Fortinet OT Security Lab Guide For FortiOS 7.2
Fortinet OT Security Lab Guide For FortiOS 7.2
© FORTINET
OT Security
Lab Guide
for FortiOS 7.2
DO NOT REPRINT
© FORTINET
Fortinet Training Institute - Library
https://training.fortinet.com
https://docs.fortinet.com
https://kb.fortinet.com
https://fusecommunity.fortinet.com/home
Fortinet Forums
https://forum.fortinet.com
https://support.fortinet.com
FortiGuard Labs
https://www.fortiguard.com
https://www.fortinet.com/nse-training
https://home.pearsonvue.com/fortinet
https://helpdesk.training.fortinet.com/support/home
11/22/2022
DO NOT REPRINT
© FORTINET
TABLE OF CONTENTS
Network Topology 6
Lab 1: Introduction 7
Lab 2: Device Detection 8
VM Username and Passwords 8
Exercise 1: Configuring Device Detection on FortiGate 9
Configure FortiAnalyzer Logging on Edge-FortiGate (Root) 9
Configure the Security Fabric on Edge-FortiGate (Root) 10
Configure the Security Fabric on FortiGate-1 11
Authorize the Downstream FortiGate (FortiGate-1) on the Root FortiGate (Edge-
FortiGate) 12
Configure the Security Fabric on FortiGate-2 13
Authorize the Downstream FortiGate (FortiGate-2) on the Root FortiGate (Edge-
FortiGate) 14
Authorize All Security Fabric FortiGate Devices on FortiAnalyzer 15
Check the Security Fabric Deployment Result 16
Lab 3: Access Control 19
Exercise 1: Configuring Local Authentication 21
Configure Local Users 21
Configure Firewall Policy Authentication 22
Test the Policy-Based Authentication 23
Exercise 2: Configuring FSSO Authentication 25
Review the FSSO Configuration on FortiGate 25
Assign FSSO Users to a Firewall Policy 26
Test the User Authentication 27
Lab 4: Segmentation 29
Exercise 1: Configuring Microsegmentation 31
Configure a Software Switch on FortiGate-1 31
Manage Traffic Between PLC-1 and PLC-2 32
Configure a Software Switch on FortiGate-2 33
Exercise 2: Configuring Internal Segmentation 35
Configure Firewall Policies to Allow Traffic Between Floors 35
Lab 5: Protection 39
Exercise 1: Configuring Industrial Signatures 40
DO NOT REPRINT
© FORTINET
Generate Modbus Traffic 40
Review Logs 41
Generate IEC 104 Communication Traffic 42
Review Logs 42
Exercise 2: Configuring an Application Filter Sensor 44
Create an Application Sensor 44
Generate and Monitor Traffic 46
Lab 6: Logging and Monitoring Configuration 48
Exercise 1: Preparing Devices for Logs and Alerts 51
Configure Edge-FortiGate to Send Logs to FortiAnalyzer and FortiSIEM 51
Configure FortiAnalyzer 52
Configure a Rule on FortiSIEM for Incidents 54
Generate Logs 57
Exercise 2: Examining Logs and Events on FortiAnalyzer 59
Explore Log View 59
Use Log Filters 62
Create a Custom View 63
Explore FortiView 65
Explore FortiSOC 65
View OT Security Events and Incidents 66
Exercise 3: Configuring a Rule to Monitor Performance 69
Configure a Rule to Monitor Fuel Pump Server Temperature Sensors 69
Lab 7: Risk Assessment 82
Exercise 1: Running a Default Report 83
Exercise 2: Building a Chart-Based Report on a Log Search 88
Exercise 3: Executing Default Reports on FortiSIEM 94
Exercise 4: Building Reports From Analytics on FortiSIEM 98
Create a Report on Performance for OT Devices 98
Create a Report on Traffic for Purdue Level 1 Devices 101
Create a Report on Modbus and IEC 104 service 103
Create a Report on OT Security Events From FortiAnalyzer 105
Exercise 5: Building an OT Dashboard on FortiSIEM 109
Lab 8: Use Case 1 117
Exercise 1: Configuring Devices 120
Network Topology 120
Requirements 120
Exercise 2: Testing the Configuration 122
Lab 9: Use Case 2 124
Exercise 1: Configuring Devices 127
Network Topology 127
Requirements 127
DO NOT REPRINT
© FORTINET
Exercise 2: Testing the Configuration 130
DO Network
NOTTopology
REPRINT
© FORTINET
Network Topology
In this lab, you will learn to configure the Fortinet Security Fabric with device detection. After you configure the
Security Fabric, you will access the physical and logical topology views.
Objectives
l Configure the Security Fabric on Edge-FortiGate (root), FortiGate-1, and FortiGate-2
l Use the Security Fabric topology views to have logical and physical views of your network topology
Time to Complete
Estimated: 30 minutes
VM Username Password
In this exercise, you will configure the Security Fabric between Edge-FortiGate (root), FortiGate-1 (leaf), and
FortiGate-2 (leaf).
You will configure the root of the Security Fabric to send all logs to FortiAnalyzer. These settings are automatically
replicated to all downstream devices when they become members of the Security Fabric.
Field Value
Status Enable
IP address 10.1.3.210
5. Click OK.
6. In the verification window that appears, click Accept.
© FORTINET
A warning appears that states FortiGate isn’t authorized on FortiAnalyzer yet. You will
configure this authorization on FortiAnalyzer in a later step.
7. Click Close.
4. Click OK.
Field Value
Status Enable
Allow other Security Fabric devices to join Enable, and then ensure that both interfaces (port1 and
port2) are selected.
© FORTINET
5. Click OK.
© FORTINET
5. In the Upstream FortiGate IP/FQDN field, make sure the IP address is 10.1.1.254.
6. In the Default admin profile field, select admin_no_access.
7. Click OK.
8. Click OK.
You will authorize FortiGate-1 on the root Edge-FortiGate to join the Security Fabric.
© FORTINET
3. In the Device Registration window, in the Devices field, ensure the FortiGate serial number is selected, and then
click Authorize.
If the serial number is not displayed, refresh the page, and then repeat step 2.
4. Click Close.
After authorization, FortiGate-1 appears in the Security Fabric topology section, which
means FortiGate-1 joined the Security Fabric successfully.
5. Hover over the FortiGate-1 icon to display a summary of the firewall settings, and then verify that it is correctly
registered in the Security Fabric.
© FORTINET
5. In the Network section, enable Device detection.
6. Click OK.
You will authorize FortiGate-2 on the root Edge-FortiGate to join the Security Fabric.
© FORTINET
3. In the Device Registration window, in the Devices field, ensure the FortiGate serial number is selected, and then
click Authorize.
If the serial number is not displayed, refresh the page, and then repeat step 2.
4. Click Close.
After authorization, FortiGate-2 appears in the Security Fabric topology section, which
means FortiGate-2 joined the Security Fabric successfully.
5. Hover over the FortiGate-2 icon to display a summary of the firewall settings, and then verify that it is correctly
registered in the Security Fabric.
© FORTINET
4. Select the Edge-FortiGate, FortiGate-1, and FortiGate-2 checkboxes, and then click Authorize.
5. Click OK to keep the default FortiGate device names.
6. In the Authorize Device wizard, click Close.
All three devices are added to the FortiAnalyzer root ADOM.
7. Wait a few seconds until the Logs status for all FortiGate devices turns green.
You will check the Security Fabric deployment result on the root Edge-FortiGate.
© FORTINET
© FORTINET
In this lab, you will configure local authentication on FortiGate-1 and FortiGate-2.
This lab uses a demo environment to emulate the behavior of an active FSSO DC agent from the Linux-Client VM
using a Python script. Therefore, you will not configure a DC agent to send logon events from the Linux-Client VM.
Objectives
l Configure local authentication and apply it to policies
l Review the SSO configuration on FortiGate
l Test the transparent or automatic user identification by generating user logon events
l Monitor the SSO status and operation
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must restore the initial configuration files to the FortiGate devices. The configuration
files are located on the desktop of the Linux-Client VM.
© FORTINET
To restore the FortiGate-2 configuration file
1. Log in to the FortiGate-2 GUI at 10.1.2.1 with the username admin and password password.
2. In the upper-right corner of the screen, click admin, and then click Configuration > Restore.
In this exercise, you will configure local users and use them as part of policy-based authentication to allow access
to programmable logic controllers (PLCs).
Field Value
Username supervisor
Password password
4. Click Submit.
5. Click Create New.
6. Configure the following settings:
Field Value
Username PLC1admin
Password password
7. Click Submit.
8. Log in to the FortiGate-2 GUI with the username admin and password password.
9. Click User & Authentication > User Definition > Create New.
10. Configure the following settings:
Field Value
Username supervisor
Password password
© FORTINET
11. Click Submit.
You will configure firewall policy authentication to allow authorized users to access the PLCs.
Field Value
Name PLC-2_Access
Source all
Destination PLC-2
Service ALL
NAT disable
3. Click OK.
4. Click Create New, and then configure the following settings:
Field Value
Name PLC-1_Access
Source all
Destination PLC-1
Service ALL
NAT disable
5. Click OK.
6. On the Linux-Client VM, close all browsers that are open.
© FORTINET
Test the Policy-Based Authentication
You will test the policy-based authentication from the Linux-Client VM.
2. Type the username PLC1admin and password password, and then click Continue.
3. Open another browser tab, and then open the PLC-2 web page at http://192.168.1.2.
Notice that you cannot connect to the PLC-2 page. This is because the user is already
registered with the IP address and is not allowed to access PLC-2.
© FORTINET
FortiGate sends an authentication page for user authentication.
11. Type the username supervisor and password password, and then click Continue.
You are redirected to the PLC-1 web page.
12. Open another browser tab, and then open the PLC-2 web page at http://192.168.1.2.
Notice that this time, you are not required to authenticate the user. Because the
supervisor user also has access to PLC-2, you can access PLC-2 without having to
authenticate the user.
In this exercise, you will assign FSSO users to a firewall policy and test the user authentication to access PLCs
protected by FortiGate.
This lab uses a demo environment to emulate the behavior of an active FSSO DC agent from the Linux-Client VM
using a Python script. Therefore, you will not configure a DC agent to send logon events from the Linux-Client VM.
In the real world, you must configure FortiGate to identify users by polling their logon
events using an FSSO agent, and you must install and configure a collector agent.
FSSO agents are available on the Fortinet Support website
(http://support.fortinet.com).
For FortiGate to communicate and poll information from the FSSO collector agent,
you must assign the polled user to a firewall user group, and then add the user group
as a source on a firewall policy.
Finally, you can verify the user logon event that FortiGate collects. This event is
generated after a user logs in to the Windows Active Directory domain. Therefore, no
firewall authentication is required.
You will review the FSSO configuration and FSSO user groups on Edge-FortiGate. FSSO allows FortiGate to
automatically identify the users who connect using SSO. Then, you will add FSSO user groups to the firewall
policies.
To review the FSSO server and FSSO user group configuration on FortiGate
1. Log in to the Edge-FortiGate GUI with the username admin and password password.
2. Click Security Fabric > External Connectors.
3. Select TrainingDomain, and then click Edit.
4. In the upper-right corner, review the Endpoint/Identity status, and see that the status is Disconnected.
Leave the window open.
Keep the terminal window open. The script will continue to run in the background.
© FORTINET
The Security Fabric > External Connectors window is displayed.
Field Value
Name Management
Members TRAININGAD/Management_Users
The FSSO user is automatically listed because of the selected group type—FSSO.
3. Click OK.
You will assign your FSSO user group as a source on a firewall policy. This allows you to control access to
network resources based on user identity.
© FORTINET
Field Value
Name Floor-2_Access
Source all
Destination all
Service ALL
NAT disable
4. Click OK.
You will test the user authentication from the Linux-Client VM.
2. Log in to the Edge-FortiGate GUI with the username admin and password password.
3. Click Log & Report > Forward Traffic.
4. Select a log, and then click Details to view more information about it.
© FORTINET
In this lab, you will configure microsegmentation with Edge-FortiGate, FortiGate-1, and FortiGate-2.
Objectives
l Configure software switches on FortiGate-1 and FortiGate-2
l Allow traffic between software switch members based on requirements
Time to Complete
Estimated: 30 minutes
Prerequisites
Before you begin this lab, you must restore the initial configuration files to the FortiGate devices. The configuration
files are located on the desktop of the Linux-Client VM.
© FORTINET
In this exercise, you will configure software switches on FortiGate-1 and FortiGate-2. You will use the software
switches to control traffic between devices that belong to the same broadcast domain. You will use firewall policies
to allow traffic based on the requirements.
You will configure a software switch on FortiGate-1. You will add port3 and port4 as members of the switch.
Field Value
Name Linux_Client_To_PLC_Access
Source Linux-Client
Destination all
Service ALL
NAT disable
© FORTINET
8. Click OK.
You configured a software switch and now PLC-1 and PLC-2 belong to the same broadcast domain. Now, you will
test the connectivity between PLC-1 and PLC-2.
You will notice that even if PLC-1 and PLC-2 are in the same broadcast domain, they
cannot ping each other.
Field Value
Name PLC-1_To_PLC-2
Source all
Destination all
Service ALL
NAT disable
© FORTINET
4. Click OK.
Because you only have a policy that allows traffic from PLC-1 to PLC-2, the
communication is active from PLC-1 to PLC-2 only, but not the other way around.
You will configure a software switch on FortiGate-2. You will add port3 and port4 as members of the switch.
© FORTINET
7. Click Create New, and then configure the following settings to allow Linux-Client access to PLC-3 and the Client
VM:
Field Value
Name Linux_Client_Access
Source Linux-Client
Destination all
Service ALL
NAT disable
8. Click OK.
In this exercise, you will manage the traffic from one floor to another using firewall policies on Edge-FortiGate.
Floor-1 and Floor-2 are already segmented using two different subnets and two different interfaces. Any
communication between the floors must be allowed by a supervisor on Edge-FortiGate.
You will configure firewall policies to allow traffic from the Client VM to PLC-2. You will also allow traffic from PLC-
1 to PLC-3. You will restrict the allowed traffic as much as possible to allow only essential traffic, to avoid security
risks.
Field Value
Name Client_To_PLC-2
Source Client
Destination PLC-2
Service ALL
NAT disable
4. Click OK.
5. Log in to the Edge-FortiGate GUI with the username admin and password password.
6. Click Policy & Objects > Firewall Policy.
7. Click Create New, and then configure the following settings to allow the Client VM access to PLC-2:
Field Value
Name Client_To_PLC-2
© FORTINET
Field Value
Source Client
Destination PLC-2
Service ALL
NAT disable
8. Click OK.
9. Log in to the FortiGate-1 GUI with the username admin and password password.
10. Click Policy & Objects > Firewall Policy.
11. Click Create New, and then configure the following settings to allow the Client VM access to PLC-2:
Field Value
Name Client_To_PLC-2
Source Client
Destination PLC-2
Service ALL
NAT disable
© FORTINET
Field Value
Name PLC-1_To_PLC-3
Source PLC-1
Destination PLC-3
Service ALL
NAT disable
3. Click OK.
4. On the Edge-FortiGate GUI, click Policy & Objects > Firewall Policy.
5. Click Create New, and then configure the following settings to allow PLC-1 access to PLC-3:
Field Value
Name PLC-1_To_PLC-3
Source PLC-1
Destination PLC-3
Service ALL
NAT disable
6. Click OK.
7. On the FortiGate-2 GUI, click Policy & Objects > Firewall Policy.
8. Click Create New, and then configure the following settings to allow PLC-1 access to PLC-3:
Field Value
Name PLC-1_To_PLC-3
Source PLC-1
Destination PLC-3
© FORTINET
Field Value
Service ALL
NAT disable
9. Click OK.
In this lab, you will configure Edge-FortiGate to monitor industrial protocol signatures using application filters. You
will also create an application filter to allow specific signatures to pass through.
Objectives
l Configure an application filter to monitor industrial signatures
l Generate industrial signatures on PLCs and Client VMs
l Monitor logs for industrial traffic signatures
l Use application control to allow only specific signatures
Time to Complete
Estimated: 45 minutes
Prerequisites
You must complete the previous lab before you start this one. If you haven't done so, tell your instructor.
In this exercise, you will perform basic industrial control system (ICS) honeypot communication by simulating
common industrial control protocols. You will generate Modbus TCP with Conpot from the Client VM to PLC-2.
You will log the traffic on Edge-FortiGate, and then review the logs.
You will configure application control on Edge-FortiGate. You will also generate Modbus TCP traffic from the
Client VM to PLC-2.
© FORTINET
Review Logs
You will review logs being captured by Edge-FortiGate for the Modbus traffic that you generated.
To review logs
1. Log in to the Edge-FortiGate GUI with the username admin and password password.
2. Click Log & Report > Forward Traffic.
3. Review the log with the Modbus_Diagnostics signature.
© FORTINET
Generate IEC 104 Communication Traffic
You will start IEC 104 communication from PLC-1 to PLC-3, and then monitor the traffic.
After you run the Python command, notice the data model on PLC-3. You also
simulated a similar data model on PLC-1.
Review Logs
You will review the logs being captured by Edge-FortiGate for the IEC 104 traffic that you generated.
To review logs
1. Log in to the Edge-FortiGate GUI with the username admin and password password.
2. Click Log & Report > Security Events.
3. Review the security widgets, and then click the Application Control widget.
4. Review the logs for IEC traffic.
© FORTINET
Press Ctrl+C to stop the scripts on the PLC-1, PLC-2, and PLC-3 PuTTY sessions
before beginning the next exercise.
In this exercise, you will create an application sensor to allow only specific traffic and block all other traffic from
PLC-1 to PLC-3.
You will create an application sensor using signatures to allow IEC 104 transfer only. You will also block the
signature for the C_BO_NA_1 command.
© FORTINET
© FORTINET
To apply an application sensor to a policy
1. Log in to the Edge-FortiGate GUI with the username admin and password password.
2. Click Policy & Objects > Firewall Policy.
3. Select the PLC-1_To_PLC-3 policy, and then click Edit.
4. Enable Application Control, and then select the Allow_IEC-104_Transfer profile.
5. Click OK.
You will generate IEC 104 communication, and then review the logs.
To generate traffic
1. Connect to the Linux-Client VM.
2. On the Linux-Client VM, open PuTTY.
3. Click PLC-3 to select the saved session, and then click Open.
4. Log in with the username sysadmin and password Fortinet1!.
5. Enter the following command:
cd Uploads/iecsim/
python3 demo_server.py 1000 2000
6. Leave the PuTTY session open.
7. Connect to the Linux-Client VM.
8. On the Linux-Client VM, open PuTTY.
9. Click PLC-1 to select the saved session, and then click Open.
10. Log in with the username sysadmin and password Fortinet1!.
11. Enter the following command:
cd Uploads/iecsim/
python3 demo_client.py 192.168.2.1 1000 1010
12. Leave the PuTTY session open.
To review logs
1. Log in to the Edge-FortiGate GUI with the username admin and password password.
2. Click Log & Report > Security Events, then click the Application Control widget.
3. Review the logs for IEC traffic.
© FORTINET
Press Ctrl+C to stop the scripts on the PLC-1 and PLC-3 PuTTY sessions before
beginning the next lab.
In this lab, you will configure FortiGate to send logs to FortiAnalyzer and FortiSIEM. You will configure
FortiAnalyzer to accept logs from FortiGate, and configure a rule to monitor industrial protocols on FortiSIEM.
You will also configure FortiSIEM to monitor and send alerts for changes in the performance of industrial devices.
After you complete these exercises, you will understand how single and multiple pattern performance rules for
industrial devices work and how to create your own.
Objectives
l Configure FortiGate to send logs to both FortiAnalyzer and FortiSIEM
l Configure FortiAnalyzer to send security events to FortiSIEM
l Examine logs on FortiAnalyzer for industrial protocols and signatures
l Examine logs and alerts on FortiSIEM for industrial protocols and signatures
l Configure a performance single pattern rule on FortiSIEM to send alerts for industrial devices
l Enhance performance rules for multiple patterns to send alerts for industrial devices on FortiSIEM
Time to Complete
Estimated: 120 minutes
Prerequisites
Before you begin this lab, you must restore the initial configuration files to FortiAnalyzer and Edge-FortiGate. The
configuration files are located in the Resources folder on the desktop of the Linux-Client VM.
© FORTINET
4. Click Browse.
5. Click Desktop > Resources > Logging and Monitoring, and then select FortiAnalyzer_logging.dat.
You do not have to enter a password because the file is not encrypted.
7. Click OK.
© FORTINET
To restore the Edge-FortiGate configuration file
1. On the Linux-Client VM, open a browser, and then log in to the Edge-FortiGate GUI at 10.1.5.254 with the
username admin and password password.
2. In the upper-right corner of the screen, click admin, and then click Configuration > Restore.
Follow the directions in the lab guide and do not make changes to any other devices
unless your instructor tells you to.
In this exercise, you will configure FortiGate to send logs to FortiAnalyzer and FortiSIEM. You will configure
FortiAnalyzer to accept logs from FortiGate, and configure an event handler to send events to FortiSIEM. You will
also configure a rule to monitor industrial protocols on FortiSIEM, by generating traffic from PLC simulations.
You will configure FortiGate to send logs to both FortiAnalyzer and FortiSIEM.
Field Value
IP address 10.1.3.210
6. Click OK.
7. Click Accept.
8. Click Close.
A warning appears that states FortiGate isn’t yet authorized on FortiAnalyzer. You will
configure this authorization on FortiAnalyzer in a later step.
4. Click Apply.
5. Click OK to dismiss the warning message.
© FORTINET
6. Click Close.
Configure FortiAnalyzer
You will configure FortiAnalyzer to accept logs from FortiGate. You will also configure an event handler to send
events to FortiSIEM.
5. In the Logs match field, select All, and then configure the following settings:
Field Value
Value Industrial
© FORTINET
Field Value
6. In the Notification section, select the Send Alert to Syslog Server checkbox, and then click + to configure the
syslog server settings.
7. In the Create New Syslog Server Settings window, configure the following settings:
Field Value
Name FortiSIEM
© FORTINET
8. Click OK, and then in the drop-down list, select FortiSIEM as the syslog server.
9. Click OK to finish the event handler configuration.
You will configure a rule on FortiSIEM to monitor industrial protocols and trigger an incident if a match is found.
5. Click Rules > Security > Operation Technology, and then click New.
6. In the Add New Rule window, under Step 1: General, in the Rule Name field, type Monitor Industrial
Protocols.
7. Select Step 2: Define Condition, and then leave the default time interval set to 300 seconds (5 minutes).
8. In the Subpattern field, click the pencil icon, type the name industrial_protocol_monitor, and then create
the following Filters:
Field Value
Operator IN
Value Select CMDB > Protocols > OT Ports, add the OT Ports
group to Selections, and then click OK.
Next OR
Row +
© FORTINET
Field Value
Operator IN
Value Select CMDB > Protocols > OT Ports, add the OT Ports
group to Selections, and then click OK.
9. In the Aggregate section, use the Expression Builder in the Attribute field.
10. In the Function field, select COUNT, and then click +.
11. In the Event Attribute field, select Matched Events, click +, and then click Validate.
An Expression is valid message appears.
© FORTINET
15. Click Step 3: Define Action, set the Severity to 10 - HIGH, the Category to Security, and the Subcategory to
Lateral Movement.
16. In the Action section, click the pencil icon, in the Incident Title field, type Operational Technology, complete
the Incident Attributes and Triggered Attributes fields as shown in the following image, and then click Save.
© FORTINET
Generate Logs
© FORTINET
4. Log in with the username sysadmin and password Fortinet1!.
5. Enter the following command:
./Uploads/start-conpot.sh
6. Leave the PuTTY session open.
The output may report a failure to allocate a new port. This is because of the previous
lab. It should not impact the results to continue and generate Modbus traffic.
Notice the data model on PLC-3 after running the Python command. You also
simulated a similar data model on PLC-1.
There are many ways to view logs and events on FortiAnalyzer. In this exercise, you will explore the following
different views and log management features:
l Log View
l FortiView
l FortiSOC
Because of simulated traffic limitations in this lab, not all views will be populated.
Log View allows you to view traffic logs (also referred to as firewall policy logs), event logs, and security logs for
each device or for each log group, which is a feature we are not using in this lab.
When ADOMs are enabled, Log View displays information for each ADOM.
Log View displays log messages from analytics logs and archive logs.
l Historical logs and real-time logs in Log View are from analytics logs.
l Log Browse can display logs from both the current, active log file and any of the compressed log files.
You will examine traffic logs and security logs related to industrial protocols and signatures only.
© FORTINET
To view logs in Log View
1. Log in to the FortiAnalyzer GUI with the username admin and password password.
2. Click Log View.
3. In the menu on the left, click FortiGate > Traffic.
4. Explore the different ways of viewing logs, such as real time, historical, and raw.
l On the right side of the GUI, click Tools > Real-time Log.
You should see traffic logs in real time and in the formatted view.
Note that you can click Pause to stop the traffic if you want to look at one or more logs without losing them
among all the real-time logs constantly dropping in. Click Resume to resume.
Real-time logs are temporarily considered compressed, but are indexed as soon as
FortiAnalyzer has available CPU and memory.
© FORTINET
The indexing process may take a few minutes to show all historical logs.
You can view details about historical logs, because they have been indexed in the SQL
database.
While logs are compressed, they are considered offline, and you cannot view details
about the logs in Log View (or FortiView). Also, you cannot customize the columns.
© FORTINET
5. Click Tools > Formatted Log to return the view to formatted logs.
6. In the menu on the left, click Security to examine the security logs.
Security logs from FortiAnalyzer include antivirus, web filtering, application control, intrusion prevention, email
filtering, data leak prevention, SSL/SSH scan, and VoIP. The logs displayed on FortiAnalyzer are dependent
on the device type logging to it, the traffic, and the features that are enabled. In this lab, only web filter,
application control, and intrusion prevention logs are triggered.
You can also view security logs in real-time or historical views, and in raw or formatted
formats.
Tips:
l If you are not sure what the correctly formed column name is, add the column name that you want to search for in the
Column Settings drop-down list.
l Ensure your time filter covers the logs that you are searching for.
l Ensure the device is set accordingly for the logs you want to return.
l Verify whether case-sensitive search is enabled or disabled (Tools).
© FORTINET
l Ensure you are searching on the appropriate log type for the logs you want to return (for example, traffic, web filter,
application control, IPS, and so on).
l Ensure you are not in the raw log view, because you cannot filter on raw logs (only historical and real-time).
l Ensure you are not filtering on real-time logs if you want to search on historical logs.
Ensure your time filter is set correctly (includes the time you have been generating
traffic).
Ensure your time filter is set correctly (includes the time you have been generating
traffic).
Set your time filters appropriately, and if required, increase the time range from 1 to 4
hours.
2. Click Add Filter, type Application, in the drop-down list, select Application Category, and then select
"Industrial".
© FORTINET
3. Click Add Filter again, type Destination, in the drop-down list, select Destination Port, and then type "2404".
4. To the right of the filters, click the custom view icon.
7. In the Custom View section, you can review the Industrial Applications and Protocols custom view.
© FORTINET
Explore FortiView
You can view summaries of log data in FortiView in both tabular and graphical formats. For example, you can view
top applications and websites, top threats to your network, top sources of network traffic, and top destinations of
network traffic. For each summary view, you can drill down into details.
Explore FortiSOC
FortiSoC provides events and incident management capabilities. You will review the OT security events that the
event handler created, and you will also create an incident for the OT security event.
© FORTINET
View OT Security Events and Incidents
You will view the OT security event that the event handler you configured in the first exercise created, and then
you will create an incident for the event.
3. Click Event Monitor > All Events, and then expand the Industrial event.
You should see at least two grouped events for the industrial category—one for the Modbus application and
one for IEC 104.
4. Double-click one of the events to view logs for the event, and then double-click the log again to view log details.
© FORTINET
5. Click the back arrow icon to go back to All Events, select one of the events, right-click the event, and then click
Create New Incident to manually create an incident for the selected event.
6. In the Raise Incident window, configure the following settings:
Field Value
Severity High
Status New
Assigned To admin
A window appears, to confirm that the incident was created. The window will disappear by itself.
8. Click Incidents to view the incident table and verify the incident.
You should see an incident listed in the table.
© FORTINET
9. Click Dashboards > Incidents to view the count and status of incidents on the Incidents dashboard.
In this exercise, you will build a single pattern performance rule to monitor the temperature of some fuel pump
sensors, and trigger alerts if the average temperature over a 5-minute time period goes above or below a set
threshold (80 degrees Fahrenheit).
You will configure a rule to monitor fuel pump temperature sensors. You will also generate logs to trigger an
incident according to your rule.
To configure filters
1. Log in to the FortiSIEM GUI, click the ANALYTICS tab, and then clear the display filters.
2. Click the change field display icon beside the Run icon, and then click Clear All to clear any existing fields.
3. Click Apply, and then click Use Default.
4. In the Edit Filters and Time Range field, click the field, and when the Filter editor opens, click Clear All to clear
any existing conditions, and then add the following condition:
© FORTINET
Field Value
Attribute Host IP
Operator IN
Value 10.6.0.1,10.6.0.2,10.6.0.3
NEXT AND
5. In the Row column associated with the condition, click + to add another row.
6. In the second condition row, configure the following settings:
Field Value
Operator =
Value PH_DEV_MON_HW_TEMP
© FORTINET
2. Log in with the username root and password Fortinet1!.
3. Enter the following commands, and then when prompted, enter 1 for Option 1:
cd /root/labs/lab6/6_4
./runLab6_4.sh
This script adds three generic Linux devices to FortiSIEM and replays some temperature events.
On the CMDB tab, you can view the devices that were added: Fuel Server 1 – 10.6.0.1, Fuel Server 2 –
10.6.0.2, and Fuel Server 3 – 10.6.0.3.
To view logs
1. On the FortiSIEM GUI, you should see results from the Real Time search—review the raw event logs to see their
content.
© FORTINET
The script may take a couple of minutes to process and display the logs. If you cannot
see logs on the FortiSIEM GUI, run the scripts again.
2. Edit the Group By and Display Fields section to match the following image, and then click Apply:
Use the Expression Builder to create the AVG(Temperature Fahrenheit) field for
the Group By and Display fields.
© FORTINET
To configure a rule
1. On the FortiSIEM GUI, click the ADMIN tab, click Settings, and then in the Analytics section, click Subcategory.
2. In the left pane, under Category, select Performance, and then in the Subcategory section, click Add.
3. In the new empty entry box, type Temperature Sensors, click the check mark icon, and then click Save All.
© FORTINET
4. Click the RESOURCES tab, and in the left pane, open the Rules tree, and then click Performance.
5. Click + at the top of the tree to create a new folder, in the Group field, type Fuel Pump, and then click Save.
6. Select the new Fuel Pump subgroup, and then click New to create a new rule.
© FORTINET
7. Under Step 1: General, in the Rule Name field, type Fuel Pump Temperature Alert, and then if you want,
type a description.
8. Click Step 2: Define Condition, and then leave the default time interval at 300 seconds (5 minutes).
© FORTINET
9. Click the pencil icon, and then in the Subpattern field, create the following Filters:
Field Value
Attribute Host IP
Operator IN
Value 10.6.0.1,10.6.0.2,10.6.0.3
NEXT AND
10. In the Row column associated with the condition, click + to add another row.
11. In the second condition row, configure the following settings:
Field Value
Operator =
Value PH_DEV_MON_HW_TEMP
12. For the Aggregate condition, use the Expression Builder in the Attribute section.
13. In the Function drop-down list, select AVG, and then click +.
14. In the Event Attribute field, type Temperature, select Temperature Fahrenheit, click +, and then click
Validate.
An Expression is valid message appears.
© FORTINET
Field Value
Operator >=
Value 2
19. In the Group By section, add the Host IP, Host Name, and Hardware Component Name attributes, and then
click Save.
© FORTINET
20. Click Step 3: Define Action, set Severity to 10-HIGH, Category to Performance, and Subcategory to
Temperature Sensors.
21. In the Action: Undefined section, click the pencil icon, complete the Incident and Triggered Attributes as
shown in the following image, and then click Save:
© FORTINET
© FORTINET
2. Wait for the Simulation - All Done! message (in approximately 3 minutes), and then enter 3 to Quit the script.
2. Select List by Incident to view the Events that triggered the incident.
© FORTINET
Review the incident (there should be an incident for Fuel Server 2 only) and notice the
incident Target and Details, and then click the Events tab to view the individual events
that triggered the rule.
In this lab, you will generate a default report, build a chart based on a log search, and perform some diagnostic
checks on FortiAnalyzer. You will also create reports and dashboards for operational technology (OT) security on
FortiSIEM.
Objectives
l Generate a default report on FortiAnalyzer
l Run report diagnostics on FortiAnalyzer
l Build a chart-based report on a log search on FortiAnalyzer
l Execute default reports on FortiSIEM
l Create reports on FortiSIEM from analytics
l Create an OT dashboard on FortiSIEM
Time to Complete
Estimated: 75 minutes
Prerequisites
Before you begin this lab, you must complete the previous lab. If you haven't done so, tell your instructor.
Follow the directions in the lab guide and do not make changes to any other devices
unless the course instructor tells you to.
In this exercise, you will run one of the default reports on demand. This will allow you to see the report
immediately. You will also run diagnostics for this report.
Because of simulated traffic limitations in this lab, not all report fields are populated.
© FORTINET
Ensure your time filter is set correctly (includes the time you have been generating
traffic).
6. Click Apply.
7. Click the Generated Reports tab, and then click Run Report to run the report on demand.
10. Scroll down, and then click Key Applications Crossing The Network.
© FORTINET
The report shows key industrial applications going through your network.
You can view the latest available applications in the industrial category by clicking the
http://fortiguard.com/appcontrol link.
12. Scroll down, click Files/File Types Transferred by Applications, and then review the contents of the File Name
column to see the industrial application data.
© FORTINET
Rendering time
Total time
For example:
© FORTINET
FortiAnalyzer updates the HCACHE when new logs come in and new log tables generate. If you do not
enable auto-cache, the report generates the HCACHE for the current log tables only. Remember, you are
currently generating traffic in your lab.
8. Click Apply.
9. Run the report again, and then run diagnostics again.
What is the output this time?
Rendering time
Total time
For example:
Although your lab environment does not have a large number of logs, you can still see that by enabling auto-
cache, the report builds faster. This is more noticeable if you have higher log volumes.
In this exercise, you will create a chart based on the industrial application category, add the chart to a report, and
then run the report.
Ensure your time filter is set correctly (includes the time you have been generating traffic).
7. Click the custom view icon to save the current view as a custom view.
Although a custom view isn't required to build a chart, it's a nice feature that allows you
to save your filtered searches. The custom view option is available only in the historical
log view.
© FORTINET
Ensure your time filter is set correctly (includes the time you have been generating
traffic).
9. In your OT_Security_Logs custom view, click the custom view icon, and then click More Columns.
© FORTINET
10. In Column Settings, select the Application Risk and File Name column names, and then click OK.
11. In your OT_Security_Logs custom view, click the tools icon, and then click Chart Builder.
The dataset query is generated in advance based on your search filters. The Preview window indicates what
the results will look like in a report.
Field Value
Name OT_Security_Chart
Columns Select:
l Date/Time
l Level
l Application
l Application Risk
l File Name
This setting allows you to select only five columns. If other columns are
selected by default, deselect them.
Group By Date/Time
Order By Application
© FORTINET
Field Value
4. Click OK.
5. Click Settings.
6. In the Time Period field, select Today.
7. Click the Editor tab, and then click Insert Chart.
8. Click the second Chart drop-down list, in the text field, start typing OT_Security_Chart, and then when it
appears in the list, select it.
9. Click OK.
10. Click Apply.
© FORTINET
11. Optionally, try inserting one of the Traffic macros:
a. Click to insert your cursor below the chart you just added to the layout.
b. Click Insert Macro.
c. In the inserted macro drop-down list, scroll up to the Traffic section, and then select any of the default macros.
For example, you can select the Highest Risk Application with Highest Session Count macro.
d. Click Apply.
12. Click the Generated Reports tab, and then click Run Report.
13. In the Format column, click HTML or PDF to view the report.
© FORTINET
You successfully created a report based on a chart and dataset created from a filtered search result.
In this exercise, you will run one of the default reports on demand. You will explore the opening and running of
reports from the report tree. You will explore a default report on all incidents. FortiSIEM is placed in Purdue level
3.5, and it will trigger incidents based on events for devices from level 0 to 5. The All incidents report provides an
incident summary from all Purdue levels. You will also learn how to schedule a report on FortiSIEM.
5. On the Report Time Range tab, select Relative, in the Last field, type 7, and then in the drop-down list, select
Days.
6. Click OK.
The report automatically runs and populates the results in a new tab on the ANALYTICS tab.
To schedule a report
1. Click the RESOURCES tab.
2. Click Reports > Incidents.
3. Select All Incidents.
4. Click More.
5. In the More drop-down list, select Schedule.
© FORTINET
6. Configure the following settings (you must click Next to view some of the settings), and then click OK:
Field Value
Schedule Time Range (Start Time:) Set this field to 10 minutes ahead of the current time, and
then make sure Local is selected.
The remote directory to save reports is already configured. The Scheduled column for the All Incidents
report indicates that a report is scheduled.
7. Click the ADMIN tab, and then click Settings > Analytics > Scheduled Report > Scheduled Report Copy to
review the settings of the remote directory.
© FORTINET
4. Click +.
Notice that the same Schedule dialog box shown above opens.
5. Click Cancel.
6. Click the scheduled entry Scheduled for:<date>.
Both the pencil and trash icons become active.
8. After 10 minutes, verify the delivery of the scheduled report to the FortiSIEM_Reports folder on the desktop of the
Linux-Client VM.
© FORTINET
The All Incidents report should be available in PDF format after approximately 10 minutes.
In this exercise, you will learn to save reports from the ANALYTICS tab. You will create search filters to capture
events on various OT, security, and performance events, and then save them as reports.
You will build search filters to capture the temperature performance of fuel pump servers, add aggregate log data
for average temperatures, and then save it as a report.
2. Click the Clear All button to clear any existing conditions, and then add the following condition:
© FORTINET
Field Value
Attribute Host IP
Operator IN
Value 10.6.0.1,10.6.0.2,10.6.0.3
NEXT AND
3. In the Row column associated with the condition, click + to add another row.
4. In the second condition row, configure the following settings:
Field Value
Operator =
Value PH_DEV_MON_HW_TEMP
5. In the Time Range section, select Relative, in the Last field, type 1, select Day in the drop-down list, and then
click Apply.
6. Click the change field display icon beside the Run icon.
7. In the Group By and Display Fields window, click Clear All to clear any existing fields, and then configure the
display fields with the following attributes:
l Reporting IP
l Event Type
l Hardware Component Name
l AVG(Temperature Fahrenheit)
l COUNT(Matched Events)
© FORTINET
Event Name is not an attribute that you can search for—it appears automatically when
the Event Type attribute is selected.
9. In the upper-left corner, click Actions, and then click Save as Report to save the results as a report.
The default report name is Search Result - <report interval>.
© FORTINET
A window should appear that confirms the report was saved successfully.
The window disappears automatically. You can view the saved report in the Reports > Operational
Technology folder.
You will build search filters to capture security events from Purdue level 1 devices (traffic from PLC-1 to PLC-3),
and then save it as a report.
2. Click Clear All to clear any existing conditions, and then add the following condition:
Field Value
Attribute Source IP
Operator =
Value 192.168.1.1
NEXT AND
© FORTINET
3. In the Row column associated with the condition, click + to add another row.
4. In the second condition row, configure the following settings:
Field Value
Attribute Destination IP
Operator =
Value 192.168.2.1
5. In the Time Range section, select Relative, in the Last field, type 1, in the drop-down list, select Day, and then
click Apply.
6. In the Group By and Display Fields window, click Clear All to clear any existing fields, and then configure the
display fields with the following attributes:
l Reporting Device
l Event Type
l Source IP > Display AS > PLC-1
l Destination IP > Display AS > PLC-3
l Service Name
l COUNT(Matched Events)
© FORTINET
Event Name is not an attribute that you can search for—it appears automatically when
the Event Type attribute is selected.
8. In the upper-left corner, click Actions, and then click Save as Report to save the results as a report.
The default report name is Search Result - <report interval>.
9. Replace the Report Name with Traffic From PLC-1 to PLC-3 - Purdue Level 1_Security
Events.
10. Select the Save Definition checkbox, and then in the Save To section, select the Operational Technology
folder.
11. Select the Save Results checkbox, in the for field, select 1 and Days, and then click OK to save the report.
You will build search filters to capture security events for Modbus and IEC 104 service, and then save it as a
report.
2. Click Clear All to clear any existing conditions, and then add the following condition:
Field Value
Operator IN
© FORTINET
Field Value
Value Click CMDB > Protocols > OT Ports, add the OT Ports
group to Selections, and then click OK.
NEXT OR
3. In the Row column associated with the condition, click + to add another row.
4. In the second condition row, configure the following settings:
Field Value
Operator IN
Value Click CMDB > Protocols > OT Ports, add the OT Ports
group to Selections, and then click OK.
5. In the Time Range section, select Relative, in the Last field, type 1, in the drop-down list, select Day, and then
click Apply.
6. In the Group By and Display Fields window, click Clear All to clear any existing fields, and then configure the
display fields with the following attributes:
l Reporting Vendor
l Service Name
l Event Type
l COUNT(Matched Events)
© FORTINET
7. Click Apply & Run.
The search results should look like the following example:
Event Name is not an attribute that you can search for—it appears automatically when
the Event Type attribute is selected.
8. In the upper-left corner, click Actions, , and then click Save as Report to save the results as a report.
The default report name is Search Result - <report interval>.
You will build search filters to capture security events that FortiAnalyzer (IP 10.1.3.210) reports, and you will add
display fields to display the application risk level, and then save it as a report.
2. Click Clear All to clear any existing conditions, and then add the following condition:
© FORTINET
Field Value
Attribute Reporting IP
Operator =
Value 10.1.3.210
NEXT AND
3. In the Row column associated with the condition, click + to add another row.
4. In the second condition row, configure the following settings:
Field Value
Operator =
Value Industrial
5. In the Time Range section, select Relative, in the Last field, type 1, in the drop-down list, select Day, and then
click Apply.
6. In the Group By and Display Fields window, click Clear All to clear any existing fields, and then configure the
display fields with the following attributes:
l Reporting IP
l Application Group Name
l Application Risk
l Application Name
l Service Name
l COUNT(Matched Events)
© FORTINET
8. In the upper-left corner, click Actions, and then click Save as Report to save the results as a report.
The default report name is Search Result - <report interval>.
© FORTINET
11. Select the Save Results checkbox, in the for field, select 1 and Days, and then click OK to save the report.
12. Navigate to the RESOURCES > Reports > Operational Technology folder to view all four reports.
You will use these reports in the next exercise to build an OT dashboard.
In this exercise, you will create a custom dashboard by adding dashboard widgets for OT.
4. In the Name field, type Operational Technology, and then click Save.
The Operational Technology group opens, and is added to the dashboard drop-down list.
© FORTINET
The OT/IoT widget is created, and the main window displays an empty widget.
6. Click the Reports folder, and then select the Incidents folder.
7. Select the All Incidents report, and then when the right arrow icon appears, click the icon to add the All Incidents
report widget.
8. Hover over the title bar of the All Incidents widget, on the right side, click the settings icon, and then click Edit
Settings.
© FORTINET
9. Adjust the widget settings to match the following image, and then click Save:
If the Display Settings fields are empty, click Save, and then click the widget settings
icon again to open the widget settings. The Display Settings fields should now be
populated. Network lag can cause this issue, which you may not experience.
10. On the OT/IoT tab, click + again, and add the report widgets from the Operational Technology folder, in the
following order:
l OT_Device_Performance
l FortiAnalyzer_OT_Security_Events_Application_Risk_Assessment
l MODBUS and IEC104_OT_Security_Events
l Traffic From PLC-1 to PLC-3 - Purdue Level 1_Security Events
© FORTINET
10. Hover over the title bar of the OT_Device_Performance widget, and then on the right, click the settings icon to edit
the settings.
11. Adjust the widget settings to match the following image, and then click Save:
If the Display Settings fields in the widget settings are empty, click Save, and then
click the widget settings icon again to open the widget settings. The Display Settings
fields should now be populated. Network lag can cause this issue, which you may not
experience.
12. Hover over the title bar of the FortiAnalyzer_OT_Security_Events_Application_Risk_Assessment widget, and
then on the right, click the settings icon to edit the settings.
13. Adjust the widget settings to match the following image, and then click Save:
© FORTINET
If the Display Settings fields in the widget settings are empty, click Save, and then
click the widget settings icon again to open the widget settings. The Display Settings
fields should now be populated. Network lag can cause this issue, which you may not
experience.
14. Hover over the title bar of the MODBUS and IEC104_OT_Security_Events widget, and on the right side, click the
settings icon to edit the settings.
15. Adjust the widget settings to match the following image, and then click Save:
© FORTINET
If the Display Settings fields in the widget settings are empty, click Save, and then
click the widget settings icon again to open the widget settings. The Display Settings
fields should now be populated. Network lag can cause this issue, which you may not
experience.
16. Hover over the title bar of the Traffic From PLC-1 to PLC-3 - Purdue Level 1_Security Events widget, and then
on the right, click the settings icon to edit the settings.
17. Adjust the widget settings to match the following image, and then click Save:
© FORTINET
If the Display Settings fields are empty, click Save, and then click the widget settings
icon again to open the widget settings. The Display Settings fields should now be
populated. Network lag can cause this issue, which you may not experience.
18. Review the Operational Technology > OT/IOT dashboard, which appears similar to the following image:
© FORTINET
In this lab, you will configure Fortinet devices based on requirements that a customer provides. The lab is
preconfigured with IP addresses.
Objectives
l Complete all tasks to configure the network based on customer requirements
Time to Complete
Estimated: 150 minutes
Prerequisites
Before you begin this lab, you must restore the initial configuration files to the FortiGate devices. The configuration
files are located on the desktop of the Linux-Client VM.
© FORTINET
4. Click Browse.
5. Click Desktop > Resources > Use Case-1, and then select FortiAnalyzer_usecase1.dat.
© FORTINET
You do not have to enter a password because the file is not encrypted.
7. Click OK.
In this exercise, you will configure the OT network based on the following basic customer requirements:
l Achieve microsegmentation within floors
l Implement segmentation between floors
l Implement access control to limit access to Fortinet devices and PLCs
l Allow only Modbus traffic between PLCs based on requirements
l Log traffic on FortiGate and FortiAnalyzer
Network Topology
Review the current configuration before proceeding to the next step. You have basic connectivity from Fortinet
products to FortiManager so that you can perform license verification. Do not make changes to the policies that
allow this traffic.
Requirements
© FORTINET
l FortiGate-1
l FortiGate-2
l FortiAnalyzer
To segment floors
l Ensure that all traffic between floors is controlled through Edge-FortiGate.
l Allow Linux-Client to access PLC-1, PLC-2, PLC-3, and the Client VM over SSH without access control.
Username Password
supervisor supervisor
jradmin jradmin
sradmin sradmin
client1 client1
Create policies to allow traffic from the Linux-Client VM to the following devices using access control:
l Allow supervisor to access PLC-1, PLC-2, PLC-3, and the Client VM over HTTP.
l Allow jradmin to access PLC-3 over HTTP.
l Allow sradmin to access all PLCs on Floor-1 over HTTP.
l Allow client1 to access the Client VM over HTTP.
To log traffic
Configure the devices so that Edge-FortiGate can send logs in real time to FortiAnalyzer for storage and reporting.
Make sure you complete all of the configuration steps before you test the configuration.
jradmin PLC-3
After you are logged in with one user, if you do not see another login prompt, do the
following:
1. Click Dashboard > Users & Devices, and then expand Firewall Users to
deauthenticate the user.
2. Close all browsers to clear the caches.
© FORTINET
To test application filter and logging
1. Connect to the Linux-Client VM.
2. Open PuTTY.
3. Click PLC-2 to select the saved session, and then click Open.
4. Log in with the username sysadmin and password Fortinet1!.
5. Enter the following command:
./Uploads/start-conpot.sh
If you receive an error when you try to run the script, this may be due to a previous
session. Enter the docker ps command to check the process ID of the running script,
and then enter the docker kill <container_id> command to stop the script.
In this lab, you will configure Fortinet devices based on requirements provided by a customer. The lab is
preconfigured with IP addresses.
Objectives
l Complete all tasks to configure the network based on customer requirements
Time to Complete
Estimated: 150 minutes
Prerequisites
Before you begin this lab, you must restore the initial configuration files to the FortiGate devices. The configuration
files are located on the desktop of the Linux-Client VM.
© FORTINET
4. Click Browse.
5. Click Desktop > Resources > Use Case-2, and then select FortiAnalyzer_usecase2.dat.
© FORTINET
You do not have to enter a password because the file is not encrypted.
7. Click OK.
In this exercise, you will configure the OT network based on the following basic customer requirements:
l Configure administrator accounts on the FortiGate devices
l Configure microsegmentation within Floor-1
l Implement segmentation between floors
l Implement access control to limit access to Fortinet devices and PLCs
l Allow only IEC-104 traffic between PLCs based on requirements
l Log traffic on FortiGate, FortiAnalyzer, and FortiSIEM
Network Topology
Review the current configuration before proceeding to the next step. You will have basic connectivity from Fortinet
products to FortiManager so that you can perform license verification. Do not make changes to the policies that
allow this traffic.
Requirements
© FORTINET
Username Password Access
To segment floors
l Ensure that all traffic between floors is controlled through Edge-FortiGate.
l Configure firewall policies and routes to allow Linux-Client to access PLC-1, PLC-2, PLC-3, and the Client VM over
SSH without access control.
Username Password
supervisor supervisor
jradmin jradmin
sradmin sradmin
Create policies to allow traffic from the Linux-Client VM to the following devices using access control:
l Allow supervisor to access PLC-1, PLC-2, PLC-3, and the Client VM over HTTP.
l Allow jradmin to access PLC-1 over HTTP.
l Allow sradmin to access PLC-3 on Floor-2 over HTTP.
To log traffic
Configure devices so that Edge-Fortigate can:
© FORTINET
l Send logs in real time to FortiAnalyzer for storage and reporting
l Send logs to FortiSIEM
Make sure you have completed all of the configuration steps before testing the configuration.
jradmin PLC-1
sradmin PLC-3
© FORTINET
If you do not see another login prompt after you are logged in with one user, do the
following:
1. Click Dashboard > Users & Devices, and then expand Firewall Users to
deauthenticate the user.
2. Close all browsers to clear the caches.
No part of this publication may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from Fortinet Inc.,
as stipulated by the United States Copyright Act of 1976.
Copyright© 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.