Do Not Reprint © Fortinet: Fortimanager Lab Guide
Do Not Reprint © Fortinet: Fortimanager Lab Guide
Do Not Reprint © Fortinet: Fortimanager Lab Guide
© FORTINET
Fortinet Document Library
http://docs.fortinet.com
Fortinet Knowledge Base
http://kb.fortinet.com
Fortinet Forums
https://forum.fortinet.com
Fortinet Support
https://support.fortinet.com
FortiGuard Labs
http://www.fortiguard.com
Feedback
Email: [email protected]
10/5/2018
DO NOT REPRINT
© FORTINET
TABLE OF CONTENTS
© FORTINET
Virtual Lab Basics
In this course, you will use a virtual lab for hands-on exercises. This section explains how to connect to the lab
and its virtual machines. It also shows the topology of the virtual machines in the lab.
If your trainer asks you to use a different lab, such as devices physically located in your
classroom, then ignore this section. This section applies only to the virtual lab
accessed through the Internet. If you do not know which lab to use, please ask your
trainer.
Network Topology
Lab Environment
Fortinet's virtual lab for hands-on exercises is hosted on remote data centers that allow each student to have their
own training lab environment or point of deliveries (PoD).
© FORTINET
Remote Access Test
Before starting any course, check if your computer can connect to the remote data center successfully. The
remote access test fully verifies if your network connection and your web browser can support a reliable
connection to the virtual lab.
You do not have to be logged in to the lab portal in order to run the remote access test.
If your computer connects successfully to the virtual lab, you will see the message All tests passed!:
© FORTINET
Logging In
After you run the remote access test to confirm that your system can run the labs successfully, you can proceed to
log in.
You will receive an email from your trainer with an invitation to auto-enroll in the class. The email will contain a
link and a passphrase.
© FORTINET
Your system dashboard appears, listing the virtual machines (VMs) in your lab topology.
l From the box of the VM you want to open, click View VM.
When you open a VM, your browser uses HTML5 to connect to it. Depending on the VM you select, the web
browser provides access to either the GUI of a Windows or Linux VM, or the CLI-based console access of a
Fortinet VM.
© FORTINET
For most lab exercises, you will connect to a jumpbox VM, that could be either a Windows or a Linux VM.
From the jumpbox VM, you will connect over HTTPS and SSH to all other Fortinet VMs in the lab
environment.
If your computer’s connection to the VM times out or closes, to regain access, return to the window or tab that
contains the list of VMs for your session, and reopen the VM.
Screen Resolution
To configure screen resolution in the HTML5 client, use the Resolution drop-down list on the left. You can also
change the color depth:
© FORTINET
You can use the Virtual Keyboard panel to either send the Ctrl-Alt-Del combination, or the Windows key:
From the Virtual Keyboard panel, you can also copy text to the guest VM's clipboard:
© FORTINET
Student Tools
There are three icons on the left for messaging the instructor, chatting with the class, and requesting assistance:
Troubleshooting Tips
l Do not connect to the virtual lab environment through Wi-Fi, 3G, VPN tunnels, or other low-bandwidth or high-
latency connections.
l Prepare your computer's settings by disabling screen savers and changing the power saving scheme so that your
computer is always on, and does not go to sleep or hibernate.
l For best performance, use a stable broadband connection, such as a LAN.
© FORTINET
l You can run a remote access test from within your lab dashboard. It will measure your bandwidth, latency and
general performance:
l If the connection to any VM or the virtual lab portal closes unexpectedly, try to reconnect. If you can't reconnect,
notify the instructor.
l If you can't connect to a VM, on the dashboard, open the VM action menu, and select Reset:
l If that does not solve the access problem, you can try to revert the VM back to its initial state. Open the VM action
menu, and select Revert:
Reverting to the VM's initial state will undo all of your work. Try other solutions first.
© FORTINET
l During the labs, if the VM is waiting for a response from the authentication server, a license message similar to the
following example appears:
In this lab, you will examine the network settings on the FortiManager the CLI and GUI.
You will also enable the FortiAnalyzer feature set on FortiManager, which can be used for logging and reporting.
Objectives
l Examine initial system settings, including network and time settings
l Enable FortiAnalyzer features on FortiManager
Time to Complete
Estimated: 20 minutes
Prerequisites
Before beginning this lab, you must restore a configuration file to Local-FortiGate and Remote-FortiGate.
© FORTINET
To restore the Local-FortiGate configuration file
1. On the Local-Windows VM, open a browser and log in to the Local-FortiGate GUI at 10.0.1.254 with the
username admin and password password.
2. In the upper-right corner of the screen, click admin, and then click Configuration > Restore.
In this exercise, you will explore the FortiManager basic configuration settings on the GUI and CLI.
You will start by accessing FortiManager using the CLI to examine the initial configuration.
4. Enter the following command to display information about the FortiManager interface configuration:
© FORTINET
CLI Command Diagnostic Result
# show system What are the primary and secondary DNS settings?
dns
By default, FortiManager uses FortiGuard DNS
servers.
© FORTINET
CLI Command Diagnostic Result
7. Enter the following command to display information about the FortiManager routing configuration:
8. To test basic network connectivity, and to ensure the default route to the Internet is working, enter the following
command to ping IP 8.8.8.8 (public IP that is highly available):
execute ping 8.8.8.8
You will now log in to FortiManager using the GUI to examine the initial configuration.
© FORTINET
Accept the self-signed certificate or security exemption, if a security alert appears.
All the lab exercises were tested running Mozilla Firefox on the Local-Windows VM
and Remote-Windows VM. To get consistent results, we recommend using Firefox in
this virtual environment.
The dashboard shows the FortiManager widgets that display information such as System Information,
License Information, System Resources, and more.
3. Examine the System Information and License Information widgets to display the information shown below.
These widgets display the same information as the CLI command get system status:
l Firmware version
l Administrative domain status
l System time and time zone
l License status (VM)
4. Using the System Information widget, edit the System Time to view the NTP information.
This displays the same information as the CLI commands get system ntp and show system ntp.
© FORTINET
© FORTINET
The fgtupdates, fclupdates on the CLI is equivalent to FortiGate Updates on
the GUI. The webfilter-antispam on the CLI is equivalent to Web Filtering on
the GUI.
You can use FortiManager as a logging and reporting device by enabling FortiAnalyzer features on FortiManager.
Remember that FortiManager has logging rate restrictions compared to FortiAnalyzer.
In this exercise, you will enable FortiAnalyzer features on FortiManager so that you can use FortiManager for
logging and reporting after the FortiGate devices are added.
4. Click OK.
FortiManager will reboot to initialize the FortiAnalyzer features and apply the changes.
5. Wait for FortiManager to reboot and then log in to the FortiManager GUI at 10.0.1.241 with the username
admin and password password.
© FORTINET
You will notice that, after enabling FortiAnalyzer features, there are more panes related to logging and
reporting—FortiView, NOC-SOC , Log View, Event Manager, and Reports.
In this lab, you will configure administrative domains (ADOMs) and an administrator. You will also restrict
administrator access based on administrator profile, trusted hosts, and ADOMs.
Then, you will enable ADOM locking, which disables concurrent access to the same ADOM.
Additionally, the lab will guide you through how to properly back up and restore a FortiManager configuration,
view alert messages in the Alert Message Console, and view event logs.
Objectives
l Enable ADOMs and configure a new ADOM
l Configure an administrator and restrict access to a newly created ADOM
l Enable ADOM locking
l Back up FortiManager, restore the backup, and disable offline mode
l Read entries in the alert message console and view event logs
Time to Complete
Estimated: 45 minutes
ADOMs group devices for administrators to monitor and manage. The purpose of ADOMs is to divide the
administration of devices and control (restrict) access.
Enable ADOMs
ADOMs are not enabled by default and can be enabled only by the admin administrator, or an administrator with
the Super_User access profile.
To enable ADOMs
1. On the Local-Windows VM, open a browser and log in to the FortiManager GUI at 10.0.1.241 with the
username admin and password password.
2. Click System Settings.
3. In the System Information widget, turn on Administrative Domain.
4. Click OK.
You will be logged out of FortiManager.
© FORTINET
View ADOM Information
Before creating new ADOMs, you should be aware of what ADOM types are available to you. You will view ADOM
information using both the GUI and the CLI.
5. Remaining on the Local-Windows VM, open PuTTY and connect over SSH to the FORTIMANAGER saved
session.
6. At the login prompt, enter the username admin and password password.
7. Enter the following command to view what ADOMs are currently enabled on FortiManager and the type of device
you can register to each ADOM:
The CLI output formatting is easier to read if you maximize your PuTTY window. If
you've already executed the command, once the window is maximized, press the up
arrow to show the last command you entered and click Enter to run the command
again.
© FORTINET
As you can see, there are 14 ADOMs that FortiManager supports, each associated with different devices
along with their supported firmware versions.
Configure ADOMs
By default, when you enable ADOMs, FortiManager will create ADOMs based on supported device types. The
root ADOM is based on the FortiGate ADOM type.
When creating a new ADOM, you must match the device type. For example, if you want to create an ADOM for
FortiGate, you must select FortiGate as the ADOM type. With FortiGate ADOMs specifically, you must also
select the firmware version of the FortiGate device. Different firmware versions have different features, and
therefore different CLI syntax. Your ADOM setting must match the device’s firmware.
To configure ADOMs
1. Remaining logged in to the FortiManager GUI, click All ADOMs.
© FORTINET
Field Value
Name My_ADOM
5. Keep the default values for all other settings and click OK.
You should see a list of predefined ADOMs, including your new ADOM.
© FORTINET
You can switch between ADOMs on the GUI. You do not have to log out and log back
in. To switch between ADOMs on the GUI, click ADOM on the upper-right corner of
the GUI. Your administrator privileges determine which ADOMs you have access to.
In this lab, you will create an administrative user with restricted access permissions.
In an active deployment scenario, having more than one administrative user makes administering the network
easier, especially if users are delegated specific administrative roles, or confined to specific areas within the
network. In a multi-administrator environment, you should ensure that every administrator has only those
permissions necessary to do their particular job.
Field Value
© FORTINET
Field Value
FortiManager comes preinstalled with four default profiles that you can assign to
other administrative users. Alternatively, you can create your own custom profile.
7. Keep the default values for all other settings and click OK.
8. Click admin.
9. Click Log Out.
© FORTINET
Test Administrator Privileges
You will now log in to FortiManager with the newly created administrator (student) and test the administrator
privileges.
Above screen shot shows how you can control or restrict administrator access based on administrative
profiles and ADOMs.
You will now restrict access to FortiManager by configuring a trusted host for the administrator accounts. Only
administrators connecting from a trusted subnet will be able to access the FortiManager.
© FORTINET
5. Click Admin > Administrators.
6. Edit the student account.
In this procedure, you will confirm that administrators outside the subnet 10.0.1.0/24 cannot access
FortiManager.
© FORTINET
What is the result?
Because you are trying to connect from the 10.0.2.10 IP address, your login authentication will fail. This is
because you restricted logins to only the source IP addresses in the list of trusted hosts.
The IP address specified in the URL here is not the same as the one used previously,
because now FortiManager is being accessed from a device that is in a different part
of the network (see Network Topology on page 6). Now, you are connecting to the
port2 interface of the FortiManager device.
7. Next, return to the Remote-Windows VM and attempt to log in to the FortiManager GUI again using the username
student and password fortinet.
This time, you should gain access because you just turned off the requirement to log in from a trusted host.
By default, multiple administrators can log in to the same ADOM at the same time, which allows concurrent
access. This can cause conflicts, however, if two or more administrators try to make changes in the same ADOM
at same time.
Before enabling ADOM locking, ensure all FortiManager administrators are notified and asked to save their work
on FortiManager because enabling ADOM locking will terminate all management sessions.
Now, you will enable ADOM locking using the FortiManager CLI.
4. From the Local-Windows VM, open a browser and log in to the FortiManager GUI at 10.0.1.241 with the
username student and password fortinet.
5. At the top of the screen, click Lock.
You will notice the lock status changed from unlocked to a green locked state.
© FORTINET
11. Return to the Local-Windows VM and log out as student from FortiManager.
If an administrator has locked one or more ADOMs and then logged out of
FortiManager, all those ADOMs will be unlocked.
In this example, when the student administrator locked My_ADOM and then
logged out, FortiManager unlocked My_ADOM.
Always log out gracefully from FortiManager when ADOM locking is enabled.
If this situation arises and you cannot wait for the administrator session to time out,
then delete the session manually using the GUI or the CLI.
On the GUI, click the System Information widget, and then click Current
Administrators > Current Session List.
From CLI:
In an active deployment scenario, it is a best practice to back up the device configuration before making any
configuration changes. If the new configuration does not perform as expected, you can revert to the last sane
configuration. Likewise, during these labs, it is beneficial to have a backup of the initial configuration, should you
need to revert for any reason.
FortiManager configuration files are not stored in plain text like FortiGate
configuration files. They are stored as .dat files. You can uncompress and view them
offline using archive tools such as WinRar and tar.
To back up FortiManager
1. On the Local-Windows VM, open a browser and log in to the FortiManager GUI at 10.0.1.241 with the
username admin and password password.
2. Select root.
3. At the top of the screen, click Lock.
4. Click System Settings.
5. In the System Information widget, click System Configuration, and then click the backup icon.
© FORTINET
11. Remaining on the FortiManager GUI, click Admin > Administrators.
12. Right-click student and click Delete.
13. Click OK.
You can use the following options when restoring a FortiManager configuration:
l Overwrite current IP, routing, and HA settings: By default, this option is enabled. If FortiManager has an
existing configuration, restoring a backup will overwrite everything, including the current IP, routing, and HA
settings. If you disable this option, FortiManager will still restore the configurations related to device information
and global database information, but will preserve the basic HA and network settings.
l Restore in Offline Mode: By default, this option is enabled and grayed out–you cannot disable it. While restoring,
FortiManager temporarily disables the communication channel between FortiManager and all managed devices.
This is a safety measure in case any of the devices are being managed by another FortiManager. To re-enable the
communication, disable Offline Mode.
2. In the System Information widget, click System Configuration, and then click the restore icon.
© FORTINET
3. Click Browse.
4. Select your backup file lab2.dat.
There is no password to enter because the file was not encrypted.
6. Click OK.
FortiManager will reboot.
7. Wait for FortiManager to reboot, then log in to the FortiManager GUI at 10.0.1.241 with the username
admin and password password.
8. Select root.
9. Click Lock at the top of the screen.
10. Click System Settings.
11. Click Admin > Administrator.
The student administrator account will show there.
In this exercise, you will view the alerts in the alert console widget and view the event logs. You will also configure
filter options to locate specific logs.
First, you will disable offline mode, which is enabled by default when the FortiManager backup is restored.
Offline Mode
© FORTINET
7. Click Apply.
You will notice that the Offline Mode message disappears. At this point, FortiManager can establish a
management connection with the managed devices.
Now, you will view the alerts on the Alert Message Console and logs under Event Logs.
3. In the menu on the left side of the screen, click Event Log.
© FORTINET
Now you will see only the filtered system manager events.
© FORTINET
In this lab, you will explore the common operations performed using the device manager. You will use the Device
Manager pane to add FortiGate devices.
Objectives
l Create and apply system templates to your managed devices
l Review central management settings on FortiGate
l Add a device using the Add Device wizard
Time to Complete
Estimated: 30 minutes
You can configure the system templates on FortiManager in advance. You can use system templates to provision
common system-level settings on FortiGate devices when adding them to FortiManager, or to the already
managed FortiGate devices.
This is because when ADOM locking is enabled, you must lock the ADOM before making configuration
changes.
© FORTINET
Field Value
8. Click Apply.
9. Close all other widgets by clicking X and then the check mark symbol.
© FORTINET
When ADOM locking is enabled, you must save the changes in order for them to be
copied to the FortiManager database.
© FORTINET
Disable ADOM Locking (Workspace Mode)
Now, you will disable ADOM locking because, in this practical lab, every student has dedicated ADOMs to work
on.
Before disabling workspace mode, inform all the administrators logged into FortiManager to save their work.
This command logs out administrators from FortiManager, to save the changes.
There are multiple ways to add FortiGate devices to FortiManager. These include:
Before adding FortiGate to FortiManager, you will review the central management configuration on Local-
FortiGate.
The serial-number is the FortiManager serial number, which you cannot configure
on FortiGate. This setting is set by FortiManager, which is managing this device. In
this case, it is empty because you have not yet added the device to FortiManager.
© FORTINET
Enable Real-Time Debug
Now, you will enable real-time debug on FortiManager to view the real-time status when adding FortiGate to
FortiManager.
You should place this PuTTY session and the FortiManager GUI side-by-side so that you can view the real-
time debugs while adding FortiGate on the FortiManager GUI.
The output is verbose and you might have to scroll up or down to review the
information. Alternatively, you can save the log file on your desktop and open it using a
text editor, such as Notepad++.
Now, you will add Local-FortiGate to FortiManager in My_ADOM using the Add Device wizard, and you will
apply the System Template created earlier.
4. In the Add Device wizard, make sure the Discover radio button is selected and configure the following settings:
© FORTINET
Field Value
IP Address 10.200.1.1
Username admin
Password password
5. Click Next.
6. Review the discovered device information and compare it with the output from the FortiManager PuTTy session.
7. You should observe the following:
8. Press the up arrow on your keyboard and select the following commands to disable the debug. Alternatively, you
can enter these commands manually.
diagnose debug application depmanager 0
diagnose debug disable
diagnose debug reset
© FORTINET
© FORTINET
18. In the Use Value From column, keep the default setting of FortiGate.
The download import report is only available on this page. As a best practice, you
should download the report and review the important information, such as which
device is imported into which ADOM, as well as the name of the policy package
created along with objects imported.
FortiManager imports new objects, and updates existing objects based on the option
chosen on the conflict page. The duplicate objects are skipped because FortiManager
does not import duplicate entries into the ADOM database.
© FORTINET
24. Click Finish.
The Local-FortiGate device should be now listed in Device Manager.
25. On the Local-Windows VM, open PuTTY and connect over SSH to the Local-FortiGate saved session.
26. At the login prompt, enter the user name admin and password password.
27. Enter the following command:
get system central-management
Because you have imported policy and dependent objects for Local-FortiGate, you will view the policy package
created for Local-FortiGate.
© FORTINET
To view the Local-FortiGate policy package
1. Remaining on the FortiManager GUI, click Device Manager and select Policy & Objects.
You will notice that a policy package named Local-FortiGate_root was created when you imported firewall
policies from your Local-FortiGate.
3. Click Interface.
© FORTINET
4. Click the arrow beside any interface to view the ADOM Interface mapping to device-level mappings, which were
created when the device was added.
These interfaces are used in policy packages to map firewall policies to interfaces on the firewall.
Because Local-FortiGate is now added to FortiManager, you will import NTP server settings from Local-
FortiGate. These server settings can be used by multiple FortiGate devices using this system template.
3. Click default.
© FORTINET
© FORTINET
6. On the Import NTP Server window, select Local-FortiGate.
7. Click OK.
Now, you will add Remote-FortiGate to FortiManager in My_ADOM using the Add Device Wizard. You will
apply the System Template to Remote-FortiGate.
Also, you will import the policies and objects for Remote-FortiGate later in the training.
3. In the Add Device wizard, make sure the Discover radio button is selected, and configure the following settings:
Field Value
IP Address 10.200.3.1
Username admin
Password password
4. Click Next.
5. In the System Template drop-down list, select default.
© FORTINET
6. Click Next.
7. Click Import Later.
When Import Later is chosen in the Add Device wizard, or an unregistered device is added to
FortiManager, the policy package status will show Never Installed because there is still no policy package
created for the newly added FortiGate.
You will run the Import Policy wizard later in this training.
If you add an unregistered device, then you need to run the Import Policy wizard to import the device’s
firewall policy into a new policy package.
In this lab, you will explore the common operations performed using the device manager, such as configuring
device-level changes, checking managed device statuses, installing configuration changes, and keeping the
managed devices in sync with the device database on FortiManager.
Objectives
l Understand managed device statuses on FortiManager
l Use the status information in the Configuration and Installation Status widget
l Make and install configuration changes using Device Manager
l Make configuration changes locally on FortiGate and verify that they are retrieved automatically by FortiManager
l Identify entries in the Revision History and the management action that created the new revision
l Install a large number of managed device changes using scripts
Time to Complete
Estimated: 70 minutes
In this exercise, you will check and learn about the status of FortiGate devices on FortiManager. Depending upon
the configuration changes, a FortiGate device can have a different Sync Status and Device Settings Status.
l The Sync Status indicates whether the FortiGate configuration matches the latest revision history
l The Device Settings Status indicates whether the FortiGate configuration stored at device-level database
matches with latest running revision history
In the last exercise, you applied system templates to both FortiGate devices. The configuration running on
the FortiManager device-level database is different from the latest revision history. This changes the
Config Status to Modified. The provisioning template changes need to be installed on the FortiGate
devices to return the devices to the synchronized state.
© FORTINET
4. In the Configuration and Installation Status widget, check Device Settings Status; it should appear as
Modified.
© FORTINET
Stop and think!
If the Device Settings Status is Modified, why is the FortiGate Sync Status still showing as
Synchronized?
The Device Setting Status is the status between the device-level database configuration and the latest
revision history. Applying system templates changes the device-level database configuration, so it enters
the Modified state.
The Sync Status is the status between the latest revision history and the actual FortiGate configuration.
Because the latest revision history is same as the FortiGate configuration, the Sync Status is in the
Synchronized state.
5. On the Local-Windows VM, open PuTTY and connect over SSH to the FORTIMANAGER saved session.
6. At the login prompt, enter the username admin and password password.
7. Enter the following command to display the device statuses on the CLI.
diagnose dvm device list
© FORTINET
The output will show the serial number of the device, the connecting IP address of the device, the firmware
version, the name of the device on FortiManager, and the ADOM on which the device is added.
8. Examine the STATUS row of the diagnose dvm device list output for Local-FortiGate and Remote-
FortiGate.
Actions to
Data What that Means?
Take
© FORTINET
Actions to
Data What that Means?
Take
In the previous lab, you added FortiGate devices to FortiManager and applied system templates.
In this exercise, you will install system template changes to both FortiGate devices and then view those changes
locally, by logging in to each FortiGate.
Now, you will install the default system template changes to Local-FortiGate and Remote-FortiGate using the
Install Wizard.
4. In the Install Wizard, make sure Install Device Settings (only) is selected, and click Next.
5. On the Device Settings page, ensure both FortiGate devices are selected.
© FORTINET
6. Click Next.
7. Click Install Preview for the Local-FortiGate.
This will show you the changes that will be installed (applied) to the FortiGate device.
© FORTINET
This is the install log that shows exactly what is installed on the managed device.
Now, you will check the managed device status after the installation.
© FORTINET
3. Under Configuration and Installation Status, you should observe that the Device Settings status is in the
Unmodified state.
This means that FortiGate's device-level database configuration is the same as the latest revision history.
4. On the Local-Windows VM, open PuTTY and connect over SSH to the FORTIMANAGER saved session.
5. At the login prompt, enter the username admin and password password.
6. Enter the following command to display device statuses on the CLI.
diagnose dvm device list
You should observe the following in the output for Local-FortiGate and Remote-FortiGate.
The dev-db status is not modified which means that FortiGate's device-level database
configuration matches the latest running revision history. The dm: installed field means that the
installation was performed on FortiManager.
© FORTINET
You can use this command to view the connecting IP of managed devices, the link-level address assigned by
FortiManager, and the uptime of the FGFM tunnel between FortiGate and FortiManager.
Using FortiManager, you have installed the system templates configuration on both FortiGate devices.
Now, you will log in to the Local-FortiGate and Remote-FortiGate GUIs to view the configuration installed using
FortiManager.
When you connect locally to a device managed by FortiManager, you will be presented
with a warning message because the device is centrally managed. Only when it is
absolutely necessary should you use the read-write option locally on FortiGate. An
example might be that a FortiManager administrator is unavailable to make
configuration changes and installations to manage FortiGate devices.
© FORTINET
To view a pushed configuration on the Remote-FortiGate GUI
1. On the Local-Windows VM, open a new browser and log in to the Remote-FortiGate GUI at 10.200.3.1 with
the username admin and password password..
2. Click Login Read-Only.
3. Click Log & Report > Log Settings.
You will notice that the Remote Logging and Archiving settings are the same as the default system
template entries.
By default, configuration changes made directly on FortiGate are automatically updated (retrieved) by
FortiManager, which is reflected in the Revision History. If required, you can disable the automatic update
behavior on the FortiManager CLI under config system admin settings. This allows the FortiManager
administrator to accept or refuse the configuration changes.
In this lab, you will make configuration changes directly on the FortiGate devices, and verify that the configuration
changes are retrieved automatically by FortiManager.
You will also review the configuration revision histories of FortiGate devices, created by auto update and by other
actions.
When you connect locally to a device managed by FortiManager, you will be presented
with a warning message because the device is centrally managed. Only when it is
absolutely necessary should you use the read-write option locally on FortiGate. An
example might be that a FortiManager administrator is unavailable to make
configuration changes and installations to manage FortiGate devices.
3. Click Yes.
4. Click Log & Report > Log Settings.
5. Turn off the Enable Local Reports switch.
6. Click Apply.
7. Log out of FortiGate.
© FORTINET
Make Direct Changes on Remote-FortiGate
Now, you will make direct changes on Remote-FortiGate. You will repeat the same steps for Remote-FortiGate
as you did for Local-FortiGate.
As you make the configuration changes locally on both the FortiGate devices, you will now view the auto update
status on FortiManager, and view the configuration revision histories created by FortiManager.
© FORTINET
2. In the Configuration and Installation Status widget, click the Revision History icon.
You should observe three configurations, though you may have more if you have made further changes:
l Your first Installation status should display as Auto Updated, indicating that these changes were made
locally on FortiGate and were automatically updated in FortiManager.
l Your second Installation status should display as Installed, indicating that these changes were made by
FortiManager on the managed device.
l Your third Installation status should display as Retrieved, indicating that this configuration was taken from
the device’s running configuration, when it was added to FortiManager.
© FORTINET
When the installation is done usingFortiManager, the install log will show the name of the administrator who
made this change along with the commands sent by FortiManager. If an installation fails, the install log is useful
because it shows what commands were sent to, and accepted by, the managed device, as well as the commands
that were not accepted.
You should see the CLI commands sent by FortiManager (which are identical to the installation previewed
earlier) and the FortiGate response.
© FORTINET
2. Click Close.
View Auto Update, Revision History, and the Install Log for Remote-FortiGate
(Optional)
Optionally, you can also view changes made to Remote-FortiGate by following the steps from View Auto Update
and Revision History on page 74.
To view auto update, revision history, and the install log for Remote-FortiGate (Optional)
1. Remaining logged in to the FortiManager GUI, click Remote-FortiGate and follow the steps from View Auto
Update and Revision History on page 74.
For Remote-FortiGate, you will see the NTP settings pushed by FortiManager based on the imported NTP
settings in the default system template from Local-FortiGate.
© FORTINET
Log View
As FortiAnalyzer features are enabled on FortiManager, and both FortiGate devices are configured to send logs
to FortiManager, you will view the logs for the managed devices on the Log View pane.
You should see the traffic logs generated by the FortiGate device.
Task Manager
The task manager provides the status of the task you performed. You can use it for troubleshooting various types
of issues such as adding, importing, and installing changes from FortiManager.
© FORTINET
To check Task Manager entries
1. Log out of the FortiManager GUI and log back in to the FortiManager GUI with the username admin and
password password.
2. Click root.
3. Click System Settings.
4. On the menu on the left side of the screen, click Task Monitor.
© FORTINET
5. In the drop-down list for the Install Device entry, click the View Installation Log icon for Local-FortiGate or
Remote-FortiGate.
This will show the installation log that corresponds to the installation you performed earlier.
You can view and configure device-level settings of the managed FortiGate on the Device Manager pane. Most
of these settings have a one-to-one correlation with the device configuration that you would see if you logged in
locally on each FortiGate’s GUI or CLI.
Now, you will make configuration changes for the managed FortiGate on the Device Manager pane.
If you try to change the managed FortiGate interface used for communicating with FortiManager, it will warn you
that this may disrupt the communication between FortiManager and FortiGate. If there is a communication
disruption between FortiManager and FortiGate during an installation, FortiManager will attempt to recover the
connection, but this will revert the installation changes.
Now, you will change the Remote-FortiGate port4 interface Administrative Access setting that is used by
Remote-FortiGate to communicate with FortiManager.
© FORTINET
4. Click System : Dashboard and then click Interface.
The Modified status means that the device-level database change has been made to Remote-FortiGate.
You changed the interface configuration.
The status recent auto-updated in parentheses means that the previous configuration changes were
locally made on FortiGate and were auto updated on FortiManager. You made changes to logging settings
locally in the previous lab.
FortiManager allows you to filter devices based on their current status. This is very helpful when you are
managing a large number of devices in the same ADOM. Based on the status, the FortiManager administrator
can take appropriate action.
© FORTINET
You can filter device statuses based on:
l Connection
l Device config (device database status)
l Policy package (ADOM database status)
You will now filter devices based on their device config and policy package status.
Now, you will create a new administrator account for Local-FortiGate on FortiManager.
© FORTINET
To configure the administrator account
1. Remaining on the FortiManager GUI, click Local-FortiGate.
3. Click Customize
4. In the System category, click Administrators.
© FORTINET
5. Click OK.
6. Click System : Dashboard and then click Administrators.
Field Value
Administrator training
Password fortinet
© FORTINET
9. Keep the default values for all other settings and click OK.
10. Click Managed FortiGates.
You will notice that Config Status has changed to Modified for Local-FortiGate.
This is because you made a device-level configuration change for Local-FortiGate by configuring the
administrator account.
You have made configuration changes to the managed device(s) using FortiManager.
First, you will preview the installation changes on the Configuration and Installation Status widget.
© FORTINET
This shows the device-level configuration changes that will be installed on the managed device when
FortiManager performs the device-level install.
The installation preview in the Configuration and Installation Status widget shows
only the preview for the device-level changes, not the changes related to policies and
objects.
5. Click OK.
Optionally, you can follow this same procedure to view the installation preview for Local-FortiGate.
Install Wizard
You will install these changes on the managed devices using the Install wizard.
© FORTINET
2. Select Install Device Settings (only).
3. Click Next.
4. On the Device Settings page, ensure both FortiGate devices are selected.
5. Click Next.
6. Click Install Preview for Local-FortiGate.
This will show you the changes that will be installed (applied) to FortiGate.
© FORTINET
9. Click Install.
10. Once the install has completed successfully, click the View Log icon.
This is the install log that shows exactly what is installed on the managed device.
© FORTINET
Revision Diff
After every retrieve, auto update, and install operation, FortiManager stores the FortiGate’s configuration
checksum output with the revision history. This is how the out-of-sync condition is calculated.
The Revision Diff is a useful feature that can be used to compare the differences between previous revisions, a
specific revision, or the factory default configuration. In terms of the output, you can choose to show full
configuration with differences, only the differences, or you can capture the differences to a script.
Now, you will compare the differences between the latest revision and the previous revision.
3. In the Configuration and Installation Status widget, click the Revision History icon.
© FORTINET
6. Click Apply.
© FORTINET
This shows the difference in configuration between the previous version and the current running version.
7. Click Close.
8. Click ID 4 again and click Revision Diff.
9. Select Capture Diff to a Script.
© FORTINET
This will show you the exact CLI syntax of the changes. You can use this script to configure other FortiGate
devices if they require the same settings using the script feature on FortiManager.
This is to demonstrate capturing differences in the form of scripts. Make sure the
script captured is valid for other FortiGate devices, before using them for other
FortiGate devices. If required, you can edit the script before applying it to other
FortiGate devices.
For example, if you have configured a static route along with the administrator
setting, the static route settings might be not valid for other FortiGate devices.
A script can make many changes to a managed device and is useful for bulk configuration changes and
consistency across multiple managed devices. You can configure and install scripts from FortiManager to
managed devices.
In this exercise, you will make many configuration changes by using the script feature, and install them on the
managed devices.
Configure Scripts
To configure scripts
1. On the Local-Windows VM, open a browser and log in to the FortiManager GUI at 10.0.1.241 with the
username student and password fortinet.
2. Click Device Manager.
3. Click Scripts.
© FORTINET
6. Click Desktop > Resources > FortiManager > Device-Config and select Local-Script.
7. Click Open, keep the default values for all other settings, and click Import.
8. Click Close.
9. Click Import CLI Script again.
© FORTINET
Run and Install Scripts
As the scripts are targeting the device database, you will first run the scripts against the device database and then
install these scripts on the managed devices.
To run scripts
1. Remaining logged in to the FortiManager GUI, select the Local-Script and click Run Script.
© FORTINET
If needed, you can also view the script execution history later in the Configuration
and Installation Status widget or on the Task Monitor.
4. Click Close.
5. Click Close.
6. Clear the Local-Script check box, select the Remote-Script check box, and then click Run Script.
7. Select Remote-FortiGate and click Run Now at the bottom of the page.
8. Click Close.
To install scripts
1. Remaining logged in to the FortiManager GUI, click Device & Groups.
Why is the Policy Package Status for Local-FortiGate showing Out of Sync, but the Policy Package
Status for Remote-FortiGate remains unchanged as Never Installed?
The scripts contain configuration changes related to device-level settings and policies.
The Config Status is Modified for both FortiGate devices because of device-level changes.
Because the Local-FortiGate policy package was imported when you added FortiGate, FortiManager
detects policy-level changes and marks the Local-FortiGate Policy Package Status as Out of Sync.
For Remote-FortiGate, the policy package was never imported; hence FortiManager cannot compare the
differences in the policies.
2. Select Local-FortiGate and Remote-FortiGate and click Install, and then click Install Config.
© FORTINET
3. Click OK.
The installation will be successful on both FortiGate devices.
The Install Config option does not provide an option for install preview and install
log. You should use it only if you are absolutely sure about the changes you are trying
to install.
If needed, you can view the installation history later in the Configuration and
Installation Status widget or on the Task Monitor.
4. Click Finish.
In this lab, you will explore the common operations of the Policy & Objects pane in order to centrally manage
FortiGate firewall policies, and to manage shared and dynamic objects.
Objectives
l Import firewall polices and objects from a managed device and review the imported policy packages
l Create ADOM revisions
l Use workflow mode to configure and send changes for approval
l Find duplicate objects and merge them, and delete used objects
l Create a policy package shared across multiple devices
l Create shared objects and dynamic objects with mapping rules
l Identify the different policy and object interface mapping types and configure zone mappings
l Install a policy package and device settings on the Policy & Objects pane
Time to Complete
Estimated: 60 minutes
In the previous lab, you installed scripts that contain device-level and policy configuration changes. Because you
ran the scripts on a device database that created the revision history containing these changes, the policy
packages are not automatically updated, so you must import them manually.
In this exercise, you will import the policies using the Import Policy wizard in order to reflect and update the
policy packages.
Additionally you will create an ADOM revision, which is a snapshot of all the policy and objects configurations for
an ADOM.
Import Policy
Now, you will import policies and objects for both managed FortiGate devices.
To import policies
1. On the Local-Windows VM, open a browser and log in to the FortiManager GUI at 10.0.1.241 with the
username student and password fortinet.
2. Click Device Manager.
3. Right-click Local-FortiGate and click Import Policy.
© FORTINET
6. Click Next.
7. Click Next on the conflict page.
Review the objects to be imported.
8. Click Next.
9. Click Download Import Report.
10. Select Open with and click OK to review the download import report.
11. Review the download import report and close the notepad.
12. Click Finish.
Download Import Report is available only on this page; make sure to download the
import report before clicking finish.
17. Compare the policies in the Local-FortiGate_root and Local-FortiGate-1 policy packages by clicking IPv4
Policy on each policy package.
Policy package: Local-FortiGate_root:
© FORTINET
An ADOM revision creates a snapshot of the policy and objects configuration for the ADOM. Now that you have
imported policies and objects from both FortiGate devices, you will create ADOM revisions that are stored locally
on the FortiManager and are useful for comparing the differences between two revisions, or reverting to a
previous revision.
4. Click OK.
© FORTINET
You will notice the lock icon, name of the administrator who created it, and the date and time.
5. Click Close.
Workflow mode is used to control the creation, configuration, and installation of policies and objects. It helps to
ensure that all changes are reviewed and approved before they are applied.
Workflow mode is similar to ADOM locking (workspace mode), but it also allows the administrators to submit their
configuration changes for approval. The configuration changes are not committed to the FortiManager database
until the approval administrator approves those configuration changes. Once approved, then only these
configuration changes can be installed on the managed device.
In this exercise, you will enable workflow mode and then make configuration changes related to policies and
objects. You will send it for approval and, once approved, you will install these changes.
Before enabling workflow mode, ensure all FortiManager administrators are notified
to save their work on FortiManager.
This is because enabling workflow mode will terminate all management sessions.
© FORTINET
3. Click Policy & Objects.
4. Click Sessions > Session List.
10. Click Firewall Address and Merge for the LOCAL_SUBNET firewall address.
© FORTINET
You will notice that both LAN and LOCAL_SUBNET firewall addresses are showing as duplicate objects
because both have the same values. It will also show you other objects that have the same values.
By merging the duplicate objects, you can reduce the object database, which
sometimes can overwhelm the FortiManager administrator with a large number of
objects from different FortiGate devices in the same ADOM. You can also delete the
unused objects in the same Tools menu, if they will be not used in the future.
© FORTINET
It is referenced in the Local-FortiGate-1 policy package in the firewall policy 1 as destination address.
FortiManager allows you to delete a used object. Be careful before deleting a used
object as it will be replaced by the none address 0.0.0.0/255.255.255.225.
This means any traffic meeting that specific firewall policy will be blocked if there is
no catch all or shadowed policy below it. In this case, the destination address of
firewall policy 1 in the Local-FortiGate-1 policy package is replaced by none after
the LINUX address object is deleted.
© FORTINET
Your changes are still not saved in the FortiManager database because they must be
approved by the approval administrator.
© FORTINET
The session list will show you the name of the request made, user, date, and
approval status.
The approval administrator can approve, reject, discard, or view the differences
between two revisions. The approval administrator can also create a session that can
be sent to a different approval administrator, or can self-approve based on the
workflow approval matrix.
7. Click OK.
8. Click Continue Without Session.
9. Click Unlock.
If an administrator has locked ADOMs and logs out of FortiManager, the lock releases
and unlocks all locked ADOMs locked by that administrator.
© FORTINET
Caution: Always log out of FortiManager gracefully, when ADOM locking (workspace
or workflow) is enabled.
The session will have to be deleted manually on the GUI or the CLI.
In the GUI: System Settings > System Information widget > Current
Administrators > Admin Session List.
In the CLI:
5. On the Local-Windows VM, open a command prompt in Windows and run a continuous ping to the LINUX
address object.
ping 10.200.1.254 -t
You will notice the request timed out because the firewall policy has the destination as LINUX and the action
as DENY locally on Local-FortiGate.
© FORTINET
6. Return to the FortiManager GUI and click Install > Install Wizard.
FortiManager will also delete any other unused objects. This is normal because when you install a policy
package for the first time FortiManager will delete all unused objects.
© FORTINET
All administrators will be logged out of the FortiManager GUI to save the changes. So, before you disable
workspace mode, inform all the administrators logged into FortiManager to save their work.
You will create a single policy package that can be shared by multiple devices, as opposed to having a policy
package for each device, which is the current configuration. You will use the installation target setting in a firewall
policy to target specific policies to specific FortiGate devices.
First, you will configure dynamic mappings for objects that are used to map a single logical object to a unique
definition for each device.
Field Value
Type Subnet
IP/Netmask 10.0.0.0/8
© FORTINET
© FORTINET
g. Select Remote-FortiGate for the Mapped Device.
h. Type 10.0.2.0/24 for IP/NetMask.
i. Click OK.
8. Click OK.
© FORTINET
Dynamic Mappings-Interfaces and Zones
Now, you will create dynamic mappings for interfaces and zones.
© FORTINET
You will get the following warning message “The old mapping will be deleted, are you
sure you want to continue?”. This is because interfaces were dynamically mapped
when the devices were added to FortiManager. Now, FortiManager will delete the old
mapping and add these interfaces to map to this newly created interface.
6. Click OK.
7. Remaining on the FortiManager GUI, click Create New > Zone.
© FORTINET
© FORTINET
k. Click OK in the warning message.
Your configuration should look like the following example:
© FORTINET
Create a Common Policy Package, Installation Target, and Install On
You can use FortiManager to target a common policy package to multiple devices.
So far, you have created the dynamic mapping for objects and interfaces, now you will create a common policy
package to target the Local-FortiGate and Remote-FortiGate.
A policy package can be targeted to multiple devices. When you configure an installation target, by default, all
policies in the policy package are targeted to all selected FortiGate devices. You can further restrict the policies in
the policy package to be targeted to specific FortiGate devices by using the Install On feature, which targets
specific policies in the policy package to specific selected FortiGate devices in the Install On column.
© FORTINET
To configure an installation target and install on
1. Remaining logged in to the FortiManager GUI, click Installation Targets for the Training policy package.
2. Click Add.
© FORTINET
6. Configure the following settings:
Field Value
Name For_Local
Schedule always
Action Accept
7. Click OK.
8. Click Create New to create a second policy and configure the following settings:
If you do not see all the interfaces when creating the second policy, make sure to
clear the interface filter when selecting interfaces!
Field Value
Name For_All
© FORTINET
Field Value
Schedule always
Action Accept
9. Click OK.
Your configuration should look like the following example:
Once added, you can drag the Install On column to where you want it positioned in the column list.
© FORTINET
11. For the For_Local policy, click Installation Targets.
12. Select Local-FortiGate.
13. Click OK.
14. Once you have added installation targets, reload the page. Press Ctrl + R on your keyboard to reload the current
page. If you do not reload the page, your installation targets will not appear in next Install Wizard step.
© FORTINET
4. Click Next.
5. Make sure both FortiGate devices are selected and click Next.
If you do not see the devices, reload your page as instructed in step 14.
Optionally, you can preview the changes before the installation attempt.
7. Make sure both FortiGate devices are selected and click Install.
8. Once the installation is successful, you can click View Log to see the installation history for each FortiGate.
© FORTINET
l There are two firewall policies based on the Training policy package.
l The Inside interface is translated to port3 locally on FortiGate and the Outside zone is created locally on
FortiGate, according to the dynamic mapping of interfaces and zones.
4. Click Addresses.
Internal is translated to 10.0.1.0/24 as according to the dynamic mapping of address objects.
5. Click Network > Interfaces.
An Outside zone is created with interfaces port1and port2, according to the interfaces and zones dynamic
mappings.
© FORTINET
This is because of the identity policy on Local-FortiGate. You will need to authenticate all outgoing http and
https traffic on Local-FortiGate.
8. When prompted for firewall authentication, enter the username student and the password fortinet.
9. Once authenticated, log in toRemote-FortiGate with the user name admin and password password.
10. Click Login read-only.
11. Click Policy & Objects > IPv4 Policy.
12. You should observe the following:
l There is only one firewall policy based on the Training policy package Install On targets.
l The inside interface is translated to port6 locally on the FortiGate and the outside zone is created locally on
FortiGate as per the dynamic mapping of interfaces and zones.
Optionally, you can check the interface and zone under Network, and Internal address object under
Addresses.
In this lab, you will enable and configure SD-WAN, a global header policy, and the Security Fabric.
Objectives
l Create SD-WAN using Device Manager
l Create a global header policy and assign it to a device
l Configure Security Fabric on Local-FortiGate and Remote-FortiGate, add a Security Fabric group to FortiManager,
and run and check the security rating
Time to Complete
Estimated: 40 minutes
Prerequisites
Before beginning this lab, you must restore the configuration files to Remote-FortiGate,Local-FortiGate, and
FortiManager.
© FORTINET
5. Click Local PC, and then click Upload.
6. Click Desktop > Resources > FortiManger > Advanced Configuration and select Remote-sd-wan.conf
and then click Open.
7. Click OK.
8. Click OK to reboot.
© FORTINET
5. Click Browse.
6. Click Desktop > Resources > FortiManager > Advanced Configuration and select FMG-sd-wan.dat.
There is no password to enter because the file was not encrypted.
7. Leave the Overwrite current IP, routing and HA settings check box selected.
8. Click OK.
FortiManager reboots.
9. Wait for the FortiManager to reboot, then log in to the FortiManager GUI at 10.0.1.241 with the username
admin and password password.
10. Click root.
11. Click System Settings.
12. Click Advanced > Advanced Settings.
© FORTINET
In this exercise, you will configure SD-WAN on FortiManger and push the configuration to LocalFortiGate.
Configure SD-WAN
© FORTINET
Field Value
Name Remote-Server
9. Click OK.
10. Click Interface Members > Create New.
11. Configure the following settings:
Field Value
Name port1
Gateway 10.200.1.254
Field Value
Name port2
Gateway 10.200.2.254
Field Value
Name SD-WAN
Interface Members Cretate New and add both port1 and port2, one at a time
© FORTINET
16. Click Create New in Performance SLA.
17. Configure the following settings:
Field Value
Name SLA1
18. Keep the default values for all other settings and click OK.
19. Click OK, refresh the page, and click Assigned Devices.
20. Click Create New, select the following in the drop-down list, and click OK:
l Local-FortiGate(root)
l SD-WAN
© FORTINET
© FORTINET
3. Click Create New to create a new SD-WAN firewall policy.
4. Configure the following settings:
Field Value
Name SD-WAN
Service ALL
Schedule always
Action Accept
NAT enable
5. Keep the default values for all other settings, and click OK.
You have configured SD-WAN firewall policy in the Local-FortiGate policy package.
3. Ensure that Install Policy Package & Device Settings and Local-FortiGate policy package are selected.
© FORTINET
4. Click Next.
5. Select Local-FortiGate and click Next.
6. Click Install and Finish.
Import the Default SD-WAN Static Route Script on FortiManger and Install the
Route
Now, you will configure the static route for SD-WAN. There are two ways to configure static routes: using Device
Manager or a script. In this lab, you will use a script to push the default SD-WAN route to Local-FortiGate.
3. Click Import CLI Script > Add Files, browse to Local Resource folder, then select sd-wan-route.
© FORTINET
5. Click Close.
6. Select the script and click Run Script.
8. Click Close.
9. Click Device & Group.
10. Click Install Wizard.
11. Ensure Install Device Settings(only) is selected and click Next.
12. Ensure Local-FortiGate is selected and click Next.
13. Click Install and Finish.
You have installed the SD-WAN configuration on Local-FortiGate.Now, you will check the SD-WAN status on
Local-FortiGate.
© FORTINET
To monitor SD-WAN status
1. Log in to Local-FortiGate (https://10.0.1.254) with the with username admin and password password.
2. Click Login Read-Only.
3. Click Network > SD-WAN .
You will notice that both port1 and port2 are part of the SD-WAN. Also examine the SD-WAN usage charts.
Header and footer policies are used to envelop the policies in each ADOM. You can create the header and footer
policies once on the global ADOM and assign them to multiple policy packages in the other ADOMs.
In this exercise, you will create the header policy in the global ADOM and assign the header policy to the
managed devices in My_ADOM. Then you will install the header policy on the managed devices.
Field Value
IP Address 10.200.3.1
Password password
5. Click Next.
6. Select the default System Template and click Next.
7. Click Import Now to import the policy package.
8. Accept the default values and finish importing the policy package.
Your configuration should look like following example:
9. Click My_ADOM.
10. Select Global Database ADOM.
© FORTINET
Field Value
Name Global_Policy
Service gPING
Schedule galways
Action Deny
© FORTINET
Field Value
ADOMs My_ADOM
Specify ADOM to policy Check the box and select the following:
package to exclude:
default
© FORTINET
4. Click OK.
5. Click Assign.
The header policy is assigned to the Local-FortiGate and the Remote-FortiGate_root policy packages.
2. Click My_ADOM.
3. Click Local-FortiGate > IPv4 Header Policy to view the assigned header policy.
© FORTINET
5. Click OK.
6. Click Install Preview.
The configuration changes that will be installed on FortiGate will appear. In this case, the header policy and
related objects will be installed.
© FORTINET
9. Click Finish.
10. Click the Remote-FortiGate_root policy package.
11. Click Install > Re-install Policy.
© FORTINET
18. Log out of both FortiGate devices.
19. On the Local-Windows VM, open a command prompt window and try to ping an external host (example
4.2.2.2).
You should observe that the ping fails, because the header policy was configured to block the ping.
20. Close the command prompt.
In this exercise, you will configure the Security Fabric for Local-FortiGate and Remote-FortiGate devices. Before
you can add a Security Fabric group to FortiManager, you must create the Security Fabric group or the Security
Fabric group must exist in FortiOS.
Create a Security Fabric group on Local-FortiGate and Remote-FortiGate.Then, add the Security Fabric group to
FortiManager.
Field Value
6. Click Apply.
© FORTINET
To configure the Security Fabric for Remote-FortiGate
1. On the Remote-Windows VM, open a browser and log in to the Remote-FortiGate GUI at 10.200.3.1 with
username admin and password password.
2. Click Login Read-Write.
3. Click Yes.
4. Click Security Fabric > Settings.
5. Enable FortiGate Telemetry and configure the following values:
Field Value
6. Click Apply.
Wait for a few seconds and you will notice that Remote-FortiGate will establish the
Security Fabric with the Local-FortiGate which is the root upstream FortiGate.
© FORTINET
5. Click Close.
© FORTINET
After refreshing your browser a few times, the Security Fabric group will appear on FortiManger. Also note
that an asterisk (*) on the Local-FortiGate device indicates the root FortiGate.
You will notice a security rating score for the root FortiGate device.
© FORTINET
You cannot use FortiManager to generate Security Fabric ratings; you must use
FortiOS to generate the Security Fabric ratings for a FortiGate Security Fabric group,
and then you can see the Security Fabric ratings in FortiManager.
© FORTINET
7. Click Return.
© FORTINET
You can click Easy Apply to improve security ratings for both the root FortiGate
device and the down stream Remote-FortiGate device. Once you improve the
security ratings on the FortiGate devices, you can view the new improved ratings on
FortiManger device.
8. Log back in to the FortiManager GUI and click Fabric View > Security Rating Score.
You will notice the new the security rating scores on FortiManger.
In this lab, you will perform diagnostics and troubleshooting when installing device-level settings and importing
firewall policies.
Objectives
l Diagnose and troubleshoot issues when installing System Templates
l Diagnose and troubleshoot issues when importing policy packages
Time to Complete
Estimated: 30 minutes
Prerequisites
Before beginning this lab, you must restore the configuration files to the Local-FortiGate, Remote-FortiGate, and
FortiManager.
© FORTINET
10. Repeat the same procedure to restore the system configuration for Remote-FortiGate but, in the Diagnostics
and Troubleshooting folder, select Remote-diag.conf.
11. After the reboot finishes, close both browser tabs.
5. Click Browse.
6. Browse to Desktop > Resources > FortiManager > Diagnostics and Troubleshooting and select FMG-
diag.dat.
There is no password to enter because the file was not encrypted.
7. Leave the Overwrite current IP, routing and HA settings check box selected.
8. Click OK.
FortiManager reboots.
9. Wait for FortiManager to reboot, and then log in as admin to the FortiManager GUI at 10.0.1.241.
10. Click root.
11. Click System Settings.
12. Go to Advanced > Advanced Settings.
© FORTINET
In this exercise, you will diagnose and troubleshoot issues that occur when installing configuration changes on
Local-FortiGate and Remote-FortiGate.
Now, you will view the installation preview to learn what device-level configuration changes will be installed on the
FortiGate devices. The objective of this exercise is to verify and troubleshoot to make sure the correct
configuration settings will be installed on the FortiGate devices.
© FORTINET
2. Click Device Manager.
3. Click Local-FortiGate.
Primary:
Secondary:
© FORTINET
6. Click OK.
Primary:
Secondary:
4. Click OK.
Local-FortiGate was preconfigured with the primary DNS entry 208.91.112.53.When Local-FortiGate
was added to FortiManager, it automatically updated on the device-level database. To verify, check the
current revision history and search for config system dns.
If you are not able to figure it out, use the following procedure to view the system template and DNS
settings on the CLI.
Now, you will view the DNS configuration for the configured system template and compare it with the device-level
database settings for DNS (for both Local-FortiGate and Remote-FortiGate). You will view the configuration on
the CLI.
© FORTINET
The execute fmpolicy print- command tree allows you to view the CLI
configuration for provisioning templates, ADOMs, and the device database on
FortiManager.
You can use the help feature by typing ? to open the command tree syntax.
2. Run the following command to view the Remote-FortiGate DNS settings in the FortiManager device-level
database:
# execute fmpolicy print-device-object ADOM1 Remote-FortiGate root 15
3. Compare the FortiManager system template entries with each FortiGate device.
The Local-FortiGate primary DNS entry matches the default system template primary DNS entry. Because of that,
FortiManager skips the primary DNS entry for Local-FortiGate, because Local-FortiGate has already been
configured with the same entry.
4. Close the PuTTY session.
© FORTINET
Install Device-Level Configuration Changes
Now, you will install device-level configuration changes (system templates) on the managed FortiGate devices.
5. Make sure both devices are selected, and then click Next.
© FORTINET
The preview generates.
7. Click Close.
8. For Remote-FortiGate, click Install Preview.
The preview generates.
9. Click Close.
10. Make sure both FortiGate devices are selected, and then click Install.
The installation begins.
11. After the installation finishes, click the View Log icon to view and verify what is being installed on each device.
© FORTINET
First, you will view the policies and objects imported into the ADOM database. The objects share the common
object database for each ADOM and are saved in the ADOM database, which can be shared or used among
different managed FortiGate devices in the same ADOM.
In this exercise, you will diagnose and troubleshoot issues that occur while importing the Remote-FortiGate policy
package.
Now, because the Local-FortiGate policy package is imported into ADOM1, you will view the Local-FortiGate
policy package and objects imported into the ADOM1 database.
Notice the source address of Test_PC for the Ping_Test firewall policy.
© FORTINET
5. On the left side of the window, expand Firewall Objects, and then click Addresses.
6. Review the configuration for the Test_PC firewall address. In the ADOM database, it is set to any interface based
on the configuration imported from Local-FortiGate.
You need to import the policies and objects from Remote-FortiGate. But before importing policies and objects,
you will review the policies and objects locally on Remote-FortiGate.
Remember, the Test_PC address object is bound to any interface in the ADOM database.
© FORTINET
Import a Policy Package
Now, you will import the policies and objects for the Remote-FortiGate into the policy package, and troubleshoot
issues with the policy import.
© FORTINET
7. Click Download Import Report to view the reason for skipping a firewall policy.
8. Open the file (or save it for future reference).
Did you notice the policy import failed when importing firewall policy ID # 2 (SEQ# 1)?
© FORTINET
Stop and think!
The following output provides the reason for this policy import failure:
reason=interface(interface binding contradiction. detail: any<-
port6) binding fail)"
What does this error mean? What is the impact? How can you fix this partial policy import issue?
Remember, in the ADOM1 database, the Test_PC firewall address is bound to the any interface, based
on the configuration imported from Local-FortiGate. On the Remote-FortiGate, policy ID 2 is using the
Test_PC firewall address bound to port6 as the source address.
This is the expected behavior on FortiManager because it doesn’t allow the same address object name to
bind to different interfaces.
Because FortiManager imported partial policies in the policy package, if you try to make a change to the
policy package and install it, FortiManager will delete the skipped policies and objects associated with
those policies, along with all unused objects.
You must change the Test_PC firewall address binding to the any interface by locally logging in to
Remote-FortiGate.
The following two procedures show the impact of making changes to the FortiManager policy package Remote-
FortiGate and then trying to install the policy package. FortiManager will try to delete policy ID 2 and the Test_PC
address object on Remote-FortiGate. FortiManager will also try to delete any unused objects.
If you are now familiar with the behavior, you can skip the following procedures:
© FORTINET
2. On the left side of the window, click Remote-FortiGate, and then click IPv4 Policy.
You will see that the firewall policy with Test_PC as the source address is not imported.
When installing a policy package for the first time, FortiManager also deletes all
unused objects.
© FORTINET
This is the firewall policy with Test_PC as the source address.
You must change the Test_PC firewall address binding to the any interface by locally logging in to Remote-
FortiGate.
Then, on FortiManager you will be able to import the policy package for Remote-FortiGate.
© FORTINET
To make local changes on Remote-FortiGate
1. On the Local-Windows VM, open a browser and log in to the Remote-FortiGate GUI at 10.200.3.1 with the
username admin and password password.
2. Click Login Read-Write.
3. In the warning window, click Yes.
4. Click Policy & Objects > Addresses.
© FORTINET
9. Click Cancel.
10. Log out of Remote-FortiGate.
© FORTINET
5. Click Next.
6. Keep the default values for all other settings, and then click Next.
Did you notice that Test_PC appeared as Dynamic Mapping?
FortiManager automatically creates a dynamic mapping of the object with same values. The interface must
be the same as the ADOM database.
7. You will see both firewall policies are imported this time.
© FORTINET
8. Click Finish.
The learning goals for this lab are to understand the troubleshooting commands used for FortiGuard
Management, and to learn how to use FortiManager to upgrade the firmware on managed FortiGate devices.
Objectives
l Review the central management configuration on both FortiGate devices
l Understand and run FortiGuard debug commands
l Import the firmware image for FortiGate devices and upgrade using FortiManager
Time to Complete
Estimated: 15 minutes
In this exercise, you will review the central management settings on FortiGate. Then, you will run the CLI
commands related to FortiGuard diagnostics on FortiManager to understand FortiGuard settings on
FortiManager.
Your outputs for Local-FortiGate and Remote-FortiGate should look similar to the following examples:
Local-FortiGate:
Remote FortiGate:
You will see that server-list is configured on the FortiGate devices with the FortiManager IP address,
and include-default–servers is disabled. This means FortiGate devices are pointed to FortiManager
for its FortiGuard services and access to public FortiGuard servers is disabled.
© FORTINET
Diagnose FortiGuard Issues
Now, you will run CLI commands on FortiManager to verify the FortiGuard configuration in order to troubleshoot
FortiGuard issues.
You should see that there is only one default server in the list. FortiManager is unable to connect to the public
FDN servers because of unreachability or disabled service. In this lab environment, communication with the
public FortiGuard servers is disabled.
diagnose fmupdate update-status fds
You should see that there is no information on Upullstat, UpullServer, because FortiManager is not
connected to the public FDS, which would provide that information.
diagnose fmupdate dbcontract
© FORTINET
FortiManager is operating in a closed network environment and license contracts are uploaded manually on
FortiManager. You should see the contract information, which includes the types of contracts the device
currently has along with the expiry dates.
The same information can be viewed on the FortiGate GUI in the License
Information widget.
You will also see FortiAnalyzer contract information, which is uploaded manually on FortiManager. The
FortiAnalyzer labs use FortiManager as the local FDS in order to use the IOC features on FortiAnalyzer.
You can use FortiManager as your local firmware cache and to upgrade firmware on supported devices.
In this exercise, you will import the firmware image for FortiGate and then upgrade both FortiGate devices using
FortiManager.
© FORTINET
No part of this publication may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from Fortinet Inc.,
as stipulated by the United States Copyright Act of 1976.
Copyright© 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.