index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
255 | Network
next
end
Test the configuration
To test the configuration, ping Host2 (VLAN10: 192.168.10.2/24) from Host1 (VLAN10: 192.168.10.1/24):
C:\>ping 192.168.10.2
Pinging 192.168.10.2 with 32 bytes of data:
Reply from 192.168.10.2: bytes=32 time=8ms TTL=56
Reply from 192.168.10.2: bytes=32 time=8ms TTL=56
Reply from 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
256 | Network
interface into a soft switch, or create a virtual wire pair so that devices behind port1 have direct layer 2 access to remote
peers over the VXLAN tunnel. This example uses a switch interface on the hub and a virtual wire pair on the spokes to
demonstrate the two different methods.
In order to apply an IPsec VP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
257 | Network
set ip 192.168.255.1 255.255.255.255
set allowaccess ping
set type tunnel
set remote-ip 192.168.255.254 255.255.255.0
set snmp-index 12
set interface "port2"
next
end
5. Configure the VXLAN interfaces. Each spoke requires a VXLAN interface with a different VNI. The remote IP is the
tunnel interfaces IP of the s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
258 | Network
set auto-negotiate enable
set src-subnet 192.168.255.2 255.255.255.255
next
end
The hub FortiGate inserts a reverse route pointing to newly established tunnel interfaces
for any of the subnets that the spoke FortiGate's source quick mode selectors provides.
This is why you should set the tunnel IP address here.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
259 | Network
set remote-ip "192.168.255.1"
next
end
To bind the VXLAN interface to the internal interface:
1. Configure a switch interface on the hub:
config system switch-interface
edit "SW"
set vdom "root"
set member "port1" "SPOKES_VXLAN1" "SPOKES_VXLAN2"
set intra-switch-policy {implicit | explicit}
next
end
Allowing in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
260 | Network
VXLAN with MP-BGP EVPN
FortiOS supports VXLAN as implemented according to RFC 7348. Currently, VXLAN relies on determining the MAC
address of the destination host by using address resolution protocol (ARP) broadcast frames encapsulated in multicast
packets.
l A multicast group is maintained with all the VXLAN t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
261 | Network
MP-BGP EVPN supports the following features:
l Route type 2 (MAC/IP advertisement route) and route type 3 (inclusive multicast Ethernet tag route)
l Intra-subnet communication
l Single-homing use cases
l VLAN-based service, namely, there is only one broadcast domain per EVPN instance (EVI). This is due to the
c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
262 | Network
To configure MP-BGP EVPN on each VTEP:
1. Configure the EVPN settings:
config system evpn
edit <id>
set rd {AA | AA:NN | A.B.C.D:NN}
set import-rt <AA:NN>
set export-rt <AA:NN>
set ip-local-learning {enable | disable}
set arp-suppression {enable | disable}
next
end
The ip-local-learning setting is used to enabl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
263 | Network
config system ha
set evpn-ttl <integer>
end
Example
In this example, two FortiGates are configured as VXLAN tunnel endpoints (VTEPs). A VXLAN is configured to allow L2
connectivity between the networks behind each FortiGate. The VXLAN interface vxlan1 and port2 are placed on the
same L2 network using a software... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
264 | Network
next
end
2. Configure the EVPN settings:
config system evpn
edit 100
set rd "100:100"
set import-rt "1:1"
set export-rt "1:1"
set ip-local-learning enable
set arp-suppression enable
next
end
3. Configure the local interface and EVPN settings within the VXLAN settings:
config system vxlan
edit "vxlan1"
set inter... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
265 | Network
next
end
6. Configure the software switch interface settings:
config system interface
edit "sw1"
set vdom "root"
set ip 172.18.1.253 255.255.255.0
set allowaccess ping
set type switch
next
end
7. Configure the firewall policies between the member interfaces in the software switch:
config firewall policy
edit 1
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
266 | Network
set arp-suppression enable
next
end
3. Configure the local interface and EVPN settings within the VXLAN settings:
config system vxlan
edit "vxlan1"
set interface "loopback2"
set vni 1000
set evpn-id 100
next
end
4. Configure the EVPN settings within the BGP settings:
config router bgp
set as 65001
set router-id... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
267 | Network
next
end
7. Configure the firewall policies between the member interfaces in the software switch:
config firewall policy
edit 1
set srcintf "port2"
set dstintf "vxlan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
next
edit 2
set srcintf "vxlan1"
set dstintf "por... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
268 | Network
a. Verify the forwarding database for vxlan1:
# diagnose sys vxlan fdb list vxlan1
mac=00:00:00:00:00:00 state=0x0082 remote_ip=2.2.2.2 port=4789 vni=1000 ifindex0
mac=00:50:00:00:07:00 state=0x0082 remote_ip=2.2.2.2 port=4789 vni=1000 ifindex0
total fdb num: 2
b. Verify the forwarding database statistics for v... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
269 | Network
Network Next Hop Metric LocPrf Weight RouteTag Path
Route Distinguisher: 100:100 (received from VRF 0)
*>i[2][0][48][00:50:00:00:07:00][0]/72
2.2.2.2 0 100 0 0 i <-/>
*>i[2][0][48][00:50:00:00:07:00][32][172.18.1.33]/104
2.2.2.2 0 100 0 0 i <-/>
*>i[3][0][32][2.2.2.2]/80
2.2.2.2 0 100 0 0 i <-/>
c. Verify the B... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
270 | Network
*>i[2][0][48][00:50:00:00:07:00][0]/72
2.2.2.2 0 100 0 0 i <-/>
*>i[2][0][48][00:50:00:00:07:00][32][172.18.1.33]/104
2.2.2.2 0 100 0 0 i <-/>
*> [3][0][32][1.1.1.1]/80
1.1.1.1 0 100 32768 0 i <-/>
*>i[3][0][32][2.2.2.2]/80
2.2.2.2 0 100 0 0 i <-/>
Network Next Hop Metric LocPrf Weight RouteTag Path
Route Disti... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
271 | Network
S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight RouteTag Path
Route Distinguisher: 100:100 (Default for VRF 0) (Default for VRF 0)
*>i[2][0][48][00:50:00:00:07:00][0]/72
2.2.2.2 0 100 0 0 i <-/>
*>i[2][0][48][00:50:00:00:07:00][32][172.18.1.33]/104
2.2.2.2 0 100 0 0 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
272 | Network
EVPN Local IP table:
Address MAC
172.18.1.11 00:50:00:00:06:00
EVPN PEER table:
VNI Remote Addr Binded Address
1000 2.2.2.2 2.2.2.2
5. Run the proxy ARP diagnose command:
# diagnose ip parp list
Address Hardware Addr Interface
172.18.1.33 00:50:00:00:07:00 sw1
VXLAN troubleshooting
The following commands can be... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
273 | Network
Interface/endpoint VTEP 1 VTEP 2
vxlan100 7e:f2:d1:84:75:0f ca:fa:31:23:8d:c1
port6 00:0c:29:4e:5c:1c 00:0c:29:d0:3e:0d
sw100 00:0c:29:4e:5c:1c 00:0c:29:d0:3e:0d
The MAC address of PC1 is 00:0c:29:90:4f:bf. The MAC address of PC2 is 00:0c:29:f0:88:2c.
To configure the VTEP 1 FortiGate:
1. Configure the local in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
274 | Network
next
end
To configure the VTEP 2 FortiGate:
1. Configure the local interface:
config system vxlan
edit "vxlan100"
set interface "port2"
set vni 100
set remote-ip "192.168.2.86"
next
end
2. Configure the interface settings:
config system interface
edit "port2"
set vdom "root"
set ip 192.168.2.87 255.255.255.0
se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
275 | Network
To run diagnostics and debugs:
1. Start a ping from PC1 10.10.100.10 to PC2 10.10.100.20:
C:\Users\fortidocs>ping 10.10.100.20
Pinging 10.10.100.20 with 32 bytes of data:
Reply from 10.10.100.20: bytes=32 time=2ms TTL=128
Reply from 10.10.100.20: bytes=32 time=1ms TTL=128
Reply from 10.10.100.20: bytes=32 time=... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
276 | Network
The MAC address of port6 is 00:0c:29:4e:5c:1c. The MAC address of vxlan100 is 7e:f2:d1:84:75:0f. The MAC
address 00:0c:29:f0:88:2c of PC2 is learned from the remote network.
4. Run diagnostics on the VTEP 2 FortiGate.
a. Verify the forwarding database of VXLAN interface vxlan100:
# diagnose sys vxlan fdb list v... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
277 | Network
2022-11-04 14:35:18.569427 vxlan100 in 10.10.100.20 -> 10.10.100.10: icmp: echo reply
2022-11-04 14:35:18.569431 port6 out 10.10.100.20 -> 10.10.100.10: icmp: echo reply
In the output, the following packet sequence is seen on the FortiGate:
a. The FortiGate receives an ARP request from PC1 10.10.100.10 on port6... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
278 | Network
FortiOS supports DNS configuration for both IPv4 and IPv6 addressing. When a user requests a website, the FortiGate
looks to the configured DNS servers to provide the IP address of the website in order to know which server to contact to
complete the transaction.
The FortiGate queries the DNS servers whenever it... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
279 | Network
For a FortiGate with multiple logical CPUs, you can set the DNS process number from 1 to the number of logical CPUs.
The default DNS process number is 1.
config system global
set dnsproxy-worker-count <integer>
end
DNS protocols
The following DNS protocols can be enabled:
l cleartext: Enable clear text DNS over... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
280 | Network
vfid=0 name=*.google.com ver=IPv4 wait_list=0 timer=0 min_ttl=0 cache_ttl=2000 slot=-1 num=0
wildcard=
...
Change the cache TTL in a VDOM for a specific address:
config firewall address
edit "test.bb.com"
set cache-ttl 1000
next
end
# sudo global diagnose test application dnsproxy 6
...
vfid=0 name=test.bb.com ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
281 | Network
...
FQDN: min_refresh=20 max_refresh=3600
...
# diagnose test application dnsproxy 6
worker idx: 0
vfid=0 name=aa.com ver=IPv4 wait_list=0 timer=8 min_ttl=20 cache_ttl=0 slot=-1 num=1
wildcard=0
23.202.195.114 (ttl=20:14:14)
This setting can be used in combination with fqdn-cache-ttl and cache-ttl to send more ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
282 | Network
In this example, a private DNS is used. Port2 is configured with an IP address, and the private DNS is configured to use
the IP address for port2 as its source IP address.
To set the source IP interface for a private DNS:
1. Configure port2 with an IP address. You can either specify an IP address or configure ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
283 | Network
To configure a DNS domain list in the GUI:
1. Go to Network > DNS.
2. Set DNS Servers to Specify.
3. Configure the primary and secondary DNS servers as needed.
4. In the Local Domain Name field, enter the first domain (sample.com in this example).
5. Click the + to add more domains (example.com and domainname.c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
284 | Network
As the request does not include an FQDN, FortiOS traverses the configured DNS domain list to find a match.
Because host1 is mapped to the host1.sample.com, FortiOS resolves host1 to sample.com, the first entry in the
domain list.
3. Enter execute ping host2.
The system returns the following response:
PING host2... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
285 | Network
To configure the FortiGate as a DNS server in the GUI:
1. Go to Network > DNS Servers.
2. Enable DNS services on an interface:
a. In the DNS Service on Interface table, click Create New.
b. Configure the following:
Interface Select the interface to enable DNS service on.
Mode Set the DNS server mode:
l Recursiv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
286 | Network
a. In the DNS Database table, click Create New.
b. Configure the following:
Type Select the zone type:
l Primary: The primary DNS zone, to manage entries directly.
l Secondary: The secondary DNS zone, to import entries from other
DNS zones. The purpose of a secondary DNS zone is to provide
redundancy and load b... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
287 | Network
Specify one or two DNS zone forwarder IP addresses. Use the CLI to add
more than two DNS forwarder addresses.
c. Add DNS entries:
i. In the DNS Entries table, click Create New.
ii. Configure the following:
Type The resource record type. The availability of the subsequent settings
vary depending on the selected ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
288 | Network
set domain {string}
set forwarder {user}
set primary-name {string}
set ttl {integer}
set type {primary | secondary}
set view {shadow | public | shadow-ztna | proxy}
config dns-entry
edit <id>
set status {enable | disable}
set type {A | NS | CNAME | MX | AAAA | PTR | PTR_V6}
set ttl {integer}
set ip {ipv4-addres... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
289 | Network
10. Add DNS entries:
a. In the DNS Entries table, click Create New.
b. Select a Type, for example Address (A).
c. Set the Hostname, for example web.
d. Configure the remaining settings as needed. The options might vary depending on the selected Type.
e. Click OK.
11. Add more DNS entries as needed.
12. Click OK... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
290 | Network
e. Click OK.
To configure FortiGate as a primary DNS server in the CLI:
config system dns-database
edit WebServer
set domain example.com
set type primary
set view shadow
set ttl 86400
set primary-name corporate
set contact admin@example.com
set authoritative disable
config dns-entry
edit 1
set status enable
set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
291 | Network
C:\Users\demo>nslookup facebook.com
Server: Unknown
Address: 172.16.200.1
Non-authoritative answer:
Name: facebook.com
Addresses: 157.240.22.35
The query is resolved by the central DNS server.
FortiGate as a recursive DNS resolver
FortiOS supports being configured as a recursive DNS resolver. As a resolver, the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
292 | Network
Example 1
In the following example, we will configure the FortiGate’s WAN interface (port3) in resolver mode and configure 1 DNS
entry to return results for override.fortinet.com in the fortinet.com domain.
To configure the FortiGate as DNS resolver in the GUI:
1. Go to Network > DNS Servers.
2. Under DNS Servi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
293 | Network
To verify:
1. On the FortiGate, enable dnsproxy debugs:
# diagnose debug application dnsproxy -1
# diagnose debug enable
2. From a client, use dig to issue a lookup for override.fortinet.com.
>dig @10.0.3.254 override.fortinet.com
; <<>> DiG 9.16.23 <<>> @10.0.3.254 override.fortinet.com
; (1 server found)
;; g... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
294 | Network
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24497
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;www.fortinet.com. IN A
;; ANSWER SECTION:
www.fortinet.com. 60 IN CNAME fortinet.96983.fortiwebcloud.net.
fortinet.96983.fortiwebcloud.net. 60 IN CNAME ipv6.lb-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
295 | Network
n=210
…
[worker 0] dns_send_response()-1626: domain=www.fortinet.com reslen=146
6. From the FortiGate, change the DNS server setting for WAN (port3) to recursive mode.
7. Restart the dnsproxy:
# diagnose test application dnsproxy 99
8. From the client, use dig to issue a lookup for www.fortinet.com again
9. Fro... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
296 | Network
# diagnose test application dnsproxy 19
worker idx: 0
name=. label_count=0 ns_count=13
ns=a.root-servers.net A=198.41.0.4 use=1
ns=b.root-servers.net A=199.9.14.201 use=1
*ns=c.root-servers.net A=192.33.4.12 use=1
ns=d.root-servers.net A=199.7.91.13 use=1
ns=e.root-servers.net A=192.203.230.10 use=1
ns=f.root-s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
297 | Network
Implement the interface name as the source IP address in RADIUS, LDAP, and DNS
configurations
To account for dynamic IP address changes, such as those governed by SD-WAN rules, interface names can be used to
define the source IP addresses in RADIUS, LDAP, and DNS configurations using the source-ip-interface
com... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
298 | Network
5.144791 testvlink1 out 10.1.10.9.17437 -> 10.1.100.142.1812: udp 110
5.144794 testvlink0 in 10.1.10.9.17437 -> 10.1.100.142.1812: udp 110
5.144812 port2 out 10.1.10.9.17437 -> 10.1.100.142.1812: udp 110
5.149570 port2 in 10.1.100.142.1812 -> 10.1.10.9.17437: udp 169
5.149581 testvlink0 out 10.1.100.142.1812 ->... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
299 | Network
Example 3: DNS database
In this example, the system DNS database uses a customized DNS server and a loopback interface as the source IP
address.
To configure the interface name as the source IP address in a DNS database:
1. Configure the loopback interface:
config system interface
edit "loop"
set vdom "root"
se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
300 | Network
523.470350 port2 in 10.1.100.150.53 -> 10.3.10.9.3990: udp 60
523.470380 port2 in 10.1.100.150.53 -> 10.3.10.9.3990: udp 85
523.470396 port2 in 10.1.100.150.53 -> 10.3.10.9.3990: udp 95
^C
10 packets received by filter
0 packets dropped by kernel
DDNS
If your external IP address changes regularly and you want a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
301 | Network
The New DDNS Entry pane opens.
3. Configure the DDNS entry settings:
a. Select the Interface with the dynamic connection.
b. Select the Server that you have an account with.
c. Enter the Unique Location.
d. Click OK.
FortiOS 7.6.2 Administration Guide 302
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
302 | Network
4. Click Create new and repeat step 3 to add more entries.
5. Click Apply.
To configure the FortiGuard DDNS service as an IPv4 DDNS server in the CLI:
config system ddns
edit 1
set ddns-server FortiGuardDDNS
set server-type ipv4
set ddns-domain "branch.float-zone.com"
set addr-type ipv4
set use-public-ip enable... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
303 | Network
set ddns-domain "test.com"
set addr-type ipv6
set monitor-interface "port3"
next
end
Refresh DDNS IP addresses
When using a public IP that is not assigned to the FortiGate, the FortiGate cannot trigger an update when the IP address
changes. The FortiGate can be configured to refresh DDNS IP addresses by periodi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
304 | Network
set ddns-server-ip <ddns_server_ip>
set ddns-zone <ddns_zone>
next
end
Troubleshooting
To debug DDNS:
# diagnose debug application ddnscd -1
# diagnose debug enable
To check if a DDNS server is available:
# diagnose test application ddnscd 3
Not available:
FortiDDNS status:
ddns_ip=0.0.0.0, ddns_ip6=::, ddns_po... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
305 | Network
To view DNS latency information using the CLI:
# diagnose test application dnsproxy 2
worker idx: 0
worker: count=1 idx=0
retry_interval=500 query_timeout=1495
DNS latency info:
vfid=0 server=2001::1 latency=1494 updated=73311
vfid=0 server=96.45.46.46 latency=1405 updated=2547
vfid=0 server=8.8.8.8 latency=19 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
306 | Network
IP Weight RTT Flags TZ Packets Curr Lost Total Lost Updated Time
173.243.138.194 10 0 DI -8 700 0 2 Tue Jan 22 08:02:44
2019
173.243.138.195 10 0 -8 698 0 4 Tue Jan 22 08:02:44
2019
173.243.138.198 10 0 -8 698 0 4 Tue Jan 22 08:02:44
2019
173.243.138.196 10 0 -8 697 0 3 Tue Jan 22 08:02:44
2019
173.243.138.197 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
307 | Network
Basic configurations for enabling DoT and DoH for local-out DNS queries
Before enabling DoT or DoH, ensure that they are supported by the DNS servers. The legacy FortiGuard DNS servers
(208.91.112.53 and 208.91.112.52) do not support DoT or DoH queries, and will drop these packets. At times, the
latency status ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
308 | Network
5. Click OK.
To enable DoH on the DNS server in the CLI:
config system dns-server
edit "port1"
set dnsfilter-profile "dnsfilter"
set doh enable
next
end
Examples
The following examples demonstrate how configure DNS settings to support DoT and DoH queries made to the
FortiGate.
DoT
The following example uses a D... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
309 | Network
edit 1
set category 30
set action block
next
end
end
next
end
3. Configure the DNS server settings:
config system dns-server
edit "port1"
set dnsfilter-profile "dnsfilter"
next
end
4. Send a DNS query over TLS (this example uses kdig on an Ubuntu client) using the FortiGate as the DNS server.
The www.ubc.ca dom... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
310 | Network
To configure scanning DoH traffic in explicit mode with a DNS filter:
1. Configure the DNS settings:
config system dns
set primary 1.1.1.1
set secondary 1.0.0.1
set protocol doh
end
2. Configure the DNS filter profile:
config dnsfilter profile
edit "dnsfilter"
config ftgd-dns
config filters
edit 1
set category ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
311 | Network
This provides greater control over DNS requests, especially when the administrator is not managing the DNS server
configuration of the client devices. This can improve network efficiency and performance by resolving IPs local to the
client's PCs rather than IPs local to the central DNS server.
This feature is n... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
312 | Network
By default, DNS server options are not available in the GUI.
To enable DNS server options in the GUI:
1. Go to System > Feature Visibility.
2. In the Additional Features section, enable DNS Database.
3. Click Apply.
To configure the DNS zone and local DNS entries on the Local Site FortiGate in the GUI:
1. Go to... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
313 | Network
config dns-entry
edit 1
set hostname "office"
set ip 172.16.200.55
next
end
next
end
To add the DNS database to a DNS filter profile:
config dnsfilter profile
edit "SaaS"
set transparent-dns-database "SaaS_applications"
next
end
Multiple DNS databases can be selected for transparent-dns-database.
After selectin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
314 | Network
Address: 192.168.16.254
Non-authoritative answer:
Name: osiprod-wus-pineapple-100.westus.cloudapp.azure.com
Address: 172.16.200.55
The query is resolved to the IP address configured on the Local Site FortiGate.
2. Send a DNS query for the domain configured on the Local Site FortiGate:
C:\Users\demo>nslookup tea... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
315 | Network
l When vdom-dns is disabled (default), only the IP address of interfaces in the management VDOM can be
configured as the source-ip.
For more information on VDOM DNS, see Important DNS CLI commands on page 279.
In this example:
l vdom1 is a non-management VDOM
l port8 is assigned to vdom1 and has IP address 13.1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
316 | Network
next
end
To test configuring a source IP address when vdom-dns is enabled:
config vdom
edit vdom1
config system vdom-dns
set vdom-dns enable
end
next
end
l port8 can be used as the source IP address in a DNS database because it is assigned to the vdom1:
config vdom
edit vdom1
config system dns-database
edit "1"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
317 | Network
set name dns-tcp
set port 53
set protocol 6
next
end
Use the show system session-helper command to view the current session helper configuration.
To accept DNS sessions you must add a security policy with service set to ALL or to the DNS
pre-defined service (which listens on TCP and UDP ports 53).
Disabling DNS... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
318 | Network
# diagnose test application dnsproxy
worker idx: 0
1. Clear DNS cache
2. Show stats
3. Dump DNS setting
4. Reload FQDN
5. Requery FQDN
6. Dump FQDN
7. Dump DNS cache
8. Dump DNS DB
9. Reload DNS DB
10. Dump secure DNS policy/profile
11. Dump Botnet domain
12. Reload Secure DNS setting
13. Show Hostname cache
14... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
319 | Network
tls 1 if the connection is TLS, 0 if the connection is not TLS.
rt The round trip time of the DNS latency.
probe The number of probes sent.
To dump the second DNS worker's cache:
# diagnose test application dnsproxy 7 1
To enable debug on the second worker:
# diagnose debug application dnsproxy -1 1
To enable d... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
320 | Network
l Secure explicit proxy on page 402
l Secure explicit proxy with client certificates on page 405
l Explicit proxy logging on page 407
l Configuring fast fallback for explicit proxy on page 416
l Forward HTTPS requests to a web server without the need for an HTTP CONNECT message on page 419
l Specifying outgoing... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
321 | Network
e. Click Apply.
2. Create an explicit web proxy policy:
a. Go to Policy & Objects > Proxy Policy.
b. Click Create New.
c. Set Proxy Type to Explicit Web and Outgoing Interface to port1.
d. Also set Source and Destination to all, Schedule to always, Service to webproxy, and Action to ACCEPT.
e. Click OK to creat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
322 | Network
3. Configure a client to use the FortiGate explicit proxy:
Set the FortiGate IP address as the proxy IP address in the browser, or use an automatic configuration script for the
PAC file.
To configure explicit web proxy in the CLI:
1. Enable and configure explicit web proxy:
config web-proxy explicit
set status ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
323 | Network
Downloading a PAC file using HTTPS
PAC files can be downloaded for an explicit proxy through the FortiGate's captive portal using HTTPS to ensure a secure
download.
In this example, a Windows PC has an HTTPS URL configured in its proxy settings to download a PAC file from a
FortiGate by using a download link, h... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
324 | Network
5. In the Automatic proxy setup section, click Save to trigger the PAC file download from the HTTPS URL.
FTP proxy
FTP proxies can be configured on the FortiGate so that FTP traffic can be proxied. When the FortiGate is configured as
an FTP proxy, FTP client applications should be configured to send FTP request... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
325 | Network
e. Click OK to create the policy.
This example creates a basic policy. If required, security profiles can be enabled.
3. Configure the FTP client application to use the FortiGate IP address.
To configure explicit FTP proxy in the CLI:
1. Enable and configure explicit FTP proxy:
config ftp-proxy explicit
set sta... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
326 | Network
end
This example creates a basic policy. If required, security profiles can be enabled.
3. Configure the FTP client application to use the FortiGate IP address.
Changing the FTP mode from active to passive for explicit proxy
An explicit FTP proxy can convert an active FTP connection initiated by an FTP client t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
327 | Network
config firewall proxy-policy
edit 1
set proxy ftp
set dstintf "port3"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
next
end
4. Get the client to download the text file from the FTP server (NcFTP is used in this example):
ncftpget -E -r 0 -d stdout -u pc4user1@172.16.200.44 -p 1234... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
328 | Network
HTTP and HTTPS traffic that is successfully redirected to a proxy policy is subject to security
profiles configured on the proxy policy, not the base firewall policy. Security profiles configured
on the base firewall policy still apply to other traffic, such as FTP.
To configure transparent proxy in the GUI:
1.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
329 | Network
3. No special configuration is required on the client to use FortiGate transparent proxy. As the client is using the
FortiGate as its default gateway, requests will first hit the regular firewall policy, and then be redirected to the
transparent proxy policy.
To configure transparent proxy in the CLI:
1. Config... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
330 | Network
l Host regex match on page 331
l URL pattern on page 332
l URL category on page 333
l HTTP method on page 334
l HTTP header on page 334
l User agent on page 335
l Advanced (source) on page 336
l Advanced (destination) on page 337
Fast policy match
The fast policy match function improves the performance of IPv4 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
331 | Network
4. Click OK.
To create a host regex match address in the CLI:
config firewall proxy-address
edit "Host Regex"
set type host-regex
set host-regex "qa.[a-z]*.com"
next
end
URL pattern
In this address type, a user can create a URL path as a regular expression. Once created, the path address can be
selected as a de... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
332 | Network
To create a URL pattern address in the CLI:
config firewall proxy-address
edit "URL Regex"
set type url
set host "all"
set path "/filetypes/"
next
end
URL category
In this address type, a user can create a URL category based on a FortiGuard URL ID. Once created, the address can be
selected as a destination of a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
333 | Network
next
end
To see a list of all the categories and their numbers, when editing the address, enter set category ?.
HTTP method
In this address type, a user can create an address based on the HTTP request methods that are used. Multiple method
options are supported, including: CONNECT, DELETE, GET, HEAD, OPTIONS, O... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
334 | Network
l Name to HTTP-header,
l Type to HTTP Header,
l Host to all,
l Header Name to Header_Test, and
l Header Regex to Q[A-B].
4. Click OK.
To create a HTTP header address in the CLI:
config firewall proxy-address
edit "method_get"
set type header
set host "all"
set header-name "Header_Test"
set header "Q[A-B]"
next
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
335 | Network
Browser version control
For security reasons, the user can restrict the browser version by specifying a range of the supported versions which can
be set from the CLI using set ua-min-ver and set ua-max-ver. This option is available when the address Type is
either User Agent or Advanced (Source).
To restrict the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
336 | Network
set header "Q[A-B]"
next
end
next
end
Advanced (destination)
In this address type, a user can create an address based on URL pattern and URL category parameters. Once created,
the address can be selected as a destination of a proxy policy. This means that a policy will only allow or block requests
that match th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
337 | Network
Proxy policy security profiles
Web proxy policies support most security profile types.
Security profiles must be created before they can be used in a policy, see Security Profiles on
page 1756 for information.
Explicit web proxy policy
The security profiles supported by explicit web proxy policies are:
l AntiVi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
338 | Network
created):
AntiVirus av
Web Filter urlfiler
Application Control app
IPS Sensor-1
DLP Profile dlp
ICAP default
Web Application Firewall default
SSL Inspection deep-inspection
6. Click OK to create the policy.
To configure security profiles on an explicit web proxy policy in the CLI:
config firewall proxy-policy
e... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
339 | Network
l Web Application Firewall
l File Filter
l SSL Inspection
To configure security profiles on a transparent proxy policy in the GUI:
1. Go to Policy & Objects > Proxy Policy.
2. Click Create New.
3. Set the following:
Proxy Type Transparent Web
Incoming Interfae port2
Outgoing Interface port1
Source all
Destinati... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
340 | Network
set action accept
set schedule "always"
set utm-status enable
set av-profile "av"
set webfilter-profile "urlfilter"
set dlp-profile "dlp"
set ips-sensor "sensor-1"
set application-list "app"
set icap-profile "default"
set waf-profile "default"
set ssl-ssh-profile "certificate-inspection"
next
end
FTP proxy
The ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
341 | Network
To configure security profiles on an FTP proxy policy in the CLI:
config firewall proxy-policy
edit 3
set proxy ftp
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set utm-status enable
set av-profile "av"
set dlp-profile "dlp"
set ips-sensor "sensor-1"
set applic... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
342 | Network
end
config system interface
edit "port2"
set vdom "vdom1"
set ip 10.1.100.1 255.255.255.0
set allowaccess ping https ssh snmp http telnet
set type physical
set explicit-web-proxy enable
set snmp-index 12
end
next
end
Configure the authentication server and create user groups
Since we are using an external authe... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
343 | Network
FSSO NTLM authentication is supported in a Windows AD network. FSSO can also provide NTLM authentication
service to the FortiGate unit. When a user makes a request that requires authentication, the FortiGate initiates
NTLM negotiation with the client browser, but does not process the NTLM packets itself. Instea... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
344 | Network
NAAIAEEZPUlRJTkVUUUEuTE9DQUwABEhUVFAAFEZHVC5GT1JUSU5FVFFBLkxPQ0FMAAAAAQAAAAAEABEAEG49vHE
iiBghr63Z/lnwYrU="
next
end
For information on generating a keytab, see Generating a keytab on a Windows server on page 347.
3. Configure FSSO NTLM authentication:
config user fsso
edit "1"
set server "172.18.62.220"
set pa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
345 | Network
To create an authentication scheme and rules in the CLI:
1. Create an authentication scheme:
config authentication scheme
edit "Auth-scheme-Negotiate"
set method negotiate <<< Accepts both Kerberos and NTLM as fallback
next
end
2. Create an authentication rule:
config authentication rule
edit "Auth-Rule"
set st... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
346 | Network
Verify the configuration
Log in using a domain and system that would be authenticated using the Kerberos server, then enter the diagnose
wad user list CLI command to verify:
# diagnose wad user list
ID: 8, IP: 10.1.100.71, VDOM: vdom1
user name : test1@FORTINETQA.LOCAL
duration : 389
auth_type : IP
auth_method ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
347 | Network
l The password must be very strong.
l The password is set to never expire.
2. Add the FortiGate FQDN in to the Windows DNS domain, as well as in-addr.arpa.
3. Generate the Kerberos keytab using the ktpass command on Windows servers and many domain workstations:
# ktpass -princ HTTP/<domain name of test fgt>@rea... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
348 | Network
set srcintf "port10"
set dstintf "port9"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set logtraffic all
set webproxy-forward-server "upStream_proxy_1"
set fsso disable
set av-profile "av"
set ssl-ssh-profile "deep-custom"
set nat enable
nex... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
349 | Network
The FortiGate will close the session before the client request can be forwarded if all of the following conditions are met:
l The certificate inspection is configured in the firewall policy that has the http-policy-redirect option enabled.
l A previously authenticated IP-based user record cannot be found by the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
350 | Network
set category 37
next
end
3. Configure the firewall policy:
config firewall policy
edit 1
set srcintf "port10"
set dstintf "port9"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set http-policy-redirect enable
set ssl-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
351 | Network
next
end
Transparent web proxy forwarding over IPv6
The IPv6-enabled forward server works the same way as the IPv4 forward server. For example, you can configure an
IPv6 address or an FQDN that resolves to an IPv6 address for the forward server, and you can also use the IPv6 forward
server in a forward server g... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
352 | Network
The New Forwarding Server pane opens.
4. Set the following options, and click OK to create the forwarding server.
Proxy Address Type IPv6
Proxy Address 2000:172:16:200::8
Port 8080
Health Monitor Enable
Health Check Monitor Site www.google.com
5. Set the remaining options as needed, and click OK to save the exp... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
353 | Network
6. Add the web proxy forward server to a proxy policy.
To configure an IPv6 address in the CLI:
1. Configure an IPv6 address for the web proxy forward server.
In this example, address type is set to IPv6, and an IPv6 address is specified in a configuration (fgt6) for a web proxy
forward server.
config web-proxy... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
354 | Network
Upstream proxy authentication in transparent proxy mode
A downstream proxy FortiGate that needs to be authenticated by the upstream web proxy can use the basic
authentication method to send its username and password, in the base64 format, to the upstream web proxy for
authentication. If the authentication succe... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.