FortiGate Example SOHO 01-30006-0062-20080310
FortiGate Example SOHO 01-30006-0062-20080310
FortiGate Example SOHO 01-30006-0062-20080310
www.fortinet.com
FortiGate SOHO and SMB Configuration Example
Version 3.0 MR6
28 Feburary 2008
01-30005-0062-20080228
Trademarks
Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC,
FortiBIOS, FortiBridge, FortiClient, FortiGate, FortiGate Unified Threat
Management System, FortiGuard, FortiGuard-Antispam, FortiGuard-
Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer,
FortiManager, Fortinet, FortiOS, FortiPartner, FortiProtect, FortiReporter,
FortiResponse, FortiShield, FortiVoIP, and FortiWiFi are trademarks of
Fortinet, Inc. in the United States and/or other countries. The names of
actual companies and products mentioned herein may be the trademarks
of their respective owners.
Contents
Contents
Introduction ........................................................................................ 5
Revision history................................................................................................. 5
FortiGate Unified Threat Management Systems ............................................ 5
Other Fortinet products .................................................................................... 7
Fortinet documentation..................................................................................... 8
Comments on Fortinet technical documentation ........................................... 8
Customer service and technical support ........................................................ 8
Index.................................................................................................. 51
Introduction
The FortiGate Configuration Example for SOHO (small office/home office) and
SMB (small- to medium-sized business) provides a brief overview of FortiGate
Unified Threat Management Systems, and a comprehensive example of a
network implementation for a small company. This example attempts to employ
some of the most common features applicable to small networks and can be
easily adapted for planning your own network security implementation using a
FortiGate firewall.
A complete procedure using the web-based manager is included for each network
configuration task, followed by the same procedure using the command line
interface (CLI).
Revision history
FortiGuard service
FortiGuard service includes:
• virus encyclopedia
• attack encyclopedia
• vulnerability and patch list
• attack and virus definition updates
• attack and virus engine updates
• optional automatic push updates when new threats appear
FortiClient software
Fortinet's Remote FortiClient Host Security is designed to provide secure remote
access to network resources for telecommuters, mobile workers, remote sites and
partners. The FortiClient Host Security is an easy-to-use IPSec software client
featuring an integrated personal firewall, Network Address Translation (NAT)
Traversal, centralized policy management, multiple policy support for access to
multiple devices, strong encryption, and a comprehensive set of tools for
troubleshooting. Most popular Microsoft Windows operating systems are
supported natively.
FortiManager tools
The FortiManager System is an integrated management and monitoring tool that
enables enterprises and service providers to easily manage large numbers of
FortiGate Unified Threat Management Systems. It minimizes the administrative
effort required to deploy, configure, monitor, and maintain the full range of network
protection services provide by FortiGate devices, supporting the needs of
enterprises and service providers responsible for establishing and maintaining
security policies across multiple, dispersed FortiGate installations.
FortiAnalyzer systems
The FortiAnalyzer Family of real-time logging systems is a series of dedicated
hardware solutions that securely aggregate and analyze log data from multiple
FortiGate Unified Threat Management Systems. The systems provide network
administrators with a comprehensive view of network usage and security
information, supporting the needs of enterprises and service providers
responsible for discovering and addressing vulnerabilities across dispersed
FortiGate installations. The FortiAnalyzer devices minimize the effort required to
monitor and maintain acceptable use policies, to identify attack patterns and
prosecute attackers, and to comply with governmental regulations regarding
privacy and disclosure of security breaches. They accept and process a full range
of log records provided by FortiGate devices, including traffic, event, virus, attack,
content filtering, and email filtering data.
Fortinet documentation
Information about FortiGate products is available from the following FortiGate
User Manual volumes:
• FortiGate QuickStart Guide
Provides basin information about connecting and installing a FortiGate unit.
• FortiGate Installation Guide
Described how to install a FortiGate unit. Includes a hardware reference,
default configuration information, installation procedures, connection
procedures, and basic configuration procedures. Choose the guide for your
product model number.
• FortiGate Administration Guide
Provides basic information about how to configure a FortiGate unit, including
how to define FortiGate protection profiles and firewall policies; how to apply
intrusion prevention, antivirus protection, web content filtering, and spam
filtering; and how to configure a VPN.
• FortiGate online help
Provides a context-sensitive and searchable version of the Administration
Guide in HTML format. You can access online help from the web-based
manager as you work.
• FortiGate CLI Reference Guide
Describes how to use the FortiGate CLI and contains a reference to all
FortiGate CLI commands.
• FortiGate Log Message Reference Guide
Describes the structure of FortiGate log messages and provides information
about the log messages generated by the FortiGate unit.
• FortiGate High Availability Guide
• Contains in-depth information about the FortiGate high availability feature and
the FortiGate Clustering protocol.
• FortiGate IPS Guide
Describes how to configure FortiGate Intrusion Prevention System settings
and how the FortiGate IPS deals with some common attacks.
• FortiGate VPN Guide
Explains how to configure VPNs using the web-based manager.
The FortiGate online help also contains procedures for using the FortiGate
web-based manager to configure and manage the FortiGate unit.
Note: IP addresses and domain names used in this document are examples and are not
valid outside of this example.
Existing topology
Figure 4: Example SOHO network before FortiGate installation
The Company A network provides limited functionality for their needs, including:
• a very basic router to manage the network traffic
• an email server hosted by the Internet Service Provider (ISP)
• a web server hosted by the ISP
• client-based antivirus software with no reliable central distribution of updates
• no secure method of providing remote connections for home-based workers
Proposed topology
Figure 5 shows the Company A network configuration after installation of the
FortiGate-100A.
First steps
First steps includes creating a network plan and configuring the basic FortiGate
settings.
• Creating a network plan
• Configuring FortiGate network interfaces
• Adding the default route
Plan for growth and future needs What is the company’s projected head-count for
the next 2 years? Does the company plan to have
more home-based workers?
Design a new network topology Include all the collected addressing information in
a network topology diagram.
Complete a plan for each task For example, configuring settings for a department
or user group may include:
• adding the addresses and address groups
• adding schedules if required
• configuring any required global spam filter, web
filter, and antivirus settings
• creating a protection profile
• adding a firewall policy for the department
3 Select OK.
4 Edit the wan1 interface:
5 Select OK.
6 Edit the dmz1 interface:
7 Select OK.
4 Select OK.
3 Fill in all the required fields including the product model and serial number.
4 Select Finish.
Note: If you want to set the update time to something other than the top of the hour, you
must use the CLI command.
To check server access and enable daily and push updates using the CLI
config system autoupdate push-update
set status enable
end
config system autoupdate schedule
set frequency daily
set status enable
set time 05:30
end
5 Select OK.
6 Go to System > Admin > Administrators.
7 Select Create New and enter or select the following settings:
Administrator admin_2
Password <psswrd>
Confirm Password <psswrd>
Trusted Host #1 192.168.100.60 / 255.255.255.0 (administrator’s computer)
Trusted Host #2 192.168.100.51 / 255.255.255.0 (lab computer)
Access Profile admin_monitor
8 Select OK.
To configure a new access profile and administrator account using the CLI
config system accprofile
edit admin_monitor
set admingrp read
set authgrp read
set avgrp read
set fwgrp read
set ipsgrp read
set loggrp read
set mntgrp read
set netgrp read
set routegrp read
set spamgrp read
set sysgrp read
set updategrp read
Company A adds address ranges to the firewall for Finance and Engineering so
they can be included in firewall policies. The two address ranges are included in
an address group to further simplify policy configuration.
3 Select OK.
4 Repeat to add an address called Eng with the IP Range 192.168.100.51–
192.168.100.99.
To add address ranges for Finance and Engineering using the CLI
config firewall address
edit Finance
set type iprange
set start-ip 192.168.100.10
set end-ip 192.168.100.20
next
edit Eng
set type iprange
set start-ip 192.168.100.51
set end-ip 192.168.100.99
end
To include the Finance and Eng addresses in an address group using the
CLI
config firewall addrgrp
edit FinEng
set member Finance Eng
end
Note: Enabling cache means web site ratings are stored in memory so that the FortiGuard
server need not be contacted each time an often-accessed site is requested.
Note: Marking email as spam allows end-users to create custom filters to block tagged
spam using the keyword.
To configure the FortiGuard RBL spam filter settings using the CLI
config system fortiguard
set antispam-status enable
set antispam-cache enable
set antispam-cache-ttl 3600
end
end
config antivirus grayware Keylog
set status enable
end
config antivirus grayware NMT
set status enable
end
config antivirus grayware P2P
set status enable
end
config antivirus grayware Plugin
set status enable
end
config antivirus grayware RAT
set status enable
end
config antivirus grayware Spy
set status enable
end
config antivirus grayware Toolbar
set status enable
end
General Interest
Job Search Block
Shopping and Auction Block
Personal Relationships Block
6 Select Spam Filtering and enable SMTP for IP address BWL check and E-mail
address BWL check.
7 Select IPS and and select the all_default IPS sensor.
You can create your own IPS sensors. This option does not select denial of
service (DoS) sensors. For more information, see the FortiGate Administration
Guide.
8 Select OK.
Note: The following policy is an internal to wan1 policy which uses the
standard_profile protection profile to provide antivirus, web category blocking, and
FortiGuard spam filtering.
4 Select OK.
To configure the Finance and Engineering firewall policy using the CLI
config firewall policy
edit 1
set action accept
set dstaddr all
set dstintf wan1
set profile-status enable
set schedule always
set service ANY
set srcaddr FinEng
set srcintf internal
set profile standard_profile
end
Goals
• Provide complete control of web access. Tasks include:
• Adding the Help Desk department address
• Creating and Configuring URL filters and filter lists
• Enable greater access at certain times. Tasks include:
• Creating a recurring schedule
• Control traffic and maintain security. Tasks include:
• Configuring firewall policies for help desk
3 Select OK.
URL .*
Type Regex
Action Block
5 Select Enable.
6 Select OK.
This pattern blocks all web sites.
Note: The edit command will only accept a number. Type “edit ?” for a list of URL filter
lists and their corresponding number
URL www.CompanyAsupport.com
Type Simple
Action Exempt
5 Select Enable.
6 Select OK.
7 Repeat for each of the following URLs:
• intranet.CompanyA.com
• www.dictionary.com
• www.ExampleReferenceSite.com
end
Note: The move command will only accept a number. Type “move ?” for a list of URL filter
lists and their corresponding numbers.
6 Select OK.
To add the work hours protection profile for help desk employees
1 Go to Firewall > Protection Profile and select Create New.
2 Enter help_desk_work as the Profile Name.
3 Select Anti-Virus and enable Virus Scan for HTTP, FTP, IMAP, POP3, and SMTP.
4 Select Web Filtering and enable HTTP for Web Content Block and Web Content
Exempt.
5 Select Spam Filtering and enable SMTP for IP address BWL check and E-mail
address BWL check.
6 Select IPS and and select the all_default IPS sensor.
You can create your own IPS sensors. This option does not select denial of
service (DoS) sensors. For more information, see the FortiGate Administration
Guide.
7 Select IM/P2P and enable examination of the five IM protocol types by selecting
the check boxes beside their names in the column headings. Select Block Login
for each of the five IM protocols
8 In the same IM/P2P section, select Block from the Action drop down for each of
the six P2P protocol types.
9 Select OK.
To add the work hours protection profile for help desk employees using the
CLI
config firewall profile
edit help_desk
set ftp scan
set http scan urlfilter
set imap scan
set pop3 scan
set smtp scan spamemailbwl spamipbwl
set ips-sensor-status enable
set ips-sensor all_default
set aim enable-inspect block-im
set icq enable-inspect block-im
set msn enable-inspect block-im
set yahoo enable-inspect block-im
To add the lunch hour protection profile for help desk employees
1 Go to Firewall > Protection Profile and select Create New.
2 Enter help_desk_lunch as the Profile Name.
3 Select Anti-Virus and enable Virus Scan for HTTP, FTP, IMAP, POP3, and SMTP.
4 Select FortiGuard Web Filtering and configure categories in the table as follows:
5 Select Spam Filtering and enable SMTP for IP address BWL check and E-mail
address BWL check.
6 Select IPS and and select the all_default IPS sensor.
You can create your own IPS sensors. This option does not select denial of
service (DoS) sensors. For more information, see the FortiGate Administration
Guide.
7 Select IM/P2P and enable examination of the five IM protocol types by selecting
the check boxes beside their names in the column headings. Select Block Login
for each of the five IM protocols
8 In the same IM/P2P section, select Block from the Action drop down for each of
the six P2P protocol types.
9 Select OK.
To add the lunch hour protection profile for help desk employees using the
CLI
config firewall profile
edit help_desk_lunch
set ftp scan
set http scan fortiguard-wf
set imap scan
set pop3 scan
set smtp scan spamemailbwl spamipbwl
set ips-sensor-status enable
set ips-sensor all_default
set ftgd-wf-deny g01 g02 20 g04 g05 34 37 42 48
set aim enable-inspect block-im
set icq enable-inspect block-im
set msn enable-inspect block-im
set yahoo enable-inspect block-im
4 Select OK.
5 Select the Insert Policy before icon beside policy 2.
Note: The FortiGate unit checks for matching policies in the order they appear in the list
(not by policy ID number). For the ‘lunch’ policy to work, it must go before the policy using
the help-desk protection profile (above).
7 Select OK.
3 Select OK.
4 Select Create New and enter or select the following settings:
5 Select OK.
Name Home1 (The name for the peer that connects to the Company A
network.)
Remote Gateway Static IP Address
IP Address 220.100.65.98
Local Interface wan1
Mode Main (ID protection)
Note: The VPN peers must use the same mode.
4 Select OK.
5 Select Create Phase 1.
6 Enter or select the following settings for Home_User_2:
Name Home2 (The name for the peer that connects to the Company A
network.)
Remote Gateway Dynamic DNS
Dynamic DNS example.net
Local Interface wan1
Mode Main (ID protection)
Note: The VPN peers must use the same mode.
Authentication Preshared Key
Method
Pre-shared Key GT3wlf76FKN5f43U
Note: The key must contain at least 6 printable characters and should
only be known by network administrators. For optimum protection
against currently known attacks, the key should consist of a minimum
of 16 randomly chosen alphanumeric characters. The VPN peers
must use the same preshared key.
Peer options Accept any peer ID
7 Select OK.
Note: Both ends (peers) of the VPN tunnel must use the same mode and authentication
method.
Name Home1_Tunnel
Phase 1 Home1
4 Select OK.
5 Select Create Phase 2.
6 Enter or select the following settings:
Name Home2_Tunnel
Phase 1 Home2
7 Select OK.
3 Select OK
4 Select Create New and enter or select the following settings for Home_User_2:
5 Select OK
To configure firewall policies for the VPN tunnels using the CLI
config firewall policy
edit 5
set srcintf internal
set dstintf wan1
set srcaddr CompanyA_Network
set dstaddr Home_User_1
set action ipsec
set schedule Always
set service ANY
set profile-status enable
set profile standard_profile
set inbound enable
set outbound enable
set natinbound enable
set vpntunnel Home1
next
edit 6
set srcintf internal
set dstintf wan1
set srcaddr CompanyA_Network
set dstaddr All
set action ipsec
set schedule Always
set service ANY
set profile_status enable
set profile standard_profile
set inbound enable
set outbound enable
set natinbound enable
set vpntunnel Home2
end
Note: The specific configuration given in this example will only function with licensed copies
of the FortiClient software. The default encryption and authentication types on the FortiGate
unit are not available on the FortiClient Demo software.
5 Select OK.
6 Repeat on Home_User_2’s computer for Home_User_2.
Name Web_Server_VIP
External Interface wan1
Type Static NAT
External IP Address/ 64.230.125.70
Range
Mapped IP Address/ 10.10.10.2
Range
3 Select OK.
3 Select OK.
3 Select OK.
3 Select OK.
To add the web master address to the firewall using the CLI
config firewall address
edit Web_Master_J
set subnet 192.168.100.63 255.255.255.0
end
3 Select OK.
To add a policy for web master access to the web server using the CLI
config firewall policy
edit 8
set action accept
set dstaddr Web_Server
set dstintf dmz1
set schedule always
set service FTP
set srcaddr Web_Master_J
set srcintf internal
set profile-status enable
set profile standard_profile
end
To configure a virtual IP
1 Go to Firewall > Virtual IP.
2 Select Create New and enter or select the following settings:
Name Email_Server_VIP
External Interface wan1
Type Static NAT
External IP Address/ 64.230.120.8
Range
Mapped IP address/ 10.10.10.3
Range
3 Select OK.
3 Select OK.
To add the email server address to the firewall using the CLI
config firewall address
edit Email_Server
set subnet 64.230.120.8 255.255.255.0
end
3 Select OK.
3 Select OK.
Action ACCEPT
Protection Profile Enable and select standard_profile
3 Select OK.
4 Select Create New and enter or select the following settings:
5 Select OK.
• add an internal -> wan1 firewall policy for the web master to upload web site
updates via FTP
• add an internal -> wan1 POP3 firewall policy so that users can use POP3 to
download email
• add an internal -> wan1 SMTP firewall policy so that users can use SMTP to
send email
Index
A VPN tunnels 38
address N
adding 23, 30, 37, 43, 46
group 24 network plan 17
antivirus
configuring automatic updates 21 P
definition updates 21
grayware 26 policy
attack configuring 28, 36, 40, 43, 47
automatic updates 21 default 19
definition updates 21 email server 47
VPN tunnels 40
web server 43
C protection profile 27, 33
Customer service 8
R
D remote access VPN tunnels 37
default route 18
DMZ S
network 13, 42
schedule
DNS forwarding 19
automatic updates 21
recurring 33
E server
email server email 45
configuring 45 web 42
F T
firewalls time and date
about 5 configuring 20
FortiClient 7, 14, 42 topology
FortiGate design 17
firewalls 5 existing 12
models 13 proposed 15
FortiGuard 25
FortiLog 7 U
FortiManager 7 URL filter 30
FortiProtect 7
V
G
virtual IP 42, 46
grayware VPN
configuring 26 configuring 37
VPN tunnels
I FortiClient 42
policies 40
interface
configuring 17
dmz 17 W
external 17 web category block 24
internal 17 web filter URL block 30
IPSec web server
phase1 38 configuring 42
phase2 40