index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
355 | Network
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set ssl-ssh-profile "deep-inspection"
set av-profile "av"
set webproxy-forward-server "Student_Upstream_WebProxy"
set nat enable
next
edit 2
set srcintf "Vlan_Staff"
set dstintf "port9"
set srcaddr "Staff_S... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
356 | Network
1. Configure LDAP:
config user ldap
edit "ldap-kerberos"
set server "172.18.62.220"
set cnid "cn"a
set dn "dc=fortinetqa,dc=local"
set type regular
set username "CN=root,CN=Users,DC=fortinetqa,DC=local"
set password *********
next
end
2. Configure FSSO:
config user fsso
edit "1"
set server "172.18.62.220"
set p... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
357 | Network
set content "$proxy_name"
next
edit 3
set name "user"
set content "$user"
next
edit 4
set name "domain"
set content "$domain"
next
edit 5
set name "local_grp"
set content "$local_grp"
next
edit 6
set name "remote_grp"
set content "$remote_grp"
next
edit 7
set name "Via"
set content "Fortigate-Proxy"
next
end
ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
358 | Network
ip: 10.1.100.116|Proxy-Name: 1.1 100D.qa|user: TEST21|domain: FORTINETQA|local_grp:
NTLM-FSSO|remote_grp: FORTINETQA/FSSO|Via: Fortigate-Proxy"
Restricted SaaS access
Large organizations may want to restrict SaaS access to resources like Microsoft Office 365, Google Workspace, and
Dropbox by tenant to block non... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
359 | Network
The following table lists the vendor-specific config headers settings that must be configured in the web proxy profile
(config web-proxy profile):
Setting Vendor specification
Microsoft Office 365 Google Workspace Dropbox
name <string> l RestrictAccess-ToTenants
l RestrictAccess-Context
l X-GoogAppsAllowed-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
360 | Network
Configuration summary
The following must be configured in FortiOS:
l An FQDN address for login.live.com
l An SSL inspection profile that applies deep inspection for login.live.com
Ensure that the firewall certificate is installed on the client machines. A company certificate
signed by an internal CA is recommen... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
361 | Network
config webfilter urlfilter
edit 1
set name "Auto-webfilter-urlfilter"
config entries
edit 1
set url "login.microsoftonline.com"
set action allow
next
edit 2
set url "login.microsoft.com"
set action allow
next
edit 3
set url "login.windows.net"
set action allow
next
edit 4
set url "login.live.com"
set action all... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
362 | Network
set add-option new
set protocol https http
set content <domain>
next
edit 2
set name "Restrict-Access-Context"
set dstaddr "login.microsoftonline.com" "login.microsoft.com"
"login.windows.net"
set action add-to-request
set base64-encoding disable
set add-option new
set protocol https http
set content <directory... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
363 | Network
Testing the access
To test the access to corporate domains and personal accounts:
1. Get a client to log in with their corporate email using the login.microsoftonline.com domain.
2. The client is able to enter their credentials and log in successfully.
3. Get a client to log in to their personal Outlook account... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
364 | Network
4. After the client enters their credentials, a message appears that they cannot access this resource because it is
restricted by the cross-tenant access policy.
FortiOS 7.6.2 Administration Guide 365
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
365 | Network
Verifying the header insertion
To verify the header insertion for corporate domains and personal accounts:
1. On the FortiGate, start running the WAD debugs:
# diagnose wad debug enable category http
# diagnose wad debug enable level info
# diagnose debug enable
2. After a client attempts to access corporate do... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
366 | Network
Explicit proxy and FortiGate Cloud Sandbox
Explicit proxy connections can leverage FortiGate Cloud Sandbox for advanced threat scanning and updates. This
allows FortiGates behind isolated networks to connect to FortiCloud services.
To configure FortiGuard services to communicate with an explicit proxy server:
c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
367 | Network
[81] fds_print_msg: Connection: close
[81] fds_print_msg: Content-Type: application/octet-stream
[81] fds_print_msg: Content-Length: 301
[524] fds_https_connect: http request to 172.16.102.21: header=248, ext=301.
[257] fds_https_send: sent 248 bytes: pos=0, len=248
[265] fds_https_send: 172.16.102.21: sent 248... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
368 | Network
[81] fds_print_msg: Content-Type: application/octet-stream
[81] fds_print_msg: Content-Length: 338
[524] fds_https_connect: http request to 172.16.102.21: header=248, ext=338.
[257] fds_https_send: sent 248 bytes: pos=0, len=248
[265] fds_https_send: 172.16.102.21: sent 248 byte header, now send 338-byte body
[... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
369 | Network
To enable explicit web proxy in the GUI:
1. Go to System > Feature Visibility.
2. In the Security Features column, enable Explicit Proxy.
3. Configure the explicit web proxy settings. See Explicit web proxy on page 321.
To add a web proxy forwarding server in the GUI:
1. Go to Network > Explicit Proxy. The Expl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
370 | Network
Web proxy forwarding server monitoring and health checking
By default, a FortiGate unit monitors a web proxy forwarding server by forwarding a connection to the remote server
every 10 seconds. The remote server is assumed to be down if it does not respond to the connection. FortiGate
continues checking the serv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
371 | Network
When you create a forwarding server group you can select a load balancing method to control how sessions are load
balanced to the forwarding servers in the server group. Two load balancing methods are available:
l Weighted load balancing sends more sessions to the servers with higher weights. You can configure ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
372 | Network
Adding proxy chaining to an explicit web proxy policy
You can enable proxy chaining for web proxy sessions by adding a web proxy forwarding server or server group to an
explicit web proxy policy. In a policy you can select one web proxy forwarding server or server group. All explicit web
proxy traffic accepted ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
373 | Network
Example
The following example demonstrates that the Squid server and the FortiGate can handle TLS 1.3 traffic.
The following output from the Squid server demonstrates that the FortiGate supports TLS 1.3 traffic and forwards the
hello retry request back to the client PC. The client PC then sends the client hello... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
374 | Network
To configure FGT_A:
1. Configure the hard disk to perform WANOpt:
config system storage
edit "HDD2"
set status enable
set usage wanopt
set wanopt-mode mix
next
end
2. Configure the WANOpt peer and profile:
config wanopt peer
edit "FGT-D"
set ip 120.120.120.172
next
end
config wanopt profile
edit "test"
config h... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
375 | Network
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set profile-protocol-options "protocol"
set ssl-ssh-profile "ssl"
set wanopt enable
set wanopt-profile "test"
set nat enable
next
end
To configure FGT_D:
1. Configure the hard disk to perf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
376 | Network
set utm-status enable
set inspection-mode proxy
set wanopt enable
set wanopt-detection passive
set nat enable
next
end
5. Configure a proxy policy to apply the SSL profile:
config firewall proxy-policy
edit 100
set proxy wanopt
set dstintf "port23"
set srcaddr "all"
set dstaddr "all"
set service "ALL"
set actio... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
377 | Network
4. On FGT_A, check the WAD statistics again:
# diagnose wad stats worker.tunnel
comp.n_in_raw_bytes 10181157
comp.n_in_comp_bytes 4570331
comp.n_out_raw_bytes 31627
comp.n_out_comp_bytes 34702
# diagnose wad stats worker.protos.http
wan.bytes_in 0
wan.bytes_out 0
lan.bytes_in 1607
lan.bytes_out 20286841
tunnel.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
378 | Network
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=ubuntu
* start date: Sep 20 21:38:01 2018 GMT
* expire date: Sep 17 21:38:01 2028 GMT
* issuer: C=US; ST=California; L=Sunnyvale; O=Fortinet; OU=Certificate Authority;
CN=Fortinet Untrusted CA; emailAddress=support@fortinet.com
* SSL ce... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
379 | Network
{ [1920 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [300 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [37 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
380 | Network
To reconfigure FGT_A:
config firewall profile-protocol-options
edit "protocol"
config http
set ports 80 8080
unset options
unset post-lang
end
next
end
To reconfigure FGT_D:
1. Configure a new firewall policy for traffic passing from port27 to port29:
config firewall policy
edit 1
set name "WANOPT-B"
set srcint... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
381 | Network
set ssl-ssh-profile "ssl"
next
end
To confirm that HTTPS traffic is still being accelerated:
1. On the client PC, curl the same 10MB test sample through the explicit proxy:
root@client:/tmp# curl -x 100.100.100.174:8080 -v -k https://172.16.200.144/test_10M.pdf
-O
% Total % Received % Xferd Average Speed Time T... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
382 | Network
next
end
3. Create an authentication scheme and rule:
config authentication scheme
edit "au-ntlm"
set method ntlm
set domain-controller "dc1"
next
end
config authentication rule
edit "ru-ntlm"
set srcaddr "all"
set ip-based disable
set active-auth-method "au-ntlm"
next
end
4. In the proxy policy, append the use... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
383 | Network
To support individual users for agentless NTLM using the CLI:
1. Configure an LDAP server:
config user ldap
edit "ldap-kerberos"
set server "172.18.62.177"
set cnid "cn"
set dn "dc=fortinetqa,dc=local"
set type regular
set username "CN=root,CN=Users,DC=fortinetqa,DC=local"
set password *********
next
end
2. Con... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
384 | Network
set av-profile "av"
set ssl-ssh-profile "deep-custom"
next
end
This implementation lets you configure a single user instead of a whole group. The FortiGate will now allow the user
named test1.
To verify the configuration using the CLI:
diagnose wad user list
ID: 1827, IP: 10.1.15.25, VDOM: vdom1
user name : tes... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
385 | Network
config user krb-keytab
edit "http_service"
set pac-data disable
set principal "HTTP/FGT.FORTINETQA.LOCAL@FORTINETQA.LOCAL"
set ldap-server "ldap-kerberos" "ldap-two"
set keytab xxxxxxxxx
next
end
3. Configure a domain controller that uses both LDAP servers:
config user domain-controller
edit "dc1"
set ip-addres... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
386 | Network
To configure the proxy policy:
config firewall proxy-policy
edit 1
set proxy explicit-web
set dstintf "mgmt1"
set srcaddr "all"
set dstaddr "all"
set service "w"
set action accept
set schedule "always"
set groups "fsso1"
set utm-status enable
set av-profile "default"
set dlp-profile "default"
set profile-protoc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
387 | Network
In this example, explicit proxy authentication over HTTPS is configured with form IP-based authentication. Once
configured, you can enable authorization for an explicit web proxy by configuring users or groups in the firewall proxy
policy.
To configure explicit proxy authentication over HTTPS:
1. Configure the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
388 | Network
Verification
When a client visits a HTTP website, the client will be redirected to the captive portal for authentication by HTTPS. For
example, the client could be redirected to a URL by a HTTP 303 message similar to the following:
HTTP/1.1 303 See Other
Connection: close
Content-Type: text/html
Cache-Control: ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
389 | Network
config authentication scheme
edit "mtls"
set method cert
set user-cert enable
next
end
config authentication rule
edit "mtls"
set srcintf "port2"
set srcaddr "all"
set dstaddr "all"
set active-auth-method "mtls"
next
end
2. Select the CA or CAs used to verify the client certificate:
config authentication settin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
390 | Network
config firewall access-proxy
edit "mTLS-access-proxy"
set vip "mTLS"
config api-gateway
edit 1
config realservers
edit 1
set ip 172.16.200.44
next
end
next
end
next
end
6. Configure the proxy policy to apply authentication and the security profile, selecting the appropriate user object
depending on the user typ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
391 | Network
3. Click Certificate information to view details about the certificate.
4. On the FortiGate, check the traffic logs.
l If client certificate authentication passes:
1: date=2021-06-03 time=15:48:36 eventtime=1622760516866635697 tz="-0700"
logid="0000000010" type="traffic" subtype="forward" level="notice" vd="vdo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
392 | Network
wanoptapptype="web-proxy" proto=6 action="accept" policyid=3 policytype="proxypolicy" poluuid="af5e2df2-c321-51eb-7d5d-42fa58868dcb" duration=0 user="trustedissuer" wanin=0 rcvdbyte=0 wanout=0 lanin=4089 sentbyte=4089 lanout=7517
appcat="unscanned" utmaction="block" countweb=1 crscore=30 craction=8 utmref=655... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
393 | Network
To verify the results:
The WAD debug shows that the FortiGate adds the client certificate information to the HTTP header. The added header
cannot be checked using the sniffer, because the FortiGate encrypts the HTTP header to forward it to the server.
1. Enable WAD debug on all categories:
# diagnose wad debug ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
394 | Network
To configure the FortiGate:
1. Configure the authentication rule:
config authentication rule
edit "saml"
set srcaddr "all"
set ip-based disable
set active-auth-method "saml"
set web-auth-cookie enable
next
end
2. Configure the captive portal:
config authentication setting
set captive-portal "fgt9.myqalab.local"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
395 | Network
CORS request scenarios
Preflight CORS request
The client sends the initial CORS preflight request (OPTIONS with the origin header) to the web server through
FortiGate's web proxy and receives a CORS 200 OK response (with headers, such as Access-Control-AllowOrigin). The FortiGate will not redirect the client t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
396 | Network
https://fgt9.myqalab.local:7831/test/saml/login/?cptype=ckauth&scheme=https&4Tmthd=0&host=c2
shb.pubgw.yahoo.com&port=443&rule=98&uri=L2JpZFJlcXVlc3Q=&cdata=pqWlpdswdcCnpaWli6WlpcjEwszG
mJbGksbBwMCVwcPBlpKRnMGTl52QxJeUwYPW18aYlJWLlIuUlZWLlJalpQ==
< Content-Length: 0
Redirection to captive portal
Once the client... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
397 | Network
< Connection: close
< Content-Type: text/html
< Cache-Control: no-cache
< Location:
https://fgt9.myqalab.local:7831/test/saml/login/?cptype=ckauth&scheme=https&4Tmthd=0&host=ww
w.yahoo.com&port=443&rule=98&uri=Lw==&cdata=pqWlpaw7dcCnpaWli6WlpcjEwszGmJbGksbAkpOcxMDDlpbG
lMSTl52QwcGcl4PW18aYlJWLlIuUlZWLlJalpQ==
<... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
398 | Network
set srcaddr "all"
set ip-based disable
set active-auth-method "form"
set web-auth-cookie enable
set cors-stateful enable
set cors-depth 3
next
end
3. Configure the captive portal:
config authentication setting
set captive-portal "fgt9.myqalab.local"
end
4. Configure the proxy policy:
config firewall proxy-polic... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
399 | Network
If CORS access (cors-stateful) was disabled, the browser would load a blank page.
HTTP connection coalescing and concurrent multiplexing for explicit proxy
HTTP connection coalescing and concurrent multiplexing allows multiple HTTP requests to share the same TCP threeway handshake when the destination IP is th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
400 | Network
To configure connection coalescing and concurrent multiplexing with an explicit proxy:
1. Configure the explicit web proxy:
config web-proxy explicit
set status enable
set http-incoming-port 8080
set http-connection-mode serverpool
end
2. Enable explicit web proxy on port2:
config system interface
edit "port2"
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
401 | Network
6. Change the HTTP connection mode to static:
config web-proxy explicit
set status enable
set http-incoming-port 8080
set http-connection-mode static
end
7. Verify the sniffer packet capture. This time, the FortiGate establishes a TCP connection for each client.
Secure explicit proxy
Secure explicit web proxy w... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
402 | Network
l 1536: use 1536-bit Diffie-Hellman prime
l 2048: use 2048-bit Diffie-Hellman prime (default)
Example
In this example, a Windows PC user configures an HTTPS URL (https://cp.myqalab.local) as the proxy address for the
explicit web proxy. When the user opens a browser (such as Edge or Chrome), the browser will us... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
403 | Network
To configure the secure explicit web proxy:
config web-proxy explicit
set status enable
set secure-web-proxy enable
set ftp-over-http enable
set socks enable
set http-incoming-port 8080
set secure-web-proxy-cert "server_cert"
set socks-incoming-port 1080
set ipv6-status enable
set unknown-http-version best-effo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
404 | Network
After the client initiates the TLS connection to the explicit web proxy with a client hello packet, the web proxy is able
to respond appropriately with a server hello packet to establish a TLS connection first before any HTTP messages
are exchanged, and all HTTP messages will be protected by the TLS connection.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
405 | Network
config web-proxy explicit
set secure-web-proxy enable
set secure-web-proxy-cert "proxy"
set client-cert enable
set empty-cert-action block
end
3. Configure verification of the client certificate with the root CA.
config authentication setting
set user-cert-ca "root_ca"
end
When the user accesses a web site:
1. ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
406 | Network
blocked.
Explicit proxy logging
Explicit proxy traffic logging can be used to troubleshoot the HTTP proxy status for each HTTP transaction with the
following:
l Monitor HTTP header requests and responses in the UTM web filter log. This requires an SSL deep inspection
profile to be configured in the correspondin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
407 | Network
set action monitor-request
next
edit 2
set name "ETag"
set action monitor-response
next
end
next
end
2. Enable forward server name logging in traffic:
config web-proxy global
set proxy-fqdn "100D.qa"
set log-forward-server enable
end
3. Configure the web filter banned word table to block any HTTP response conta... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
408 | Network
config firewall policy
edit 1
set srcintf "port10"
set dstintf "port9"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set webproxy-profile "header"
set webproxy-forward-server "fgt-b"
set ssl-ssh-profile "deep-inspect... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
409 | Network
l set webfilter-profile "header"
l set logtraffic all
To verify the configuration:
1. Send a HTTP request from the client:
curl -kv https://172.16.200.33 -H "test_request_header: aaaaa"
This command sends a HTTP request with the header test_request_header: aaaaa through the FortiGate.
Since the response from th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
410 | Network
The following settings are required in the firewall policy:
l set inspection-mode proxy
l set webproxy-forward-server "fgt-b"
l set logtraffic all
When a HTTP request is sent through the FortiGate proxy, the request will be forwarded by the FortiGate to the
upstream proxy (fgt-b), and the forward server's name ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
411 | Network
To verify the configuration:
1. Send a HTTP request from the client to an unreachable IP:
curl -kv https://172.16.200.34
2. On the FortiGate, check the traffic logs:
# execute log filter category 3
1: date=2023-04-19 time=20:25:55 eventtime=1681961155100007061 tz="-0700"
logid="0000000013" type="traffic" subtyp... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
412 | Network
1: date=2024-05-21 time=20:06:17 eventtime=1716347177537010993 tz="-0700"
logid="0000000010" type="traffic" subtype="forward" level="notice" vd="vdom1"
srcip=10.1.100.11 srcport=42694 srcintf="port1" srcintfrole="undefined"
dstcountry="Reserved" srccountry="Reserved" dstip=172.16.200.44 dstport=80
dstintf="port... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
413 | Network
proxyapptype="web-proxy" proto=6 action="accept" policyid=2 policytype="proxy-policy"
poluuid="1f986ef4-14c1-51ef-7d4f-fd482cefde73" trandisp="snat" transip=172.16.200.8
transport=34326 duration=0 wanin=3051 rcvdbyte=3051 wanout=618 lanin=842 sentbyte=842
lanout=4551 appid=40568 app="HTTPS.BROWSER" appcat="Web.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
414 | Network
sentbyte=787 scheme="https" hostname="172.16.200.44" resptype="normal"
reqtime=1716532330 resptime=1716532330 respfinishtime=1716532330 appcat="unscanned"
For HTTPS with explicit-web proxy, there is an additional piece of http-transaction log for each CONNECT request and
response:
3: date=2024-05-21 time=20:34:... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
415 | Network
transip=172.16.200.8 transport=16135 duration=0 wanin=392 rcvdbyte=392 wanout=356 lanin=725
sentbyte=725 lanout=71832 appcat="unscanned" utmaction="block" countav=1 utmref=65517-14
3: date=2024-05-23 time=22:49:40 eventtime=1716529779381204800 tz="-0700" logid="0006000026"
type="traffic" subtype="http-transacti... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
416 | Network
config web-proxy fast-fallback
edit <name>
set status {enable | disable}
set connection-mode {sequentially | simultaneously}
set protocol {IPv4-first | IPv6-first | IPv4-only | IPv6-only}
set connection-timeout <integer>
next
end
status {enable | disable} Enable/disable the fast fallback entry (default = enable... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
417 | Network
To configure the FortiGate:
1. Configure the IPv4 static route:
config router static
edit 1
set gateway 172.16.200.251
set device "port3"
next
end
2. Configure the IPv6 static route:
config router static6
edit 1
set gateway 2000:172:16:200::254
set device "port3"
next
end
3. Configure the proxy destination conn... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
418 | Network
Verifying the connection
Scenario 1:
The TCP connection from the explicit web proxy to the web server is established successfully over IPv4 within 200 ms.
As shown in the forward traffic log, the web session data is transmitted over IPv4 between the explicit web proxy and the
web server.
2: date=2023-06-26 time... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
419 | Network
Example
Based on the following topology, an HTTPS request is sent to a web server through an explicit web proxy.
To enable detection of HTTPS in an HTTP request:
1. Configure the explicit web proxy:
config web-proxy explicit
set status enable
set ftp-over-http enable
set socks enable
set http-incoming-port 8080... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
420 | Network
telnet 10.1.100.2 8080
Trying 10.1.100.2...
Connected to 10.1.100.2.
Escape character is '^]'.
POST https://172.16.200.33/ HTTP/1.1
Host: 172.16.200.33
User-Agent: curl/7.68.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
HTTP/1.1 200 OK
5. Verify the traffic log. The HTTP reques... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
421 | Network
Example
In the following example, a forward server is applied to the FortiGate in an explicit proxy policy. A interface that is not in
the policy, such as port3, can be specified to forward traffic.
Without this feature, the FortiGate would have to forward traffic through the management
interface which is the d... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
422 | Network
set schedule "always"
set logtraffic all
set webproxy-forward-server "FWD_SVR"
next
end
4. Access a website in the browser, such as www.fortinet.com.
5. Go to Log & Report > Forward Traffic and review the traffic log. The Destination Interface is port3 instead of the
management interface.
FortiOS 7.6.2 Administ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
423 | Network
DHCP servers and relays
A DHCP server dynamically assigns IP addresses to hosts on the network connected to the interface. The host
computers must be configured to obtain their IP addresses using DHCP. You can configure one or more DHCP servers
on any FortiGate interface.
A DHCP server can be in server or relay... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
424 | Network
Configure a DHCP server on an interface
A DHCP server can be configured on an interface in the GUI from Network > Interfaces.
To configure a DHCP server in the GUI:
1. Go to Network > Interfaces.
2. Edit an interface.
3. Enable the DHCP Server option and configure the settings.
4. Click OK.
Field Description
Ad... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
425 | Network
next
edit 2
set start-ip 192.168.1.3
set end-ip 192.168.1.254
next
end
set timezone-option default
set tftp-server "172.16.1.2"
next
end
Configure a DHCP relay on an interface
To configure a DHCP relay in the GUI:
1. Go to Network > Interfaces.
2. Edit an interface.
3. Expand the Advanced section and set Mode t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
426 | Network
Configuring a DHCP server and relay on the same interface is currently only supported in the
CLI.
To configure a DHCP server and relay in the CLI:
1. Configure the interface:
config system interface
edit "port2"
set vdom "root"
set dhcp-relay-service enable
set ip 10.1.1.5 255.255.255.0
set allowaccess ping htt... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
427 | Network
end
next
end
Viewing information about DHCP server connections
To view information about DHCP server connections, go to Dashboard > Network and expand the DHCP monitor widget.
On this page, you can also add IP addresses to the reserved IP address list.
DHCP options
When adding a DHCP server, you can include DHC... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
428 | Network
The parameter marked with an asterisk (*) are mandatory and must be filled in.
Configuring the lease time
This configuration implements DHCP option code 51. The global lease time (measured in seconds, 300 - 864000)
determines the length of time an IP address remains assigned to a client. Once the lease expires,... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
429 | Network
Breaking an address lease
If you need to end an IP address lease, you can break the lease. This is useful if you have limited addresses and longer
lease times when some leases are no longer necessary, for example, with corporate visitors.
To break a lease:
# execute dhcp lease-clear <ip_address>
To break a leas... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
430 | Network
To configure TFTP servers:
config system dhcp server
edit <id>
set interface <interface>
set netmask <netmask>
set tftp-server <hostname/IP address> <hostname/IP address>
next
end
TFTP servers can also be configured in the GUI in the TFTP server(s) field within the DHCP server > Advanced section
of the Edit Int... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
431 | Network
Variable Description
type {hex | string | ip
| fqdn}
DHCP server option type (default = hex).
value <string> DHCP server option value.
ip <ip address> DHCP server option IP address. This option is only available when type is ip.
Example
To configure option 252 with value http://192.168.1.1/wpad.dat:
config syst... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
432 | Network
Option 77
This option can be used for User Class information (UCI) matching. When enabled, only DHCP requests with a matching
UCI are served with the specified range.
To configure UCI matching:
config system dhcp server
edit <id>
config ip-range
edit <id>
set uci-match {enable | disable}
set uci-string <string>... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
433 | Network
remote-id <value> Option 82 remote ID of the client that will get the reserved IP address.
Format: the MAC address of the client.
type {mac | option82} The DHCP reserved address type; mac (default) or option82.
To create an IP address assignment rule using option 82 in the GUI:
1. Go to Network > Interfaces.
2.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
434 | Network
8. Click OK.
To create an IP address assignment rule using option 82 with the CLI:
config system dhcp server
edit 1
set netmask 255.255.255.0
set interface "port4"
config ip-range
edit 1
set start-ip 192.168.2.100
set end-ip 192.168.2.254
next
end
config reserved-address
edit 1
set type option82
set ip 192.168.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
435 | Network
To configure an interface as a DHCP client in the GUI:
1. Go to Network > Interfaces.
2. Edit an interface.
3. Select the DHCP option in the Addressing mode.
4. Configure the rest of the setting as required.
5. Click OK.
The following table describes the DHCP status information when DHCP is configured for an in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
436 | Network
To configure an interface as a DHCP client in the CLI:
config system interface
edit <name>
set mode dhcp
set defaultgw {enable | disable}
set distance <integer>
set dns-server-override {enable | disable}
next
end
Configuring the DHCP renew time
You can set a minimum DHCP renew time for an interface acting as a ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
437 | Network
next
end
Variable Description
code <integer> DHCP client option code (0 - 255, default = 0).
See Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol
(BOOTP) Parameters for a list of possible options.
type {hex | string | ip |
fqdn}
DHCP client option type (default = hex).
value <string> DHCP clien... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
438 | Network
To configure VCI pattern matching on FortiGate A:
config system dhcp server
edit 1
set dns-service default
set default-gateway 10.2.2.131
set netmask 255.255.255.0
set interface "port3"
config ip-range
edit 1
set start-ip 10.2.2.132
set end-ip 10.2.2.132
next
edit 2
set start-ip 10.2.2.133
set end-ip 10.2.2.133... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
439 | Network
exhausted. This way, the FortiGate can allocate IP addresses more efficiently and avoid wasting unused addresses in
each subnet.
config system dhcp server
edit <id>
set shared-subnet {enable | disable}
set relay-agent <ip_address>
next
end
Example
In this example, there are two DHCP servers configured on the Fo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
440 | Network
edit 1
set start-ip 10.18.1.200
set end-ip 10.18.1.201
next
end
set shared-subnet enable
set relay-agent 10.18.0.10
set dns-server1 8.8.8.8
next
end
2. Verify the DHCP lease list:
# execute dhcp lease-list
port6
IP MAC-Address Hostname VCI SSID AP SERVER-ID Expiry
10.18.0.110 00:50:56:02:92:11 1 Fri Jan 13
15:3... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
441 | Network
Example
In this example, two DHCP relay servers are configured on port2, with DHCP relay IP addresses 10.1.1.1 and 10.2.2.1.
To configure the DHCP relay servers:
config system interface
edit "port2"
set dhcp-relay-service enable
set dhcp-relay-ip 10.1.1.1 10.2.2.1
next
end
To check the debug messages to verify ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
442 | Network
got a DHCPDISCOVER
forwarding dhcp request from 10.10.10.12:67
to 10.1.1.1:67
forwarding dhcp request from 10.10.10.12:67
to 10.2.2.1:67
FortiGate received a DHCPDISCOVER message from
the DHCP client and forwarded it to both DHCP servers.
got a DHCPOFFER
from server 10.1.1.1
FortiGate received a DHCPOFFER messa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
443 | Network
To configure DHCP smart relay on interfaces with a secondary IP:
1. Configure DHCP relay on the interfaces:
config system interface
edit "port3"
set vdom "vdom1"
set ip 10.2.2.2 255.255.255.0
set allowaccess ping https ssh snmp http telnet
set type physical
set snmp-index 5
next
edit "port5"
set vdom "vdom1"
se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
444 | Network
(xid:7ea80e4b) got a DHCPOFFER
(xid:7ea80e4b) from server 10.2.2.1
(xid:7ea80e4b) sending dhcp reply from 11.2.2.1:67 to 255.255.255.255:68
(xid:7ea80e4b) received request message from 0.0.0.0:68 to 255.255.255.255 at port5
(xid:7ea80e4b) got a DHCPREQUEST
Insert option(82), len(7)
found route to 10.2.2.1 via 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
445 | Network
l Basic site-to-site VPN with digital certificate on page 2254
l Site-to-site VPN with overlapping subnets on page 2265
l Tunneled Internet browsing on page 2357
l Multiple concurrent SDN connectors on page 3769
l Packet distribution and redundancy for aggregate IPsec tunnels on page 2417
l Using BGP tags with ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
446 | Network
Destination l Subnet
Enter the destination IP address and netmask. A value of
0.0.0.0/0.0.0.0 creates a default route.
l Named Address
Select an address or address group object. Only addresses with static
route configuration enabled will appear on the list. This means a
geography type address cannot be used.
l ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
447 | Network
Routing table
A routing table consists of only the best routes learned from the different routing protocols. The most specific route
always takes precedence. If there is a tie, then the route with a lower administrative distance will be injected into the
routing table. If administrative distances are also equal... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
448 | Network
Field Description
l RIPNG: All routes learned through RIP version 6 (which enables the sharing of routes
through IPv6 networks)
l BGP: All routes learned through BGP
l OSPF: All routes learned through OSPF
l OSPF6: All routes learned through OSPF version 6 (which enables the sharing of routes
through IPv6 netwo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
449 | Network
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [1/0] via 172.31.0.1, MPLS [1/0]via 192.168.2.1, port1 [1/0] via
192.168.122.1, port2
S 1.2.3.4/32 [10/0] via 172.16.100.81, VLAN100
C 10.10.2.0/24 is directly connected, hub
C 10.10.2.1/32 is directly connected, hub
O 10.10.10.0/24 [110/101] via 192.16... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
450 | Network
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
> - selected route, * - FIB route, p - stale info
Routing table for VRF=0
S *> 0.0.0.0/0 [1/0] via 172.31.0.1, MPLS
*> [1/0... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
451 | Network
Value Description
vf Virtual domain of the firewall: It is the VDOM index number. If
VDOMs are not enabled, this number is 0.
type Type of routing connection. Valid values include:
l 0 - unspecific
l 1 - unicast
l 2 - local
l 3 - broadcast
l 4 - anycast
l 5 - multicast
l 6 - blackhole
l 7 - unreachable
l 8 - pr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
452 | Network
3. If no match occurs, the packet is dropped.
Searching the routing table
When there are many routes in your routing table, you can perform a quick search by using the search bar to specify your
criteria, or apply filters on the column header to display only certain routes. For example, if you want to only disp... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
453 | Network
To create a blackhole route in the GUI:
1. Go to Network > Static Routes.
2. Click Create New. The New Static Route screen appears.
3. Specify a Destination type.
4. Select Blackhole from the Interface field.
5. Type the desired Administrative Distance.
6. Click OK.
Route priority for a Blackhole route can only... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
454 | Network
Traffic from PC1 to PC2 goes through the FortiGate, while traffic from PC2 to PC1 does not.
In TCP, if the packets in the request and response directions follow different paths, the FortiGate will block the packets,
since the TCP three-way handshake is not established through the FortiGate.
Scenario 1: PC1 star... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.