Lab 7. Fortigate Virtual Domains (VDOMs) (CS Open CourseWare)
Lab 7. Fortigate Virtual Domains (VDOMs) (CS Open CourseWare)
Setup
On the last lab, remember that we used a licensed Forti VM (used for a maximum of 1 vCPU and 2 GB RAM) with Internet access, with a lic that
gets invalidated after few minutes.
Before starting this lab, make sure you have enough space available on the machine (if space is full, you cannot even login to webui console):
As an alternative, you can delete from this path /opt/unetlab/tmp the files created for each node, but the first option is the recommended one.
Licensing
From this lab on, we will need to have a licensed VM with no access to Internet (to keep the Valid status). As we have only 2 licenses available in
total (starting with HA lab, we are going to use 2 firewall machines), we need to reuse them for all Fortigate firewalls using the following steps:
0. We will blackhole the default route after the license is marked as VALID, then create a route only for client user ip (which will mostly be the
same for all firewalls).
1. Find your internal private ip. To do this, go to cli and check the icmp packets:
# from you host, send an imcp echo-req to the specific port1 ip address
On the example from above see that the source ip address is the internal one: 10.128.0.20, which will be used later to fwd packets via
10.3.255.254 (def gateway). This is just an example, you will have a different address assigned.
An alternative here for taking the assigned internal ip is: go to Globalprotect UI > Settings > Connections tab > Assigned Local IP.
2. From the browser, go to IP_FORTIGATE/ng/system/vm/license and upload the first license that is found on UPB-Learning course.
3. Wait for the firewall to reboot, then access the machine again via vnc to make sure the mgmt ip was not changed (in case it is changed, the
webui interface will hang at reboot until timeout).
4. Remeber that this device has an implicit default route to 10.3.255.254 with AD = 5.
# from this point on, all requests to Internet are blackholed (the exception is the packets sent to client ip 10.128.0.20, which traffic originates from remote students).
Make sure to respect this steps in order for licensing. In case your license is not seen as valid and the default route is added, remove it and wait
for system log message to appear on stdout: “registration status changed to 'VALID'”.
Exercises
Find on moodle course the pdf file [https://curs.upb.ro/2022/pluginfile.php/397572/mod_folder/content/0/FortiGate_Infrastructure_6.4_Lab_Guide-Online.pdf]
for the Fortinet Exercises. As we will work with VDOMs, go directly to chapter 3 (page 62) and start the tasks.
Topology setup
Below you can find our topology (a little different from the one found on page 62):
https://ocw.cs.pub.ro/courses/sred/lab6 1/3
29/04/2025 01:03 Lab 7. Fortigate Virtual Domains (VDOMs) [CS Open CourseWare]
We are going to reuse the one from the last lab, but with a small change. Shutdown the second client machine and the firewall. Then, delete the
existing connection between client2 and firewall and re-attach the client to port4.
The differences in our case are that client2 (which needs to be linked with port4 to firewall, instead of port3 as stated on pdf) will not access the
Internet (as all traffic to default route is sinkholed) and client1 will have configured at the end an ad hoc server (for testing the second exercise).
Next, I will give you some tips/changes regarding the differences for configurations:
Then, logout, login again and check the webui (there should appear 2 default VDOMs: Global and root).
If you enabled VDOM before creating the snapshot, disable it firstly using:
Also note that if there are multiple (value >= 2) VDOMs present on the device, then you will need to remove the custom ones (all except root) and
after that disable VDOM feature.
- instead of port3 for customer VDOM, we will use port4 (the one remained from the last lab not configured)
- configure port 4 using network 192.168.2.0/24 with 192.168.2.1 for gateway, dhcp server with pool 192.168.2.2-192.168.2.254, http + https
(enabled for admin access), ping and attach to it the new vdom for customer
In case you already have a configuration for port4, it will be automatically imported to root VDOM and you cannot modify from Network >
Interface > port4 the Virtual Domain to customer. This issue is seen when you configure firstly the interface, then activate the VDOM.
The solution here is to clear all references to a port (a reference = a configuration like policy rule, dhcp server, interface that is attached to that
interface). Go to Global mode > System > VDOM > root > double click to number from Ref. column (number of references for that vdom), then
find interface port4 > double click again to Ref. value, then select each subvalue with Ctrl and Delete all Refs.
https://ocw.cs.pub.ro/courses/sred/lab6 2/3
29/04/2025 01:03 Lab 7. Fortigate Virtual Domains (VDOMs) [CS Open CourseWare]
- to access the firewall using the customer credentials, we will need to access webui from client2: after client2 gets an ip from dhcp server (it
should be 192.168.2.2), go to Mozilla > https://192.168.2.1 [https://192.168.2.1] and try to login with customer's account credentials
- to test the connection from client2 to client1 (we cannot do the ones from page 75), try to ping 172.16.0.2 and then create a simple http server
on client1's machine:
Try to ping client2's ip from client1. Does it work? Why not? If not, what do you need to add to firewall's configuration?
sred/lab6.txt · Last modified: 2022/11/25 13:43 by horia.stoenescu
https://ocw.cs.pub.ro/courses/sred/lab6 3/3