Module 1 - Introduction To FortiGate and The Security Fabric
Module 1 - Introduction To FortiGate and The Security Fabric
Lesson Overview
High-Level Features
Objectives
• Identify platform design features of FortiGate
• Identify features of FortiGate in virtualized networks and the cloud
F-.:RYIMEY
The Modern Context of Network Security
• Firewalls are more than gatekeepers on the network perimeter.
• Today’s firewalls are designed in response to multi-faceted and multi-device
environments with no identifiable perimeter:
Mobile workforce
Panners accessing your network services
Public and private
clouds Internet of things
(IoT)
Bring your own device (BYOD)
• Firewalls are expected to perform diXerent functions within a network.
Different deployment modes:
• Distributed enterprise firewall
• Next-generation firewall
• Internal segmentation firewall
• Data center firewall
DNS. DHCP, web filter. intrusion prevention system (IPS), and so on
Platfr›rm Design
Topology in the Cloud
• Deploy FortiGao in FortîGaØ VM Specificaûons
virtualized networks
FortiGate VM — Same
fe&ures as physical
2. What solution, specific to Fortinet, enhances performance and reduces latency for
specific features and traRic?
A Specialized circuits called ASICs
B. Increased RAM and CPU power
Setu Decisions
Objectives
• Identify the factory defaults
• Select an operation mode
• Understand FortiGate’s relationship with FortiGuard and distinguish between
live queries and package updates
Modes of Operation
NAT Transparent
c CLI Consde widget and teftninal emuŒor, such as PuWY or Tern Tetm
FočiGuard Subscription Services
• Internet connection and contract required
• Provided by FoliGuard Distńbution Network (FDN)
Major da@ œnters in Nońh Ameñca, Asia, and Europe
• Or, Ëom FDN Ğrough your FoõManager
. FoliGate prefers data center in nearest šme zone,
but will adjust by seœer load
› Package updates: FoliGuard Antivirus and IPS
uØ[email protected]
o TCP po¥ 443 (SSL)
• Live queńes: FoliGuard Web Filteñng, DNS Fißeûng, and Antispam
sewiœ.fortiguard.net
Proprieary protocol on UDP poń 53 or 8888
Kno wledge Check
1. Which protocol does FoliGate use to download antivirus and IPS packages?
A UDP
B TCP
CLI
Console SSH Telnet. GUI Wõget
User Name
CA SMS
Two-factor Authentication
vi::-onnex
Administrator Prafiles: Permissians
System > Admin Profiles
Administrator Profiles: Hierarchy
n
Full global access Par'. a g oLa access I r. ar-?>ss n .'irk> «-en.tit
custom
Two-Fact«r Authentication
F•:.RFI€ET
Administrative Access: Trusted Sources
Trusted Host 1 10 0 1. 0 32
Tr us ted Host 2
Trusted Host 3
HTTPS) is recommended.
• Default Idle timeout is 5
minutes.
22
Administrative Access: Protü›cols
Network » Inte6aces
• Enable acceptable management
protocols on each interface
independently:
Separate IPv4 and IPv6
IPv6 options hidden by default
• Also protocols where FoliGate is the
destination IP:
Fo¥iTelemetry
CAPWAP
FMG-Access
FTM
RADIUS Accounting
F(:ïRFtF]ET
• Exceptions.Dedicated to FortiSwitch
and the One-Arm Snifier
F-:.RFlf]EY
000.00OOO
be added dynamically.
Ad n » e D ‹ «• e io
0 Disabl ed
Advanced Optiot›s
Link Aggregation
• Bundles several physical
po6s to form a single point-
to-point logical channel with
greater bandwidth.
« Increases redundancy for higher
avaiIabiI"ity
KOYAsMwiCo*n:X
Knowledge Check
1. How do you restrict logins to FortiGate to be only from specific IP addresses?
A Disable HTTPS access on
interface B Configure trusted host
M TELtKT
DHCP Sewer: IP Reservation
• Reservations reassign the IP address Network » Interfaces
to the same host. MACRese‹vatiu- + Access Cotitrul
To reserve, select IP address or choose + create New Edit
¿ a‹c «o= nH«P r.iie•t I ist
RXisting DNC P lease. MDC Address Actian or
1I* Description
Cancel
Configuration File
Format Build
number
Model Plain text
c ig ers on h i d0076 *global vdon-j
180329:opmode=0:vdom=0:user=admin
Encrypted
# GBK 3 16 6 00 076
ARer the header the encrypted file is not readable.
Mcidel
• Restoring configuration
Encrypted? Same device/mDdRI + build + password requirRd. Firmware major version
Unencrypted? Same model required.
Upgrade Firmware
• The current firmware version can
be viewed on the Dashboard or in
System > Firmware (or on the
CLI:
• If there is an updated
firmware version, you will be F•:.RFI€ET
notified
• Firmware can be updated by clicking
Upload Firmware or selecting the
upgrade option in the notification icon
drop-down list.
• Make sure you read the Re/ease
Notes to verify the upgrade path and
other details.
FGVMO 1ZOO IO 7 t t ó
19U8
Upgrade Firmware Process
1 Back up the configuration (full confiq backup on GUI or CLI).
2. Download a copy of the current fimware, in case reversion is needed.
3. Have physical access, or a teminal sewer connected to local console, in
case reversion is needed.
4. Read the Re/ease Nates, they include the upgrade path and other useful
infomation. I •-•••••w•»a
5. Perfom the upgrade.
Fort dFirmware
Downgrade Firmwar e Process
1 Get the pre-upgrade configuration file.
2 Download a copy of the current firmware, in case reversion is needed.
3, Have physical access, or a terminal server connected to the local
console, in case reversion is needed.
4. Read the Release Notes, (Does downgrade preserve configuration?)
5. Downgrade the firmware.
6. If required, upload the configuration that matches the firmware version.
Knowledge Check
1. When restoring an encrypted system configuration file, in addition to needing the
FortiGate model and firmware version from the time the configuration file was
produced you also must provide:
1
2. Which document should you consult to increase the chances of success before
upgrading or downgrading firmware?
A. System Administration guide
<"8 Re/ease #ofes
F-:.RFtMET
Lesson Progress
FortiGate Within the Security Fabric
Objectives
• Define the Fortinet Security Fabric
• Identify why the Security Fabric is required
• Identify the Fortinet devices that participate in the Security Fabric, especially the
essential ones
• Understand how to configure the Security Fabric at a high level
What is the Fo1inet Security
Fabric?
FABRIC
Broad
Powerful
AutDmated
SDN
CIOMCI
Why a Security
Fabric?
• Many administrators lack visibility of The fa¢t that this company has deployed
• FortiMail integration
NO1FICA1ONS
• Output notifications in
various ways such
as iOS Push or on the
GUI dashboard.
• lntegrate with IFTTT
and other cloud
services
Fabric Connectars
• Security fabric multi-cloud suppol adds security fabric connectors to the security
fabric configuration.
Allow you to integrate
• Application Centric Infrastructure Secuńty Fabric» Fabric Connectom
{ACI)
• Amazon Web Services (AWS)
• MicrosoR Azure
• VMware NSX
• Nuage Virtualized Services Platform
e‹.›Rrinev
How Do You Impiement the Security Fabric?
FortiAnalyzer
Accoun6ng wciorins«
netwo& Sa ne
Accou
10 39.0/24
nting
ISFW
Market
ing
Maaeang netwoa ISFW
1 "‹
External
Port 11 PoN 12
Sales ISFW
How Do You Implement the Security Fabric? (Cont’d)
Root Foi1iGøte Bmnch FortiGøte LgætæemFoitlGata IP
SecuńÇ Fabric > Security Fabf4c »
4etlîngø
Settings
FortłGate Telemetry
Group name
Cc›rporate
Fax tiGate Telemetr v
Corporate
Q•rDupp8ss; rd Connect to upstream Fo+”wate
Conr›e‹t o ps‹ream ro«iEa‹e ”X FortiGa e IP
192.îó8.I.1
Forti Ï•.łeme£ry •nabIed interfac.•sfi. portl0
FortiAnafyzer Logg ng
tò8.4S.10 FortîAnalyzer Logging
F-.:RT)NEY