Lab Guide
Lab Guide
Lab Guide
FFT-FortiOS r5-1716037163
Table of contents
1. Introduction .................................................................................................................................. 3
1.1. Fast Track Overview .......................................................................................................... 4
1.2. Agenda ................................................................................................................................ 5
1.3. Topology .............................................................................................................................. 7
2. Fortinet Security Fabric .............................................................................................................. 8
2.1. Fabric Management Pane ................................................................................................. 9
2.2. MAC Address Threat Feed .............................................................................................. 11
3. General GUI Changes ................................................................................................................. 14
3.1. FortiView ........................................................................................................................... 15
3.2. Dashboards ....................................................................................................................... 19
3.3. Packet Capture ................................................................................................................. 21
3.4. Debug Flow ....................................................................................................................... 24
4. SD-WAN ....................................................................................................................................... 26
4.1. SD-WAN Overlay .............................................................................................................. 27
4.2. Provision Template .......................................................................................................... 31
4.3. Review VPN Connection Status ..................................................................................... 33
5. ZTNA ............................................................................................................................................. 34
5.1. Endpoint Management Server ....................................................................................... 35
5.2. Logical AND Tag Matching Policy .................................................................................. 38
5.3. Test Connection (Windows Firewall OFF) .................................................................... 40
5.4. Test Connection (Windows Firewall ON) ...................................................................... 41
6. Policy & Objects ......................................................................................................................... 43
6.1. New Policy Layout ........................................................................................................... 44
6.2. Workflow Management ................................................................................................... 46
7. Secure Access Switching .......................................................................................................... 48
7.1. FortiSwitch Management ............................................................................................... 49
8. Operational Technology ............................................................................................................ 52
8.1. FortiGate OT View ........................................................................................................... 53
9. Networking .................................................................................................................................. 56
9.1. DHCP Shared Subnet ....................................................................................................... 57
9.2. Route Tag Address Objects ............................................................................................ 62
10. Conclusion ................................................................................................................................. 65
10.1. Continued Education ..................................................................................................... 66
To address today’s risks and deliver the industry’s most comprehensive cybersecurity platform that enables digital
innovation, Fortinet continues to enhance the Fortinet Security Fabric with the latest version of its operating system, FortiOS.
FortiOS ties all the Security Fabric’s security and networking components together to ensure seamless integration. This
enables the convergence of networking and security functions to deliver a consistent user experience and resilient security
posture across all manner of environments including on-premises, cloud, hybrid, and converging IT/OT/IoT infrastructure.
While this workshop focuses on new features introduced during the two latest major versions of FortiOS, all VMs have been
installed using the latest major version.
Some features may have changed slightly from the previous version to the most current version.
Tasks
The blue button at the top of this page is the primary action button. When there is an action that can be completed on the
page, this button will change accordingly.
When ready, click the blue Continue button in the menu at the top of the page to get started.
The Fast Track program is a collection of free, instructor-led, hands-on workshops that introduce Fortinet solutions for
securing your digital infrastructure.
These workshops are only an introduction to what Fortinet security solutions can do for your organization.
For more in-depth training, we encourage you to investigate our full portfolio of NSE training courses at
https://training.fortinet.com.
Background
Fast Track workshops often include more hands-on activities than time permits, and not every exercise suits every
opportunity. To allow for customization, some exercises are optional, giving instructors the flexibility to exclude or rearrange
the workshop flow as needed. Average execution times are provided as an aid in planning and to help instructors ensure
their Fast Track session will stay within the available timeframe.
Please take advice from your instructor if you have any questions.
Agenda
In the case of this workshop, the exercises are organized like this:
Background
This diagram is a useful reference tool while working on the lab exercises.
The following topology diagram shows the starting layout for this workshop.
Topology
Unless otherwise indicated all usernames/passwords for the various web consoles are:
Tasks
This will be the last time we specifically state to click on the Continue button, from now on it is assumed the Continue
button will be used to move forward in the lab.
The Fortinet Security Fabric platform is built on a cybersecurity MESH architecture – similar to what Gartner announced
recently - “an architectural approach to creating a collaborative ecosystem of security tools operating beyond the traditional
perimeter.”
The Security Fabric provides a suite of best-of-breed solutions, organically built from the ground up to provide the best
integration in the industry.
The Security Fabric enables organizations to achieve operational efficiencies through consistent policies and automation,
deep visibility across all their full deployments whether on the network or in the cloud, and the ability to interoperate with a
broad ecosystem of networking and security solutions.
Background
The Firmware & Registration section allows you to authorize new Fabric devices and manage the firmware running on each
FortiGate, FortiAP, and FortiSwitch in the Security Fabric.
In this exercise, you will configure a Security Fabric connector on the downstream device FGT-ISFW.
You then connect to the root FortiGate, FGT-EDGE, and use the Fabric Management page to authorize
the device FGT-ISFW as part of the Security Fabric. You will also make sure all Fabric devices are
running current firmware versions.
Tasks
1. From the Lab Activity: FortiOS tab, log into the FGT-ISFW under the Core group via the HTTPS option.
Note: Unless otherwise indicated, all usernames and passwords for the various web consoles are:
5. Click OK.
6. Click OK to Confirm.
7. Return to the Lab Activity tab, click FGT-EDGE in the sidebar menu under the Core group, and click HTTPS to access
8. Click System > Firmware & Registration. The donut charts show that the Security Fabric includes one FortiGate Up
and that all firmware is current.
11. After a few moments, FGT-ISFW is shown in the donut charts at the top of the page, along with the FortiSwitch that FGT-
ISFW manages. Press F5 to refresh the browser tab if the device doesn’t appear. Ignore the FortiSwitch registration
warning. This is only a limitation of the current lab and not typical of an actual production environment.
1. From the browser tab, log into FGT-ISFW via the web console.
4. Click Authorize.
Note: If the EMS Fabric Connector color doesn’t change from Amber to white, press F5 to refresh the browser tab.
Background
A MAC address threat feed is a dynamic list that contains MAC addresses, MAC ranges, and MAC OUIs.
The list is periodically updated from an external server and stored in text file format on an external
server.
After FortiGate imports this list, it can be used as a source in firewall policies, proxy policies, and ZTNA rules. For policies in
transparent mode or virtual wire pair policies, the MAC address threat feed can be used as a source or destination address.
01:01:01:01:01:01
01:01:01:01:01:01-01:01:02:50:20:ff
8c:aa:b5
The file can contain one MAC address, MAC range, or MAC OUI per line.
The Security Admin at AcmeCorp finds out through the SOC team that Alice’s PC has been compromised with potential
malware installed on the device.
They now, need to immediately stop this device from accessing the AcmeCorp finance web portal. They instruct the security
team to add Alice’s sales network adapter MAC address to the MAC address threat feed list hosted on one of the servers.
Tasks
1. From the Lab Activity: FortiOS tab, login to the Alice machine under the Sales group via the RDP option:
3. The portal login page comes up. It implies access to the portal is allowed.
ipconfig /all
6. Scroll to the Sales Network adapter and review the associated MAC address.
4. Under Threat Feeds, click MAC Address and use the following Connector Settings:
Status: Enabled
Name: MAC_List
5. Click OK.
6. In case the connector card doesn’t show a green checkmark located at the bottom right corner click the refresh icon.
7. Right-click MAC_List Fabric connector and click View Entries to view the MAC address list.
Note: You will see Alice’s Sales network adapter MAC address listed here.
Note: You will check out this feature in a later lab exercise.
3. Click + Create New to add a new policy and use the following settings:
Name: MAC_List_Deny
Type: Standard
Destination: Finance_Web_Portal
Schedule: Always
Service: ALL
Action: DENY
4. Click OK.
5. Click MAC_List_Deny policy. Hover the mouse cursor on the left corner and drag this new policy to the top of the policy
list.
1. From the browser tab, log into Alice's machine via the web console.
Each major release of FortiOS includes updates to the GUI that improve performance, process flow, and ease of use.
Background
Dashboard widgets and FortiView monitors are updated with new graphs, faster performance, and other updates that
improve the user experience.
Tasks
1. From the Lab Activity: FortiOS tab, login to Alice via the RDP option using the following credentials:
FortiView
1. From the Lab Activity: FortiOS tab, login to FGT-EDGE via the HTTPS option using the following credentials:
2. Click the Search icon on the top left corner. FortiView pages can be found using the global search.
4. In the FortiView Sources dashboard, click the drop-down arrow icon > click Preview.
8. Click Websites to view blocked connections to various destinations like Bet365, YouTube, Netflix, Bet365, etc. Click the X
at the top-right to remove the filter and show that tab again.
Note: Multiple FortiView widgets can be added to custom dashboards. Filters that are applied to the expanded widgets
will remain after refreshing the browser.
Note: The new Training dashboard has been created. Multiple FortiView widgets can be added to custom dashboards.
16. Select any session entry and click End session(s) in the toolbar to end that session. On the FortiView Sessions page,
sessions can be ended by selecting the session or sessions and then clicking End session(s) in the toolbar or right-click
menu.
Dashboards
1. Click Dashboard > Status. The Licenses and Security Fabric widgets are updated with new visible icons all in one place
to improve the user experience and provide faster performance.
Note: The topology in your lab might differ from the screenshot below.
4. On the top right corner, click the Save as Monitor icon button.
10. The expanded Assets widget is updated as compared to previous FortiOS versions to create a more streamlined
appearance and to conserve resources. The Asset Identity Center page offers a unified view of asset information,
consolidates data from various sources, and can handle significantly larger sets of data.
Note: The Assets dashboard in the lab might differ from the screenshot below:
Background
The Network > Diagnostics page now supports launching multiple packet captures at a time. From this page, you can run
both packet captures and debug flows within the GUI and see real-time information.
For example, ingress and egress interfaces can be captured at the same time to compare traffic, or the physical interface
and VPN interface can be captured using different filters to see if packets are leaving the VPN. The packet capture dialog can
be docked and minimized to run in the background. The minimized dialog aligns with other CLI terminals that are minimized.
In this exercise, you capture packets flowing from any interface on FGT-EDGE that reaches the host 8.8.8.8 and host 8.8.4.4
using ICMP.
Later in this exercise, you run a debug flow from the GUI to trace the flow of a packet through the FortiGate system.
Tasks
1. From the Lab Activity tab, log in to FGT-EDGE under the Core group via the HTTPS option.
5. Turn on the Maximum captured packets and set the value to 10.
17. Click the >_ button in the top-right corner to connect to the CLI console session.
19. After ten ICMP pings are sent, copy/paste the following command and hit Enter:
20. After 10 IMCP pings are sent, click X to close the CLI console session window.
25. At the bottom, click and open the Packet Capture 2. Click on an individual packet to see more information about it.
26. Click Back. In the upper-left corner of the GUI is a list of Recent Capture Criteria. If you want to run this specific capture
again, click it to load the saved settings.
1. In the FGT-EDGE GUI, click Network > Diagnostics > Debug Flow.
3. Turn on Filters.
4. Set the Filter type to Basic and set the IP type to IPv4.
8. Click the >_ button in the top-right corner to connect to the CLI. Type execute ping-options repeat-count 20 and
press Enter. Then type execute ping 8.8.8.8 and hit Enter. The FortiGate begins to ping 8.8.8.8 and will do so
twenty times.
9. Minimize the CLI screen. You can view the debug flow in real time.
12. The current output can be filtered in the GUI using the Time and Message columns.
In the reality of today’s market, digital innovation is a necessity. From moving faster and more efficiently, to operating in
uncertain environments at a global scale, it all starts with the network.
Organizations and branches need both high-performance networks and strong security. The Fortinet Security-Driven
Networking solution is an integral component of the Fortinet Security Fabric, which enables complete visibility and provides
automated threat protection across the entire attack surface. Powered by a single operating system, it delivers industry-
leading security and unmatched performance, all while reducing complexity.
FortiOS is a security-hardened, purpose-built network operating system that is the software foundation of FortiGate, and the
entire Fortinet Security Fabric. Designed to deliver tightly integrated and intuitive security and networking capabilities
across your entire network, FortiOS delivers everything from core network functionality to software-defined wide-area
networking (SD-WAN) to best-in-class security that protects organizations end-to-end, including the ability to extend the
Fortinet Security Fabric to third-party solutions using application programming interfaces (APIs) and Security Fabric
connectors.
Seamless automation and orchestration built into FortiOS allows organizations to overcome resource and skills gaps, and
achieve desired digital innovation outcomes without compromise.
Background
FortiManager includes an automated SD-WAN overlay template with a wizard to automate and simplify the process using
recommended IPsec and BGP templates.
FortiManager 7.4 takes it one step further and now includes an automated SD-WAN post overlay process that creates
policies to allow the health-checks traffic to flow between Branch and HUB.
The SD-WAN overlay template includes two new options in the wizard to automate the post-wizard processes.
Normalize Interfaces: Enable the Normalize Interfaces option to normalize the SD-WAN zones created by the template.
Add Health Check Firewall Policy to Hub/Branch Policy Package: Enable the Add Health Check Firewall Policy to
Hub/Branch Policy Package option to create health check firewall policies (or policy blocks) for HUB(s) and branches.
Template Prerequisites
Import the FortiGate devices that will make up the hub and branch devices into FortiManager.
Configure the ISP links and other interfaces on your imported devices.
In this exercise, you configure an SD-WAN overlap template for a single HUB SD-WAN using the managed FortiGate device.
Tasks
For this objective, you will be working on the FortiManager and FGT-BR1.
1. From the Lab Activity tab, log in to FortiManager under the Data Center group via the HTTPS option.
2. Click Device Manager > Provisioning Templates > Template Groups. Confirm that no groups exist.
3. Click Provisioning Templates > IPsec Tunnel. Confirm that only the three default templates exist.
4. Click Provisioning Templates > BGP. Confirm that only the two default templates exist.
5. Click Provisioning Templates > SD-WAN Overlay and click Create New to begin using the SD-WAN overlay template
wizard.
11. Toggle ON Automatic Branch ID Assignment. When Automatic Branch ID Assignment is enabled, FortiManager
automatically assigns and tracks a branch ID for each device in the branch device group. This also applies to devices
added to the branch device group in the future, as well as those added to the device group using a zero-touch
provisioning device blueprint.
Standalone Hub:
16. Turn ON Add Health Check Firewall Policy to Hub Policy Package and select FGT-HQ from the drop-down list.
17. Turn ON Add Health Check Firewall Policy to Branch Policy Package and select FGT-BR1 from the drop-down list.
22. Click Provisioning Templates > IPsec Tunnel. The SD-WAN overlap template wizard created two new templates.
23. Click Provisioning Templates > BGP. The SD-WAN overlap template wizard created two new templates.
Background
In this objective, you push the SD-WAN template configuration to FortiGates via FortiManager Install Wizard and review the
VPN status.
Tasks
1. In the FortiManager GUI, click Device & Groups > Managed FortiGate (2).
4. Click Next.
6. Click Next.
9. Press F5 to refresh the FortiManager browser tab. The Provisioning Templates column shows that the templates were
installed successfully.
12. Expand HQ-Branch_HBLK policy list. You see firewall policies (or policy blocks) are created automatically to allow SLA
health checks to each device loopback. The SD-WAN overlay template creates the policy block and applies it to the top of
the HUB Policy Package.
14. Select the branch_id variable and Click Edit to review. When Automatic Branch ID Assignment is enabled in the
provisioning template configuration, FortiManager automatically assigns and tracks a branch ID for each device in the
branch device group. This also applies to devices added to the branch device group in the future, as well as those added
to the device group using a zero-touch provisioning device blueprint.
1. From the Lab Activity tab, log into FGT-BR1 under the Branch 1 group via HTTPS to option using the following
credentials:
2. An alert appears stating that this FortiGate is managed by a FortiManager. Click Login Read-Only.
3. Click Dashboard > Network. Locate and expand the IPsec widget. It shows the HUB1-VPN1 is up and running.
ZTNA is a Zero Trust Access (ZTA) capability that controls application access.
It extends the principles of ZTA to verify users and devices before every application session. ZTNA confirms that they meet
the organization’s policy to access that application.
Our unique approach, delivering Universal ZTNA as part of our FortiGate Next-Generation Firewall (NGFW) makes it uniquely
flexible, covering users when they are remote or in the office.
Universal ZTNA capabilities are automatically enabled on any device or service running FortiOS 7.0 and higher. This includes
hardware appliances, virtual machines in the cloud, and the FortiSASE service.
Background
FortiClient Endpoint Management Server (FortiClient EMS) is a security management solution that enables scalable and
centralized management of multiple endpoints.
FortiClient EMS provides efficient and effective administration of endpoints running FortiClient. It provides visibility across
the network to securely share information and assign security policies to endpoints. It is designed to maximize operational
efficiency and includes automated capabilities for device management and troubleshooting.
Tasks
1. From the Lab Activity FortiOS tab, login to FortiClient EMS via the HTTPS option using the following credentials:
4. On the top right corner, click +Add and use the following information:
Endpoint Groups: Click Edit and checkmark All Groups. Click Save.
3. For FortiClient Endpoint Sharing, select Share All FortiClients from the drop-down list.
4. For Tag Types Being Shared, choose both Classification Tags and Zero Trust Tags.
5. Click Save.
1. In FortiClient EMS, click Zero Trust Tags > Zero Trust Tagging Rules.
Name: Windows_Firewall.
OS: Windows.
4. Click Save.
5. Click Save.
Background
When configuring a firewall policy for IP- or MAC-based access control that uses different EMS tag types (such as ZTNA tags
and classification tags), a logical AND can be used for matching.
By separating each tag type into primary and secondary groups, the disparate tag types will be matched with a logical AND
operator.
Tasks
1. From the Lab Activity: FortiOS tab, login to FGT-ISFW via the HTTPS option using the following credentials:
3. Click + Create New on top to create a new policy and use the following information:
Name: Logical_AND_Policy_Match
Type: Standard
Source: all
IP/MAC Based Access Control: ZTNA IP Firewall_Enabled_Tag (Choose from the list & click Close)
Secondary Tags: CLASS IP Low (Choose from the list & click Close)
Note: Low-risk endpoints are automatically tagged with this EMS classification tag.
Destination: DC_Server
Schedule: Always
Service: ALL
Action: ACCEPT
5. Click Logical_AND_Policy_Match policy. Hover the mouse cursor on the left corner and drag this new firewall policy to
the top of the policy list above the two other policies.
Background
FortiClient is a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client.
A Fabric Agent is a bit of endpoint software that runs on an endpoint, such as a laptop or mobile device, that communicates
with the Fortinet Security Fabric to provide information, visibility, and control to that device. It also enables secure, remote
connectivity to the Security Fabric.
Tasks
1. From the Lab Activity: FortiOS tab, login to EMS using the HTTPS option.
1. From the Lab Activity: FortiOS tab, login to Alice's machine using the RDP option.
Note: Access to the web server is denied because no logical AND policy is matched.
Background
In this lab objective, you turn on the Windows firewall and test ZTNA connectivity again.
Tasks
1. On Alice's machine, go to Control Panel > System & Security > Windows Firewall.
4. Click OK.
1. From the lab activity tab, log in to FortiClient EMS using the HTTPS option.
3. Expand Firewall_Enabled_Tag.
Note: Alice's machine has been successfully tagged with the new EMS tag. In case you don’t see the EMS tag, wait for a
few minutes.
1. From the Lab Activity: FortiOS tab, log in to Alice using the RDP option.
This section includes information about policy and object-related new features.
Background
Improvements to the FortiOS GUI backend have been implemented to speed up the loading of a large number of policies.
This is achieved by only loading the necessary data when needed, rather than loading all the data at once.
This can significantly improve performance and reduce the time it takes to load a large number of policies.
A new layout has also been introduced for the policy list with the option to choose between the new layout and the old
layout.
To switch between the classic and new policy list layout, select the style from the dropdown menu.
In this lab objective, you switch between the classic and new policy list layout, select the style from the dropdown menu, and
review the new policy features.
Tasks
1. From the browser tab, log in to FGT-EDGE using the web console.
4. Expand EDGE_DC Network (port3) -> ISP1 (port6) policy section and click DC_to_WAN1 policy.
Note: The new layout includes several features to enhance user experience. The edit, and delete buttons are identified
through new icons along with words below the policy. Selecting a policy also displays an inline menu with options to edit,
insert, disable, and delete policies, with the option to Show more options when hovered over.
6. A pane is used to insert, create, and edit policies instead of a separate page. When a policy is inserted in Interface Pair
View, the Incoming Interface and Destination Interface fields will be automatically filled. You can confirm the
location of the new policy in the right-side gutter before inserting the policy.
8. You can now right-click in Interface Pair View to Expand All and then, click Collapse All sections.
Background
The Policy change summary and Policy expiration features of the FortiOS Workflow Management enforce an audit
trail for changes to firewall policies and allow administrators to set a date for the firewall policy to be disabled.
In this exercise, you set a policy expiration date and time with limited access to the web for the guest network.
Tasks
1. From the Lab Activity: FortiOS tab, login to FGT-EDGE via the HTTPS option using the following credentials:
4. Click Apply.
6. In the Workflow Management section, the review Policy change summary is set to Required.
Note: The default value for Policy expiration is 30 days. This number can be changed in the CLI or System > Settings
in the GUI to any value between zero and 365 days. If the default value is set to zero, the Default state will disable the
Policy expiration.
7. Click Apply.
12. Set the Expiration date to tomorrow’s date and the time 5:00 PM.
Note: Use the appropriate date, which will differ from the screenshot.
17. From the Firewall Policy page, again Edit the Guest_to_ISP1 firewall policy.
18. Under Security Profiles, enable Web Filter and select default.
21. In the Change Summary tab, type Default Web Filter enabled.
23. From the Firewall Policy page, again edit the Guest_to_ISP1 firewall policy.
Note: Policy change summaries are used to track changes made to a firewall policy. The Audit trail allows users to
review the policy change summaries, including the date and time of the change and which user made the change.
FortiSwitch secure access switches are feature-rich, yet cost-effective, supporting the needs of enterprise campus and
branch office network connectivity.
With high-density 24 and 48-port models, which support 802.11at Power over Ethernet (PoE), you can power anything from
access points to VoIP handsets and surveillance cameras.
FortiSwitch integrates directly into FortiGate, allowing switch administration and access port security to be managed from
the same “single pane of glass.” Regardless of how users and devices are connected to the network (wired, wireless, or
VPN), you have complete visibility and control over your network security and access.
FortiSwitch VLANs appear just like any other interface on a FortiGate, meaning you can apply policies to FortiSwitch ports
just as you can with FortiGate “WLAN” ports. You even have visibility of per-port and switch-level PoE power usage. Unified
control of switches through FortiGate, together with security administration, simplifies remote management and
troubleshooting.
Background
FortiOS includes features that enhance FortiSwitch management and further network deployment with minimal technical
expertise.
In this exercise, you go through the features of the FortiGate switch controller.
This includes the FortiSwitch topology view, the FortiSwitch Clients page, configuring of flap guard through the switch
controller, and allowing the FortiSwitch console port login to be disabled.
Tasks
1. From the Lab Activity: FortiOS tab, login to FGT-ISFW via HTTPS using the following credentials:
4. Check the Port Health section. When there are error frames, the port health is shown as Poor. When there are no error
frames, the port health is shown as Good.
5. Click Legend in the top right corner. It displays the Health Thresholds pane, which lists the thresholds for the Good,
Fair, and Poor ratings for General Health, Port Health, and MC-LAG Health.
7. You can now clear port counters by right-clicking a port and selecting Clear port counters.
1. Click WiFi & Switch Controller > FortiSwitch Clients. This page will list all devices connected to the FortiSwitch unit
for a particular VDOM.
2. Double-click the existing device to display the Device Info page. The page will display matching NAC policies and
dynamic port policies (if applicable).
3. You can create a Firewall Address and Quarantine Host by hovering the mouse over the device.
4. Click Cancel.
The flap guard feature detects how many times a port changes status during a specified number of seconds.
If too many changes are detected, the system shuts down the port. After a port is shut down, you can manually reset the
port and restore it to the active state.
Flap guard is configured and enabled on each port through the switch controller. The default setting is disabled.
3. To restore the port to service if flap guard shuts down port 3, you use the following command:
Note: Because flapguard has not triggered on port 3, the above command will not reset the port at this time.
Administrators can use the FortiSwitch profile to control whether users can log in with the managed FortiSwitchOS console
port. By default, users can log in with the managed FortiSwitchOS console port.
3. Enter the following commands to apply the switch profile on the managed switch:
Connections between IT and operational technology (OT) systems are no longer air-gapped, introducing the potential for
hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure.
Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
AcmeCorp organization is looking to have visibility in their network and be able to identify what type of devices are
connecting and connected.
In this objective, you are going to explore FortiGate OT asset visibility and network topology.
Tabs are added to the Asset Identity Center page to view the OT asset list and OT network topology using Purdue Levels.
Background
In this objective, you will go work on the FortiGate-ISFW to view the OT asset list and OT network topology using Purdue
Levels.
Tasks
1. From the Lab Activity: FortiOS tab, login to FGT-ISFW via the HTTPS option using the following credentials:
4. Click Apply.
6. In the column header top left corner, hover the mouse cursor and click the settings gear box icon once it appears as
shown in the screenshot below.
8. You can see the discovered PLC VM ending with the following MAC & IP addresses with Purdue Level 3:
Note: There are few other devices at the same Purdue Level 3.
Note: The OT View in your lab might differ from the screenshot shown below.
10. Click Unlock View. You are now able to freely drag and move devices to different levels. Do NOT move any devices yet.
Note: FortiGate and managed FortiSwitch devices are statically assigned to Purdue Level 2, other detected devices are
assigned to Purdue Level 3 by default and can be changed. You will be assigning the PLC VMs behind OT Network port6 to
Purdue Level 1 Basic Control.
11. On the top-right corner, click the >_ icon to open the CLI console session and enter the following commands:
12. On the OT View page wait for a few minutes and click the refresh icon next to Unlock View. You should be able to see
PLC VMs moved to Purdue Level 1.
Note: The Purdue Levels for the recently moved devices are set to 1 now.
This section includes lab objectives about new network-related FortiOS 7.4 features.
Background
A FortiGate can act as a DHCP server and assign IP addresses from different subnets to clients on the same interface or
VLAN based on the requests coming from the same DHCP relay agent.
A FortiGate may have more than one server and pool associated with the relay agent, and it can assign IP addresses from
the next server when the current one is exhausted.
This way, the FortiGate can allocate IP addresses more efficiently and avoid wasting unused addresses in each subnet.
In this exercise, you will configure DHCP Relay on FGT-ISFW and two DHCP servers on FGT-EDGE.
Tasks
1. From the Lab Activity: FortiOS tab, log into FGT-ISFW using the following credentials:
Note: DHCP clients Alice and Carol's Windows machines are connected to the Sales Network (port2) interface of FGT-
ISFW.
Mode: Relay
Type: Regular
Note: 10.10.30.14 is the FGT-EDGE port4 IP address. You will configure two DHCP servers on port 4 of the FGT-EDGE.
6. Click OK.
1. From the Lab Activity: FortiOS tab, log into FGT-EDGE via the HTTPS option using the following credentials:
4. Scroll down to turn ON DHCP Server and use the following settings:
Netmask: 255.255.255.0
5. Click OK.
6. On the top-right corner, click the >_ icon to open the CLI console session and copy/paste the following commands to set
the FGT-ISFW Port2 (Sales Network) interface as the DHCP relay agent:
1. In the FGT-EDGE, use the same CLI console session and copy/paste the following commands to configure another DHCP
server 2 (IP Address Range 172.16.30.x/24) on the same interface Port4 and set the FGT-ISFW Sales interface as the DHCP
relay agent:
1. In the FGT-EDGE, at the top-right corner, click the >_ icon to open the CLI console session and enter the following
command:
Note: You will see DHCP server 1 and DHCP server 2 configurations with different IP address ranges set up on the same
port4 interface of FGT-EDGE and pointing to the same DHCP relay agent Sales (port2) interface IP of the FGT-ISFW.
Both Carol and Alice's client machines are connected to the same port4 (Sales network) interface on FGT-ISFW. In this
objective, you will verify the DHCP IP leases assigned to these devices.
1. From the Lab Activity: FortiOS tab, login to Carol's machine via the RDP option using the following credentials:
1. From the Lab Activity: FortiOS tab, login to Alice's machine via the RDP option using the following credentials:
3. Double-click Sales Network Adapter > Properties > TCP/IPv4 > Obtain an IP address automatically > Obtain DNS server
address automatically.
1. From the Lab Activity: FortiOS tab, login to FGT-EDGE via the HTTPS option using the following credentials:
3. Both Carol & Alice's machines are assigned IP addresses by FGT-EDGE (DHCP server) from two different subnets on the
same interface as requests are coming from the same DHCP relay agent FGT-ISFW. A FortiGate can assign IP addresses
from the next server when the first one is exhausted. This way, the FortiGate can allocate IP addresses more efficiently
and avoid wasting unused addresses in each subnet.
Background
A route tag (route-tag) firewall address object can include IPv4 or IPv6 addresses associated with a BGP route tag number,
and is updated dynamically with BGP routing updates. The route tag firewall address object allows for a more dynamic and
flexible configuration that does not require manual intervention for dynamic routing updates.
This address object can be used wherever a firewall address can be used, such as in a firewall policy, a router policy, or an
SD-WAN service rule.
In this lab objective, you will configure and apply a route tag address object.
Note: The Route tag field has been removed from the Priority Rule configuration page (Network > SD-WAN > SD-WAN
Rules). The route-tag option has been removed from the config service settings under config system sdwan.
Tasks
1. From the Lab Activity: FortiOS tab, login to FGT-EDGE via the HTTPS option using the following credentials:
2. At the top right corner, click >_ to open a CLI console session and copy/paste the following commands:
7. Click Close.
8. Click OK.
Review
Verify that the route tag firewall address is associated with firewall policy ID 2 (ISFW_to_WAN1):
1. At the top right corner, click >_ to open a CLI console session and copy/paste the following command:
2. Scroll the list and locate the policy with policy index=2 and route_tag(1): 10 assigned to it.
This concludes the Fast Track Workshop lab activity. We hope you found the information provided useful and the user
experience compelling.
After completing this Fast Track workshop, you should know, how to:
Use the Security Fabric improvements to provide IT teams with a holistic view into devices, traffic, applications, and
events, in addition to the ability to stop a threat anywhere along its attack chain.
Enable the sharing and correlation of real-time threat intelligence by integrating devices using open standards, common
operating systems, and unified management platforms.
Use FortiOS ZTNA, OT, and SD-WAN capabilities to deliver unprecedented visibility, secure networking, and risk reduction
for cyber-physical and industrial control systems.
Now that you've completed the What's New in FortiOS workshop, here are a few additional resources and some next
steps.
For continued learning about Fortinet solutions and products, please consider Fortinet NSE training:
https://training.fortinet.com/
Additional resources regarding new features of FortiOS can be found at the following locations:
Ask your instructor for more information about the following Fast Track workshops: