LAB 01 System and Network Settings
LAB 01 System and Network Settings
Sumário
Lab 1: System and Network Settings ........................................................................................................... 3
Objectives.......................................................................................................................................... 3
Time to Complete ............................................................................................................................... 3
Exercise 1: Configuring FortiGate System Settings .................................................................................... 4
Review Local-FortiGate Network Settings ............................................................................................. 4
Enable the DHCP Server on Local-FortiGate ......................................................................................... 6
Exercise 2: Working With the CLI ............................................................................................................. 7
Explore the CLI ................................................................................................................................... 7
To explore the CLI ............................................................................................................................... 7
Action ................................................................................................................................................ 7
Exercise 3: Generating Configuration Backups........................................................................................ 11
Restore a Configuration From a Backup .............................................................................................. 11
Back Up and Encrypt a Configuration File ........................................................................................... 13
Exercise 4: Configuring Administrator Accounts ..................................................................................... 18
Configure a User Administrator Profile ................................................................................................ 18
2
Lab 1: System and Network Settings
In this lab, you will learn about FortiGate basic system and network factory default settings and apply changes
and modify the default factory settings. You will also perform administrative tasks through the CLI and GUI and
back up and restore a configuration file, as well as create a new administrator account and modify
administrator access permissions.
Objectives
• Review and change network settings
• Locate the FortiGate model and FortiOS firmware build in a configuration file
Time to Complete
Estimated: 30 minutes
VM Username Password
3
Exercise 1: Configuring FortiGate System Settings
In this exercise, you will review the Local-FortiGate system settings and make changes to complete setting up
FortiGate on your network. You will enable the internal network DHCP server to allow hosts to receive the IP
address when connecting to Local-FortiGate.
Some of the settings in this lab have been preconfigured and are not the factory default settings of FortiGate.
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
You can double-click an object on the FortiGate GUI to view or edit the content
of the object.
4. In the Edit Interface window, review the information available on the right.
4
FortiGate displays its host name and status without the need to navigate away from your current work.
Why do some of the settings appear or disappear when the role of an interface
changes?
5
The purpose of choosing WAN as the role of the interface is to see that when this
interface is connected to an external connection, you may need to disable some
settings to configure the DHCP server setting.
When the role of the interface is set to WAN, you can set the downstream and upstream maximum bandwidth.
You can set the priority value of the static route. When two routes have an equal distance, the route with a lower
priority number takes precedence
6
4. Enable DHCP Server.
Notice in the LAN role, the DHCP server appears on the GUI, unlike when the
role is set to WAN.
This command displays basic status information about FortiGate. The output includes the FortiGate serial
number, operation mode, and so on. When the More prompt appears on the CLI, perform one of the following
actions:
Action Command
7
Action Command
To exit Type q.
get ?
This command shows all options that the CLI will accept after the get command. Depending on the command,
you may need to enter additional words to completely specify a configuration option.
7. Try some of the control key sequences shown in the following table:
Action Command
8
Action Command
execute ?
This command lists all options that the CLI accepts after the execute command.
10. Press the space bar, and then press the Tab key three times.
Each time you press the Tab key, the CLI replaces the second word with the next possible option for
the execute command, in alphabetical order.
You can abbreviate most commands. In lessons and labs, many of the
commands that you see are in abbreviated form. For example, instead of
typing execute, you can type exe.
Use this technique to reduce the number of keystrokes that are required to enter
a command. Often, experts can configure FortiGate faster using the CLI than
using the GUI.
If there are other commands that start with the same characters, your
abbreviation must be long enough to be specific, so that FortiGate can
distinguish them. Otherwise, the CLI displays an error message about
ambiguous commands.
9
11. On a new line, enter the following command to view the port3 interface configuration (hint: try using the
shortcuts you just learned about):
The show full-configuration command displays all the configuration settings for
the interface. The show command displays only those values that are different
from the default values.
10
Exercise 3: Generating Configuration Backups
In this exercise, you will learn how to generate and restore cleartext and encrypted configuration backups. The
configuration files that backups produce enable you to restore FortiGate to an earlier configuration.
1. Log in to the Local-Client VM with the username Administrator and password password.
The first time that you log in, you may need to click and drag the screen from the
bottom to bring up the login prompt.
2. On the Local-Client VM, open a browser, and then log in to the Local-FortiGate GUI at 10.0.1.254 with
the username admin and password password.
You can also access the Local-FortiGate GUI from the bookmarks bar in the
Mozilla Firefox browser.
All lab exercises were tested running Firefox on the Local-Client and Remote-
Client VMs. To get consistent results, you should use Firefox to access both the
internet and the FortiGate GUIs in this virtual environment.
3. In the upper-right corner, click admin, and then click Configuration > Restore.
11
4. Click Upload to select the backup configuration file from your local PC.
5. Click Desktop > Resources > FortiGate-Administrator > Introduction > local-initial.conf, and then
click Select.
6. Click OK.
7. Click OK to reboot.
After your browser uploads the configuration, FortiGate reboots automatically. This takes approximately 30–45
seconds.
8. When the Local-FortiGate GUI login page reappears after reboot, log in with the username admin and
password password.
9. Click Network > Interfaces, and then verify that the network interface settings were restored.
12
10. Click Network > Static Routes, and then verify that the default route was restored.
You will create an encrypted file with the backup of the FortiGate current configuration.
1. On the Local-Client VM, open a browser, and then log in to the Local-FortiGate GUI at 10.0.1.254 with
the username admin and password password.
2. On the Local-FortiGate GUI, in the upper-right corner, click admin, and then
click Configuration > Backup.
13
5. Click OK.
The Firefox browser saves the encrypted configuration file in the Downloads folder, by default. Ensure that you
record the password and store it in a secure place.
You can access downloaded files by clicking the download arrow button in the
upper-right corner of the browser.
Restoring from a backup enables you to return FortiGate to a previous configuration. As a word of caution, if you
cannot recall the password required to decrypt an encrypted backup, you will not be able to restore FortiGate
to the backup. Ensure that you record the password and store it in a secure place.
You will restore the configuration backup that you created in the previous procedure.
If you require assistance, or to verify your work, use the step-by-step instructions
that follow.
After you complete the challenge, see Compare the Headers of Two
Configuration Files on page 1.
1. On the Local-FortiGate GUI, in the upper-right corner, click admin, and then
click Configuration > Restore.
14
3. Browse to your Downloads folder, and then select the configuration file that you created in the previous
procedure.
FortiGate reboots.
When you troubleshoot issues, or when you restore FortiGate to an earlier OS version or build, it is useful to
know where to find the version and build number in a configuration file. This task shows you where to find this
information.
You will open and compare two configuration files using Notepad++.
15
2. Click File > Open, and then browse to the Downloads folder to open the encrypted configuration file.
3. Click File > Open, and then browse to the initial configuration file:
Desktop\Resources\FortiGate-Security\Introduction\local-initial.conf
16
4. Compare the headers in the two files.
In both the cleartext and encrypted configuration files, the top line acts as a
header, and lists the firmware and model that this configuration belongs to.
5. Close the two tabs in Notepad++, and then close the application.
17
Exercise 4: Configuring Administrator Accounts
FortiGate offers many options for configuring administrator privileges. For example, you can specify the IP
addresses that administrators are allowed to connect from.
In this exercise, you will work with administrator profiles and administrator user accounts. An administrator
profile is a role that is assigned to an administrator user that defines what the user is permitted to do on the
FortiGate GUI and CLI.
1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.
5. In the permissions table, set Security Profile to Read/Write, and then set all other permissions
to Read.
18
6. Click OK to save the changes.
You will create a new administrator account. You will assign the account to the administrator profile you
created in the previous procedure. The administrator will have read-only access to most of the configuration
settings.
2. Click Create New, and then click Administrator to add a new administrator account.
Field Value
Username Security
19
Field Value
Password fortinet
Administrator names and passwords are case sensitive. You can't include
characters, such as < > ( ) # ", in an administrator account name.
You will confirm that the new administrator account has read-write access to only the security profile
configuration.
1. Continuing on the Local-FortiGate GUI, click admin, and then click Logout to log out of
the admin account GUI session.
20
2. Log back in to the Local-FortiGate GUI with the username Security and password fortinet.
4. Enable Don't show again, and then click OK to close the FortiOS introduction window.
You should see that this account can configure only security profiles.
You will restrict access for FortiGate administrators. Only administrators connecting from a trusted subnet are
allowed access. This is useful if you must restrict the access points that administrators connect to FortiGate
from.
1. On the Local-Client VM, open a browser, and then log in to the Local-FortiGate GUI with the
username admin and password password.
4. Enable Restrict login to trusted hosts, and then set Trusted Host 1 to the 10.200.3.0/24 address.
You will verify that a Security administrator outside the 10.200.3.0/24 subnet can't access FortiGate.
3. Log in to the Remote-Client VM with the username Administrator and password password.
4. On the Remote-Client VM, open a browser, and then log in to the Local-FortiGate GUI at 10.200.1.1 with
the username Security and password fortinet.
Why were you able to log in using the admin account and not
the Security account from the Local-Client VM directly connecting to the Local-
FortiGate GUI?
This is because Trusted Host is set on the Security administrator account but
not on the admin account.
5. On the Local-FortiGate CLI, log in with the username admin and password password.
6. Enter the following CLI commands to add 10.0.1.0/24 as the second trusted IP subnet (Trusted Host 2)
to the Security administrator account:
edit Security
end
8. Open a browser, and then try to log in to the Local-FortiGate GUI at 10.0.1.254 with the
username Security and password fortinet.
22