN subinterfaces to the internal network interface
Add firewall addresses and address ranges for the internal and external networks
Add security policies to allow:
the VLAN networks to access each other
the VLAN networks to access the external network.
2. Configure the VLAN switch
V
L
A
N
S
w
itc
h
V
L
A
N
2
0
0
N
e
tw
o
r
k
1
0
.1
.2
.0
U
n
ta
g
g
e
d
p
a
c
k
e
ts
F
a
0
/9
F
a
0
/3
F
a
0
/2
4
8
0
2
.
1
Q
t
r
u
n
k
E
x
te
r
n
a
l
1
7
2
.1
6
.2
1
.2
In
te
r
n
a
l
1
9
2
.1
6
8
.1
1
0
.1
2
6
V
L
A
N
1
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
N
e
tw
o
r
k
1
0
.1
.1
.0
l
6
.2
1
.2
IIIIInn
te
r
n
111111111111111
9999
2
99
2
.1
6
8
1
L
V
L
V
L
V
L
V
L
A
N
A
N
A
N
A
N
A
N
A
N
SSSSSS
ww
i
w
i
w
i
w
i
w
itc tc tc tc tc
hhh
F
a
F
0
/3 /3 3333
0
/2
4
Fortinet Technologies Inc. Page 189 Install and System Administration for FortiOS 5.0
Configure the FortiGate unit
Configuring the FortiGate unit includes:
Configure the external interface
Add VLAN subinterfaces
Add the firewall addresses
Add the security policies
Configure the external interface
The FortiGate units external interface will provide access to the Internet for all internal
networks, including the two VLANs.
To configure the external interface - web-based manager
1. Go to System > Network > Interface.
2. Select Edit for the external interface.
3. Enter the following information and select OK:
To configure the external interface - CLI
config system interface
edit external
set mode static
set ip 172.16.21.2 255.255.255.0
end
Add VLAN subinterfaces
This step creates the VLANs on the FortiGate unit internal physical interface. The IP address of
the internal interface does not matter to us, as long as it does not overlap with the subnets of
the VLAN subinterfaces we are configuring on it.
The rest of this example shows how to configure the VLAN behavior on the FortiGate unit,
configure the switches to direct VLAN traffic the same as the FortiGate unit, and test that the
configuration is correct.
Adding VLAN subinterfaces can be completed through the web-based manager, or the CLI.
To add VLAN subinterfaces - web-based manager
1. Go to System > Network > Interface.
2. Select Create New.
3. Enter the following information and select OK:
Addressing mode Manual
IP/Network Mask 172.16.21.2/255.255.255.0
Name VLAN_100
Interface internal
VLAN ID 100
Addressing mode Manual
Fortinet Technologies Inc. Page 190 Install and System Administration for FortiOS 5.0
4. Select Create New.
5. Enter the following information and select OK::
To add VLAN subinterfaces - CLI
config system interface
edit VLAN_100
set vdom root
set interface internal
set type vlan
set vlanid 100
set mode static
set ip 10.1.1.1 255.255.255.0
set allowaccess https ping telnet
next
edit VLAN_200
set vdom root
set interface internal
set type vlan
set vlanid 200
set mode static
set ip 10.1.2.1 255.255.255.0
set allowaccess https ping telnet
end
Add the firewall addresses
You need to define the addresses of the VLAN subnets for use in security policies. The
FortiGate unit provides one default address, all, that you can use when a security policy
applies to all addresses as a source or destination of a packet. However, using all is less
secure and should be avoided when possible.
In this example, the _Net part of the address name indicates a range of addresses instead of a
unique address. When choosing firewall address names, use informative and unique names.
To add the firewall addresses - web-based manager
1. Go to Firewall Objects > Address > Address.
2. Select Create New.
IP/Network Mask 10.1.1.1/255.255.255.0
Administrative Access HTTPS, PING, TELNET
Name VLAN_200
Interface internal
VLAN ID 200
Addressing mode Manual
IP/Network Mask 10.1.2.1/255.255.255.0
Administrative Access HTTPS, PING, TELNET
Fortinet Technologies Inc. Page 191 Install and System Administration for FortiOS 5.0
3. Enter the following information and select OK:
4. Select Create New.
5. Enter the following information and select OK::
To add the firewall addresses - CLI
config firewall address
edit VLAN_100_Net
set type ipmask
set subnet 10.1.1.0 255.255.255.0
next
edit VLAN_200_Net
set type ipmask
set subnet 10.1.2.0 255.255.255.0
end
Add the security policies
Once you have assigned addresses to the VLANs, you need to configure security policies for
them to allow valid packets to pass from one VLAN to another and to the Internet.
If you do not want to allow all services on a VLAN, you can create a security policy for each
service you want to allow. This example allows all services.
To add the security policies - web-based manager
1. Go to Policy > Policy > Policy and select Create New.
2. Leave the Policy Type as Firewall and the Policy Subtype as Address.
3. Enter the following information and select OK:
Name VLAN_100_Net
Type Subnet
Subnet / IP Range 10.1.1.0/255.255.255.0
Name VLAN_200_Net
Type Subnet
Subnet / IP Range 10.1.2.0/255.255.255.0
You can customize the Security Policy display by including some or all columns, and customize
the column order onscreen. Due to this feature, security policy screenshots may not appear the
same as on your screen.
Incoming Interface VLAN_100
Source Address VLAN_100_Net
Outgoing Interface VLAN_200
Destination Address VLAN_200_Net
Fortinet Technologies Inc. Page 192 Install and System Administration for FortiOS 5.0
4. Select Create New.
5. Leave the Policy Type as Firewall and the Policy Subtype as Address.
6. Enter the following information and select OK:
7. Select Create New.
8. Leave the Policy Type as Firewall and the Policy Subtype as Address.
9. Enter the following information and select OK:
10.Select Create New.
11.Leave the Policy Type as Firewall and the Policy Subtype as Address.
12.Enter the following information and select OK:
Schedule Always
Service ALL
Action ACCEPT
Enable NAT Enable
Incoming Interface VLAN_200
Source Address VLAN_200_Net
Outgoing Interface VLAN_100
Destination Address VLAN_100_Net
Schedule Always
Service ALL
Action ACCEPT
Enable NAT Enable
Incoming Interface VLAN_100
Source Address VLAN_100_Net
Outgoing Interface external
Destination Address all
Schedule Always
Service ALL
Action ACCEPT
Enable NAT Enable
Incoming Interface VLAN_200
Source Address VLAN_200_Net
Fortinet Technologies Inc. Page 193 Install and System Administration for FortiOS 5.0
To add the security policies - CLI
config firewall policy
edit 1
set srcintf VLAN_100
set srcaddr VLAN_100_Net
set dstintf VLAN_200
set dstaddr VLAN_200_Net
set schedule always
set service ALL
set action accept
set nat enable
set status enable
next
edit 2
set srcintf VLAN_200
set srcaddr VLAN_200_Net
set dstintf VLAN_100
set dstaddr VLAN_100_Net
set schedule always
set service ALL
set action accept
set nat enable
set status enable
next
edit 3
set srcintf VLAN_100
set srcaddr VLAN_100_Net
set dstintf external
set dstaddr all
set schedule always
set service ALL
set action accept
set nat enable
set status enable
next
edit 4
set srcintf VLAN_200
set srcaddr VLAN_200_Net
Outgoing Interface external
Destination Address all
Schedule Always
Service ALL
Action ACCEPT
Enable NAT Enable
Fortinet Technologies Inc. Page 194 Install and System Administration for FortiOS 5.0
set dstintf external
set dstaddr all
set schedule always
set service ALL
set action accept
set nat enable
set status enable
end
Configure the VLAN switch
On the Cisco Catalyst 2950 Catalyst VLAN switch, you need to define VLANs 100 and 200 in the
VLAN database, and then add a configuration file to define the VLAN subinterfaces and the
802.1Q trunk interface.
One method to configure a Cisco switch is to connect over a serial connection to the console
port on the switch, and enter the commands at the CLI. Another method is to designate one
interface on the switch as the management interface and use a web browser to connect to the
switchs graphical interface. For details on connecting and configuring your Cisco switch, refer
to the installation and configuration manuals for the switch.
The switch used in this example is a Cisco Catalyst 2950 switch. The commands used are IOS
commands. Refer to the switch manual for help with these commands.
To configure the VLAN subinterfaces and the trunk interfaces
Add this file to the Cisco switch:
!
interface FastEthernet0/3
switchport access vlan 100
!
interface FastEthernet0/9
switchport access vlan 200
!
interface FastEthernet0/24
switchport trunk encapsulation dot1q
switchport mode trunk
!
The switch has the configuration:
Port 0/3 VLAN ID 100
Port 0/9
VLAN ID 200
Port 0/24 802.1Q trunk
To complete the setup, configure devices on VLAN_100 and VLAN_200 with default gateways.
The default gateway for VLAN_100 is the FortiGate VLAN_100 subinterface. The default
gateway for VLAN_200 is the FortiGate VLAN_200 subinterface.
Fortinet Technologies Inc. Page 195 Install and System Administration for FortiOS 5.0
Test the configuration
Use diagnostic commands, such as tracert, to test traffic routed through the FortiGate unit
and the Cisco switch.
Testing traffic from VLAN_100 to VLAN_200
In this example, a route is traced between the two internal networks. The route target is a host
on VLAN_200.
Access a command prompt on a Windows computer on the VLAN_100 network, and enter the
following command:
C:\>tracert 10.1.2.2
Tracing route to 10.1.2.2 over a maximum of 30 hops:
1 <10 ms <10 ms <10 ms 10.1.1.1
2 <10 ms <10 ms <10 ms 10.1.2.2
Trace complete.
Testing traffic from VLAN_200 to the external network
In this example, a route is traced from an internal network to the external network. The route
target is the external network interface of the FortiGate-800 unit.
From VLAN_200, access a command prompt and enter this command:
C:\>tracert 172.16.21.2
Tracing route to 172.16.21.2 over a maximum of 30 hops:
1 <10 ms <10 ms <10 ms 10.1.2.1
2 <10 ms <10 ms <10 ms 172.16.21.2
Trace complete.
VLANs in transparent mode
In transparent mode, the FortiGate unit behaves like a layer-2 bridge but can still provide
services such as antivirus scanning, web filtering, spam filtering and intrusion protection to
traffic. There are some limitations in transparent mode in that you cannot use SSL VPN,
PPTP/L2TP VPN, DHCP server, or easily perform NAT on traffic. The limits in transparent mode
apply to IEEE 802.1Q VLAN trunks passing through the unit.
VLANs and transparent mode
You can insert the FortiGate unit operating in transparent mode into the VLAN trunk without
making changes to your network. In a typical configuration, the FortiGate unit internal interface
accepts VLAN packets on a VLAN trunk from a VLAN switch or router connected to internal
network VLANs. The FortiGate external interface forwards VLAN-tagged packets through
another VLAN trunk to an external VLAN switch or router and on to external networks such as
the Internet. You can configure the unit to apply different policies for traffic on each VLAN in the
trunk.
To pass VLAN traffic through the FortiGate unit, you add two VLAN subinterfaces with the same
VLAN ID, one to the internal interface and the other to the external interface. You then create a
security policy to permit packets to flow from the internal VLAN interface to the external VLAN
interface. If required, you create another security policy to permit packets to flow from the
external VLAN interface to the internal VLAN interface. Typically in transparent mode, you do
not permit packets to move between different VLANs. Network protection features, such as
Fortinet Technologies Inc. Page 196 Install and System Administration for FortiOS 5.0
spam filtering, web filtering and anti-virus scanning, are applied through the UTM profiles
specified in each security policy, enabling very detailed control over traffic.
When the FortiGate unit receives a VLAN-tagged packet at a physical interface, it directs the
packet to the VLAN subinterface with the matching VLAN ID. The VLAN tag is removed from the
packet, and the FortiGate unit then applies security policies using the same method it uses for
non-VLAN packets. If the packet exits the FortiGate unit through a VLAN subinterface, the
VLAN ID for that subinterface is added to the packet and the packet is sent to the
corresponding physical interface. For a configuration example, see Example of VLANs in
transparent mode on page 198.
There are two essential steps to configure your FortiGate unit to work with VLANs in transparent
mode:
Add VLAN subinterfaces
Create security policies
You can also configure the protection profiles that manage antivirus scanning, web filtering and
spam filtering. For more information on UTM profiles, see the UTM Guide.
Add VLAN subinterfaces
The VLAN ID of each VLAN subinterface must match the VLAN ID added by the
IEEE 802.1Q-compliant router or switch. The VLAN ID can be any number between 1 and 4094,
with 0 being used only for high priority frames and 4095 being reserved. You add VLAN
subinterfaces to the physical interface that receives VLAN-tagged packets.
For this example, we are creating a VLAN called internal_v225 on the internal interface, with a
VLAN ID of 225. Administrative access is enabled for HTTPS and SSH. VDOMs are not enabled.
To add VLAN subinterfaces in transparent mode - web-based manager
1. Go to System > Network > Interface.
2. Select Create New.
3. Enter the following information and select OK.
The FortiGate unit adds the new subinterface to the interface that you selected.
Repeat steps 2 and 3 to add additional VLANs. You will need to change the VLAN ID, Name,
and possibly Interface when adding additional VLANs.
Name internal_v225
Type VLAN
Interface internal
VLAN ID 225
Administrative Access Enable HTTPS, and SSH. These are very secure
access methods.
Comments VLAN 225 on internal interface
Fortinet Technologies Inc. Page 197 Install and System Administration for FortiOS 5.0
To add VLAN subinterfaces in transparent mode - CLI
config system interface
edit internal_v225
set interface internal
set vlanid 225
set allowaccess HTTPS SSH
set description VLAN 225 on internal interface
set vdom root
end
Create security policies
In transparent mode, the FortiGate unit performs antivirus and antispam scanning on each
VLANs packets as they pass through the unit. You need security policies to permit packets to
pass from the VLAN interface where they enter the unit to the VLAN interface where they exit the
unit. If there are no security policies configured, no packets will be allowed to pass from one
interface to another.
To add security policies for VLAN subinterfaces - web based manager
1. Go to Firewall Objects > Address > Address.
2. Select Create New to add firewall addresses that match the source and destination IP
addresses of VLAN packets.
3. Go to Policy > Policy > Policy and select Create New.
4. Leave the Policy Type as Firewall and the Policy Subtype as Address.
5. From the Incoming Interface/Zone list, select the VLAN interface where packets enter the
unit.
6. From the Outgoing Interface/Zone list, select the VLAN interface where packets exit the unit.
7. Select the Source and Destination Address names that you added in step 2.
8. Select OK.
To add security policies for VLAN subinterfaces - CLI
config firewall address
edit incoming_VLAN_address
set associated-interface <incoming_VLAN_interface>
set type ipmask
set subnet <IPv4_address_mask)
next
edit outgoing_VLAN_address
set associated-interface <outgoing_VLAN_interface>
set type ipmask
set subnet <IPv4_address_mask>
next
end
config firewall policy
edit <unused_policy_number>
set srcintf <incoming_VLAN_interface>
set srcaddr incoming_VLAN_address
set destintf <outgoing_VLAN_interface>
Fortinet Technologies Inc. Page 198 Install and System Administration for FortiOS 5.0
set destaddr outgoing_VLAN_address
set service <protocol_to_allow_on VLAN>
set action ACCEPT
next
end
Example of VLANs in transparent mode
In this example, the FortiGate unit is operating in transparent mode and is configured with two
VLANs: one with an ID of 100 and the other with ID 200. The internal and external physical
interfaces each have two VLAN subinterfaces, one for VLAN_100 and one for VLAN_200.
The IP range for the internal VLAN_100 network is 10.100.0.0/255.255.0.0, and for the internal
VLAN_200 network is 10.200.0.0/255.255.0.0.
The internal networks are connected to a Cisco 2950 VLAN switch, which combines traffic from
the two VLANs onto one the FortiGate unit internal interface. The VLAN traffic leaves the
FortiGate unit on the external network interface, goes on to the VLAN switch, and on to the
Internet. When the FortiGate units receives a tagged packet, it directs it from the incoming
VLAN subinterface to the outgoing VLAN subinterface for that VLAN.
This section describes how to configure a FortiGate-800 unit, Cisco switch, and Cisco router in
the network topology shown in Figure 180.
Figure 16:VLAN transparent network topology
General configuration steps
The following steps summarize the configuration for this example. For best results, follow the
procedures in the order given. Also, note that if you perform any additional actions between
procedures, your configuration may have different results.
V
L
A
N
r
o
u
te
r
1
0
.1
0
0
.0
.1
1
0
.2
0
0
.0
.1
V
L
A
N
S
w
itc
h
V
L
A
N
2
0
0
N
e
tw
o
r
k
1
0
.2
0
0
.0
.0
F
a
0
/9
F
a
0
/3
F
a
0
/2
4
8
0
2
.
1
Q
t
r
u
n
k
V
L
A
N
1
,
2
E
x
te
r
n
a
l
In
te
r
n
a
l
V
L
A
N
1
0
0
V
L
A
N
2
0
0
V
L
A
N
1
0
0
N
e
tw
o
r
k
1
0
.1
0
0
.0
.0
e
r
n
a
l
IIIIIn IIn In Inn
tte
r
n
a
V
L
V
L
V
L
V
L
V
A
N
A
N
A
N
A
N
A
N
A
N
SSSSSS
ww
i
w
i
w
i
ww
ittc tc tc t
hhh
F
a
F
0
/3 /3333
0
/2
4
Fortinet Technologies Inc. Page 199 Install and System Administration for FortiOS 5.0
1. Configure the FortiGate unit which includes
Adding VLAN subinterfaces
Adding the security policies
2. Configure the Cisco switch and router
Configure the FortiGate unit
The FortiGate unit must be configured with the VLAN subinterfaces and the proper security
policies to enable traffic to flow through the FortiGate unit.
Add VLAN subinterfaces
For each VLAN, you need to create a VLAN subinterface on the internal interface and another
one on the external interface, both with the same VLAN ID.
To add VLAN subinterfaces - web-based manager
1. Go to System > Network > Interface.
2. Select Create New.
3. Enter the following information and select OK:
4. Select Create New.
5. Enter the following information and select OK:
6. Select Create New.
7. Enter the following information and select OK:
8. Select Create New.
9. Enter the following information and select OK:
Name VLAN_100_int
Interface internal
VLAN ID 100
Name VLAN_100_ext
Interface external
VLAN ID 100
Name VLAN_200_int
Interface internal
VLAN ID 200
Name VLAN_200_ext
Interface external
VLAN ID 200
Fortinet Technologies Inc. Page 200 Install and System Administration for FortiOS 5.0
To add VLAN subinterfaces - CLI
config system interface
edit VLAN_100_int
set status down
set type vlan
set interface internal
set vlanid 100
next
edit VLAN_100_ext
set status down
set type vlan
set interface external
set vlanid 100
next
edit VLAN_200_int
set status down
set type vlan
set interface internal
set vlanid 200
next
edit VLAN_200_ext
set status down
set type vlan
set interface external
set vlanid 200
end
Add the security policies
Security policies allow packets to travel between the VLAN_100_int interface and the
VLAN_100_ext interface. Two policies are required; one for each direction of traffic. The same is
required between the VLAN_200_int interface and the VLAN_200_ext interface, for a total of four
required security policies.
To add the security policies - web-based manager
1. Go to Policy > Policy > Policy and select Create New.
2. Leave the Policy Type as Firewall and the Policy Subtype as Address.
3. Enter the following information and select OK:
Incoming Interface VLAN_100_int
Source Address all
Outgoing Interface VLAN_100_ext
Destination Address all
Schedule Always
Service ALL
Action ACCEPT
Fortinet Technologies Inc. Page 201 Install and System Administration for FortiOS 5.0
4. Select Create New.
5. Leave the Policy Type as Firewall and the Policy Subtype as Address.
6. Enter the following information and select OK:
7. Go to Policy > Policy > Policy and select Create New.
8. Leave the Policy Type as Firewall and the Policy Subtype as Address.
9. Enter the following information and select OK:
10.Select Create New.
11.Leave the Policy Type as Firewall and the Policy Subtype as Address.
12.Enter the following information and select OK::
Incoming Interface VLAN_100_ext
Source Address all
Outgoing Interface VLAN_100_int
Destination Address all
Schedule Always
Service ALL
Action ACCEPT
Incoming Interface VLAN_200_int
Source Address all
Outgoing Interface VLAN_200_ext
Destination Address all
Schedule Always
Service ALL
Action ACCEPT
Enable NAT Enable
Incoming Interface VLAN_200_ext
Source Address all
Outgoing Interface VLAN_200_int
Destination Address all
Schedule Always
Service ALL
Action ACCEPT
Fortinet Technologies Inc. Page 202 Install and System Administration for FortiOS 5.0
To add the security policies - CLI
config firewall policy
edit 1
set srcintf VLAN_100_int
set srcaddr all
set dstintf VLAN_100_ext
set dstaddr all
set action accept
set schedule always
set service ALL
next
edit 2
set srcintf VLAN_100_ext
set srcaddr all
set dstintf VLAN_100_int
set dstaddr all
set action accept
set schedule always
set service ALL
next
edit 3
set srcintf VLAN_200_int
set srcaddr all
set dstintf VLAN_200_ext
set dstaddr all
set action accept
set schedule always
set service ALL
next
edit 4
set srcintf VLAN_200_ext
set srcaddr all
set dstintf VLAN_200_int
set dstaddr all
set action accept
set schedule always
set service ALL
end
Configure the Cisco switch and router
This example includes configuration for the Cisco Catalyst 2900 ethernet switch, and for the
Cisco Multiservice 2620 ethernet router. If you have access to a different VLAN enabled switch
or VLAN router you can use them instead, however their configuration is not included in this
document.
Configure the Cisco switch
On the VLAN switch, you need to define VLAN_100 and VLAN_200 in the VLAN database and
then add a configuration file to define the VLAN subinterfaces and the 802.1Q trunk interface.
Fortinet Technologies Inc. Page 203 Install and System Administration for FortiOS 5.0
Add this file to the Cisco switch:
interface FastEthernet0/3
switchport access vlan 100
!
interface FastEthernet0/9
switchport access vlan 200
!
interface FastEthernet0/24
switchport trunk encapsulation dot1q
switchport mode trunk
!
The switch has the following configuration:
Configure the Cisco router
You need to add a configuration file to the Cisco Multiservice 2620 ethernet router. The file
defines the VLAN subinterfaces and the 802.1Q trunk interface on the router. The 802.1Q trunk
is the physical interface on the router.
The IP address for each VLAN on the router is the gateway for that VLAN. For example, all
devices on the internal VLAN_100 network will have 10.100.0.1 as their gateway.
Add this file to the Cisco router:
!
interface FastEthernet0/0
!
interface FastEthernet0/0.1
encapsulation dot1Q 100
ip address 10.100.0.1 255.255.255.0
!
interface FastEthernet0/0.2
encapsulation dot1Q 200
ip address 10.200.0.1 255.255.255.0
!
The router has the following configuration:
Port 0/3 VLAN ID 100
Port 0/9 VLAN ID 200
Port 0/24 802.1Q trunk
Port 0/0.1 VLAN ID 100
Port 0/0.2 VLAN ID 200
Port 0/0 802.1Q trunk
Fortinet Technologies Inc. Page 204 Install and System Administration for FortiOS 5.0
Test the configuration
Use diagnostic network commands such as traceroute (tracert) and ping to test traffic routed
through the network.
Testing traffic from VLAN_100 to VLAN_200
In this example, a route is traced between the two internal networks. The route target is a host
on VLAN_200. The Windows traceroute command tracert is used.
From VLAN_100, access a Windows command prompt and enter this command:
C:\>tracert 10.1.2.2
Tracing route to 10.1.2.2 over a maximum of 30 hops:
1 <10 ms <10 ms <10 ms 10.1.1.1
2 <10 ms <10 ms <10 ms 10.1.2.2
Trace complete.
Troubleshooting VLAN issues
Several problems can occur with your VLANs. Since VLANs are interfaces with IP addresses,
they behave as interfaces and can have similar problems that you can diagnose with tools such
as ping, traceroute, packet sniffing, and diag debug.
Asymmetric routing
You might discover unexpectedly that hosts on some networks are unable to reach certain other
networks. This occurs when request and response packets follow different paths. If the
FortiGate unit recognizes the response packets, but not the requests, it blocks the packets as
invalid. Also, if the FortiGate unit recognizes the same packets repeated on multiple interfaces,
it blocks the session as a potential attack.
This is asymmetric routing. By default, the FortiGate unit blocks packets or drops the session
when this happens. You can configure the FortiGate unit to permit asymmetric routing by using
the following CLI commands:
config vdom
edit <vdom_name>
config system settings
set asymroute enable
end
end
If VDOMs are enabled, this command is per VDOM. You must set it for each VDOM that has the
problem. If this solves your blocked traffic issue, you know that asymmetric routing is the cause.
But allowing asymmetric routing is not the best solution, because it reduces the security of your
network.
For a long-term solution, it is better to change your routing configuration or change how your
FortiGate unit connects to your network. The Asymmetric Routing and Other FortiGate Layer-2
Fortinet Technologies Inc. Page 205 Install and System Administration for FortiOS 5.0
Installation Issues technical note provides detailed examples of asymmetric routing situations
and possible solutions.
Layer-2 and Arp traffic
By default, FortiGate units do not pass layer-2 traffic. If there are layer-2 protocols such as IPX,
PPTP or L2TP in use on your network, you need to configure your FortiGate unit interfaces to
pass these protocols without blocking. Another type of layer-2 traffic is ARP traffic. For more
information on ARP traffic, see ARP traffic on page 205.
You can allow these layer-2 protocols using the CLI command:
config vdom
edit <vdom_name>
config system interface
edit <name_str>
set l2forward enable
end
end
where <name_str> is the name of an interface.
If VDOMs are enabled, this command is per VDOM. You must set it for each VDOM that has the
problem. If you enable layer-2 traffic, you may experience a problem if packets are allowed to
repeatedly loop through the network. This repeated looping, very similar to a broadcast storm,
occurs when you have more than one layer-2 path to a destination. Traffic may overflow and
bring your network to a halt. You can break the loop by enabling Spanning Tree Protocol (STP)
on your networks switches and routers. For more information, see STP forwarding on
page 1262.
ARP traffic
Address Resolution Protocol (ARP) packets are vital to communication on a network, and ARP
support is enabled on FortiGate unit interfaces by default. Normally you want ARP packets to
pass through the FortiGate unit, especially if it is sitting between a client and a server or
between a client and a router.
ARP traffic can cause problems, especially in transparent mode where ARP packets arriving on
one interface are sent to all other interfaces including VLAN subinterfaces. Some layer-2
switches become unstable when they detect the same MAC address originating on more than
one switch interface or from more than one VLAN. This instability can occur if the layer-2 switch
does not maintain separate MAC address tables for each VLAN. Unstable switches may reset
and cause network traffic to slow down considerably.
Note that the default ARP timeout value is 300 seconds. This is not a configurable value.
Multiple VDOMs solution
By default, physical interfaces are in the root domain. If you do not configure any of your VLANs
in the root VDOM, it will not matter how many interfaces are in the root VDOM.
The multiple VDOMs solution is to configure multiple VDOMs on the FortiGate unit, one for each
VLAN. In this solution, you configure one inbound and one outbound VLAN interface in each
If you enable asymmetric routing, antivirus and intrusion prevention systems will not be
effective. Your FortiGate unit will be unaware of connections and treat each packet individually.
It will become a stateless firewall.
Fortinet Technologies Inc. Page 206 Install and System Administration for FortiOS 5.0
VDOM. ARP packets are not forwarded between VDOMs. This configuration limits the VLANs in
a VDOM and correspondingly reduces the administration needed per VDOM.
As a result of this configuration, the switches do not receive multiple ARP packets with
duplicate MACs. Instead, the switches receive ARP packets with different VLAN IDs and
different MACs. Your switches are stable.
However, you should not use the multiple VDOMs solution under any of the following
conditions:
you have more VLANs than licensed VDOMs
you do not have enough physical interfaces
Instead, use one of two possible solutions, depending on which operation mode you are using:
In NAT mode, you can use the vlan forward CLI command.
In transparent mode, you can use the forward-domain CLI command. But you still need to
be careful in some rare configurations.
Vlanforward solution
If you are using NAT mode, the solution is to use the vlanforward CLI command for the
interface in question. By default, this command is enabled and will forward VLAN traffic to all
VLANs on this interface. When disabled, each VLAN on this physical interface can send traffic
only to the same VLAN. There is no cross-talk between VLANs, and ARP packets are forced
to take one path along the network which prevents the multiple paths problem.
In the following example, vlanforward is disabled on port1. All VLANs configured on port1
will be separate and will not forward any traffic to each other.
config system interface
edit port1
set vlanforward disable
end
Forward-domain solution
If you are using transparent mode, the solution is to use the forward-domain CLI command.
This command tags VLAN traffic as belonging to a particular collision group, and only VLANs
tagged as part of that collision group receive that traffic. It is like an additional set of VLANs. By
default, all interfaces and VLANs are part of forward-domain collision group 0. The many
benefits of this solution include reduced administration, the need for fewer physical interfaces,
and the availability of more flexible network solutions.
In the following example, forward-domain collision group 340 includes VLAN 340 traffic on
port1 and untagged traffic on port 2. Forward-domain collision group 341 includes VLAN 341
traffic on port 1 and untagged traffic on port 3. All other interfaces are part of forward-domain
collision group 0 by default. This configuration separates VLANs 340 and 341 from each other
on port 1, and prevents the ARP packet problems from before.
Use these CLI commands:
config system interface
edit port1
next
edit port2
set forward_domain 340
next
edit port3
Fortinet Technologies Inc. Page 207 Install and System Administration for FortiOS 5.0
set forward_domain 341
next
edit port1-340
set forward_domain 340
set interface port1
set vlanid 340
next
edit port1-341
set forward_domain 341
set interface port1
set vlanid 341
end
You may experience connection issues with layer-2 traffic, such as ping, if your network
configuration has:
packets going through the FortiGate unit in transparent mode more than once
more than one forwarding domain (such as incoming on one forwarding domain and
outgoing on another)
IPS and AV enabled.
Now IPS and AV is applied the first time packets go through the FortiGate unit, but not on
subsequent passes. Only applying IPS and AV to this first pass fixes the network layer-2 related
connection issues.
NetBIOS
Computers running Microsoft Windows operating systems that are connected through a
network rely on a WINS server to resolve host names to IP addresses. The hosts communicate
with the WINS server by using the NetBIOS protocol.
To support this type of network, you need to enable the forwarding of NetBIOS requests to a
WINS server. The following example will forward NetBIOS requests on the internal interface for
the WINS server located at an IP address of 192.168.111.222.
config system interface
edit internal
set netbios_forward enable
set wins-ip 192.168.111.222
end
These commands apply only in NAT mode. If VDOMs are enabled, these commands are per
VDOM. You must set them for each VDOM that has the problem.
STP forwarding
The FortiGate unit does not participate in the Spanning Tree Protocol (STP). STP is an IEEE
802.1 protocol that ensures there are no layer-2 loops on the network. Loops are created when
there is more than one route for traffic to take and that traffic is broadcast back to the original
switch. This loop floods the network with traffic, reducing available bandwidth to nothing.
If you use your FortiGate unit in a network topology that relies on STP for network loop
protection, you need to make changes to your FortiGate configuration. Otherwise, STP
recognizes your FortiGate unit as a blocked link and forwards the data to another path. By
default, your FortiGate unit blocks STP as well as other non-IP protocol traffic.
Fortinet Technologies Inc. Page 208 Install and System Administration for FortiOS 5.0
Using the CLI, you can enable forwarding of STP and other layer-2 protocols through the
interface. In this example, layer-2 forwarding is enabled on the external interface:
config system interface
edit external
set l2forward enable
set stpforward enable
end
By substituting different commands for stpforward enable, you can also allow layer-2
protocols such as IPX, PPTP or L2TP to be used on the network. For more information, see
Layer-2 and Arp traffic on page 205.
Too many VLAN interfaces
Any virtual domain can have a maximum of 255 interfaces in transparent mode. This includes
VLANs, other virtual interfaces, and physical interfaces. NAT mode supports from 255 to 8192
depending on the FortiGate model. This total number of interfaces includes VLANs, other virtual
interfaces, and physical interfaces.
Your FortiGate unit may allow you to configure more interfaces than this. However, if you
configure more than 255 interfaces, your system will become unstable and, over time, will not
work properly. As all interfaces are used, they will overflow the routing table that stores the
interface information, and connections will fail. When you try to add more interfaces, an error
message will state that the maximum limit has already been reached.
If you see this error message, chances are you already have too many VLANs on your system
and your routing has become unstable. To verify, delete a VLAN and try to add it back. If you
have too many, you will not be able to add it back on to the system. In this case, you will need to
remove enough interfaces (including VLANs) so that the total number of interfaces drops to 255
or less. After doing this, you should also reboot your FortiGate unit to clean up its memory and
buffers, or you will continue to experience unstable behavior.
To configure more than 255 interfaces on your FortiGate unit in transparent mode, you have to
configure multiple VDOMs, each with many VLANs. However, if you want to create more than
the default 10 VDOMs (or a maximum of 2550 interfaces), you must buy a license for additional
VDOMs. Only FortiGate models 3000 and higher support more than 10 VDOMs.
With these extra licenses, you can configure up to 500 VDOMs, with each VDOM containing up
to 255 VLANs in transparent mode. This is a theoretical maximum of over 127 500 interfaces.
However, system resources will quickly get used up before reaching that theoretical maximum.
To achieve the maximum number of VDOMs, you need to have top-end hardware with the most
resources possible.
In NAT mode, if you have a top-end model, the maximum interfaces per VDOM can be as high
as 8192, enough for all the VLANs in your configuration.
Your FortiGate unit has limited resources, such as CPU load and memory, that are divided
between all configured VDOMs. When running 250 or more VDOMs, you may need to monitor
the system resources to ensure there is enough to support the configured traffic processing.
Page 209
PPTP and L2TP
A virtual private network (VPN) is a way to use a public network, such as the Internet, as a
vehicle to provide remote offices or individual users with secure access to private networks.
FortiOS supports the Point-to-Point Tunneling Protocol (PPTP), which enables interoperability
between FortiGate units and Windows or Linux PPTP clients. Because FortiGate units support
industry standard PPTP VPN technologies, you can configure a PPTP VPN between a FortiGate
unit and most third-party PPTP VPN peers.
This section describes how to configure PPTP and L2TP VPNs as well as PPTP passthrough.
This section includes the topics:
How PPTP VPNs work
FortiGate unit as a PPTP server
Configuring the FortiGate unit for PPTP VPN
Configuring the FortiGate unit for PPTP pass through
Testing PPTP VPN connections
Logging VPN events
Configuring L2TP VPNs
L2TP configuration overview
How PPTP VPNs work
The Point-to-Point Tunneling Protocol enables you to create a VPN between a remote client and
your internal network. Because it is a Microsoft Windows standard, PPTP does not require
third-party software on the client computer. As long as the ISP supports PPTP on its servers,
you can create a secure connection by making relatively simple configuration changes to the
client computer and the FortiGate unit.
PPTP uses Point-to-Point protocol (PPP) authentication protocols so that standard PPP
software can operate on tunneled PPP links. PPTP packages data in PPP packets and then
encapsulates the PPP packets within IP packets for transmission through a VPN tunnel.
When the FortiGate unit acts as a PPTP server, a PPTP session and tunnel is created as soon as
the PPTP client connects to the FortiGate unit. More than one PPTP session can be supported
on the same tunnel. FortiGate units support PAP, CHAP, and plain text authentication. PPTP
clients are authenticated as members of a user group.
Traffic from one PPTP peer is encrypted using PPP before it is encapsulated using Generic
Routing Encapsulation (GRE) and routed to the other PPTP peer through an ISP network. PPP
packets from the remote client are addressed to a computer on the private network behind the
FortiGate unit. PPTP packets from the remote client are addressed to the public interface of the
FortiGate unit. See Figure 17 on page 210
Fortinet Technologies Inc. Page 210 Install and System Administration for FortiOS 5.0
.
Figure 17:Packet encapsulation
In Figure 17, traffic from the remote client is addressed to a computer on the network behind the
FortiGate unit. When the PPTP tunnel is established, packets from the remote client are
encapsulated and addressed to the FortiGate unit. The FortiGate unit forwards disassembled
packets to the computer on the internal network.
When the remote PPTP client connects, the FortiGate unit assigns an IP address from a
reserved range of IP addresses to the client PPTP interface. The PPTP client uses the assigned
IP address as its source address for the duration of the connection.
When the FortiGate unit receives a PPTP packet, the unit disassembles the PPTP packet and
forwards the packet to the correct computer on the internal network. The security policy and
protection profiles on the FortiGate unit ensure that inbound traffic is screened and processed
securely.
PPTP control channel messages are not authenticated, and their integrity is not protected.
Furthermore, encapsulated PPP packets are not cryptographically protected and may be read
or modified unless appropriate encryption software such as Secure Shell (SSH) or Secure File
Transfer Protocol (SFTP) is used to transfer data after the tunnel has been established.
As an alternative, you can use encryption software such as Microsoft Point-to-Point Encryption
(MPPE) to secure the channel. MPPE is built into Microsoft Windows clients and can be
installed on Linux clients. FortiGate units support MPPE.
3
1
2
3
1
2
3
1
2
T
r
a
ffic
d
e
s
tin
a
tio
n
1
9
2
.1
6
8
.2
0
.2
T
r
a
ffic
d
e
s
tin
a
tio
n
1
9
2
.1
6
8
.2
0
.2
P
P
T
P
p
a
c
k
e
ts
d
e
s
tin
a
tio
n
1
7
2
.1
6
.3
0
.1
3
1
2
P
P
T
P
p
a
c
k
e
ts
d
e
s
tin
a
tio
n
1
7
2
.1
6
.3
0
.1
1
7
2
.1
6
.3
0
.1
PPTP clients must be authenticated before a tunnel is established. The authentication process
relies on FortiGate user group definitions, which can optionally use established authentication
mechanisms such as RADIUS or LDAP to authenticate PPTP clients. All PPTP clients are
challenged when a connection attempt is made.
Fortinet Technologies Inc. Page 211 Install and System Administration for FortiOS 5.0
FortiGate unit as a PPTP server
In the most common Internet scenario, the PPTP client connects to an ISP that offers PPP
connections with dynamically-assigned IP addresses. The ISP forwards PPTP packets to the
Internet, where they are routed to the FortiGate unit.
Figure 18:FortiGate unit as a PPTP server
If the FortiGate unit will act as a PPTP server, there are a number of steps to complete:
Configure user authentication for PPTP clients.
Enable PPTP.
Specify the range of addresses that are assigned to PPTP clients when connecting
Configure the security policy.
Configuring user authentication for PPTP clients
To enable authentication for PPTP clients, you must create user accounts and a user group to
identify the PPTP clients that need access to the network behind the FortiGate unit. Within the
user group, you must add a user for each PPTP client.
You can choose to use a plain text password for authentication or forward authentication
requests to an external RADIUS, LDAP, or TACACS+ server. If password protection will be
provided through a RADIUS, LDAP, or TACACS+ server, you must configure the FortiGate unit to
forward authentication requests to the authentication server.
This example creates a basic user/password combination.
Configuring a user account
To add a local user - web-based manager
1. Go to User & Device > User > User Definition and select Create New.
2. Enter a User Name.
3. Enter a Password for the user. The password should be at least six characters.
4. Select OK.
I
n
t
e
r
n
a
l
N
e
t
w
o
r
k
P
P
T
P
_
C
l
i
e
n
t
_
1
P
P
T
P
_
C
l
i
e
n
t
_
3
P
P
T
P
_
C
l
i
e
n
t
_
2
Fortinet Technologies Inc. Page 212 Install and System Administration for FortiOS 5.0
To add a local user - CLI
config user local
edit <username>
set type password
set passwd <password>
end
Configuring a user group
To ease configuration, create user groups that contain users in similar categories or
departments.
To create a user group - web-based manager
1. Go to User & Device > User > User Group and select Create New.
2. Enter a Name for the group.
3. Select the Type of Firewall.
4. From the Available Users list, select the required users and select the right-facing arrow to
add them to the Members list.
5. Select OK.
To create a user group - CLI
config user group
edit <group_name>
set group-type firewall
set members <user_names>
end
Enabling PPTP and specifying the PPTP IP address range
The PPTP address range specifies the range of addresses reserved for remote PPTP clients.
When a PPTP client connects to the FortiGate unit, the client is assigned an IP address from
this range. Afterward, the FortiGate unit uses the assigned address to communicate with the
PPTP client.
The address range that you reserve can be associated with private or routable IP addresses. If
you specify a private address range that matches a network behind the FortiGate unit, the
assigned address will make the PPTP client appear to be part of the internal network.
PPTP requires two IP addresses, one for each end of the tunnel. The PPTP address range is the
range of addresses reserved for remote PPTP clients. When the remote PPTP client establishes
a connection, the FortiGate unit assigns an IP address from the reserved range of IP addresses
to the client PPTP interface or retrieves the assigned IP address from the PPTP user group. If
you use the PPTP user group, you must also define the FortiGate end of the tunnel by entering
the IP address of the unit in Local IP (web-based manager) or local-ip (CLI). The PPTP client
uses the assigned IP address as its source address for the duration of the connection.
PPTP configuration is only available through the CLI. In the example below, PPTP is enabled
with the use of an IP range of 182.168.1.1 to 192.168.1.10 for addressing.
The start and end IPs in the PPTP address range must be in the same 24-bit subnet, for
example, 192.168.1.1 - 192.168.1.254.
Fortinet Technologies Inc. Page 213 Install and System Administration for FortiOS 5.0
config vpn pptp
set status enable
set ip-mode range
set eip 192.168.1.10
set sip 192.168.1.1
end
In this example, PPTP is enabled with the use of a user group for addressing, where the IP
address of the PPTP server is 192.168.1.2 and the user group is hr_admin.
config vpn pptp
set status enable
set ip-mode range
set local-ip 192.168.2.1
set usrgrp hr_admin
end
Adding the security policy
The security policy specifies the source and destination addresses that can generate traffic
inside the PPTP tunnel and defines the scope of services permitted through the tunnel. If a
selection of services are required, define a service group.
To configure the firewall for the PPTP tunnel - web-based manager
1. Go to Policy > Policy > Policy and select Create New.
2. Leave the Policy Type as Firewall and the Policy Subtype as Address.
3. Complete the following and select OK:
Do not select identity-based policy, as this will cause the PPTP access to fail. Authentication is
configured in the PPTP configuration setup
Incoming Interface The FortiGate interface connected to the Internet.
Source Address Select the name that corresponds to the range of addresses
that you reserved for PPTP clients.
Outgoing Interface The FortiGate interface connected to the internal network.
Destination Address Select the name that corresponds to the IP addresses
behind the FortiGate unit.
Schedule always
Service ALL
Action ACCEPT
Fortinet Technologies Inc. Page 214 Install and System Administration for FortiOS 5.0
To configure the firewall for the PPTP tunnel - CLI
config firewall policy
edit 1
set srcintf <interface to internet>
set dstintf <interface to internal network>
set srcaddr <reserved_range>
set dstaddr <internal_addresses>
set action accept
set schedule always
set service ALL
end
Configuring the FortiGate unit for PPTP VPN
To arrange for PPTP packets to pass through the FortiGate unit to an external PPTP server,
perform the following tasks in the order given:
Configure user authentication for PPTP clients.
Enable PPTP on the FortiGate unit and specify the range of addresses that can be assigned
to PPTP clients when they connect.
Configure PPTP pass through on the FortiGate unit.
Configuring the FortiGate unit for PPTP pass through
To forward PPTP packets to a PPTP server on the network behind the FortiGate unit, you need
to perform the following configuration tasks on the FortiGate unit:
Define a virtual IP address that points to the PPTP server.
Create a security policy that allows incoming PPTP packets to pass through to the PPTP
server.
Configuring a virtual IP address
The virtual IP address will be the address of the PPTP server host.
To define a virtual IP for PPTP pass through - web-based manager
1. Go to Firewall Objects > Virtual IP > Virtual IP.
2. Select Create New.
3. Enter the name of the VIP, for example, PPTP_Server.
4. Select the External Interface where the packets will be received for the PPTP server.
5. Enter the External IP Address for the VIP.
6. Select Port Forwarding.
7. Set the Protocol to TCP.
The address range is the external (public) ip address range which requires access to the internal
PPTP server through the FortiGate virtual port-forwarding firewall.
IP addresses used in this document are fictional and follow the technical documentation
guidelines specific to Fortinet. Real external IP addresses are not used.
Fortinet Technologies Inc. Page 215 Install and System Administration for FortiOS 5.0
8. Enter the External Service Port of 1723, the default for PPTP.
9. Enter the Map to Port to 1723.
10.Select OK.
To define a virtual IP for PPTP pass through - web-based manager
config firewall vip
edit PPTP_Server
set extinf <interface>
set extip <ip_address>
set portforward enable
set protocol tcp
set extport 1723
set mappedport 1723
end
Configuring a port-forwarding security policy
To create a port-forwarding security policy for PPTP pass through you must first create an
address range reserved for the PPTP clients.
To create an address range - web-based manager
1. Go to Firewall Objects > Address > Address and select Create New.
2. Enter a Name for the range, for example, External_PPTP.
3. Select a Type of Subnet/IP Range.
4. Enter the IP address range.
5. Select the Interface to the Internet.
6. Select OK.
To create an address range - CLI
config firewall address
edit External_PPTP
set iprange <ip_range>
set start-ip <ip_address>
set end-ip <ip_address>
set associated-interface <internet_interface>
end
With the address set, you can add the security policy.
To add the security policy - web-based manager
1. Go to Policy > Policy > Policy and select Create New.
2. Leave the Policy Type as Firewall and the Policy Subtype as Address.
3. Complete the following and select OK:
Incoming Interface The FortiGate interface connected to the Internet.
Source Address Select the address range created in the previous step.
Outgoing Interface The FortiGate interface connected to the PPTP server.
Destination Address Select the VIP address created in the previous steps.
Fortinet Technologies Inc. Page 216 Install and System Administration for FortiOS 5.0
To add the security policy - CLI
config firewall policy
edit <policy_number>
set srcintf <interface to internet>
set dstintf <interface to PPTP server>
set srcaddr <address_range>
set dstaddr <PPTP_server_address>
set action accept
set schedule always
set service PPTP
end
Testing PPTP VPN connections
To confirm that a PPTP VPN between a local network and a dialup client has been configured
correctly, at the dialup client, issue a ping command to test the connection to the local network.
The PPTP VPN tunnel initializes when the dialup client attempts to connect.
Logging VPN events
PPTP VPN, activity is logged when enabling VPN logging. The FortiGate unit connection events
and tunnel status (up/down) are logged.
To log VPN events
1. Go to Log & Report > Log Config > Log Setting.
2. Enable the storage of log messages to one or more locations.
3. Select VPN activity event.
4. Select Apply.
To view event logs
1. Go to Log & Report > Event Log > VPN.
2. If the option is available from the Log Type list, select the log file from disk or memory.
Configuring L2TP VPNs
This section describes how to configure a FortiGate unit to establish a Layer Two Tunneling
Protocol (L2TP) tunnel with a remote dialup client. The FortiGate implementation of L2TP
enables a remote dialup client to establish an L2TP tunnel with the FortiGate unit directly.
According to RFC 2661, an Access Concentrator (LAC) can establish an L2TP tunnel with an
L2TP Network Server (LNS). In a typical scenario, the LAC is managed by an ISP and located on
the ISP premises; the LNS is the gateway to a private network. When a remote dialup client
connects to the Internet through the ISP, the ISP uses a local database to establish the identity
Schedule always
Service PPTP
Action ACCEPT
Fortinet Technologies Inc. Page 217 Install and System Administration for FortiOS 5.0
of the caller and determine whether the caller needs access to an LNS through an L2TP tunnel.
If the services registered to the caller indicate that an L2TP connection to the LNS is required,
the ISP LAC attempts to establish an L2TP tunnel with the LNS.
A FortiGate unit can be configured to act as an LNS. The FortiGate implementation of L2TP
enables a remote dialup client to establish an L2TP tunnel with the FortiGate unit directly,
bypassing any LAC managed by an ISP. The ISP must configure its network access server to
forward L2TP traffic from the remote client to the FortiGate unit directly whenever the remote
client requires an L2TP connection to the FortiGate unit.
When the FortiGate unit acts as an LNS, an L2TP session and tunnel is created as soon as the
remote client connects to the FortiGate unit. The FortiGate unit assigns an IP address to the
client from a reserved range of IP addresses. The remote client uses the assigned IP address as
its source address for the duration of the connection.
More than one L2TP session can be supported on the same tunnel. FortiGate units can be
configured to authenticate remote clients using a plain text user name and password, or
authentication can be forwarded to an external RADIUS or LDAP server. L2TP clients are
authenticated as members of a user group.
Traffic from the remote client must be encrypted using MPPE before it is encapsulated and
routed to the FortiGate unit. Packets originating at the remote client are addressed to a
computer on the private network behind the FortiGate unit. Encapsulated packets are
addressed to the public interface of the FortiGate unit. See Figure 19.
When the FortiGate unit receives an L2TP packet, the unit disassembles the packet and
forwards the packet to the correct computer on the internal network. The security policy and
protection profiles on the FortiGate unit ensure that inbound traffic is screened and processed
securely.
Figure 19:L2TP encapsulation
FortiGate units support L2TP with Microsoft Point-to-Point Encryption (MPPE) encryption only.
Later implementations of Microsoft L2TP for Windows use IPSec and require certificates for
authentication and encryption. If you want to use Microsoft L2TP with IPSec to connect to a
FortiGate unit, the IPSec and certificate elements must be disabled on the remote client
3
1
2
3
1
2
3
1
2
T
ra
ffic
d
e
s
tin
a
tio
n
1
9
2
.1
6
8
.2
0
.2
T
ra
ffic
d
e
s
tin
a
tio
n
1
9
2
.1
6
8
.2
0
.2
L
2
T
P
p
a
c
k
e
ts
d
e
s
tin
a
tio
n
1
7
2
.1
6
.3
0
.1
3
1
2
L
2
T
P
p
a
c
k
e
ts
d
e
s
tin
a
tio
n
1
7
2
.1
6
.3
0
.1
1
7
2
.1
6
.3
0
.1
Fortinet Technologies Inc. Page 218 Install and System Administration for FortiOS 5.0
FortiGate units cannot deliver non-IP traffic such as Frame Relay or ATM frames encapsulated
in L2TP packets FortiGate units support the IPv4 and IPv6 addressing schemes only
Network topology
The remote client connects to an ISP that determines whether the client requires an L2TP
connection to the FortiGate unit. If an L2TP connection is required, the connection request is
forwarded to the FortiGate unit directly.
Figure 20:Example L2TP configuration
L2TP infrastructure requirements
The FortiGate unit must be operating in NAT mode and have a static public IP address.
The ISP must configure its network access server to forward L2TP traffic from remote clients
to the FortiGate unit directly.
The remote client must not generate non-IP traffic (Frame Relay or ATM frames).
The remote client includes L2TP support with MPPE encryption. If the remote client includes
Microsoft L2TP with IPSec, the IPSec and certificate components must be disabled.
L2TP configuration overview
To configure a FortiGate unit to act as an LNS, you perform the following tasks:
Create an L2TP user group containing one user for each remote client.
Enable L2TP on the FortiGate unit and specify the range of addresses that can be assigned
to remote clients when they connect.
Define firewall source and destination addresses to indicate where packets transported
through the L2TP tunnel will originate and be delivered.
Create the security policy and define the scope of permitted services between the source
and destination addresses.
Configure the remote clients.
I
n
t
e
r
n
a
l
N
e
t
w
o
r
k
R
e
m
o
t
e
_
C
l
i
e
n
t
_
1
R
e
m
o
t
e
_
C
l
i
e
n
t
_
3
R
e
m
o
t
e
_
C
l
i
e
n
t
_
2
Fortinet Technologies Inc. Page 219 Install and System Administration for FortiOS 5.0
Authenticating L2TP clients
L2TP clients must be authenticated before a tunnel is established. The authentication process
relies on FortiGate user group definitions, which can optionally use established authentication
mechanisms such as RADIUS or LDAP to authenticate L2TP clients. All L2TP clients are
challenged when a connection attempt is made.
To enable authentication, you must create user accounts and a user group to identify the L2TP
clients that need access to the network behind the FortiGate unit.
You can choose to use a plain text password for authentication or forward authentication
requests to an external RADIUS or LDAP server. If password protection will be provided through
a RADIUS or LDAP server, you must configure the FortiGate unit to forward authentication
requests to the authentication server.
Enabling L2TP and specifying an address range
The L2TP address range specifies the range of addresses reserved for remote clients. When a
remote client connects to the FortiGate unit, the client is assigned an IP address from this
range. Afterward, the FortiGate unit uses the assigned address to communicate with the remote
client.
The address range that you reserve can be associated with private or routable IP addresses. If
you specify a private address range that matches a network behind the FortiGate unit, the
assigned address will make the remote client appear to be part of the internal network.
To enable L2TP and specify the L2TP address range, use the config vpn l2tp CLI
command.
The following example shows how to enable L2TP and set the L2TP address range using a
starting address of 192.168.10.80 and an ending address of 192.168.10.100 for an
existing group of L2TP users named L2TP_users:
config vpn l2tp
set sip 192.168.10.80
set eip 192.168.10.100
set status enable
set usrgrp L2TP_users
end
Defining firewall source and destination addresses
Before you define the security policy, you must define the source and destination addresses of
packets that are to be transported through the L2TP tunnel:
For the source address, enter the range of addresses that you reserved for remote L2TP
clients (for example 192.168.10.[80-100]).
For the destination address, enter the IP addresses of the computers that the L2TP clients
need to access on the private network behind the FortiGate unit (for example,
172.16.5.0/24 for a subnet, or 172.16.5.1 for a server or host, or
192.168.10.[10-15] for an IP address range).
To define the firewall source address
1. Go to Firewall Objects > Address > Address and select Create New.
2. In the Address Name field, type a name that represents the range of addresses that you
reserved for remote clients (for example, Ext_L2TPrange).
3. In Type, select Subnet / IP Range.
Fortinet Technologies Inc. Page 220 Install and System Administration for FortiOS 5.0
4. In the Subnet / IP Range field, type the corresponding IP address range.
5. In Interface, select the FortiGate interface that connects to the clients.
6. This is usually the interface that connects to the Internet.
7. Select OK.
To define the firewall destination address
1. Go to Firewall Objects > Address > Address and select Create New.
2. In the Address Name field, type a name that represents a range of IP addresses on the
network behind the FortiGate unit (for example, Int_L2TPaccess).
3. In Type, select Subnet / IP Range.
4. In the Subnet / IP Range field, type the corresponding IP address range.
5. In Interface, select the FortiGate interface that connects to the network behind the FortiGate
unit.
6. Select OK.
Adding the security policy
The security policy specifies the source and destination addresses that can generate traffic
inside the L2TP tunnel and defines the scope of services permitted through the tunnel. If a
selection of services are required, define a service group.
To define the traffic and services permitted inside the L2TP tunnel
1. Go to Policy > Policy > Policy and select Create New.
2. Leave the Policy Type as Firewall and the Policy Subtype as Address.
3. Enter these settings:
4. Select OK.
Configuring a Linux client
This procedure outlines how to install L2TP client software and run an L2TP tunnel on a Linux
computer. Obtain an L2TP client package that meets your requirements (for example,
rp-l2tp). If needed to encrypt traffic, obtain L2TP client software that supports encryption
using MPPE.
Incoming Interface Select the FortiGate interface to the Internet.
Source Address Select the name that corresponds to the address range that
reserved for L2TP clients (for example, Ext_L2TPrange).
Outgoing Interface Select the FortiGate interface to the internal (private)
network.
Destination Address Select the name that corresponds to the IP addresses
behind the FortiGate unit (for example, Int_L2TPaccess).
Service Select ALL, or if selected services are required instead,
select the service group that you defined previously.
Action ACCEPT
Fortinet Technologies Inc. Page 221 Install and System Administration for FortiOS 5.0
To establish an L2TP tunnel with a FortiGate unit that has been set up to accept L2TP
connections, you can obtain and install the client software following these guidelines:
1. If encryption is required but MPPE support is not already present in the kernel, download
and install an MPPE kernel module and reboot your computer.
2. Download and install the L2TP client package.
3. Configure an L2TP connection to run the L2TP program.
4. Configure routes to determine whether all or some of your network traffic will be sent
through the tunnel. You must define a route to the remote network over the L2TP link and a
host route to the FortiGate unit.
5. Run l2tpd to start the tunnel.
Follow the software suppliers documentation to complete the steps.
To configure the system, you need to know the public IP address of the FortiGate unit, and the
user name and password that has been set up on the FortiGate unit to authenticate L2TP
clients. Contact the FortiGate administrator if required to obtain this information.
Monitoring L2TP sessions
You can display a list of all active sessions and view activity by port number. By default, port
1701 is used for L2TP VPN-related communications. If required, active sessions can be
stopped from this view. Use the Top Sessions Dashboard Widget.
Testing L2TP VPN connections
To confirm that a VPN between a local network and a dialup client has been configured
correctly, at the dialup client, issue a ping command to test the connection to the local network.
The VPN tunnel initializes when the dialup client attempts to connect.
Logging L2TP VPN events
You can configure the FortiGate unit to log VPN events. For L2TP VPNs, connection events and
tunnel status (up/down) are logged.
To log VPN events - web-based manager
1. Go to Log & Report > Log Config > Log Setting.
2. Enable the storage of log messages to one or more locations.
3. Select Enable, and then select VPN activity event.
4. Select Apply.
To log VPN events - CLI
config log memory setting
set diskfull overright
set status enable
end
config log eventfilter
set ppp
end
Page 222
Session helpers
The FortiOS firewall can analyze most TCP/IP protocol traffic by comparing packet header
information to security policies. This comparison determines whether to accept or deny the
packet and the session that the packet belongs to.
Some protocols include information in the packet body (or payload) that must be analyzed to
successfully process sessions for this protocol. For example, the SIP VoIP protocol uses TCP
control packets with a standard destination port to set up SIP calls. But the packets that carry
the actual conversation can use a variety of UDP protocols with a variety of source and
destination port numbers. The information about the protocols and port numbers used for a SIP
call is contained in the body of the SIP TCP control packets. To successfully process SIP VoIP
calls, FortiOS must be able to extract information from the body of the SIP packet and use this
information to allow the voice-carrying packets through the firewall.
FortiOS uses session helpers to analyze the data in the packet bodies of some protocols and
adjust the firewall to allow those protocols to send packets through the firewall.
This section includes the topics:
Viewing the session helper configuration
Changing the session helper configuration
DCE-RPC session helper (dcerpc)
DNS session helpers (dns-tcp and dns-udp)
File transfer protocol (FTP) session helper (ftp)
H.245 session helpers (h245I and h245O)
H.323 and RAS session helpers (h323 and ras)
Media Gateway Controller Protocol (MGCP) session helper (mgcp)
ONC-RPC portmapper session helper (pmap)
PPTP session helper for PPTP traffic (pptp)
Remote shell session helper (rsh)
Real-Time Streaming Protocol (RTSP) session helper (rtsp)
Session Initiation Protocol (SIP) session helper (sip)
Trivial File Transfer Protocol (TFTP) session helper (tftp)
Oracle TNS listener session helper (tns)
Viewing the session helper configuration
You can view the session helpers enabled on your FortiGate unit in the CLI using the commands
below. The following output shows the first two session helpers. The number of session helpers
can vary to around 20.
show system session-helper
config system session-helper
edit 1
set name pptp
set port 1723
set protocol 6
Fortinet Technologies Inc. Page 223 Install and System Administration for FortiOS 5.0
end
next
set name h323
set port 1720
set protocol 6
next
end
.
.
The configuration for each session helper includes the name of the session helper and the port
and protocol number on which the session helper listens for sessions. Session helpers listed on
protocol number 6 (TCP) or 17 (UDP). For a complete list of protocol numbers see: Assigned
Internet Protocol Numbers.
For example, the output above shows that FortiOS listens for PPTP packets on TCP port 1723
and H.323 packets on port TCP port 1720.
If a session helper listens on more than one port or protocol the more than one entry for the
session helper appears in the config system session-helper list. For example, the pmap
session helper appears twice because it listens on TCP port 111 and UDP port 111. The rsh
session helper appears twice because it listens on TCP ports 514 and 512.
Changing the session helper configuration
Normally you will not need to change the configuration of the session helpers. However in some
cases you may need to change the protocol or port the session helper listens on.
Changing the protocol or port that a session helper listens on
Most session helpers are configured to listen for their sessions on the port and protocol that
they typically use. If your FortiGate unit receives sessions that should be handled by a session
helper on a non-standard port or protocol you can use the following procedure to change the
port and protocol used by a session helper. The following example shows how to change the
port that the pmap session helper listens on for Sun RPC portmapper TCP sessions. By default
pmap listens on TCP port 111.
To change the port that the pmap session helper listens on to TCP port 112
1. Confirm that the TCP pmap session helper entry is 11 in the session-helper list:
show system session-helper 11
config system session-helper
edit 11
set name pmap
set port 111
set protocol 6
next
end
2. Enter the following command to change the TCP port to 112.
config system session-helper
edit 11
set port 112
end
Fortinet Technologies Inc. Page 224 Install and System Administration for FortiOS 5.0
3. The pmap session helper also listens on UDP port 111. Confirm that the UDP pmap session
helper entry is 12 in the session-helper list:
show system session-helper 12
config system session-helper
edit 12
set name pmap
set port 111
set protocol 17
next
end
4. Enter the following command to change the UDP port to 112.
config system session-helper
edit 12
set port 112
end
end
Use the following command to set the h323 session helper to listen for ports on the UDP
protocol.
To change the protocol that the h323 session helper listens on
1. Confirm that the h323 session helper entry is 2 in the session-helper list:
show system session-helper 2
config system session-helper
edit 2
set name h323
set port 1720
set protocol 6
next
end
2. Enter the following command to change the protocol to UDP.
config system session-helper
edit 2
set protocol 17
end
end
If a session helper listens on more than one port or protocol, then multiple entries for the
session helper must be added to the session helper list, one for each port and protocol
combination. For example, the rtsp session helper listens on TCP ports 554, 7070, and 8554 so
there are three rtsp entries in the session-helper list. If your FortiGate unit receives rtsp packets
on a different TCP port (for example, 6677) you can use the following command to configure the
rtsp session helper to listen on TCP port 6677.
To configure a session helper to listen on a new port and protocol
config system session-helper
edit 0
set name rtsp
set port 6677
set protocol 6
end
Fortinet Technologies Inc. Page 225 Install and System Administration for FortiOS 5.0
Disabling a session helper
In some cases you may need to disable a session helper. Disabling a session helper just means
removing it from the session-helper list so that the session helper is not listening on a port. You
can completely disable a session helper by deleting all of its entries from the session helper list.
If there are multiple entries for a session helper on the list you can delete one of the entries to
prevent the session helper from listening on that port.
To disable the mgcp session helper from listening on UDP port 2427
1. Enter the following command to find the mgcp session helper entry that listens on UDP port
2427:
show system session-helper
.
.
.
edit 19
set name mgcp
set port 2427
set protocol 17
next
.
.
.
2. Enter the following command to delete session-helper list entry number 19 to disable the
mgcp session helper from listening on UDP port 2427:
config system session-helper
delete 19
By default the mgcp session helper listens on UDP ports 2427 and 2727. The previous
procedure shows how to disable the mgcp protocol from listening on port 2427. The following
procedure completely disables the mgcp session helper by also disabling it from listening on
UDP port 2727.
To completely disable the mgcp session helper
1. Enter the following command to find the mgcp session helper entry that listens on UDP port
2727:
show system session-helper
.
.
.
edit 20
set name mgcp
set port 2727
set protocol 17
next
.
.
.
2. Enter the following command to delete session-helper list entry number 20 to disable the
mgcp session helper from listening on UDP port 2727:
config system session-helper
delete 20
Fortinet Technologies Inc. Page 226 Install and System Administration for FortiOS 5.0
DCE-RPC session helper (dcerpc)
Distributed Computing Environment Remote Procedure Call (DCE-RPC) provides a way for a
program running on one host to call procedures in a program running on another host.
DCE-RPC (also called MS RPC for Microsoft RPC) is similar to ONC-RPC. Because of the large
number of RPC services, for example, MAPI, the transport address of an RPC service is
dynamically negotiated based on the service program's universal unique identifier (UUID). The
Endpoint Mapper (EPM) binding protocol in FortiOS maps the specific UUID to a transport
address.
To accept DCE-RPC sessions you must add a security policy with service set to any or to the
DEC-RPC pre-defined service (which listens on TCP and UDP ports 135). The dcerpc session
helper also listens on TCP and UDP ports 135.
The session allows FortiOS to handle DCE-RPC dynamic transport address negotiation and to
ensure UUID-based security policy enforcement. You can define a security policy to permit all
RPC requests or to permit by specific UUID number.
In addition, because a TCP segment in a DCE-RPC stream might be fragmented, it might not
include an intact RPC PDU. This fragmentation occurs in the RPC layer; so FortiOS does not
support parsing fragmented packets.
DNS session helpers (dns-tcp and dns-udp)
FortiOS includes two DNS session helpers, dns-tcp, a session helper for DNS over TCP, and
dns-udp, a session helper for DNS over UDP. The DNS session helpers monitor DNS query and
reply packets and close sessions if the DNS flag indicates the packet is a reply message.
To accept DNS sessions you must add a security policy with service set to any or to the DNS
pre-defined service (which listens on TCP and UDP ports 53). The dns-udp session helper also
listens on UDP port 53. By default the dns-tcp session helper is disabled. If needed you can use
the following command to enable the dns-tcp session helper to listen for DNS sessions on TCP
port 53:
config system session-helper
edit 0
set name dns-tcp
set port 53
set protocol 6
end
File transfer protocol (FTP) session helper (ftp)
The FTP session helper monitors PORT, PASV and 227 commands and NATs the IP addresses
and port numbers in the body of the FTP packets and opens ports on the FortiGate unit as
required.
To accept FTP sessions you must add a security policy with service set to any or to the FTP,
FTP_Put, and FTP_GET pre-defined services (which all listen on TCP port 21).
Fortinet Technologies Inc. Page 227 Install and System Administration for FortiOS 5.0
H.245 session helpers (h245I and h245O)
H.245 is a control channel protocol used for H.323 and other similar communication sessions.
H.245 sessions transmit non-telephone signals. H.245 sessions carry information needed for
multimedia communication, such as encryption, flow control jitter management and others.
FortiOS includes two H.245 sessions helpers, h245I which is for H.245 call in and h245O which
is for H.245 call out sessions. There is no standard port for H.245. By default the H.245 sessions
helpers are disabled. You can enable them as you would any other session helper. When you
enable them, you should specify the port and protocol on which the FortiGate unit receives
H.245 sessions.
H.323 and RAS session helpers (h323 and ras)
The H.323 session helper supports secure H.323 voice over IP (VoIP) sessions between terminal
endpoints such as IP phones and multimedia devices. In H.323 VoIP networks, gatekeeper
devices manage call registration, admission, and call status for VoIP calls. The FortiOS h323
session helper supports gatekeepers installed on two different networks or on the same
network.
To accept H.323 sessions you must add a security policy with service set to any or to the H323
pre-defined service (which listens on TCP port numbers 1720 and 1503 and on UDP port
number 1719). The h323 session helper listens on TCP port 1720.
The ras session helper is used with the h323 session helper for H.323 Registration, Admission,
and Status (RAS) services. The ras session helper listens on UDP port 1719.
Alternate H.323 gatekeepers
The h323 session helper supports using H.323 alternate gatekeepers. All the H.323 end points
must register with a gatekeeper through the Registration, Admission, and Status (RAS) protocol
before they make calls. During the registration process, the primary gatekeeper sends
Gatekeeper Confirm (GCF) and Registration Confirm (RCF) messages to the H.323 end points
that contain the list of available alternate gatekeepers.
The alternate gatekeeper provides redundancy and scalability for the H.323 end points. If the
primary gatekeeper fails the H.323 end points that have registered with that gatekeeper are
automatically registered with the alternate gatekeeper. To use the H.323 alternate gatekeeper,
you need to configure security policies that allow H.323 end points to reach the alternate
gatekeeper.
Media Gateway Controller Protocol (MGCP) session helper (mgcp)
The Media Gateway Control Protocol (MGCP) is a text-based application layer protocol used for
VoIP call setup and control. MGCP uses a master-slave call control architecture in which the
media gateway controller uses a call agent to maintain call control intelligence, while the media
gateways perform the instructions of the call agent.
To accept MGCP sessions you must add a security policy with service set to any or to the
MGCP pre-defined service (which listens on UDP port numbers 2427 and 2727). The h323
session helper also listens on UDP port numbers 2427 and 2727.
Fortinet Technologies Inc. Page 228 Install and System Administration for FortiOS 5.0
The MGCP session helper does the following:
VoIP signalling payload inspection. The payload of the incoming VoIP signalling packet is
inspected and malformed packets are blocked.
Signaling packet body inspection. The payload of the incoming MGCP signaling packet is
inspected according to RFC 3435. Malformed packets are blocked.
Stateful processing of MGCP sessions. State machines are invoked to process the parsed
information. Any out-of-state or out-of-transaction packet is identified and properly handled.
MGCP Network Address Translation (NAT). Embedded IP addresses and ports in packet
bodies is properly translated based on current routing information and network topology,
and is replaced with the translated IP address and port number, if necessary.
Manages pinholes for VoIP traffic. To keep the VoIP network secure, the IP address and port
information used for media or signalling is identified by the session helper, and pinholes are
dynamically created and closed during call setup.
ONC-RPC portmapper session helper (pmap)
Open Network Computing Remote Procedure Call (ONC-RPC) is a widely deployed remote
procedure call system. Also called Sun RPC, ONC-RPC allows a program running on one host
to call a program running on another. The transport address of an ONC-RPC service is
dynamically negotiated based on the service's program number and version number. Several
binding protocols are defined for mapping the RPC program number and version number to a
transport address.
To accept ONC-RPC sessions you must add a security policy with service set to any or to the
ONC-RPC pre-defined service (which listens on TCP and UDP port number 111). The RPC
portmapper session helper (called pmap) handles the dynamic transport address negotiation
mechanisms of ONC-RPC.
PPTP session helper for PPTP traffic (pptp)
The PPTP session help supports port address translation (PAT) for PPTP traffic. PPTP provides
IP security at the Network Layer. PPTP consists of a control session and a data tunnel. The
control session runs over TCP and helps in establishing and disconnecting the data tunnel. The
data tunnel handles encapsulated Point-to-Point Protocol (PPP) packets carried over IP.
To accept PPTP sessions that pass through the FortiGate unit you must add a security policy
with service set to any or to the PPTP pre-defined service (which listens on IP port 47 and TCP
port 1723). The pptp session helper listens on TCP port 1723.
PPTP uses TCP port 1723 for control sessions and Generic Routing Encapsulation (GRE) (IP
protocol 47) for tunneling the encapsulated PPP data. The GRE traffic carries no port number,
making it difficult to distinguish between two clients with the same public IP address. PPTP
uses the source IP address and the Call ID field in the GRE header to identify a tunnel. When
multiple clients sharing the same IP address establish tunnels with the same PPTP server, they
may get the same Call ID. The call ID value can be translated in both the control message and
the data traffic, but only when the client is in a private network and the server is in a public
network.
PPTP clients can either directly connect to the Internet or dial into a network access server to
reach the Internet. A FortiGate unit that protects PPTP clients can translate the clients private
IP addresses to a pool of public IP addresses using NAT port translation (NAT-PT). Because the
GRE traffic carries no port number for address translation, the pptp session helper treats the
Call ID field as a port number as a way of distinguishing multiple clients.
Fortinet Technologies Inc. Page 229 Install and System Administration for FortiOS 5.0
After the PPTP establishing a TCP connection with the PPTP server, the client sends a start
control connection request message to establish a control connection. The server replies with a
start control connection reply message. The client then sends a request to establish a call and
sends an outgoing call request message. FortiOS assigns a Call ID (bytes 12-13 of the control
message) that is unique to each PPTP tunnel. The server replies with an outgoing call reply
message that carries its own Call ID in bytes 12-13 and the clients call ID in bytes 14-15. The
pptp session helper parses the control connection messages for the Call ID to identify the call to
which a specific PPP packet belongs. The session helper also identifies an outgoing call
request message using the control message type field (bytes 8-9) with the value 7. When the
session helper receives this message, it parses the control message for the call ID field (bytes
12-13). FortiOS translates the call ID so that it is unique across multiple calls from the same
translated client IP. After receiving outgoing call response message, the session helper holds
this message and opens a port that accepts GRE traffic that the PPTP server sends. An
outgoing call request message contains the following parts:
The protocol used for the outgoing call request message (usually GRE)
Source IP address (PPTP server IP)
Destination IP address (translated client IP)
Destination port number (translated client call ID)
The session helper identifies an outgoing call reply message using the control message type
field (bytes 8-9) with the value 8. The session helper parses these control messages for the call
ID field (bytes 12-13) and the clients call ID (bytes 14-15). The session helper then uses the
clients call ID value to find the mapping created for the other direction, and then opens a
pinhole to accept the GRE traffic that the client sends.
An outgoing call reply message contains the following parts:
Protocol used for the outgoing call reply message (usually GRE)
Source IP address (PPTP client IP)
Destination IP address (PPTP server IP)
Destination port number (PPTP server Call ID)
Each port that the session opens creates a session for data traffic arriving in that direction. The
session helper opens the following two data sessions for each tunnel:
Traffic from the PPTP client to the server, using the servers call ID as the destination port
Traffic from the PPTP server to the client, using the clients translated call ID as the
destination port
The default timeout value of the control connection is 30 minutes. The session helper closes the
pinhole when the data session exceeds the timeout value or is idle for an extended period.
Remote shell session helper (rsh)
Using the remote shell program (RSH), authenticated users can run shell commands on remote
hosts. RSH sessions most often use TCP port 514. To accept RSH sessions you must add a
security policy with service set to any or to the RSH pre-defined service (which listens on TCP
port number 514).
FortiOS automatically invokes the rsh session helper to process all RSH sessions on TCP port
514. The rsh session helper opens ports required for the RSH service to operate through a
FortiGate unit running NAT or transparent and supports port translation of RSH traffic.
Fortinet Technologies Inc. Page 230 Install and System Administration for FortiOS 5.0
Real-Time Streaming Protocol (RTSP) session helper (rtsp)
The Real-Time Streaming Protocol (RTSP) is an application layer protocol often used by SIP to
control the delivery of multiple synchronized multimedia streams, for example, related audio
and video streams. Although RTSP is capable of delivering the data streams itself it is usually
used like a network remote control for multimedia servers. The protocol is intended for selecting
delivery channels (like UDP, multicast UDP, and TCP) and for selecting a delivery mechanism
based on the Real-Time Protocol (RTP). RTSP may also use the SIP Session Description
Protocol (SDP) as a means of providing information to clients for aggregate control of a
presentation consisting of streams from one or more servers, and non-aggregate control of a
presentation consisting of multiple streams from a single server.
To accept RTSP sessions you must add a security policy with service set to any or to the RTSP
pre-defined service (which listens on TCP ports 554, 770, and 8554 and on UDP port 554). The
rtsp session helper listens on TCP ports 554, 770, and 8554.
The rtsp session help is required because RTSP uses dynamically assigned port numbers that
are communicated in the packet body when end points establish a control connection. The
session helper keeps track of the port numbers and opens pinholes as required. In Network
Address Translation (NAT) mode, the session helper translates IP addresses and port numbers
as necessary.
In a typical RTSP session the client starts the session (for example, when the user selects the
Play button on a media player application) and establishes a TCP connection to the RTSP
server on port 554. The client then sends an OPTIONS message to find out what audio and
video features the server supports. The server responds to the OPTIONS message by
specifying the name and version of the server, and a session identifier, for example, 24256-1.
The client then sends the DESCRIBE message with the URL of the actual media file the client
wants to play. The server responds to the DESCRIBE message with a description of the media
in the form of SDP code. The client then sends the SETUP message, which specifies the
transport mechanisms acceptable to the client for streamed media, for example RTP/RTCP or
RDT, and the ports on which it receives the media.
In a NAT configuration the rtsp session helper keeps track of these ports and addresses
translates them as necessary. The server responds to the SETUP message and selects one of
the transport protocols. When both client and server agree on a mechanism for media transport
the client sends the PLAY message, and the server begins streaming the media.
Session Initiation Protocol (SIP) session helper (sip)
The sip session helper is described in VoIP Solutions: SIP Guide.
Trivial File Transfer Protocol (TFTP) session helper (tftp)
To accept TFTP sessions you must add a security policy with service set to any or to the TFTP
pre-defined service (which listens on UDP port number 69). The TFTP session helper also
listens on UTP port number 69.
TFTP initiates transfers on UDP port 69, but the actual data transfer ports are selected by the
server and client during initialization of the connection. The tftp session helper reads the
transfer ports selected by the TFTP client and server during negotiation and opens these ports
on the firewall so that the TFTP data transfer can be completed. When the transfer is complete
the tftp session helper closes the open ports.
Fortinet Technologies Inc. Page 231 Install and System Administration for FortiOS 5.0
Oracle TNS listener session helper (tns)
The Oracle Transparent Network Substrate (TNS) listener listens on port TCP port 1521 for
network requests to be passed to a database instance. The Oracle TNS listener session helper
(tns) listens for TNS sessions on TCP port 1521. TNS is a foundation technology built into the
Oracle Net foundation layer and used by SQLNET.
Page 232
Advanced concepts
This chapter provides configuration concepts and techniques to enhance your network security.
This section includes the topics:
Dual internet connections
Single firewall vs. multiple virtual domains
Modem
DHCP servers and relays
Assigning IP address by MAC address
DNS services
Dynamic DNS
FortiClient discovery and registration
IP addresses for self-originated traffic
Administration for schools
Tag management
Replacement messages list
Disk
CLI Scripts
Rejecting PING requests
Opening TCP 113
Obfuscate HTTP headers
Dual internet connections
Dual internet connection, dual WAN, or redundant internet connection refers to using two
FortiGate interfaces to connect to the Internet. Dual internet connections can be used in three
ways:
redundant interfaces, should one interface go down, the second automatically becomes the
main internet connection
for load sharing to ensure better throughput.
a combination of redundancy and load sharing.
Redundant interfaces
Redundant interfaces, ensures that should your internet access be no longer available through a
certain port, the FortiGate unit will use an alternate port to connect to the Internet.
Fortinet Technologies Inc. Page 233 Install and System Administration for FortiOS 5.0
Figure 21:Configuring redundant interfaces
In this scenario, two interfaces, WAN1 and WAN2 are connected to the Internet using two
different ISPs. WAN1 is the primary connection. In an event of a failure of WAN1, WAN2
automatically becomes the connection to the Internet. For this configuration to function
correctly, you need to configure three specific settings:
configure a ping server to determine when the primary interface (WAN1) is down and when
the connection returns
configure a default route for each interface.
configure security policies to allow traffic through each interface to the internal network.
Ping server
Adding a ping server is required for routing fail over traffic. A ping server will confirm the
connectivity of the devices interface
To add a ping server - web-based manager
1. Go to Router > Static > Settings and select Create New.
For low-end FortiGate units, go to System > Network > Routing and select Create New.
2. Select the Interface that will send ping requests.
3. For the Ping Server field, enter the IP address of a server that the FortiGate unit will send
ping requests to. This is typically a next hop router or gateway device.
4. Select the Detect Protocol type.
5. For the Ping Interval, enter the number of seconds to send ping requests.
6. For the Failover Threshold, enter the number of lost pings is acceptable before the port is
determined to be down.
7. Select OK.
Backup ISP
Primary ISP
Computers on
a private internal
network
I
n
t
e
r
n
a
l
1
9
2
.
1
6
8
.
1
.
9
9
W
A
N
1
1
7
2
.
2
0
.
1
2
0
.
1
2
W
A
N
2
D
H
C
P
Fortinet Technologies Inc. Page 234 Install and System Administration for FortiOS 5.0
To add a ping server - CLI
config router gwdetect
edit wan1
set server <ISP_IP_address>
set failtime <failure_count>
set interval <seconds>
end
Routing
You need to configure a default route for each interface and indicate which route is preferred by
specifying the distance. The lower distance is declared active and placed higher in the routing
table.
To configure the routing of the two interfaces - web-based manager
1. Go to Router > Static > Static Route and select Create New.
For low-end FortiGate units, go to System > Network > Routing and select Create New.
2. Set the Destination IP/Mask to the address and netmask to 0.0.0.0/0.0.0.0.
3. Select the Device to the primary connection, WAN1.
4. Enter the Gateway address.
5. Select Advanced.
6. Set the Distance to 10.
7. Select OK.
8. Repeat steps 1 through 7 setting the Device to WAN2 and a Distance of 20.
To configure the routing of the two interfaces - CLI
config router static
edit 1
set dst 0.0.0.0 0.0.0.0
set device WAN1
set gateway 0.0.0.0 0.0.0.0
set distance 10
next
edit 1
set dst <ISP_Address>
set device WAN2
set gateway <gateway_address>
set distance 20
next
end
When you have dual WAN interfaces that are configured to provide fail over, you might not be
able to connect to the backup WAN interface because the FortiGate unit may not route traffic
(even responses) out of the backup interface. The FortiGate unit performs a reverse path lookup
to prevent spoofed traffic. If no entry can be found in the routing table which sends the return
traffic out the same interface, then the incoming traffic is dropped.
Fortinet Technologies Inc. Page 235 Install and System Administration for FortiOS 5.0
Security policies
When creating security policies, you need to configure duplicate policies to ensure that after
traffic fails over WAN1, regular traffic will be allowed to pass through WAN2 as it did with WAN1.
This ensures that fail-over will occur with minimal affect to users. For more information on
creating security policies see the Firewall Guide.
Load sharing
Load sharing enables you to use both connections to the internet at the same time, but do not
provide fail over support. When configuring for load sharing, you need to ensure routing is
configured for both external ports, for example, WAN1 and WAN2, have static routes with the
same distance and priority.
Further configuration can be done using Equal Cost Multiple Path (ECMP). For more information
on ECMP and load sharing, see the Advanced Routing Guide.
Link redundancy and load sharing
In this scenario, both links are available to distribute Internet traffic over both links. Should one
of the interfaces fail, the FortiGate unit will continue to send traffic over the other active
interface. Configuration is similar to the Redundant interfaces configuration, with the main
difference being that the configured routes should have equal distance settings.
This means both routes will remain active in the routing table. To make one interface the
preferred interface, use a default policy route to indicate the interface that is preferred for
accessing the Internet. If traffic matches the security policy, the policy overrides all entries in the
routing table, including connected routes. You may need to add a specific policy routes that
override these default policy routes.
To redirect traffic over the secondary interface, create policy routes to direct some traffic onto it
rather than the primary interface. When adding the policy route, only define the outgoing
interface and leave the gateway blank. This ensures that the policy route will not be active when
the link is down.
Single firewall vs. multiple virtual domains
A typical FortiGate setup, with a small to mid-range appliance, enables you to include a number
of subnets on your network using the available ports and switch interfaces. This can potentially
provide a means of having three or more mini networks for the various groups in a company.
Within this infrastructure, multiple network administrators have access to the FortiGate to
maintain security policies.
However, the FortiGate unit may not have enough interfaces to match the number of
departments in the organization. If the FortiGate unit it running in transparent mode however,
there is only one interface, and multiple network branches through the FortiGate are not
possible.
A FortiGate unit with Virtual Domains (VDOMs) enabled, provides a means to provide the same
functionality in transparent mode as a FortiGate in NAT mode. VDOMs are a method of dividing
a FortiGate unit into two or more virtual units that function as multiple independent units.
VDOMs can provide separate security policies and, in NAT mode, completely separate
configurations for routing and VPN services for each connected network. For administration, an
administrator can be assigned to each VDOM, minimizing the possibility of error or fouling
network communications.
Fortinet Technologies Inc. Page 236 Install and System Administration for FortiOS 5.0
By default, your FortiGate unit supports a maximum of 10 VDOMs. For FortiGate models 3000
and higher, you can purchase a license key to increase the number of VODMs to 25, 50, 100 or
250.
The FortiGate-20C and 30B and FortiWifi-20C and 30B do not support VDOMs.
Single firewall vs. vdoms
When VDOMs are not enabled, and the FortiGate unit is in transparent mode, all the interfaces
on your unit become broadcast interfaces. The problem is there are no interfaces free for
additional network segments.
A FortiGate with three interfaces means only limited network segments are possible without
purchasing more FortiGate devices.
With multiple VDOMs you can have one of them configured in transparent mode, and the rest in
NAT mode. In this configuration, you have an available transparent mode FortiGate unit you can
drop into your network for troubleshooting, and you also have the standard.
W
A
N
1
I
n
t
e
r
n
a
l
G
a
t
e
w
a
y
t
o
p
u
b
lic
n
e
t
w
o
r
k
D
M
Z
I
nn
W
A
N
1
N
1
DDD
M
Z
A
ll
in
t
e
r
f
a
c
e
s
o
n
t
h
e
s
a
m
e
s
u
b
n
e
t
W
A
N
1
G
a
t
e
w
a
y
t
o
p
u
b
lic
n
e
t
w
o
r
k
I
n
t
e
r
n
a
l
a
l
W
A
N
1
N
1
IIII
nn
I
nnn
I
n
I
nn
t
e
t
e
r
n
D
M
Z
Fortinet Technologies Inc. Page 237 Install and System Administration for FortiOS 5.0
This example shows how to enable VDOMs on the FortiGate unit and the basic and create a
VDOM accounting on the DMZ2 port and assign an administrator to maintain the VDOM. First
enable Virtual Domains on the FortiGate unit.
To enable VDOMs - web-based manager
1. Go to System > Dashboard > Status.
2. In the System Information widget, select Enable for Virtual Domain.
Note that on FortiGate-60 series and lower models, you need to enable VDOMs in the CLI only.
The FortiGate unit logs you out. Once you log back in, you will notice that the menu structure
has changed. This reflects the global settings for all Virtual Domains.
To enable VDOMs - CLI
config system global
set vdom-admin enable
end
Next, add the VDOM called accounting.
To add a VDOM - web-based manager
1. Go to Global > VDOM > VDOM, and select Create New.
2. Enter the VDOM name accounting.
3. Select OK.
To add a VDOM - CLI
config vdom
edit <new_vdom_name>
end
With the Virtual Domain created, you can assign a physical interface to it, and assign it an IP
address.
To assign physical interface to the accounting Virtual Domain - web-based manager
1. Go to Global > Network > Interface.
2. Select the DMZ2 port row and select Edit.
3. For the Virtual Domain drop-down list, select accounting.
4. Select the Addressing Mode of Manual.
5. Enter the IP address for the port of 10.13.101.100/24.
6. Set the Administrative Access to HTTPS and SSH.
7. Select OK.
To assign physical interface to the accounting Virtual Domain - CLI
config global
config system interface
edit dmz2
set vdom accounting
set ip 10.13.101.100/24
set allowaccess https ssh
next
end
Fortinet Technologies Inc. Page 238 Install and System Administration for FortiOS 5.0
Modem
FortiGate units support the use of wireless, 3G and 4G modems connected using the USB port
or, if available, the express card slot. Modem access provides either primary or secondary
(redundant) access to the Internet. For FortiGate units that do not include an internal modem
(those units with an M designation), the modem interface will not appear in the web-based
manager until enabled in the CLI. To enable the modem interface enter the CLI commands:
config system modem
set status enable
end
You will need to log out of the FortiGate and log back in to see the modem configuration page at
System > Network > Modem. Once enabled, modem options become available by going to
System > Network > Interface.
Note that the modem interface is only available when the FortiGate unit is in NAT mode.
To configure modem settings, go to System > Network > Modem.
Configuring the modem settings is a matter of entering the ISP phone number, user name and
password. Depending on the modem, additional information may need to be supplied such as
product identifiers, and initialization strings.
The FortiGate unit includes a number of common modems within its internal database. You can
view these by selecting the Configure Modem link on the Modem Settings page. If your modem
is not on the list, select Create New to add the information. This information is stored on the
device, and will remain after a reboot.
Fortinet has an online database of modem models and configuration settings through
FortiGuard. A subscription to the FortiGuard services is not required to access the information.
As models are added, you can select the Configure Modem link and select Update Now to
download new configurations.
USB modem port
Each USB modem has a specific dial-out ttyusb port. This will be indicated with the
documentation for your modem. To enable the correct USB port, use the CLI commands:
config system modem
set wireless-port {ttyusb0 | ttyusb1 | ttyusb2}
end
To test the port, use the diagnose command:
diagnose sys modem com /ttyusb1
The ttyusb1 will be the value of your USB port selected. The response will be:
Serial port: /dev/ttyusb1
Press Ctrl+W to exit.
If the port does not respond the output will be:
Can not open modem device /dev/ttyusb1 : Broken pipe
Modes
The FortiGate unit allows for two modes of operation for the modem; stand alone and
redundant. In stand alone mode, the modem connects to a dialup ISP account to provide the
connection to the Internet. In redundant mode, the modem acts as a backup method of
connecting to the Internet, should the primary port for this function fails.
Fortinet Technologies Inc. Page 239 Install and System Administration for FortiOS 5.0
Configuring either stand alone or redundant modes are very similar. The primary difference is
the selection of the interface that the modem will replace in the event of it failing, and the
configuration of a PING server to monitor the chosen interface.
Configuring stand alone mode
Configuring stand alone mode is a matter of configuring the modem information and the dialing
mode. The dial mode is either Always Connect or Dial on demand. Selecting Always Connect
ensures that once the modem has connected, it remains connected to the ISP. Selecting Dial on
Demand, the modem only calls the ISP if packets are routed to the modem interface. Once sent,
the modem will disconnect after a specified amount of time.
To configure standalone mode as needed - web-based manager
1. Go to System > Network > Modem.
2. Select the Mode of Standalone.
3. Select the Dial Mode of Dial on Demand.
4. Enter the Idle Timeout of 2 minutes.
5. Select the number of redials the modem attempts if connection fails to 5.
6. Select Apply.
To configure standalone mode as needed- CLI
config system modem
set mode standalone
set auto-dial enable
set idle-timer 2
set redial 5
end
Configuring redundant mode
Redundant mode provides a backup to an interface, typically to the Internet. If that interface
fails or disconnects, the modem automatically dials the configured phone number(s). Once
connected, the FortiGate unit routes all traffic to the modem interface until the monitored
interface is up again. The FortiGate unit pings the connection to determine when it is back
online.
For the FortiGate to verify when the interface is back up, you need to configure a Ping server for
that interface. You will also need to configure security policies between the modem interface
and the other interfaces of the FortiGate unit to ensure traffic flow.
To configure redundant mode as needed - web-based manager
1. Go to System > Network > Modem.
2. Select the Mode of Redundant.
3. Select the interface the modem takes over from if it fails.
4. Select the Dial Mode of Dial on Demand.
5. Enter the Idle Timeout of 2 minutes.
6. Select the number of redials the modem attempts if connection fails to 5.
7. Select Apply.
Fortinet Technologies Inc. Page 240 Install and System Administration for FortiOS 5.0
To configure standalone mode as needed- CLI
config system modem
set mode redundant
set interface wan1
set auto-dial enable
set idle-timer 2
set redial 5
end
Ping server
Adding a ping server is required for routing fail over traffic. A ping server will confirm the
connectivity of the devices interface.
For low-end FortiGate units, go to System > Admin > Settings and enable Dynamic Routing
before continuing.
To add a ping server - web-based manager
1. Go to Router > Static > Settings and select Create New.
2. Select the Interface that will send ping requests.
3. For the Ping Server field, enter the IP address of a server that the FortiGate unit will send
ping requests to. This is typically a next hop router or gateway device.
4. Select the Detect Protocol type ICMP Ping.
5. For the Ping Interval, enter the number of seconds to send ping requests.
6. For the Failover Threshold, enter the number of lost pings is acceptable before the port is
determined to be down.
7. Select OK.
To add a ping server - CLI
config router gwdetect
edit wan1
set server <ISP_IP_address>
set failtime <failure_count>
set interval <seconds>
end
Additional modem configuration
The CLI provides additional configuration options when setting up the modem options including
adding multiple ISP dialing and initialization options and routing. For more information, see the
CLI Reference.
Modem interface routing
The modem interface can be used in FortiOS as a dedicated interface. Once enabled and
configured, you can use it in security policies and define static and dynamic routing. Within the
CLI commands for the modem, you can configure the distance and priority of routes involving
the modem interface. The CLI commands are:
config sysetm modem
set distance <route_distance>
set priority <priority_value>
end
Fortinet Technologies Inc. Page 241 Install and System Administration for FortiOS 5.0
For more information on the routing configuration in the CLI, see the CLI Reference. For more
information on routing and configuring routing, see the Advanced Routing Guide.
DHCP servers and relays
Note that DHCP server options are not available in transparent mode.
A DHCP server provides an address to a client on the network, when requested, from a defined
address range.
An interface cannot provide both a server and a relay for connections of the same type (regular
or IPSec). However, you can configure a Regular DHCP server on an interface only if the
interface is a physical interface with a static IP address. You can configure an IPSec DHCP
server on an interface that has either a static or a dynamic IP address.
You can configure one or more DHCP servers on any FortiGate interface. A DHCP server
dynamically assigns IP addresses to hosts on the network connected to the interface. The host
computers must be configured to obtain their IP addresses using DHCP.
If an interface is connected to multiple networks via routers, you can add a DHCP server for
each network. The IP range of each DHCP server must match the network address range. The
routers must be configured for DHCP relay.
You can configure a FortiGate interface as a DHCP relay. The interface forwards DHCP requests
from DHCP clients to an external DHCP server and returns the responses to the DHCP clients.
The DHCP server must have appropriate routing so that its response packets to the DHCP
clients arrive at the unit.
DHCP Server configuration
To add a DHCP server, go to System > Network > DHCP Server, select Create New and
complete the following
Interface Name Select an interface from the drop-down list.
Mode Select the type of DHCP server.
Enable Select to enable the DHCP server.
Type Select the type of DHCP server.
You cannot configure a regular DHCP server on an interface that has a
dynamic IP address.
DHCP Server IP This appears only when Mode is Relay. Enter the IP address of the
DHCP server where the FortiGate unit obtains the requested IP address.
IP Enter the start and end for the range of IP addresses that this DHCP
server assigns to DHCP clients.
Network Mask Enter the netmask of the addresses that the DHCP server assigns.
Default Gateway Enter the IP address of the default gateway that the DHCP server
assigns to DHCP clients.
Fortinet Technologies Inc. Page 242 Install and System Administration for FortiOS 5.0
DNS Service Select to use either a specific DNS server or the systems DNS settings.
You can add multiple DNS servers by selecting the plus sign (+) beside
DNS Server 1.
For more information see DNS services and DNS server.
DNS Server 1 Enter the DNS server.
DNS Server 2 Enter the second DNS server. If you need to add more DNS servers,
select the plus sign (+).
MAC Address
Access Control List
Select to match an IP address from the DHCP server to a specific client
or device using its MAC address.
In a typical situation, an IP address is assigned ad hoc to a client, and
that assignment times out after a specific time of inactivity from the
client, known as the lease time. To ensure a client or device always has
the same IP address, that is, there is no lease time, use IP reservation.
For more information, see Assigning IP address by MAC address on
page 244.
Add from DHCP
Client List
If the client is currently connected and using an IP address from the
DHCP server, you can select this option to select the client from the list.
Advanced section of the New DHCP Service page
Domain Enter the domain that the DHCP server assigns to clients.
Lease Time Set the length of time an IP address remains assigned to a client. Once
the lease expires, the address is released for allocation to the next client
request for an IP address. To set the lease to never expire, select
Unlimited.
IP Assignment
Mode
Configure how the IP addresses for an IPSec DHCP server are assigned
to dialup IPSec VPN users. These options are available when the DHCP
server type is IPsec. Select:
Server IP Range - The IPSec DHCP server will assign the IP
addresses as specified in IP Range, and Exclude Ranges.
User-group defined method - The IP addresses will be assigned by a
user group used to authenticate the user. The user group is used to
authenticate XAUTH users.
When User-group defined method is selected, the IP Range fields are
greyed out, and the Exclude Ranges table and controls are not visible.
WINS Server 0
WINS Server 1
Add the IP addresses of one or two WINS servers that the DHCP server
assigns to DHCP clients.
Fortinet Technologies Inc. Page 243 Install and System Administration for FortiOS 5.0
DHCP in IPv6
You can use DHCP with IPv6 using the CLI. To configure DHCP, ensure IPv6 is enabled by going
to System > Admin > Settings and enable IPv6. Use the CLI command
config system dhcp6.
For more information on the configuration options, see the CLI Reference.
Service
On low-end FortiGate units, a DHCP server is configured, by default on the Internal interface:
These settings are appropriate for the default Internal interface IP address of 192.168.1.99. If
you change this address to a different network, you need to change the DHCP server settings to
match.
Alternatively, after the FortiGate unit assigns an address, you can go to System > Monitor >
DHCP Monitor, locate the particular user. Select the check box for the user and select Add to
Reserved.
DHCP options
When adding a DHCP server, you have the ability to include DHCP codes and options. The
DHCP options are BOOTP vendor information fields that provide additional vendor-independent
configuration parameters to manage the DHCP server. For example, you may need to configure
Options When adding a DHCP server, you have the ability to include DHCP
codes and options. The DHCP options are BOOTP vendor information
fields that provide additional vendor-independent configuration
parameters to manage the DHCP server. For example, you may need to
configure a FortiGate DHCP server that gives out a separate option as
well as an IP address. For example, an environment that needs to
support PXE boot with Windows images.
The option numbers and codes are specific to the particular application.
The documentation for the application will indicate the values to use.
Option codes are represented in a option value/HEX value pairs. The
option is a value 1 and 255.
You can add up to three DHCP code/option pairs per server.
Exclude Ranges Enter a range of IP addresses from the IP range that should not be
assigned. This option is only available when the DHCP type is IPsec,
and the IP Assignment Mode is Server IP range.
IP Range
192.168.1.110 to
192.168.1.210
Netmask 255.255.255.0
Default gateway 192.168.1.99
Lease time 7 days
DNS Server 1 192.168.1.99
Fortinet Technologies Inc. Page 244 Install and System Administration for FortiOS 5.0
a FortiGate DHCP server that gives out a separate option as well as an IP address. For example,
an environment that needs to support PXE boot with Windows images.
The option numbers and codes are specific to the particular application. The documentation for
the application will indicate the values to use. Option codes are represented in a option
value/HEX value pairs. The option is a value 1 and 255.
You can add up to three DHCP code/option pairs per DHCP server.
To configure option 252 with value http://192.168.1.1/wpad.dat - web-based manager
1. Go to System > Network > DHCP Server and select Create New.
2. Select a Mode of Server.
3. Select the blue arrow to expand the Advanced options.
4. Select Options.
5. Enter a Code of 252.
6. Enter the Options of
687474703a2f2f3139322e3136382e312e312f777061642e646174.
In the CLI, use the commands:
config system dhcp server
edit <server_entry_number>
set option1 252
687474703a2f2f3139322e3136382e312e312f777061642e646174
end
For detailed information about DHCP options, see RFC 2132, DHCP Options and BOOTP
Vendor Extensions.
DHCP Monitor
To view information about DHCP server connections, go to System > Monitor > DHCP Monitor.
On this page, you can also add IP address to the reserved IP address list.
Breaking a address lease
Should you need to end an IP address lease, you can break the lease using the CLI. This is
useful if you have limited addresses, longer lease times where leases are no longer necessary.
For example, with corporate visitors.
To break a lease enter the CLI command:
execute dhcp lease-clear <ip_address>
Assigning IP address by MAC address
To prevent users in the from changing their IP addresses and causing IP address conflicts or
unauthorized use of IP addresses, you can bind an IP address to a specific MAC address using
DHCP.
Use the CLI to reserve an IP address for a particular client identified by its device MAC address
and type of connection. The DHCP server then always assigns the reserved IP address to the
client. The number of reserved addresses that you can define ranges from 10 to 200 depending
on the FortiGate model.
After setting up a DHCP server by going to System > Network > DHCP Server, select the blue
arrow next to MAC Address Access Control List to expand the options. If you know the MAC
Fortinet Technologies Inc. Page 245 Install and System Administration for FortiOS 5.0
address of the system select Create New to add it, or if the system has already connected,
locate it in the list, select its check box and select Add from DHCP Client List.
You can also match an address to a MAC address in the CLI. In the example below, the IP
address 10.10.10.55 for User1 is assigned to MAC address 00:09:0F:30:CA:4F.
config system dhcp reserved-address
edit User1
set ip 10.10.10.55
set mac 00:09:0F:30:CA:4F
set type regular
end
DNS services
A DNS server is a public service that converts symbolic node names to IP addresses. A Domain
Name System (DNS) server implements the protocol. In simple terms, it acts as a phone book
for the Internet. A DNS server matches domain names with the computer IP address. This
enables you to use readable locations, such as fortinet.com when browsing the Internet.
FortiOS supports DNS configuration for both IPv4 and IPv6 addressing.
The FortiGate unit includes default DNS server addresses. However, these should be changed
to those provided by your Internet Service Provider. The defaults are DNS proxies and are not
as reliable as those from your ISP.
Within FortiOS, there are two DNS configuration options; each provide a specific service, and
can work together to provide a complete DNS solution.
DNS queries
Basic DNS queries are configured on interfaces that connect to the Internet. When a web site is
requested, for example, the FortiGate unit will look to the configured DNS servers to provide the
IP address to know which server to contact to complete the transaction.
DNS server addresses are configured by going to System > Network > DNS. Here you specify
the DNS server addresses. Typically, these addresses are supplied by your ISP. An additional
option is available if you have local Microsoft domains on the network, by entering a domain
name in the Local Domain Name field.
In a situation where all three fields are configured, the FortiGate unit will first look to the local
domain. If no match is found, a request is sent to the external DNS servers.
If virtual domains are enabled, you create a DNS database in each VDOM. All of the interfaces in
a VDOM share the DNS database in that VDOM.
Additional DNS CLI configuration
Further options are available from the CLI with the command config system dns. Within this
command you can set the following commands:
dns-cache-limit - enables you to set how many DNS entries are stored in the cache.
Entries that remain in the cache provide a quicker response to requests than going out to the
Internet to get the same information.
dns-cache-ttl - enables you to set how long entries remain in the cache in seconds,
between 60 and 86,400 (24 hours).
Fortinet Technologies Inc. Page 246 Install and System Administration for FortiOS 5.0
cache-notfound-responses - when enabled, any DNS requests that are returned with
NOTFOUND can be stored in the cache.
source-ip - enables you to define a dedicated IP address for communications with the
DNS server.
DNS server
You can also create local DNS servers for your network. Depending on your requirements, you
can manually maintain your entries (master DNS server), or use it as a jumping point, where the
server refers to an outside source (slave DNS server). A local master DNS server works similarly
to the DNS server addresses configured in System > Network > DNS, but all entries must be
added manually. This enables you to add a local DNS server to include specific URL/IP address
combinations.
The DNS server options are not visible in the web-based manager by default. To enable the
server, go to System > Admin > Settings and select DNS Database.
While a master DNS server is an easy method of including regularly used addresses to save on
going to an outside DNS server, it is not recommended to make it the authoritative DNS server.
IP addresses may change, and maintaining any type of list can quickly become labor-intensive.
A FortiGate master DNS server is best set for local services. For example, if your company has
a web server on the DMZ that is accessed by internal employees as well as external users, such
as customers or remote users. In this situation, the internal users when accessing the site would
send a request for website.example.com, that would go out to the DNS server on the web, to
return an IP address or virtual IP. With an internal DNS, the same site request is resolved
internally to the internal web server IP address, minimizing inbound/outbound traffic and access
time.
As a slave, DNS server, the FortiGate server refers to an external or alternate source as way to
obtain the url/IP combination. This useful if there is a master DNS server for a large company
where a list is maintained. Satellite offices can then connect to the master DNS server to obtain
the correct addressing.
The DNS server entries does not allow CNAME entries, as per rfc 1912, section 2.4.
To configure a master DNS server - web-based manager
1. Go to System > Network > DNS Server, and select Create New.
2. Select the Type of Master.
3. Select the View as Shadow.
4. The view is the accessibility of the DNS server. Selecting Public, external users can access,
or use, the DNS server. Selecting Shadow, only internal users can use it.
5. Enter the DNS Zone, for example, WebServer.
6. Enter the domain name for the zone, for example example.com.
7. Enter the hostname of the DNS server, for example, Corporate.
8. Enter the contact address for the administrator, for example, admin@example.com.
9. Set Authoritative to Disable.
10.Select OK.
11.Enter the DNS entries for the server by selecting Create New.
12.Select the Type, for example, Address (A).
13.Enter the Hostname, for example web.example.com.
14.Enter the remaining information, which varies depending on the Type selected.
15.Select OK.
Fortinet Technologies Inc. Page 247 Install and System Administration for FortiOS 5.0
To configure a DNS server - CLI
config system dns-database
edit WebServer
set domain example.com
set type master
set view shadow
set ttl 86400
set primary-name corporate
set contact admin@exmple.com
set authoritative disable
config dns-entry
edit 1
set hostname web.example.com
set type A
set ip 192.168.21.12
set status enable
end
end
end
Recursive DNS
You can set an option to ensure these types of DNS server is not the authoritative server. When
configured, the FortiGate unit will check its internal DNS server (Master or Slave). If the request
cannot be fulfilled, it will look to the external DNS servers. This is known as a split DNS
configuration.
You can also have the FortiGate unit look to an internal server should the Master or Slave not
fulfill the request by using the CLI commands:
config system dns-database
edit example.com
...
set view shadow
end
For this behavior to work completely, for the external port, you must set the DNS query for the
external interface to be recursive. This option is configured in the CLI only.
To set the DNS query
config system dns-server
edit wan1
set mode recursive
end
Dynamic DNS
If your ISP changes the your external IP address on a regular basis, and you have a static
domain name, you can configure the external interface to use a dynamic DNS service to ensure
external users and/or customers can always connect to your company firewall.
Fortinet Technologies Inc. Page 248 Install and System Administration for FortiOS 5.0
If you have a FortiGuard subscription, you can use FortiGuard as your DDNS server. To
configure dynamic DNS in the web-based manager, go to System > Network > DNS, select
Enable FortiGuard DDNS, and enter the relevant information for the interface communicating to
the server, and which server to use, and relevant information.
If you do not have a FortiGuard subscription, or want to use an alternate server, you can
configure dynamic DNS in the CLI use the commands below. Within the CLI you can configure a
DDNS for each interface. Only the first configured port appears in the web-based manager.
Additional commands vary with the DDNS server you select.
config system ddns
edit <instance_value>
set monitor-interface <external_interface>
set ddns-server <ddns_server_selection>
end
You can also use FortiGuard (when subscribed) as a DDNS as well. To configure, use the CLI
commands:
config system fortiguard
set ddns-server-ip
set ddns-server-port
end
FortiClient discovery and registration
FortiOS provides a means of allowing users running FortiClient Endpoint Control software to
connect to specific interfaces when connecting to the FortiGate unit. As well as ensuring that
remote or local users have FortiClient Endpoint Control software installed on their PC or mobile
device.
FortiClient discovery
You can configure a FortiGate interface as an interface that will accept FortiClient connections.
When configured, the FortiGate unit sends broadcast messages which the FortiClient software
running on a end user PC is listening for.
To enable the broadcast message
1. Go to System > Network > Interface.
2. Edit the interface to send the broadcast messages.
3. Select FCT-Access.
4. In Device Management, select Broadcast Discovery Messages.
5. Select OK.
Once enabled, the FortiGate unit broadcasts a discovery message that includes the IP address
of the interface and listening port number to the local network. All PCs running FortiClient on
that network listen for this discovery message.
You also have the option of including a registration key. When the FortiClient discovers the
FortiGate unit, it is prompted to enter a registration key, defined by the administrator.
To add a registration key
1. Go to System > Config > Advanced.
2. Select Enable Registration Key for FortiClient, and enter the key.
3. Select Apply.
Fortinet Technologies Inc. Page 249 Install and System Administration for FortiOS 5.0
Ensure you distribute the key to the users that need to connect to the FortiGate unit.
FortiClient Registration
On the end user side, if FortiClient has not been registered with the FortiGate unit, it is
continually listening for the FortiGate discovery message. When this message is detected the
un-registered client will pop-up a FortiGate Detected message. The user can choose to either
register or ignore the message.
Clients that have registered with that FortiGate unit will not be listening for these messages and
will not display the message again.
If you enabled the registration key, the user is prompted to enter the key before a connection
can be completed.
For more information on FortiGate registration, see the FortiClient Administration Guide.
IP addresses for self-originated traffic
On the FortiGate unit, there are a number of protocols and traffic that is specific to the internal
workings of FortiOS. For many of these traffic sources, you can identify a specific port/IP
address for this self-originating traffic. The following traffic can be configured to a specific
port/IP address:
SNMP
Syslog
alert email
FortiManager connection IP
FortiGuard services
FortiAnalyzer logging
NTP
DNS
Authorization requests such as RADIUS
FSAE
Configuration of these services is performed in the CLI. In each instance, there is a command
set source-ip. For example, to set the source IP of NTP to be on the DMZ1 port with an IP of
192.168.4.5, the commands are:
config system ntp
set ntpsyn enable
set syncinterval 5
set source-ip 192.168.4.5
end
To see which services are configured with source-ip settings, use the get command:
get system source-ip status
Fortinet Technologies Inc. Page 250 Install and System Administration for FortiOS 5.0
The output will appear similar to the sample below:
NTP: x.x.x.x
DNS: x.x.x.x
SNMP: x.x.x.x
Central Management: x.x.x.x
FortiGuard Updates (AV/IPS): x.x.x.x
FortiGuard Queries (WebFilter/SpamFilter): x.x.x.x
Administration for schools
For system administrator in the school system it is particularly difficult to maintain a network
and access to the Internet. There are potential legal liabilities if content is not properly filtered
and children are allowed to view pornography and other non-productive and potentially
dangerous content. For a school, too much filtering is better than too little. This section
describes some basic practices administrators can employ to help maintain control without
being too draconian for access to the internet.
Security policies
The default security policies in FortiOS allow all traffic on all ports and all IP addresses. Not the
most secure. While applying UTM profiles can help to block viruses, detect attacks and prevent
spam, this doesnt provide a solid overall security option. The best approach is a layered
approach; the first layer being the security policy.
When creating outbound security policies, you need to know the answer to the question What
are the students allowed to do? The answer is surf the web, connect to FTP sites, send/receive
email, and so on.
Once you know what the students need to do, you can research the software used and
determine the ports the applications use. For example, if the students only require web surfing,
then there are only two ports (80 - HTTP and 443 - HTTPS) needed to complete their tasks.
Setting the security policies to only allow traffic through two ports (rather than all 65,000), this
will significantly lower any possible exploits. By restricting the ports to known services, mean s
stopping the use of proxy servers, as many of them operate on a non-standard port to hide their
traffic from URL filtering or HTTP inspection.
DNS
Students should not be allowed to use whatever DNS they want. this opens another port for
them to use and potentially smuggle traffic on. The best approach is to point to an internal DNS
server and only allow those devices out on port 53. Its the same approach one would use for
SMTP. Only allow the mail server to use port 25 since nothing else should be sending email.
If there is no internal DNS server, then the list of allowed DNS servers they can use should be
restrictive. One possible exploit would be for them to set up their own DNS server at home that
serves different IPs for known hosts, such as having Google.com sent back the IP for
playboy.com.
Encrypted traffic (HTTPS)
Generally speaking, students should not be allowed to access encrypted web sites. Encrypted
traffic cannot be sniffed, and therefore, cannot be monitored. HTTPS traffic should only be
allowed when necessary. Most web sites a student needs to access are HTTP, not HTTPS. Due
to the nature of HTTPS protocol, and the fact that encryption is an inherent security risk to your
network, its use should be restricted.
Fortinet Technologies Inc. Page 251 Install and System Administration for FortiOS 5.0
Adding a security policy that encompasses a list of allowed secure sites will ensure that any
HTTPS sites that are required are the only sites a student can go to.
FTP
For the most part, students should not be using FTP. FTP is not HTTP or HTTPS so you cannot
use URL flitting to restrict where they go. This can be controlled with destination IPs in the
security policy. With a policy that specifically outlines which FTP addresses are allowed, all
other will be blocked.
Example security policies
Given these requirements, an example set of security policies could look like the following
illustration. In a large setup, all the IPs for the students are treated by one of these four policies.
Figure 22:Simple security policy setup
The last policy in the list, included by default, is a deny policy.This adds to the potential of error
that could end up allowing unwanted traffic to pass. The deny policy ensures that any traffic
making it to this point is stopped. It can also help in further troubleshooting by viewing the logs
for denied traffic.
With these policies in place, even before packet inspection occurs, the FortiGate, and the
network are fairly secure. Should any of the UTM profiles fail, there is still a basic level of
security.
UTM security profiles
Antivirus profiles
Antivirus screening should be enabled for any service you have enabled in the security policies.
In the case above, HTTP, FTP, as well as POP3 and SMTP (assuming there is email access for
students). There is not a virus scan option for HTTPS, because the content is encrypted.
Generally speaking, most of the network traffic will be students surfing the web.
To configure antivirus profiles in the web-based manager, go to UTM Security Profiles >
Antivirus > Profile, or use the CLI commands under config antivirus profile.
Web filtering
The actual filtering of URLs - sites and content - should be performed by FortiGuard. It is easier
and web sites are constantly being monitored, and new ones reviewed and added to the
FortiGuard databases every day. The FortiGuard categories provide an extensive list of
offensive, and non-productive sites.
Fortinet Technologies Inc. Page 252 Install and System Administration for FortiOS 5.0
As well, there are additional settings to include in a web filtering profile to best contain a
students web browsing.
Web URL filtering should be enabled to set up exemptions for web sites that are blocked or
reasons other than category filtering. It also prevents the us of IP addresses to get around
web filtering.
Block invalid URLs - HTTPS only. This option inspects the HTTPS certificate and looks at the
URL to ensure its valid. It is common for proxy sites to create an HTTPS certificate with a
garbage URL. If the site is legitimate, it should be set up correctly. If the site approach to
security is to ignore it, then their security policy puts your network at risk and the site should
be blocked.
Web filtering options are configured in the web-based manager by going to UTM Security
Profiles > Web filter > Profile, or in the CLI under config webfilter profile.
Advanced options
There are a few Advanced options to consider for a web filtering profile:
Enable Provide details for blocked HTTP 4xx and 5xx errors. Under normal circumstances
there are exploits that can be used with 400 and 500 series messages to access the web
site. While most students probably wont know how to do this, there is no harm in being
cautious. It only takes one.
Enable Rate Images by URL. This option only works with Google images. It examines the
URL that the images is stored at to get a rating on it, then blocks or allows the image based
on the rating of the originating URL. It does not inspect the image contents. Most image
search engines to a prefect and pass the images directly to the browser.
Enable Block HTTP redirects by rating. An HTTP redirect is one method of getting around
ratings. Go to one web site that has an allowed rating, and it redirects to another web site
that may want blocked.
Categories and Classifications
For the selection of what FortiGuard categories and classifications that should be blocked, that
is purely based on the school system and its Internet information policy.
Email Filtering
Other than specific teacher-led email inboxes, there is no reason why a student should be able
to access, read or send personal email. Ports for POP3, SMTP and IMAP should not be opened
in a security policies.
IPS
The intrusion protection profiles should be used to ensure the student PCs are not vulnerable to
attacks, nor do you want students making attacks. As well, IPS can do more than simple
vulnerability scans. With a FortiGuard subscription, IPS signatures are pushed to the FortiGate
unit. New signatures are released constantly for various intrusions as they are discovered.
FortiOS includes a number of predefined IPS sensors that you can enable by default. Selecting
the all_default signature is a good place to start as it includes the major signatures.
To configure IPS sensors in the web-based manager, go to UTM Security Profiles > Intrusion
Protection > IPS Sensor, on the CLI use commands under config ips sensor.
Application control
Application control uses IPS signatures to limit the use of instant messaging and peer-to-peer
applications which can lead to possible infections on a students PC. FortiOS includes a
number of pre-defined application categories. To configure and maintain application control
Fortinet Technologies Inc. Page 253 Install and System Administration for FortiOS 5.0
profiles in the web-based manager, go to UTM Security Profiles > Application Control >
Application Sensor. In the CLI use commands under config application list.
Some applications to consider include proxies, botnets, toolbars and P2P applications.
Logging
Turn on all logging - every option in this section should be enabled. This is not where you decide
what you are going to log. It is simply defining what the UTM profiles can log.
Logging everything is a way to monitor traffic on the network, see what students are utilizing
the most, and locate any potential holes in your security plan. As well, keeping this information
may help to prove negligence later in necessary.
Tag management
Tag management provide a method of categorizing, or labelling objects within FortiOS using
keywords. You can give the following elements a tag, similar to a keyword:
IPS signature
application signature
security policy
firewall address
Tagging is way to organize the various elements, especially if you have a large number of
addresses, security policies to manage and keep track of. Tagging enables you to break these
elements into groups, but each element can belong to more than one group. Tags help you find
elements which have something in common, be it a group, user or location. This is very similar
to tagging found on photo sharing sites.
To use tagging, you need to enable it for 1U FortiGate units. It is enabled by default on all 2U
FortiGate units and blades.
To enable tagging - web-based manager
1. Go to System > Admin > Settings.
2. Select Object Tagging and Coloring.
3. Select Apply.
To enable tagging - CLI
config system settings
set gui-object-tags
end
Adding and removing tags
You add and remove tags when you create the various elements. For example, when adding a
firewall address, a section below the Interface selection enables you to add tags for that
element, such as the department, region, or really, anything to help identify the element. When
editing, applied tags appear as well. To add a tag, right-click on the element you want to add a
tag to.
Fortinet Technologies Inc. Page 254 Install and System Administration for FortiOS 5.0
Figure 23:Adding tags to a new address.
To remove a tag, in the element, click the tag in the Applied Tags list.
Reviewing tags
Tags can be reviewed in one location by going to System > Config > Tag Management. In this
screen, all tags used appear. The visual size of the tag name indicates the usage; the bigger the
size, the more it is used. By hovering over the keyword, a fly out indicates how many times it
has been used.
To see where it was used, click the keyword. An Object Usage window displays all the reference
categories where the keyword was used, and the number of times. Selecting the expand arrow
further details its use.
Further, for security policies for example, you can select the View icon and see the details of the
particular element. If need be, select the Edit icon to modify the element.
Figure 24:Viewing the address information for a tagged object
Fortinet Technologies Inc. Page 255 Install and System Administration for FortiOS 5.0
Tagging guidelines
Given the ease that tags can be added to elements in FortiOS, it makes sense to jump right in
and begin applying tags to elements and object. However, this type of methodology will lead to
problems down the road as new elements are added.
A methodology should be considered and developed before applying tags. This doesnt mean
you need to develop an entire thesaurus or reference guide for all possibilities of tags. However,
taking some time to develop a methodology for the keywords you intend to use will benefit later
when new security policies, addresses, and so on are added. Some things to consider when
developing a tag list:
the hierarchy used for the organization such as region, city location, building location
department names and if short forms or long forms are used
will acronyms be used or terms spelled out.
how granular will the tagging be
As tags are added, previously used tags appear so there is an opportunity to use previously
used tags. However, you want to avoid a situation where both accounting and acct are both
options. This is also important if there are multiple administrators in different locations to ensure
consistency.
At any time, you can change or even remove tags. It is best to do a bit of planning ahead of time
to avoid unnecessary work later on.
Replacement messages list
The replacement message list in System > Config > Replacement Message.
The replacement messages list enables you to view and customize replacement messages. Use
the expand arrow beside each type to display the replacement messages for that category.
Select the Edit icon beside each replacement message to customize that message for your
requirements.
Should you make a major error to the code, you can select the Restore Default to return to the
original message and code base.
If you are viewing the replacement messages list in a VDOM, any messages that have been
customized for that VDOM are displayed with a Reset icon that you can use to reset the
replacement message to the global version.
For connections requiring authentication, the FortiGate unit uses HTTP to send an
authentication disclaimer page for the user to accept before a security policy is in effect.
Therefore, the user must initiate HTTP traffic first in order to trigger the authentication disclaimer
page. Once the disclaimer is accepted, the user can send whatever traffic is allowed by the
security policy.
Replacement message images
You can add images to replacement messages to:
disclaimer pages
login pages
declined disclaimer pages
login failed page
login challenge pages
keepalive pages
Fortinet Technologies Inc. Page 256 Install and System Administration for FortiOS 5.0
Image embedding is also available to the endpoint NAC download portal and recommendation
portal replacement messages, as well as HTTP replacement messages.
Supported image formats are GIF, JPEG, TIFF and PNG. The maximum file size supported is
6000 bytes.
Adding images to replacement messages
To upload an image for use in a message
1. Go to System > Config > Replacement Message.
2. Select Manage Images at the top of the page.
3. Select Create New.
4. Enter a Name for the image.
5. Select the Content Type.
6. Select Browse to locate the file and select OK.
The image that you include in a replacement message, must have the following html:
<img src=%%IMAGE: <config_image_name>%% size=<bytes> >
For example:
<img src=%%IMAGE: logo_hq%% size=4272>
Modifying replacement messages
Replacement messages can be modified to include a message or content that suits your
organization.
Use the expand arrows to view the replacement message list for a given category. Messages
are in HTML format. For descriptions of the replacement message tags, see Replacement
message tags.
To change a replacement message, go to System > Config > Replacement Message select the
replacement message that you want to modify. At the bottom pane of the window, you can the
message on one side and the HTML code on the other side. The message view changes in
real-time as you change the content.
A list of common replacement messages appears in the main window. To see the entire list and
all categories of replacement messages, in the upper-right corner of the window, select
Extended View.
Replacement message tags
Replacement messages can include replacement message tags, or variables. When users
receive the message, the message tag is replaced with content relevant to the message. The
table lists the replacement message tags that you can use.
Table 16:Replacement message tags
Tag Description
%%AUTH_LOGOUT%% The URL that will immediately delete the current policy and close
the session. Used on the auth-keepalive page.
%%AUTH_REDIR_URL%% The auth-keepalive page can prompt the user to open a new
window which links to this tag.
Fortinet Technologies Inc. Page 257 Install and System Administration for FortiOS 5.0
%%CATEGORY%% The name of the content category of the web site.
%%DEST_IP%% The IP address of the request destination from which a virus was
received. For email this is the IP address of the email server that
sent the email containing the virus. For HTTP this is the IP
address of web page that sent the virus.
%%DURATION%%
(FortioS Carrier
only)
The amount of time in the reporting period. This is user defined in
the protection profile.
%%EMAIL_FROM%% The email address of the sender of the message from which the
file was removed.
%%EMAIL_TO%% The email address of the intended receiver of the message from
which the file was removed.
%%FAILED_MESSAGE%% The failed to login message displayed on the auth-login-failed
page.
%%FILE%% The name of a file that has been removed from a content stream.
This could be a file that contained a virus or was blocked by
antivirus file blocking. %%FILE%% can be used in virus and file
block messages.
%%FORTIGUARD_WF%% The FortiGuard - Web Filtering logo.
%%FORTINET%% The Fortinet logo.
%%LINK%% The link to the FortiClient Host Security installs download for the
Endpoint Control feature.
%%HTTP_ERR_CODE%% The HTTP error code. 404 for example.
%%HTTP_ERR_DESC%% The HTTP error description.
%%KEEPALIVEURL%%
(FortiOS Carrier
only)
auth-keepalive-page automatically connects to this URL every
%%TIMEOUT%% seconds to renew the connection policy.
%%MMS_SENDER%%
(FortiOS Carrier
only)
Senders MSISDN from message header.
%%MMS_RECIPIENT%%
(FortiOS Carrier
only)
Recipients MSISDN from message header.
%%MMS_SUBJECT%%
(FortiOS Carrier
only)
MMS Subject line to help with message identity.
Table 16:Replacement message tags (continued)
Tag Description
Fortinet Technologies Inc. Page 258 Install and System Administration for FortiOS 5.0
%%MMS_HASH_CHECKSUM%
%
Value derived from hash calculation - will only be shown on
duplicate message alerts.
%%MMS_THRESH%% Mass MMS alert threshold that triggered this alert.
%%NIDSEVENT%% The IPS attack message. %%NIDSEVENT%% is added to alert
email intrusion messages.
%%NUM_MSG%%
(FortiOS Carrier
only)
The number of time the device tried to send the message with
banned content within the reporting period.
%%OVERRIDE%% The link to the FortiGuard Web Filtering override form. This is
visible only if the user belongs to a group that is permitted to
create FortiGuard web filtering overrides.
%%OVRD_FORM%% The FortiGuard web filter block override form. This tag must be
present in the FortiGuard Web Filtering override form and should
not be used in other replacement messages.
%%PROTOCOL%% The protocol (http, ftp, pop3, imap, or smtp) in which a virus was
detected. %%PROTOCOL%% is added to alert email virus
messages.
%%QUARFILENAME%% The name of a file that has been removed from a content stream
and added to the quarantine. This could be a file that contained a
virus or was blocked by antivirus file blocking.
%%QUARFILENAME%% can be used in virus and file block
messages. Quarantining is only available on FortiGate units with
a local disk.
%%QUOTA_INFO%% Display information about the traffic shaping quota setting that is
blocking the user. Used in traffic quota control replacement
messages.
%%QUESTION%% Authentication challenge question on auth-challenge page.
Prompt to enter username and password on auth-login page.
%%SERVICE%% The name of the web filtering service.
%%SOURCE_IP%% The IP address of the request originator who would have
received the blocked file. For email this is the IP address of the
users computer that attempted to download the message from
which the file was removed.
%%TIMEOUT%% Configured number of seconds between authentication keepalive
connections. Used on the auth-keepalive page.
Table 16:Replacement message tags (continued)
Tag Description
Fortinet Technologies Inc. Page 259 Install and System Administration for FortiOS 5.0
Administration replacement message
If you enter the following CLI command the FortiGate unit displays the Administration Login
Disclaimer whenever an administrator logs into the FortiGate units web-based manager or CLI.
config system global
set access-banner enable
end
The web-based manager administrator login disclaimer contains the text of the Login
Disclaimer replacement message as well as Accept and Decline buttons. The administrator
must select accept to login.
Alert Mail replacement messages
The FortiGate unit adds the alert mail replacement messages listed in the following table to alert
email messages sent to administrators. If you enable the option Send alert email for logs based
on severity, whether or not replacement messages are sent by alert email depends on how you
set the alert email in Minimum log level.
Authentication replacement messages
The FortiGate unit uses the text of the authentication replacement messages for various user
authentication HTML pages that are displayed when a user is required to authenticate because
a security policy includes at least one identity-based policy that requires firewall users to
authenticate.
These replacement message pages are for authentication using HTTP and HTTPS. You cannot
customize the firewall authentication messages for FTP and Telnet.
The authentication login page and the authentication disclaimer include replacement tags and
controls not found on other replacement messages.
Users see the authentication login page when they use a VPN or a security policy that requires
authentication. You can customize this page in the same way as you modify other replacement
messages.
%%URL%% The URL of a web page. This can be a web page that is blocked
by web filter content or URL blocking. %%URL%% can also be used
in http virus and file block messages to be the URL of the web
page from which a user attempted to download a file that is
blocked.
%%VIRUS%% The name of a virus that was found in a file by the antivirus
system. %%VIRUS%% can be used in virus messages
Table 16:Replacement message tags (continued)
Tag Description
Fortinet Technologies Inc. Page 260 Install and System Administration for FortiOS 5.0
There are some unique requirements for these replacement messages:
The login page must be an HTML page containing a form with ACTION="/" and
METHOD="POST"
The form must contain the following hidden controls:
<INPUT TYPE="hidden" NAME="%%MAGICID%%" VALUE="%%MAGICVAL%%">
<INPUT TYPE="hidden" NAME="%%STATEID%%" VALUE="%%STATEVAL%%">
<INPUT TYPE="hidden" NAME="%%REDIRID%%" VALUE="%%PROTURI%%">
The form must contain the following visible controls:
<INPUT TYPE="text" NAME="%%USERNAMEID%%" size=25>
<INPUT TYPE="password" NAME="%%PASSWORDID%%" size=25>
Example
The following is an example of a simple authentication page that meets the requirements listed
above.
<HTML><HEAD><TITLE>Firewall Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this service.</H4>
<FORM ACTION="/" method="post">
<INPUT NAME="%%MAGICID%%" VALUE="%%MAGICVAL%%" TYPE="hidden">
<TABLE ALIGN="center" BGCOLOR="#00cccc" BORDER="0"
CELLPADDING="15" CELLSPACING="0" WIDTH="320"><TBODY>
<TR><TH>Username:</TH>
<TD><INPUT NAME="%%USERNAMEID%%" SIZE="25" TYPE="text"> </TD></TR>
<TR><TH>Password:</TH>
<TD><INPUT NAME="%%PASSWORDID%%" SIZE="25" TYPE="password">
</TD></TR>
<TR><TD COLSPAN="2" ALIGN="center" BGCOLOR="#00cccc">
<INPUT NAME="%%STATEID%%" VALUE="%%STATEVAL%%" TYPE="hidden">
<INPUT NAME="%%REDIRID%%" VALUE="%%PROTURI%%" TYPE="hidden">
<INPUT VALUE="Continue" TYPE="submit"> </TD></TR>
</TBODY></TABLE></FORM></BODY></HTML>
Captive Portal Default replacement messages
The Captive Portal Default replacement messages are used for wireless authentication only. You
must have a VAP interface with the security set as captive portal to trigger these replacement
messages.
Device Detection Portal replacement message
The FortiGate unit displays the replacement message when the FortiGate unit cannot determine
the type of BYOD or handheld device is used to connect the network.
Email replacement messages
The FortiGate unit sends the mail replacement messages to email clients using IMAP, POP3, or
SMTP when an event occurs such as antivirus blocking a file attached to an email that contains
a virus. Email replacement messages are text messages.
If the FortiGate unit supports SSL content scanning and inspection these replacement
messages can also be added to IMAPS, POP3S, and SMTPS email messages.
Fortinet Technologies Inc. Page 261 Install and System Administration for FortiOS 5.0
Endpoint Control replacement message
The FortiGate unit displays the replacement message when the FortiClient Endpoint Security
software is not installed or registered correctly with the FortiGate unit.
FTP replacement messages
The FortiGate unit sends the FTP replacement messages listed in the table below to FTP clients
when an event occurs such as antivirus blocking a file that contains a virus in an FTP session.
FTP replacement messages are text messages.
FortiGuard Web Filtering replacement messages
The FortiGate unit sends the FortiGuard Web Filtering replacement messages listed in the table
to web browsers using the HTTP protocol when FortiGuard web filtering blocks a URL, provides
details about blocked HTTP 4xx and 5xx errors, and for FortiGuard overrides. FortiGuard Web
Filtering replacement messages are HTTP pages.
If the FortiGate unit supports SSL content scanning and inspection and if Protocol Recognition
> HTTPS Content Filtering Mode is set to Deep Scan in the antivirus profile, these replacement
messages can also replace web pages downloaded using the HTTPS protocol.
HTTP replacement messages
The FortiGate unit sends the HTTP replacement messages listed in the following table to web
browsers using the HTTP protocol when an event occurs such as antivirus blocking a file that
contains a virus in an HTTP session. HTTP replacement messages are HTML pages.
If the FortiGate unit supports SSL content scanning and inspection, and if under HTTPS in the
protocol option list has Enable Deep Scan enabled, these replacement messages can also
replace web pages downloaded using the HTTPS protocol.
IM replacement messages
The FortiGate unit sends the IM replacement messages listed in to IM clients using AIM, ICQ,
MSN, or Yahoo! Messenger when an event occurs such as antivirus blocking a file attached to
an email that contains a virus. IM replacement messages are text messages.
NNTP replacement messages
The FortiGate unit sends the NNTP replacement messages listed in the following table to NNTP
clients when an event occurs such as antivirus blocking a file attached to an NNTP message
that contains a virus. NNTP replacement messages are text messages.
Spam replacement messages
The FortiGate unit adds the Spam replacement messages listed in the following table to SMTP
server responses if the email message is identified as spam and the spam action is discard. If
the FortiGate unit supports SSL content scanning and inspection these replacement messages
can also be added to SMTPS server responses.
NAC quarantine replacement messages
The page that is displayed for the user depends on whether NAC quarantine blocked the user
because a virus was found, a DoS sensor detected an attack, an IPS sensor detected an attack,
Fortinet Technologies Inc. Page 262 Install and System Administration for FortiOS 5.0
or a DLP rule with action set to Quarantine IP address or Quarantine Interface matched a
session from the user.
The default messages inform the user of why they are seeing this page and recommend they
contact the system administrator. You can customize the pages as required, for example to
include an email address or other contact information or if applicable a note about how long the
user can expect to be blocked.
SSL VPN replacement message
The SSL VPN login replacement message is an HTML replacement message that formats the
FortiGate SSL VPN portal login page. You can customize this replacement message according
to your organizations needs. The page is linked to FortiGate functionality and you must
construct it according to the following guidelines to ensure that it will work.
The login page must be an HTML page containing a form with ACTION="%%SSL_ACT%%"
and METHOD="%%SSL_METHOD%%"
The form must contain the %%SSL_LOGIN%% tag to provide the login form.
The form must contain the %%SSL_HIDDEN%% tag.
Web Proxy replacement messages
The FortiGate unit sends Web Proxy replacement messages listed in the table below when a
web proxy event occurs that is detected and matches the web proxy configuration. These
replacement messages are web pages that appear within your web browser.
The following web proxy replacement messages require an identity-based security policy so
that the web proxy is successful. You can also enable FTP-over-HTTP by selecting the FTP
option in System > Network > Explicit Proxy.
Traffic quota control replacement messages
When user traffic is going through the FortiGate unit and it is blocked by traffic shaping quota
controls, users see the Traffic shaper block message or the Per IP traffic shaper block message
when they attempt to connect through the FortiGate unit using HTTP.
The traffic quota HTTP pages should contain the %%QUOTA_INFO%% tag to display information
about the traffic shaping quota setting that is blocking the user.
MM1 replacement messages
MM1 replacement messages are sent when, during MMS content scanning, FortiOS Carrier
detects, for example a virus, using the MMS profile.
You must have Remove Blocked selected within the MMS profile if you want to remove the
content that is intercepted during MMS scanning on the FortiGate unit.
MM3 replacement messages
MM3 replacement messages are sent when, during MMS content scanning, FortiOS Carrier
detects, for example a virus, using the MMS profile.
You must have Remove Blocked selected within the MMS profile if you want to remove the
content that is intercepted during MMS scanning on the unit.
Fortinet Technologies Inc. Page 263 Install and System Administration for FortiOS 5.0
MM4 replacement messages
MM4 replacement messages are sent when, during MMS content scanning, FortiOS Carrier
detects, for example a virus, using the MMS profile.
MM7 replacement messages
MM7 replacement messages are sent when, during MMS content scanning, FortiOS Carrier
detects, for example a virus, using the MMS profile.
MMS replacement messages
The MMS replacement message is sent when a section of an MMS message has been replaced
because it contains a blocked file. This replacement message is in HTML format.
The message text is:
<HTML><BODY>This section of the message has been replaced because it
contained a blocked file</BODY></HTML>
Replacement message groups
You can configure the replacement message groups from System > Config > Replacement
Message Group. All new replacement message groups that you add inherit from the default
group. Modifying messages in the default group automatically changes any messages that are
unmodified in the other groups.
Replacement message groups are not enabled by default. To enable them, go to System >
Admin > Settings and select the Replacement Message Groups check box, or use the CLI
commands:
config sysetm global
set gui-replacement-message-groups enable
end
If you enable virtual domains (VDOMs) on the FortiGate unit, replacement message groups are
configured separately for each virtual domain. Each virtual domain has its own default
replacement message group, configured from System > Config > Replacement Message Group.
When you modify a message in a replacement message group, a Reset icon appears beside the
message in the group. You can select this Reset icon to reset the message in the replacement
message group to the default version.
All MM1/4/7 notification messages for FortiOS Carrier (and MM1 retrieve-conf messages) can
contain a SMIL layer and all MM4 notification messages can contain an HTML layer in the
message. These layers can be used to brand messages by using logos uploaded to the
FortiGate unit via the 'Manage Images' link found on the replacement message group
configuration page.
Disk
To view the status and storage information of the local disk on your FortiGate unit, go to System
> Config > Advanced. The Disk menu appears only on FortiGate units with an internal hard or
flash disk.
Fortinet Technologies Inc. Page 264 Install and System Administration for FortiOS 5.0
Formatting the disk
The internal disk of the FortiGate unit (if available) can be formatted by going to System >
Config > Disk and selecting Format.
Formatting the disk will erase all data on it, including databases for antivirus and IPS; logs,
quarantine files, and WAN optimization caches. The FortiGate unit requires a reboot once the
disk has been formatted.
Setting space quotas
If the FortiGate unit has an internal hard or flash disk, you can allocate the space on the disk for
specific logging and archiving, and WAN optimization. By default, the space is used on an as
required basis. As such, a disk can fill up with basic disk logging, leaving less potential space
for quarantine.
By going to System > Config > Disk, you can select the Edit icon for Logging and Archiving and
WAN Optimization & Web Cache and define the amount of space each log, archive and WAN
optimization has on the disk.
CLI Scripts
To upload bulk CLI commands and scripts, go to System > Config > Advanced.
Scripts are text files containing CLI command sequences. Scripts can be used to deploy
identical configurations to many devices. For example, if all of your devices use identical
security policies, you can enter the commands required to create the security policies in a
script, and then deploy the script to all the devices which should use those same settings.
Use a text editor such as Notepad or other application that creates simple text files. Enter the
commands in sequence, with each line as one command, similar to examples throughout the
FortiOS documentation set.
If you are using a FortiGate unit that is not remotely managed by a FortiManager unit or the
FortiGuard Analysis and Management Service, the scripts you upload are executed and
discarded. If you want to execute a script more than once, you must keep a copy on your
management PC.
If your FortiGate unit is configured to use a FortiManager unit, you can upload your scripts to
the FortiManager unit, and run them from any FortiGate unit configured to use the FortiManager
unit. If you upload a script directly to a FortiGate unit, it is executed and discarded.
If your FortiGate unit is configured to use FortiGuard Analysis and Management Service, scripts
you upload are executed and stored. You can run uploaded scripts from any FortiGate unit
configured with your FortiGuard Analysis and Management Service account. The uploaded
script files appear on the FortiGuard Analysis and Management Service portal web site.
Uploading script files
After you have created a script file, you can then upload it through System > Config >
Advanced. When a script is uploaded, it is automatically executed.
Commands that require the FortiGate unit to reboot when entered in the command line will also
force a reboot if included in a script.
To execute a script
1. Go to System > Config > Advanced.
2. Verify that Upload Bulk CLI Command File is selected.
Fortinet Technologies Inc. Page 265 Install and System Administration for FortiOS 5.0
3. Select Browse to locate the script file.
4. Select Apply.
If the FortiGate unit is not configured for remote management, or if it is configured to use a
FortiManager unit, uploaded scripts are discarded after execution. Save script files to your
management PC if you want to execute them again later.
If the FortiGate unit is configured to use the FortiGuard Analysis and Management Service, the
script file is saved to the remote server for later reuse. You can view the script or run it from the
FortiGuard Analysis and Management Service portal web site.
Rejecting PING requests
The factory default configuration of your FortiGate unit allows the default external interface to
respond to ping requests. Depending on the model of your FortiGate unit the actual name of
this interface will vary. For the most secure operation, you should change the configuration of
the external interface so that it does not respond to ping requests. Not responding to ping
requests makes it more difficult for a potential attacker to detect your FortiGate unit from the
Internet. One such potential threat are Denial of Service (DoS) attacks.
A FortiGate unit responds to ping requests if ping administrative access is enabled for that
interface.
To disable ping administrative access - web-based manager
1. Go to System > Network > Interface.
2. Choose the external interface and select Edit.
3. Clear the Ping Administrative Access check box.
4. Select OK.
In the CLI, when setting the allowaccess settings, by selecting the access types and not
including the PING option, that option is then not selected. In this example, only HTTPS is
selected.
To disable ping administrative access - CLI
config system interface
edit external
set allowaccess https
end
Opening TCP 113
Although seemingly contrary to conventional wisdom of closing ports from hackers, this port,
which is used for ident requests, should be opened.
Port 113 initially was used as an authentication port, and later defined as an identification port
(see RFC 1413). Some servers may still use this port to help in identifying users or other servers
and establish a connection. Because port 113 receives a lot of unsolicited traffic, many routers,
including on the FortiGate unit, close this port.
The issue arises in that unsolicited requests are stopped by the FortiGate unit, which will send a
response saying that the port is closed. In doing so, it also lets the requesting server know there
is a device at the given address, and thus announcing its presence. By enabling traffic on port
113, requests will travel to this port, and will most likely, be ignored and never responded to.
Fortinet Technologies Inc. Page 266 Install and System Administration for FortiOS 5.0
By default, the ident port is closed. To open it, use the following CLI commands:
config system interface
edit <port_name>
set ident_accept enable
end
You could also further use port forwarding to send the traffic to a non-existent IP address and
thus never have a response packet sent.
Obfuscate HTTP headers
The FortiGate unit can obfuscate the HTTP header information being sent to external web
servers to better cloak the source. By default this option is not enabled. To obfuscate HTTP
headers, use the following CLI command:
config system global
set http-obfucate {none | header-only | modified | no-error}
end
Where:
none do not hide the FortiGate web server identity.
header-only hides the HTTP server banner.
modified provides modified error responses.
no-error suppresses error responses.
Fortinet Technologies Inc. Page 267 Install and System Administration for FortiOS 5.0
Index
Numerics
3DES 33
802.1Q 177, 181, 184
802.3ad 166
A
abort 40
access controls 41
adding
DHCP relay agent 243
SNMP community 114
adding, configuring defining
administrator password 56
administrator settings 66
backing up configuration 19
changing administrators password 21
dashboards 15
DHCP interface settings 167
DHCP server 241
firmware version 18
formatting USB disks 20
general system settings 66
interface 160
LDAP authentication for administrators 61
manually updating FortiGuard definitions 22
password authentication 56
password, administrator 56
PKI authentication, administrators 62
RADIUS authentication, administrators 61
RAID disk 26
replacement message images 256
replacement messages 256
restoring configuration 21
secondary IP address 172
synchronizing with NTP server 18
system configuration backup and restore,
FortiManager 20
system time 18
TACACS+ authentication 61
text strings (names) 13
uploading scripts 264
Address Resolution Protocol (ARP) 205
admin
administrator account 28
concurrent sessions 57
disclaimer, login
disclaimer 60
password 54
password length 57
administration
schools 250
administrative access 170
changing 29
administrative interface. See web-based manager
administrator
account 28
lockout 58
password 28
administrator profiles
global 63
vdom 63
administrator settings 66
administrators
LDAP authentication 61
management access 56
monitoring See also widgets 21
viewing list 56
Agent, sFlow 104
aggregate interfaces 166
air flow 86
alert message console
viewing 23
allow access 170
ambient temperature 86
antivirus updates 95
manual 22
ASCII 45
asymmetric routing 208
attack updates
manual 22
scheduling 95
authenticating
L2TP clients 219
PPTP clients 211
authentication
PKI certificate, administrators 62
RADIUS for administrators 61
SCP 69
authentication server, external
for L2TP 219
for PPTP 211
authorization, LDAP 64
auto-install 74
B
backing up configuration
See widgets, system information
backup and restore configuration, central management
20
backup configuration
SCP 68
USB 77
baud rate 47
bits per second (bps) 32
Blowfish 33
boot interrupt 31
border gateway protocol (BGP). See routing, BGP
broadcast
domains 177
storm 205
Fortinet Technologies Inc. Page 268 Install and System Administration for FortiOS 5.0
C
captive portal 163
case sensitivity
Perl regular expressions 49
central management
backup and restore configuration 20
certificate, security 52
changing units host name 16
CHAP 209
CIDR 37
Cisco
router configuration 188, 203
switch configuration 188, 194, 202
CLI 11
connecting 31
connecting to from the web-based manager 29
connecting to the 31
Console widget 32
upgrading the firmware 73
CLI console 25
CNAME 246
collector agent, sFlow 104
column settings
configuring 13
command 35
abbreviation 43
completion 42
help 42
multi-line 43
concurrent sessions 57
configuration lock 83
configuration revisions 71
configure
FortiGuard 53
restore 70
connecting
to the CLI using SSH 33
to the CLI using Telnet 34
to the console 31
web-based manager 51
conservation mode 120
console 31
controlled upgrade 79
conventions 35
cp1252 45
Cross-Site Scripting
protection from 13
D
dashboards
adding 15
date and time 52
DB-9 31
DCE-RPC 226
dcerps
session helper 226
default route 187
VLAN 187
defaults 71
definitions 35
delete, shell command 39
DHCP
servers and relays 241
service 243
dhcp
IPv6 243
lease breaking 244
DHCP (Dynamic Host Configuration Protocol)
configuring on an interface 167
DHCP interface 167
diagnostics, tracert 195
disabling 225
disclaimer 60
disk status, viewing 263
Distributed Computing Environment Remote
Procedure Call (DCE-RPC) 226
DLP archive
viewing 24
DNS 226, 245
CNAME 246
external servers 245
loal domains 245
public 246
recursive 247
server
server, DNS 246
shadow 246
slave 246
split 247
DNS master 246
dns-tcp, session helper 226
dns-udp, session helper 226
domain name server 245
dotted decimal 37
downloading firmware 72
dual internet connection 232
dual WAN
link redundancy 232
load sharing 235
duplicate MAC 206
E
earthing 87
edit, shell command 39
_email 37
end
command in an edit shell 40
end, shell command 39
Endpoint Mapper (EPM) 226
entering text strings (names) 13
environment variables 43
escape sequence 43
execute shutdown 88
F
factory reset 71
field 36
File transfer protocol (FTP) 226
Fortinet Technologies Inc. Page 269 Install and System Administration for FortiOS 5.0
filter
filtering information on web-based manager lists 12
web-based manager lists 12
firewall IP addresses, defining L2TP 219
firmware
backup and restore from USB 77
download 72
from system reboot 76
installing 76
revert from CLI 75
reverting with web-based manager 72
testing before use 78
testing new firmware 78
upgrade from CLI 73
upgrade with web-based manager 72
upgrading using the CLI 73
flow control 32
formatting USB disks 20
FortiGuard 53
manually configuring definition updates 22
push update 93, 95
FortiGuard definitions
manually updating 22
FortiGuard Services
analysis service options 93
licenses 21
management and analysis service options 93
support contract 92
web filtering and antispam options 97
FortiGuard services 22
FortiGuard, backup and restore configuration 20
FortiManager
remote backup and restore options 20
Fortinet MIB 116, 121
_fqdn 37
fully qualified domain name (FQDN) 37
G
GB2312 45
Generic Routing Encapsulation (GRE) 209
get
edit shell command 40
shell command 39
gigabit interfaces, SNMP 113
graphical user interface. See web-based manager
grounding 87
GUI. See web-based manager
H
H.245 227
h245I
session helper 227
H323, session helper 227
hardware switch 164
host name 16
HTTPS 11, 57
humidity 86
I
ID tag 178, 181
idle timeout
changing for the web-based manager 29
IEEE 802.1Q 177, 181
ifHighSpeed 113
IF-MIB.ifSpeed 113
indentation 36
_index 37
index number 37
_int 37
interface
802.1Q trunk 184, 194
external, VLAN NAT example 189
external, VLAN NAT/Route example 189
maximum number 177, 208
software switch 163
VLAN subinterface 184, 188, 189, 194
interfaces
aggregate 166
AMC card 157
DHCP 167
loopback 165
MTU packet size 171
physical 156
PPPoE 168
redundant 165
secondary IP address 172
virtual domains 172
virtual LANs 174
wireless 171
zones 175
International characters 45
IP address
overlapping 185
_ipv4 37
_ipv4/mask 37
_ipv4mask 37
_ipv4range 37
IPv6
dhcp 243
_ipv6 37
_ipv6mask 37
IPX, layer-2 forwarding 205
ISO 8859-1 45
K
K-12 250
key 34
Fortinet Technologies Inc. Page 270 Install and System Administration for FortiOS 5.0
L
L2TP VPN
authentication method 219
configuration steps 218
enabling 219
firewall IP addresses, defining 219
infrastructure requirements 218
network configuration 218
security policy, defining 220
VIP address range 219
language
changing the web-based manager language 29
layer-2 178, 181, 184
example 178
forwarding 205
layer-3 181
LDAP authorization 64
LDAP server, external
for L2TP 219
for PPTP 211
lease breaking
dhcp 244
length 57
length, password 57
licenses
viewing 21
line endings 48
link redundancy 232
lists
using web-based manager 12
load sharing 235
local console access 31
local domain name 245
locking configuration 83
lockout
administrator 58
logging out
web-based manager 30
login 60
restricting unwanted 57
loopback interfaces 165
lost password
recovering 28
M
MAC address 206
maintenance
configuration revision 73
disk 263
management access 56
Management Information Base (MIB) 110
management IP address
changing 17
master DNS server 246
memory 208
merge interfaces 163
message, warning 60
MGCP 227
session helper 227
MIB 121
FortiGate 116
RFC 1213 116
RFC 2665 116
Microsoft Point-to-Point Encryption (MPPE) 210
modem 238
routing 240
modem modes 238
monitoring
administrators 21
DHCP 244
RAID 25
more 47
MS RPC 226
MTU packet size, interface 171
multi-line command 43
multiple pages 47
N
_name 37
NAT
port translation (NAT-PT) 228
VLAN example 189
NAT mode 16
NetBIOS, for Windows networks 207
network instability 205
Network Time Protocol server (NTP) 18
next 40
NTP server 53
null modem 31, 33
O
object 36
object identifier (OID) 121
ONC-RPC 226, 228
open shortest path first (OSPF). See routing, OSPF
Open Systems Interconnect (OSI) 178
operating temperature 86
operation mode 17
option 36
P
packet header 104
packets
layer-3 routing 181
VLAN-tagged 184
page controls
web-based manager 12
paging 47
PAP 209
parity 32
password 57
changing, administrator 21
configuring authentication 56
recovering lost password 28
password, changing 54
_pattern 37
pattern 37
Fortinet Technologies Inc. Page 271 Install and System Administration for FortiOS 5.0
Perl regular expressions, using 48
permissions 41
ping server 233, 240
pmap
session helper 228
Point-to-Point Tunneling Protocol (PPTP) 209
port 47 228
port, session helper 223
power off 88
PPPoE interface 168
PPTP
external server 214
layer-2 forwarding 205
session helper 228
PPTP VPN
authentication method 211
configuring pass through 214
enabling 212
FortiGate implementation 209
security policy, defining 213
VIP address range 212
protocol, session helper 223
publis DNS server 246
purge, shell command 40
push update 93, 95
override 95
R
RADIUS server, external
for L2TP 219
for PPTP 211
RAS, session helper 227
read & write access level
administrator account 19
read only access level
administrator account 19
reboot, upgrade 79
recursive DNS 247
redundant interface 165
redundant interfaces 232
redundant mode 238
Registration, Admission, and Status (RAS) 227
regular expression 37
relay
DHCP 241
relay, DHCP 243
remote administration 57
remote client, L2TP VPN 220
remote FortiManager options 20
remote shell 229
rename, shell command 40
replacement message group 263
replacement messages
administration 259
alert mail 259
captive portal default 260
Device Detection Portal 260
Endpoint Control 261
FortiGuard web filtering 261
FTP 261
HTTP 261
IM, P2P 261
images 255
mail 260
MM1 262
MM3 262
MM4 263
MM7 263
modifying 256
NAC quarantine 261
NNTP 261
spam 261
SSL VPN 262
tags 256
traffic quota control 262
user authentication 259
viewing 255
web proxy 262
reserved characters 43
restore 70
restore defaults 71
restoring configuration See widgets
restricting login attempts 57
reverting firmware 72
revisions 71
RFC
1213 111, 116
2516 168
2665 111, 116
RJ-45 31
RJ-45-to-DB-9 31, 33
routing
asymmetric 208
BGP 187
modem 240
OSPF 187
RIP 187
STP 207
routing information protocol (RIP). See routing, RIP
routing, default 187
rsh, session helper 229
RTSP, session helper 230
S
schedule
antivirus and attack definition updates 95
school administration 250
Fortinet Technologies Inc. Page 272 Install and System Administration for FortiOS 5.0
SCP
authentication 69
backup configuration 68
client application 69
restore configuration 70
SSH access 68
screen resolution
minimum recommended 11
scripts
uploading 264
Secure Shell (SSH)
key 34
security certificate 52
security IP addresses
defining L2TP 219
security policy
defining L2TP 219, 220
defining PPTP 213
VLAN 186
VLAN example 191
VLAN transparent mode 197, 200
serial communications (COM) port 31
server
DHCP 241
service, DHCP 243
session helper 222, 225, 226, 227, 228, 229, 231
changing the configuration 223
dcerpc 226
DNS 226
H.245 227
h245O 227
h323 227
mgcp 227
pmap 228
port 223
PPTP 228
protocol 223
ras 227
rsh 229
rtsp 230
sip 230
TFTP 230
tns 231
viewing 222
session-helper 222
set 41
setting administrative access for SSH or Telnet 32
settings 66
administrators 66
sFlow 104
shadow DNS server 246
shell command
delete 39
edit 39
end 39
get 39
purge 40
rename 40
show 40
shielded twisted pair 87
Shift-JIS 45
show 41
shell command 40
shut down 88
signatures, update 53
SIP, session helper 230
slave DNS server 246
SNMP
configuring community 114
get command 117
gigabit interfaces 113
manager 110, 114
MIB 121
MIBs 116
queries 112, 114, 115
RFC 12123 116
RFC 2665 116
traps 118
v3 110, 112
SNMP Agent 111
soft switch 163
soft-switch 163
softswith 163
software switch interface 163
Spanning Tree Protocol (STP) 205, 207
special characters 43, 45
split DNS 247
SQLNET
session helper 231
SSH 32, 33, 57
key 34
standalone mode 238
STP, forwarding 207
_str 37
string 37
sub-command 35, 38
subinterface
VLAN NAT/Route 184
switch 163
hardware 164
switching vdoms 29
syntax 35
system idle timeout 57
system reboot, installing 76
system resources
viewing 23
system time
configuring 18
system, session-helper 222
T
table 36
TACACS+ server
authentication 61
tags
replacement messages 256
Fortinet Technologies Inc. Page 273 Install and System Administration for FortiOS 5.0
TCP
port 111 223
port 135 226
port 1720 223
port 1723 223, 228
port 21 226
port 512 223
port 514 223
Telnet 32, 34
testing
VDOM transparent mode 204
VLAN 195
text strings (names) 13
TFTP server 76
TFTP, session helper 230
time
and date 52
configuring 18
NTP 53
protocol 53
zone 52
TNS 231
tns
session helper 231
top sessions
viewing 25
tracert 195
transparent mode 17, 195
management IP address 17
security policy 197, 200
VDOM example 199, 202, 203
VLAN example 198
VLAN subinterface 196
traps, SNMP 118
trunk
interface 184, 194
links 178
U
UDP
port 111 223
port 135 226
port 1719 227
port 2427 227
port 2727 227
Unicode 45
unit operation
viewing 23
universal unique identifier (UUID) 226
unknown action 35
unset 41
unwanted login attempts 57
update signatures 53
updating
antivirus and IPS, web-based manager 53
upgrade after reboot 79
upgrading, firmware using the CLI 73
uploading scripts 264
USB
auto-install 74
backup 77
USB disks, formatting 20
using the CLI 31
UTF-8 45
V
_v4mask 37
_v6mask 37
value 36
VDOM
limited resources 208
maximum interfaces 177, 208
transparent mode 195
vdoms, switching 29
veiwing
DLP archive, log and archive statistics widget 24
viewing
administrators list 56
Alert Message Console 23
configuration revisions 73
disk status 263
DLP archive 24
FortiGuard support contract 92
licenses 21
log, log and archive statistics widget 25
session history, widget 25
system information 15
system resources 23
top sessions 25
unit operation 23
VIP address
L2TP clients 219
PPTP clients 212
virtual domains 172
virtual LANs 174
VLAN
application 177
jumbo traffic frames 172
maximum number 177, 208
security policy 186
subinterface 184, 188, 189, 194
tagged packets 184
transparent mode 195
VLAN ID 181
range 178
tag 178
VLAN subinterface
transparent mode 196
VDOM transparent mode example 199
VLAN NAT example 189
VLAN NAT/Route example 189
VoIP 228
VPN, configuring L2TP 218
vulnerability
Cross-Site Scripting 13
XSS 13
Fortinet Technologies Inc. Page 274 Install and System Administration for FortiOS 5.0
W
warning message 60
wdigets
unit operation 23
web filtering service 258
web site, content category 257
Web UI. See web-based manager
web-based manager 11, 51
changing the language 29
connecting to the CLI 29
idle timeout 29
logging out 30
pages 11
screen resolution 11
using web-based manager lists 12
web-based manager, lock 83
web-based manager, switching vdoms 29
widgets 21
alert message console 23
CLI console 25
disk storage 27
IM usage 28
licence information 21
log and archive statistics 24
network protocol usage 28
P2P usage 28
RAID monitor 25
session history 25
system information 15
system resources 23
top application usage 27
top history 25
top sessions 25
VoIP usage 28
wild cards 37
wildcard pattern matching 48
Windows networks
enabling NetBIOS 207
WINS 207
wireless 171
word boundary, Perl regular expressions 48
X
XSS vulnerability
protection from 13
Z
zones 175