index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
155
Dashboards and Monitors 6. From the Sort By dropdown, select Browsing Time, Threat Score, Bytes, or Sessions. 7. Click OK. The widget is added to the tree menu. Viewing the web filter category The web filter category name appears in the Category column of the dashboard. Drill down an entry in the table. Click the Web S...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
156
Dashboards and Monitors Click View session logs to a view a list of the session logs. The category name appears in the Category column. The category name also appears in the Category column in the FortiView Websites monitor and when drilling down in the FortiView Sources monitor. Cloud application view To see different...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
157
Dashboards and Monitors 3. On the Edit Application Sensor page, click View Application Signatures. 4. Hover over a column heading or the Application Signature bar. On the right, click the filter icon to filter the applications. Cloud applications have a cloud icon next to them. The lock icon indicates that the applicat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
158
Dashboards and Monitors To view applications with cloud behavior: 1. In the Application Signature page, ensure the Behavior column is displayed. If necessary, add the Behavior column. a. Hover over the left side of the table column headings to display the Configure Table icon. b. Click Configure Table and select Behavi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
159
Dashboards and Monitors 5. Hover over an item to see its details. This example shows an application sensor with no lock icon which means that this application sensor does not require SSL deep inspection. If any local network user behind the firewall tries to navigate to the YouTube website, that activity is logged. Con...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
160
Dashboards and Monitors To add the Cloud Applications monitor in the GUI: 1. Click Add Monitor. The Add monitor window opens. 2. In the Search field, enter FortiView Cloud Applications and click the Add button next to the monitor. 3. In the FortiGate area, select the FortiGate(s) from the dropdown. 4. In the Data Sourc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
161
Dashboards and Monitors Using the Cloud Applications monitor To see additional information in the Cloud Applications monitor: 1. In the tree menu, click the FortiView Cloud Applications monitor to open it. 2. For details about a specific entry, double-click the entry or right-click the entry and select Drill Down to De...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
162
Dashboards and Monitors Sessions monitored by SSL deep inspection (in this example, Youtube_Video.Play) captured deep information such as Application User, Application Details, and so on. The Log Details pane also shows additional deep information such as application ID, Message, and so on. Sessions not monitored by SS...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
163
Dashboards and Monitors l Log Allowed Traffic is set to All Sessions. 2. Go to Security Profiles > Application Control. 3. Select a related Application Control profile used by the firewall policy and click Edit. 4. Because YouTube cloud applications are categorized into Video/Audio, ensure the Video/Audio category is m...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
164
Dashboards and Monitors 8. On the FortiGate, go to Log & Report > Security Events, select Application Control, and look for log entries for browsing and playing YouTube videos. In this example, note the Application User and Application Details. Also note that the Application Control ID is 38569 showing that this entry ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
165
Dashboards and Monitors 3. On the FortiGate, go to Log & Report > Security Events and look for log entries for browsing and playing YouTube videos in the Application Control card. In this example, the log shows only applications with the name YouTube. The log cannot show YouTube application sensors which rely on SSL de...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
166
Dashboards and Monitors Indicator Risk Description Risk Level 1 Low These applications have little to no risk level. This is the default value when no risk is specified. Example categories: Update, Business Risk Level 2 Elevated These applications have an elevated risk level. Example categories: Game, Collaboration, So...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
167
Network The following topics provide information about network settings: l Interfaces on page 168 l DNS on page 278 l Explicit and transparent proxies on page 320 l SD-WAN on page 837 l DHCP servers and relays on page 424 l Static routing on page 445 l Dynamic routing on page 472 l Multicast on page 584 l FortiExtender...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
168
Network Interface type Description VLAN A virtual local area network (VLAN) logically divides a local area network (LAN) into distinct broadcast domains using IEEE 802.1Q VLAN tags. A VLAN interface supports VLAN tagging and is associated with a physical interface that can be connected to a device, such as a switch or ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
169
Network Interface type Description FortiExtender LAN extension A FortiExtender LAN extension is a managed interface that allows a connected FortiExtender to provide LAN connectivity to the FortiGate. See FortiExtender on page 597 for more information. Enhanced MAC VLAN An enhanced media access control (MAC) VLAN, or EM...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
170
Network Interface Name Physical interface names cannot be changed. Alias Enter an alternate name for a physical interface on the FortiGate unit. This field appears when you edit an existing physical interface. The alias does not appear in logs. The maximum length of the alias is 25 characters. Type The configuration ty...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
171
Network Estimated bandwidth The estimated WAN bandwidth. The values can be entered manually, or saved from a speed test executed on the interface. The values can be used in SD-WAN rules that use the Maximize Bandwidth or Best Quality strategy. Traffic mode This option is only available when Type is WiFi SSID. l Tunnel:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
172
Network When enabled, there is an option to enable a DHCPv6 prefix hint that helps the DHCPv6 server provide the desired prefix. Create address object matching subnet This option is available and automatically enabled when Role is set to LAN or DMZ. This creates an address object that matches the interface subnet and d...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
173
Network Outbound shaping profile Enable/disable traffic shaping on the interface. This allows you to enforce bandwidth limits on individual interfaces. See Interface-based traffic shaping profile on page 1711 for more information. Miscellaneous Comments Enter a description of the interface of up to 255 characters. Stat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
174
Network 3. In the Administrative Access section, select which protocols to enable for IPv4 and IPv6 Administrative Access. Industrial Connectivity Allow Industrial Connectivity service access to proxy traffic between serial port and TCP/IP. Available with FortiGate Rugged models equipped with a serial RS-232 (DB9/RJ45)...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
175
Network 40000full} set mediatype {sr4 | lr4 | cr4} set forward-error-correction {disable | cl91-rs-fec | cl74-fc-fec} next end speed {10000full | 1000full | 100Gauto | 100Gfull | 25000auto | 25000full | 40000full} Set the interface speed: l 10000full: 10G full-duplex l 1000full: 1000M full-duplex l 100Gauto: 100G auto-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
176
Network IPAM detects and resolves any IP conflicts that may occur on the interfaces that it manages. Users have the option to manually edit the interface or reallocate the IP. IPAM can be configured on the Network > IPAM page using the IPAM Settings, IPAM Rules, IPAM Interfaces, and IPAM Subnets tabs. To configure IPAM...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
177
Network pool-subnet <class IP and netmask> Set the IPAM pool subnet, class A or class B subnet. status {enable | disable} Enable/disable IP address management services. automatic-conflict￾resolution {enable | disable} Enable/disable automatic conflict resolution. When automatic-conflict-resolution is enabled, IPAM will...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
178
Network To configure IPAM locally in the Security Fabric: 1. On the root FortiGate, go to Network > Interfaces and edit port3. 2. For Addressing Mode, select Auto-Managed by IPAM. DHCP Server is automatically enabled. 3. In this example, IPAM is not enabled yet. Click Enable IPAM. The Subnets Managed by IPAM pane opens...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
179
Network The following is configured in the backend: config system interface edit "port3" set vdom "root" set ip 172.31.0.1 255.255.0.0 set type physical set device-identification enable set snmp-index 5 set ip-managed-by-fortiipam enable end next end config system ipam set status enable end IPAM is managing a 172.31.0....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
180
Network 6. Log in to FGT-BB and set the Addressing Mode of port4 to Auto-Managed by IPAM. The subnet assigned from the pool on the root is 172.31.1.1/24. 7. Log in to FG_CC and set the Addressing Mode of port34 to Auto-Managed by IPAM. The subnet assigned from the pool on the root is 172.31.2.1/24. Any interface on a d...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
181
Network To configure IPAM on the root FortiGate: 1. Go to Network > IPAM and select the IPAM Settings tab. 2. Enable the Status, Auto-resolve conflicts, Interfaces with LAN role, FortiAP SSIDs, and FortiExtender LAN extensions settings. IPAM is disabled by default, so all these options are disabled by default. Each opt...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
182
Network There is a conflict marker (warning icon) beside the IP address of FG019TM22004646 due to a conflict between the IPAM-assigned interface FG019TM22004646 of the root FortiGate and the manually configured interface of the downstream FortiGate. a. Verify the list of IPAM entries in the CLI: # diagnose sys ipam lis...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
183
Network To view the largest available subnet size: # diagnose sys ipam largest-available-subnet Largest available subnet is a /17. To verify IPAM allocation information: # diagnose sys ipam list entries IPAM Entries: (sn, vdom, interface, subnet/mask, flag) F140EP4Q17000000 root port34 172.31.2.1/24 0 FG5H1E5818900001 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
184
Network set mtu-override enable set mtu <integer> next end To change the MTU size: config system interface edit <interface> set mtu-override enable set mtu <max bytes> next end Maximum MTU size on a path To manually test the maximum MTU size on a path, you can use the ping command on a Windows computer. For example, yo...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
185
Network Maximum segment size The TCP maximum segment size (MSS) is the maximum amount of data that can be sent in a TCP segment. The MSS is the MTU size of the interface minus the 20 byte IP header and 20 byte TCP header. By reducing the TCP MSS, you can effectively reduce the MTU size of the packet. The TCP MSS can be...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
186
Network Field Description l IPS DoS Each security profile has a predefined profile for One-Arm Sniffer called sniffer-profile. The sniffer-profile can be viewed or edited from the GUI through the Edit Interface page only. Please refer to the Example configuration on page 187 for a demonstration. The sniffer traffic log...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
187
Network 4. In the Security Profiles section, enable File Filter and click Edit. The Edit File Filter Profile pane opens. 5. In the Rules table, click Create New. FortiOS 7.6.2 Administration Guide 188 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
188
Network 6. Configure the rule: a. For File types, click the + and select pdf and rar. b. For Action, select Block. c. Click OK to save the rule. 7. Click OK to save the file filter profile. FortiOS 7.6.2 Administration Guide 189 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
189
Network 8. Click OK to save the interface settings. 9. Go to Log & Report > Security Events to view the File Filter logs. To configure a one-arm sniffer policy in the CLI: 1. Configure the interface: config system interface edit "s1" set vdom "root" set ips-sniffer-mode enable set type physical set role undefined set s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
190
Network set action block set file-type "pdf" "rar" next end next end 3. Configure the firewall sniffer policy: config firewall sniffer edit 1 set interface "s1" set file-filter-profile-status enable set file-filter-profile "sniffer-profile" next end 4. View the log: # execute log filter category  19 # execute log displ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
191
Network Alternatively, select an interface in the list. Then right-click and select Integrate Interface. 3. Select Migrate to Interface and click Next. 4. Select Create an Interface. Enter a name (rd1) and set the Type to Redundant. 5. Click Next. The References sections lists the associated services with options to Re...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
192
Network 7. The migration occurs automatically and the statuses for the object and reference change to Updated entry. Click Close. Changing the VLAN ID In this example, the VLAN ID of InternalVLAN is changed from 11 to 22. To change the VLAN ID: 1. Go to Network > Interfaces and edit an existing interface. 2. Beside the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
193
Network 4. Verify the changes, then click Update and OK. 5. The target object status changes to Updated entry. Click Close. In the interface settings, the ID displays as 22. FortiOS 7.6.2 Administration Guide 194 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
194
Network Captive portals A captive portal is used to enforce authentication before web resources can be accessed. Until a user authenticates successfully, any HTTP request returns the authentication page. After successfully authenticating, a user can access the requested URL and other web resources, as permitted by poli...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
195
Network l External: enter the FQDN or IP address of external portal. User access Select if the portal applies to all users, or selected user groups: l Restricted to Groups: restrict access to the selected user groups. The Login page is shown when a user tries to log in to the captive portal. l Allow all: all users can ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
196
Network next end Custom captive portal pages Portal pages are HTML files that can be customized to meet user requirements. Most of the text and some of the HTML in the message can be changed. Tags are enclosed by double percent signs (%%); most of them should not be changed because they might carry information that the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
197
Network Example In this example, the FortiGate connects to an L3 switch that is not physically secured. All devices that connect to the internet through the L3 switch must be authenticated with 802.1X on the switch port by either a username and password (PEAP), or a user certificate (TLS). Configuration examples for bo...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
198
Network set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response fabric set stpforward enable set type physical set snmp-index 42 set eap-supplicant enable set eap-method tls set eap-identity "test2@fortiqa.net" set eap-ca-cert "root_G_CA_Cert_1.cer" set eap-user-cert "root_eap_client_global.cer"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
199
Network To view transceiver status information in the CLI: # get system interface transceiver Interface port9 - SFP/SFP+ Vendor Name : FINISAR CORP. Part No. : FCLF-8521-3 Serial No. : PMS*** Interface port10 - Transceiver is not detected. Interface port11 - SFP/SFP+ Vendor Name : QNC Part No. : LCP-1250RJ3SRQN Serial ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
200
Network VLANs in NAT mode In NAT mode, the FortiGate unit functions as a layer-3 device. In this mode, the FortiGate unit controls the flow of packets between VLANs and can also remove VLAN tags from incoming VLAN packets. The FortiGate unit can also forward untagged packets to other networks such as the Internet. In N...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
201
Network example. General configuration steps include: 1. Configure the external interface. 2. Add two VLAN subinterfaces to the internal network interface. 3. Add firewall addresses and address ranges for the internal and external networks. 4. Add security policies to allow: l the VLAN networks to access each other. l ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
202
Network next end To add security policies: Policies 1 and 2 do not need NAT enabled, but policies 3 and 4 do need NAT enabled. config firewall policy edit 1 set srcintf VLAN_100 set srcaddr VLAN_100_Net set dstintf VLAN_200 set dstaddr VLAN_200_Net set schedule always set service ALL set action accept set nat disable s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
203
Network VLANs in transparent mode In transparent mode, the FortiGate unit behaves like a layer-2 bridge but can still provide services such as antivirus scanning, web filtering, spam filtering, and intrusion protection to traffic. Some limitations of transparent mode is that you cannot use SSL VPN, PPTP/L2TP VPN, DHCP ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
204
Network Sample configuration There are two main steps to configure your FortiGate unit to work with VLANs in transparent mode: 1. Add VLAN subinterfaces. 2. Add security policies. You can also configure the protection profiles that manage antivirus scanning, web filtering, and spam filtering. To add VLAN subinterfaces:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
205
Network set service ALL next edit 2 set srcintf VLAN_100_ext set srcaddr all set dstintf VLAN_100_int set dstaddr all set action accept set schedule always set service ALL next edit 3 set srcintf VLAN_200_int set srcaddr all set dstintf VLAN_200_ext set dstaddr all set action accept set schedule always set service ALL ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
206
Network To enable VLAN switch mode in the GUI: 1. Go to System > Settings. 2. In the View Settings section, enable VLAN switch mode. 3. Click Apply. Basic configurations Hardware switch ports can be configured as either a VLAN switch port or a trunk port. The available interfaces and allowable VLAN IDs that can be used...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
207
Network To designate an interface as a trunk port: config system interface edit internal5 set trunk enable next end Example 1: HA using a VLAN switch In this example, two FortiGates in an HA cluster are connected to two ISP routers. Instead of connecting to external L2 switches, each FortiGate connects to each ISP rout...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
208
Network config system interface edit "ISP1" set vdom "root" set ip 192.168.10.99 255.255.255.0 set allowaccess ping set type hard-switch next edit "ISP2" set vdom "root" set ip 192.168.20.99 255.255.255.0 set allowaccess ping set type hard-switch next end 3. Designate port15 as the trunk port: config system interface e...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
209
Network The available interfaces and VLAN IDs varies between FortiGate models. The FortiGate B in this example is a 60F model. To configure FortiGate B: 1. Configure the VLAN interfaces: config system virtual-switch edit "VLAN10" set physical-switch "sw0" set vlan 10 config port edit "internal1" next edit "internal2" n...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
210
Network next end 3. Designate wan2 as the trunk port: config system interface edit wan2 set trunk enable next end To configure FortiGate A: 1. Configure the VLAN subinterfaces: config system interface edit "VLAN10" set ip 192.168.10.98 255.255.255.0 set allowaccess ping https ssh set role lan set interface "dmz" set vl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
211
Network set dstaddr "all" set action accept set schedule "always" set service "ALL" set nat enable next edit 0 set name "VLAN20-out" set srcintf "VLAN20" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set nat enable next end To test the connection: 1. Co...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
212
Network set snmp-index 47 set interface "PORT" set vlanid 232 next end 2. Configure a dynamic VLAN interface that uses the inner tag (C-Tag): config system interface edit "DVLAN" set vdom "vdom1" set device-identification enable set role lan set snmp-index 48 set interface "vlan-8021ad" set vlanid 444 next end QinQ 802...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
213
Network config system interface edit "vlan-qinq8021q" set vdom "root" set ip 1.1.1.71 255.255.255.0 set allowaccess ping https ssh snmp http set device-identification enable set role lan set interface "vlan-8021q" set vlanid 200 next end To verify the traffic: 1. From the FortiGate, ping 1.1.1.72: # execute ping 1.1.1....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
214
Network transferred automatically to the remaining interfaces. The only noticeable effect is reduced bandwidth. This feature is similar to redundant interfaces. The major difference is a redundant interface group only uses one link at a time, where an aggregate link group uses the total bandwidth of the functioning lin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
215
Network Redundancy In a redundant interface, traffic only goes over one interface at any time. This differs from an aggregated interface where traffic goes over all interfaces for increased bandwidth. This difference means redundant interfaces can have more robust configurations with fewer possible points of failure. T...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
216
Network Enhanced hashing for LAG member selection FortiGate models that have an internal switch that supports modifying the distribution algorithm can use enhanced hashing to help distribute traffic evenly, or load balance, across links on the Link Aggregation (LAG) interface. The enhanced hashing algorithm is based on...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
217
Network end end LAG interface status signals to peer device FortiGate can signal LAG (link aggregate group) interface status to the peer device. If the number of available links in the LAG on the FortiGate falls below the configured minimum number of links (min-links), the LAG interface goes down on both the FortiGate ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
218
Network (A|I) - Aggregatable or Individual (I|O) - Port In sync or Out of sync (E|D) - Frame collection is Enabled or Disabled (E|D) - Frame distribution is Enabled or Disabled status: up npu: y flush: n asic helper: y oid: 72 ports: 3 link-up-delay: 50ms min-links: 1 ha: master distribution algorithm: L4 LACP mode: ac...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
219
Network MUX state: COLLECTING_DISTRIBUTING 4 member: port9 index: 2 link status: down link failure count: 0 permanent MAC addr: d4:76:a0:01:e0:46 4. On FGT_A, change the minimum number of links to 3. config system interface edit "test_agg1" set vdom "vdom1" set ip 11.1.1.1 255.255.255.0 set allowaccess ping https set t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
220
Network member: port7 index: 0 link status: up link failure count: 1 permanent MAC addr: e8:1c:ba:b3:d0:df LACP state: negotiating LACPDUs RX/TX: 10/23 actor state: ASAODD actor port number/key/priority: 1 17 255 partner state: ASAIDD partner port number/key/priority: 1 17 255 partner system: 61440 e8:1c:ba:df:a0:ba ag...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
221
Network asic helper: y oid: 72 ports: 3 link-up-delay: 50ms min-links: 1 ha: master distribution algorithm: L4 LACP mode: active LACP speed: slow LACP HA: enable aggregator ID: 1 actor key: 17 actor MAC address: d4:76:a0:01:e8:1e partner key: 17 partner MAC address: d4:76:a0:01:e0:44 member: port7 index: 0 link status:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
222
Network Failure detection for aggregate and redundant interfaces When an aggregate or redundant interface goes down, the corresponding fail-alert interface changes to down. When an aggregate or redundant interface comes up, the corresponding fail-alert interface changes to up. Fail-detect for aggregate and redundant in...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
223
Network Multiple loopback interfaces can be configured in either non-VDOM mode or in each VDOM. Dynamic routing protocols can be enabled on loopback interfaces. For example, loopback interfaces are a good practice for OSPF. To make it easier to troubleshoot OSPF, set the OSPF router ID to the same value as the loopback...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
224
Network as your wireless interfaces. Then devices on the internal network can communicate with devices on the wireless network without any additional configuration on the FortiGate unit, such as additional security policies. A software switch can also be useful if you require more hardware ports for the switch on a For...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
225
Network To create a software switch in the CLI: config system switch-interface edit <interface> set vdom <vdom> set member <interface_list> set type switch next end config system interface edit <interface> set vdom <vdom> set type switch set ip <ip_address> set allowaccess https ssh ping next end To add an interface to...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
226
Network Hardware switch A hardware switch is a virtual switch interface that groups different ports together so that the FortiGate can use the group as a single interface. Supported FortiGate models have a default hardware switch called either internal or lan. The hardware switch is supported by the chipset at the hard...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
227
Network To remove ports from a hardware switch in the CLI: config system virtual-switch edit "internal" config port delete internal2 delete internal7 ... end next end To add ports to a hardware switch in the CLI: config system virtual-switch edit "internal" set physical-switch "sw0" config port edit "internal3" next ed...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
228
Network 4. Configure a firewall policy that allows traffic from the 18188 hardware switch to go to the internet. 5. Enable 802.1X authentication on the client devices. To configure 802.1X authentication on a hardware switch in the GUI: 1. Go to Network > Interfaces and edit the hardware switch. 2. In the Network sectio...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
229
Network To configure 802.1X authentication on a hardware switch in the CLI: 1. Configure the virtual hardware switch interfaces: config system virtual-switch edit "18188" set physical-switch "sw0" config port edit "port3" next edit "port4" next end next end 2. Configure 802.1X authentication: config system interface ed...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
230
Network To configure 802.1x authentication for individual ports:  1. Configure a virtual switch to use port3 and port5:  config system virtual-switch edit "hw1" set physical-switch "sw0" config port edit "port3" next edit "port5" next end next end 2. Enable 802.1x authentication for the virtual switch: config system in...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
231
Network To configure STP for individual ports:  1. Configure a virtual switch to use port3 and port5: config system virtual-switch edit "hw1" set physical-switch "sw0" config port edit "port3" next edit "port5" next end next end 2. Enable STP for the virtual switch: config system interface edit "hw1" set vdom "vdom1" s...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
232
Network For example, in the sample configuration below, the network includes three separate groups of users representing different entities on the company network. While each group has its own set of ports and VLANs in each area, they can all use the same firewall policy and protection profiles to access the Internet. ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
233
Network set srcintf "zone_1" set dstintf "port15" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set nat enable next end Intra-zone traffic In the zone configuration you can set intrazone deny to prohibit the different interfaces in the same zone to talk to each other. For...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
234
Network Example In this example, a virtual wire pair (port3 and port4) makes it easier to protect a web server that is behind a FortiGate operating as an Internal Segmentation Firewall (ISFW). Users on the internal network access the web server through the ISFW over the virtual wire pair. Interfaces used in a virtual w...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
235
Network set srcintf "port3" "port4" set dstintf "port3" "port4" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set utm-status enable set fsso disable next end Configuring multiple virtual wire pairs in a virtual wire pair policy You can create a virtual wire pair policy th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
236
Network c. Configure the other settings as needed. d. Click OK. To configure multiple virtual wire pairs in a policy in the CLI: 1. Configure the virtual wire pairs: config system virtual-wire-pair edit "test-vwp-1" set member "wan1" "wan2" set wildcard-vlan enable next edit "test-vwp-2" set member "port19" "port20" se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
237
Network PRP handling in NAT mode with virtual wire pair PRP (Parallel Redundancy Protocol) is supported in NAT mode for a virtual wire pair. This preserves the PRP RCT (redundancy control trailer) while the packet is processed by the FortiGate. To configure PRP handling on a device in NAT mode: 1. Enable PRP in the VDO...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
238
Network set interface "port3" set vlanid 3 next edit "8021Q" set vdom "vdom1" set device-identification enable set role lan set snmp-index 32 set interface "8021ad-port3" set vlanid 33 next end 2. Configure the 802.1Q interface: config system interface edit "8021q-port5" set vdom "vdom1" set device-identification enabl...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
239
Network per_ip_shaper= class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/0 state=may_dirty br npu  statistic(bytes/packets/allow_err): org=168/2/1 reply=168/2/1 tuples=2 tx speed(Bps/kbps): 0/0 rx speed(Bps/kbps): 0/0 orgin->sink: org pre->post, reply pre->post dev=56->55/55->56 gwy=0.0.0.0/0.0.0.0 hook=pre dir=org a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
240
Network Enhanced MAC VLAN The Media Access Control (MAC) Virtual Local Area Network (VLAN) feature in Linux allows you to configure multiple virtual interfaces with different MAC addresses (and therefore different IP addresses) on a physical interface. FortiGate implements an enhanced MAC VLAN consisting of a MAC VLAN ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
241
Network To configure enhanced MAC VLAN for this example in the CLI: config system interface edit port1.emacvlan1 set vdom VDOM1 set type emac-vlan set interface port1 next edit port 1.emacvlan2 set vdom VDOM2 set type emac-vlan set interface port1 next edit port1.emacvlan3 set vdom VDOM3 set type emac-vlan set interfac...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
242
Network To configure enhanced MAC VLAN for this example in the CLI: config system interface edit npu0_vlink0.emacvlan1 set vdom VDOM1 set type emac-vlan set interface npu0_vlink0 next edit npu0_vlink0.emacvlan2 set vdom VDOM3 set type emac-vlan set interface npu0_vlink0 next edit npu0_vlink1.emacvlan1 set vdom VDOM2 se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
243
Network Sample VXLAN packet A VXLAN packet encapsulation occurs by first inserting a VXLAN header in front of the original layer 2 frame. This VXLAN header uses 3 B for the VNID that is used to identify the VXLAN segment, meaning that there are 16,777,215 different possible VNIDs. This allows for more unique LAN segmen...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
244
Network interface <string> Set the local outgoing interface for the VXLAN encapsulated traffic. vni <integer> Set the VXLAN network ID. ip-version {ipv4-unicast | ipv6-unicast | ipv4-multicast | ipv6-multicast} Set the IP version to use for the VXLAN device and communication over VXLAN (default = ipv4-unicast). dstport...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
245
Network config system virtual-wire-pair edit <name> set member <member_1> <member_2> set wildcard-vlan {enable | disable} set vlan-filter <filter> next end member <member_1> <member_2> Enter the VXLAN interface and other physical or virtual interface that will share the L2 network. wildcard-vlan {enable | disable} Enab...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
246
Network See Virtual wire pair with VXLAN on page 250 for an example configuration. VXLAN between two VTEPs with wildcard VLANs In this topology, a FortiGate (VTEP 1) is configured with a VXLAN interface over port1 where the remote-ip points to port1 of VTEP 2. The VXLAN interface is combined with port2 into the same L2...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
247
Network See VXLAN over IPsec using a VXLAN tunnel endpoint on page 256 for an example configuration. VLAN inside VXLAN VLANs can be assigned to VXLAN interfaces. In a data center network where VXLAN is used to create an L2 overlay network and for multitenant environments, a customer VLAN tag can be assigned to VXLAN in...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
248
Network set vlanid 100 set interface dmz next edit vxlan100 set type vlan set vlanid 100 set vdom root set interface vxlan1 next end 3. Configure software-switch: config system switch-interface edit sw1 set vdom root set member vlan100 vxlan100 set intra-switch-policy implicit next end The default intra-switch-policy i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
249
Network 3. Configure software-switch: config system switch-interface edit sw1 set vdom root set member vlan100 vxlan100 next end To verify the configuration: Ping PC1 from PC2. The following is captured on HQ2: This captures the VXLAN traffic between 172.1.1.1 and 172.1.1.2 with the VLAN 100 tag inside. Virtual wire pa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
250
Network end config system vxlan edit "vxlan1" set interface "port11" set vni 1000 set remote-ip "10.2.2.2" next end To create VXLAN interface on HQ2: config system interface edit "port11" set vdom "root" set ip 10.2.2.2 255.255.255.0 set allowaccess ping https ssh snmp http next end config system vxlan edit "vxlan1" se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
251
Network set webfilter-profile "default" set dnsfilter-profile "default" set ips-sensor "default" set application-list "default" set fsso disable next end To create a firewall policy on HQ2: config firewall policy edit 5 set name "1" set srcintf "port13" set dstintf "vxlan1" set srcaddr "all" set dstaddr "all" set actio...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
252
Network To configure FGT-A: 1. Configure the WAN interface: config system interface edit "wan1" set vdom "root" set ip 11.11.11.11 255.255.255.0 set allowaccess ping https ssh http fgfm set type physical set role wan set snmp-index 1 next end 2. Configure a static route to send all traffic out the WAN interface: config...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
253
Network next end The remote IP address is the address of the remote IPsec peer. 6. Configure a virtual wire pair with the port1 and vxlan interfaces as members: config system virtual-wire-pair edit "vwp" set member "port1" "vxlan" set wildcard-vlan enable next end The interfaces added to the virtual wire pair cannot be...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
254
Network config vpn ipsec phase1-interface edit "ipsec" set interface "wan1" set peertype any set proposal aes256-sha1 set remote-gw 11.11.11.11 set psksecret ********** next end config vpn ipsec phase2-interface edit "ipsec" set phase1name "ipsec" set proposal aes256-sha1 set auto-negotiate enable next end 4. Configure...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf