Fortigate Cookbook Expanded
Fortigate Cookbook Expanded
7 (Expanded Version)
Essential Recipes for Success with your FortiGate
April 23, 2014
Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and
FortiGuard, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet
names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics
contained herein were attained in internal lab tests under ideal conditions, and actual performance
and other resultsmay vary. Network variables, different network environments and other conditions
may affect performance results. Nothing herein represents any binding commitment by Fortinet,
and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet
enters a binding written contract, signed by Fortinets General Counsel, with a purchaser that
expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified
in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty
will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. Fortinet
disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express
or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication
without notice, and the most current version of the publication shall be applicable.
Contents
Change log.................................................................................................................... 1
Introduction .................................................................................................................. 2
Tips for using the FortiGate Cookbook ......................................................................... 3
Installing & Setup ......................................................................................................... 5
Connecting a private network to the Internet using NAT/Route mode .............................. 7
Extra help: NAT/Route mode ............................................................................................ 11
Quickly connecting a network to the Internet using DHCP.............................................. 14
Extra help: Private networks with DHCP .......................................................................... 16
Adding a FortiGate unit without changing the network configuration.............................. 18
Extra help: Transparent mode .......................................................................................... 22
Using VDOMs to host two FortiOS instances on a single FortiGate unit ......................... 26
Verifying and updating the FortiGate units firmware ....................................................... 33
Setting up FortiGuard services ......................................................................................... 36
Extra help: FortiGuard ...................................................................................................... 38
Logging network traffic to gather information .................................................................. 39
Extra help: Logging .......................................................................................................... 43
Using FortiCloud to record log messages ........................................................................ 44
Setting up a limited access administrator account .......................................................... 48
Using SNMP to monitor the FortiGate unit ...................................................................... 52
Setting up an explicit proxy for users on a private network ............................................. 58
Adding packet capture to help troubleshooting ............................................................... 62
Contents
iii
iv
Contents
vi
Change log
Date
Change Description
March 5, 2014
New recipes:
- Using a custom signature to block web traffic from Windows XP
- Preventing credit card numbers from escaping your network
Updated recipes:
- Connecting a private network to the Internet using NAT/Route
mode
- Using IPsec VPN to provide communications between offices
February 3, 2014
New recipes:
- Extra help: IPsec VPN
Reordered SSL and IPsec VPN section. Added FortiGate ports
section to Tips for the FortiGate Cookbook. Added a note to
Providing secure remote access to a network for an iOS device.
Updated to FortiOS version 5.0.6
Change log
Introduction
The FortiGate Cookbook (Expanded Version) is a web-only version of the FortiGate
Cookbook that will be continuously updated with new examples not contained in
the print version. See the Change log for a list of the most recent additions.
The FortiGate Cookbook provides examples, or recipes, of basic and advanced
FortiGate configurations to administrators who are unfamiliar with the unit. All
examples require access to the graphical user interface (GUI), also known as the
web-based manager.
Each example begins with a description of the desired configuration, followed by
step-by-step instructions. Some topics include extra help sections, containing tips
for dealing with some common challenges of using a FortiGate unit.
Using the FortiGate Cookbook, you can go from idea to execution in simple steps,
configuring a secure network for better productivity with reduced risk.
The Cookbook is divided into the following chapters:
Installing & Setup explains the configuration of common network functions and the
different network roles a FortiGate unit can have.
Security Policies & Firewall Objects describes security policies and firewall objects,
which determine whether to allow or block traffic.
Security Features describes the core security features that you can apply to the
traffic accepted by your FortiGate unit.
Wireless Networking explains how to configure and maintain a wireless network.
IPv6 shows how to use the new IPv6 protocol with your FortiGate.
Authentication describes the FortiGate authentication process for network users and
devices.
SSL and IPsec VPN explains the configuration and application of SSL and IPsec
virtual private networks (VPNs).
This edition of the FortiGate Cookbook (Expanded Version) was written using FortiOS 5.0.7.
2
FortiGate ports
The specific ports being used in the documentation are chosen as examples. When you are
configuring your FortiGate unit, you can substitute your own ports, provided that they have
the same function.
For example, in most recipes, wan1 is the port used to provide the FortiGate unit with
access to the Internet. If your FortiGate uses a different port for this function, you should use
that port in the parts of the configuration that the recipe uses wan1.
IP addresses
IP addresses are sometimes shown in diagrams to make it easier to see the source of the
addresses used in the recipe. When you are configuring your FortiGate unit, substitute your
own addresses.
Turning on features
Some FortiOS features can be turned off, which means they will not appear in the GUI. If an
option required for a recipe does not appear, go to System > Config > Features and make
sure that option has not been disabled.
Text elements
Bold text indicates the name of a GUI field or feature. When required, italic text indicates
information that you must enter.
Selecting OK/Apply
Always select OK or Apply when you complete a GUI step. Because this must be done
frequently, it is an assumed step and is not included in most recipes.
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
Internet
WAN 1
FortiGate
NAT/Route
mode
port 1
Internal Network
Connecting a private network to the Internet using NAT/Route mode
ISP
FortiGate
Internal Network
Results
On the PC that you used to connect to the
FortiGate internal interface, open a web
browser and browse to any Internet website.
You should also be able to connect to the
Internet using FTP or any other protocol or
connection method.
Go to Policy > Monitor > Policy Monitor
to view information about the sessions being
processed by the FortiGate unit.
10
4. Verify that you can connect to the internal IP address of the FortiGate unit.
Use a web browser to connect to the web-based manager from the FortiGate internal
interface by browsing to its IP address. From the PC, try to ping the internal interface IP
address; for example, ping 192.168.1.99 If you cannot connect to the internal interface,
verify the IP configuration of the PC. Go to the next step when you can connect to the
internal interface.
6. Verify that you can communicate from the FortiGate unit to the Internet.
Access the FortiGate CLI and use the execute ping command to ping an address or
domain name on the Internet. You can also use the execute traceroute command to
troubleshoot connectivity to the Internet.
Extra help: NAT/Route mode
11
7. Verify the DNS configurations of the FortiGate unit and the PCs.
Check for DNS errors by pinging or using traceroute to connect to a domain name; for
example:
ping www.fortinet.com
ping: cannot resolve www.fre.com: Unknown host
If the name cannot be resolved, the FortiGate unit or PC cannot connect to a DNS server
and you should confirm the DNS server IP addresses are present and correct.
On some FortiGate models, routing options are configured by going to System > Network >
Routing or through the CLI.
11. Verify that you can connect to the wan1 IP address of the FortiGate unit.
Once you have established that the internal network is operating, ping the FortiGate wan1
interface IP address. If you cannot connect to the wan1 interface, the FortiGate unit is not
allowing internal to wan1 sessions.
12. Verify that you can connect to the gateway provided by your ISP.
Try pinging the default gateway IP address from a PC on the internal network.
end
edit wan1
set macaddr <xx:xx:xx:xx:xx:xx>
end
14. Reset the FortiGate unit to factory defaults and try again
If all else fails, use the CLI command
to confirm the reset.
13
Requirements
t
t
An ISP that provides connectivity with DHCP and accepts DHCP requests without authentication.
A FortiGate default configuration that includes a DHCP server for the internal interface and a
security policy that allows all sessions from the internal network to the internet.
ISP
Internet
wan
lan
FortiGate
14
Internal Network
that uses DHCP
ISP
wan
lan
FortiGate
Internal Network
Results
From any PC on the internal network, open a
web browser and browse to any website. You
should successfully connect to the Internet.
Go to Policy > Policy > Policy and select
Global View. View Sessions and Count
columns for information about the sessions
being processed by the FortiGate.
If these columns are not visible, right-click on
the menu bar, select Sessions and Count,
and select Apply.
15
If the IP address seems incorrect or missing, select Renew to renew the lease and get
a new IP configuration from your ISP. If you cannot get a valid IP address this way, the
FortiGate unit cannot communicate with the ISPs DHCP server.
2. Verify that your ISP automatically provides a DNS server with DHCP.
If your ISP does not supply a DNS server with DHCP, you can go to System > Network >
DNS and manually add one.
16
If problems persist, see Connecting a private network to the Internet using NAT/Route
mode on page 7.
17
Internet
Router
WAN 1
FortiGate
(Transparent
Mode)
Security policies
allow traffic between
network segments
port 1
Internal Network
18
19
Router
FortiGate
20
Internal Network
Results
On the PC that you used to connect to the
FortiGate internal interface, open a web
browser and browse to any Internet website.
You should also be able to connect to the
Internet using FTP or any other protocol or
connection method.
Go to Policy > Monitor > Session Monitor
to view the sessions being processed by the
FortiGate unit.
21
5. Verify that you can communicate from the FortiGate unit to the Internet.
Access the FortiGate CLI and use the execute ping command to ping an address or
domain name on the Internet. You can also use the execute traceroute command to
troubleshoot connectivity to the Internet.
22
6. Verify the DNS configurations of the FortiGate unit and the PCs on the
internal network.
Check for DNS errors by pinging or using traceroute to connect to a domain name; for
example:
ping www.fortinet.com
ping: cannot resolve www.fre.com: Unknown host
If the name cannot be resolved, the FortiGate unit or PC cannot connect to a DNS server
and you should confirm the DNS server IP addresses are present and correct.
10. Verify that you can connect to the gateway provided by your ISP.
Try pinging the default gateway IP address from a PC on the internal network.
11. Confirm that the FortiGate unit can connect to the FortiGuard network.
Once registered, the FortiGate unit obtains antivirus and application control and other
updates from the FortiGuard network. Once the FortiGate unit is on your network, you
should confirm that it can reach the FortiGuard network. The FortiGate unit must be able
to connect to the network from its management IP address. If the following tests provide
23
incorrect results, the FortiGate unit cannot connect to the Internet from its management
IP address. Check the FortiGate units default route to make sure it is correct. Check your
Internet firewall to make sure it allows connections from the FortiGate management IP
address to the Internet.
First, check the License Information dashboard widget to make sure the status of all
FortiGuard services matches the services that you have purchased. The FortiGate unit
connects to the FortiGuard network to obtain this information.
Go to System > Config > FortiGuard. Open web filtering and email options and select
Test Availability. After a minute, the GUI should indicate a successful connection.
24
13. Reset the FortiGate unit to factory defaults and try again
If all else fails, use the CLI command
to confirm the reset.
Resetting the FortiGate unit to factory defaults will put the unit back into NAT/Route mode.
25
Gateway
Router
172.20.120.2
Port 1
VDOM-A
Port 2
Company A
192.168.10.0
26
Port 3
VDOM-B
FortiGate with
two Virtual
Domains
Port 4
Company B
192.168.20.0
27
28
29
Creating a basic
configuration for VDOM-A
Go to Virtual Domains and select
VDOM-A.
Go to Router > Static > Static Routes.
Add a default route for the VDOM. Set
Destination IP/Mask to 0.0.0.0/0.0.0.0,
set Device to port1, and set Gateway to
the IP of the gateway router (in the example,
172.20.120.2).
30
Creating a basic
configuration for VDOM-B
If you have logged out of the FortiGate unit,
log back in.
Go to Virtual Domains and select
VDOM-B. Go to Router > Static > Static
Routes.
Add a default route for the VDOM. Set
Destination IP/Mask to 0.0.0.0/0.0.0.0,
set Device to port3, and set Gateway to
the IP of the gateway router (in the example,
172.20.120.2).
31
Gateway
Router
Port 3
Port 1
VDOM-A
VDOM-B
FortiGate
Results
Connect to the Internet from the company A
and company B networks and then log into
the FortiGate unit.
Go to Virtual Domains and select
VDOM-A. Go to Policy > Policy > Monitor
to view the sessions being processed on
VDOM-A.
32
Always review the Release Notes before installing a new firmware version. They provide the recommended upgrade
path for the firmware release as well as additional information not available in other documentation. Only perform a
firmware update during a maintenance window.
no
Check
firmware
version
Current
version?
yes
Download and
install current
version
No action
required
33
34
Results
The FortiGate unit uploads the firmware
image file, updates to the new firmware
version, restarts, and displays the FortiGate
login. This process takes a few minutes.
From the FortiGate web-based manager, go
to System > Dashboard > Status. In the
System Information widget, the Firmware
Version will show the updated version of
FortiOS.
35
Internet
FortiGuard
FortiGate
Internal Network
36
37
Session begins
Logging
enabled?
no
No record
yes
Security events
only
Security
Log all
event in
traffic?
session?
yes
no
yes
Record
session data
39
40
Results
View traffic logs by going to Log & Report
> Traffic Log > Forward Traffic. The logs
display a variety of information about your
traffic, including date/time, source, device,
and destination.
To change the information shown, rightclick on any column title and select Column
Settings to enable or disable different
columns.
41
The FortiGate units performance level has decreased since enabling disk
logging.
If enabling disk logging has impacted overall performance, change the log settings to either
send logs to a FortiAnalyzer unit, a FortiManager unit, or to FortiCloud.
Log All Sessions is enabled on all security policies and cannot be changed.
This can occur if Client Reputation is enabled.
43
You must register your FortiGate unit before you can activate FortiCloud.
1. Activating FortiCloud
2. Sending logs to FortiCloud
3. Enabling logging in your security policies
4. Results
FortiCloud
FortiGate
Internal Network
44
Activating FortiCloud
Go to System > Dashboard > Status.
In the FortiCloud section of the License
Information widget, select the green
Activate button.
45
46
Results
Go to System > Dashboard > Status.
In the FortiCloud section of the License
Information widget, select Launch Portal.
From the portal, you can view the log data
and reports.
You can access your FortiCloud account at
any time by going to www.forticloud.com.
47
Admin Account
Admin Profile
No Access
Fortigate
Functions
48
Read-Write
Read Only
Fortigate
Functions
Fortigate
Functions
Creating a new
administrative profile
Go to System > Admin > Admin Profile.
Create a new administer profile that allows
the administrator with this profile to view and
edit components of User and Devices and
to view logs and reports.
49
Results
50
51
Internet
Internal Network
FortiGate
SNMP Manager
52
53
Enabling SNMP on a
FortiGate interface
Go to System > Network > Interfaces.
Enable SNMP administrative access on the
interface connected to the same network as
the SNMP manager.
54
Results
This example uses the SolarWinds SNMP
trap viewer.
In the SolarWinds Toolset Launch Pad, go to
SNMP > MIB Viewer and select Launch.
55
56
57
Internet
Port 3
58
FortiGate
Port 4
59
60
Results
Configure web browsers on the private
network to connect using a proxy server.
The IP address of the HTTP proxy server is
10.10.1.99 (the IP address of the FortiGate
internal interface) and the port is 8080
(the default explicit web proxy port). Web
browsers configured to use the proxy server
are able to connect to the Internet.
Go to Policy > Policy > Policy to see the ID
of the policy allowing webproxy traffic.
Web proxy traffic is not counted by security
policy.
61
Original Packet
Internet
FortiGate
Internal Network
Duplicate Packet
Packet Capture
62
t
t
63
Results
Open the pcap file with a pcap file viewer,
such as tcpdump or Wireshark.
Adjust the settings in the filter depending on
the kind of traffic you wish to capture.
64
Internet
WAN 1
172.20.120.22
DMZ Network
FortiGate
DMZ
LAN
Web Server
10.10.10.22
Internal Network
65
66
67
Results
External users can access the web
server on the DMZ network from the
Internet using http://172.20.120.22 and
https://172.20.120.22.
Internal users can access the web
server using http://10.10.10.22 and
https://10.10.10.22.
Go to Policy > Monitor > Policy Monitor.
Use the policy monitor to verify that traffic
from the Internet and from the internal
network is allowed to access the web server.
This verifies that the policies are configured
correctly.
68
Internet
Router
WAN 1
FortiGate
Internal
Management IP
192.168.1.100
Internal Network
192.168.1.[110-150]
69
70
71
Results
Connect to the web server from the internal
network and surf the Internet from the server
itself.
Go to Log & Report > Traffic Log >
Forward Traffic to verify that there is traffic
from the internal to wan1 interface.
72
73
Internet
ISP 1
WAN 2
WAN 1
FortiGate
ISP 2
LAN
Internal
Network
74
Configuring connections to
the two ISPs
Go to System > Network > Interfaces and
configure the wan1 and wan2 connections.
Make sure that both use DHCP as the
Addressing mode and have Retrieve
default gateway from server and
Override internal DNS enabled.
75
Configuring failover
detection and spillover load
balancing
Go to Router > Static > Settings.
Create two new Dead Gateway Detection
entries.
76
Results
Go to Log & Report > Traffic Log >
Forward Traffic to see network traffic from
different source IP addresses flowing through
both wan1 and wan2.
77
78
Internet
Internet
WAN 1
Switch
WAN 1
Dual HA Links
HA 1
FortiGate
(Primary)
Internal
FortiGate
(Primary)
Internal
HA 2
WAN 1
HA 1
HA 2
FortiGate
(Backup)
Internal
Switch
Internal Network
Internal Network
79
80
81
82
83
Internet
FortiGuard
DDNS
Remote
User
branchoffice.fortiddns.com
FortiGate
Internal Network
84
edit 0
set ddns-server FortiGuardDDNS
set monitor-interface wan1
end
Results
You can verify that the DDNS is working with
a utility like dig or nslookup to check that
the domain name resolves to the correct IP
address.
Server:
Address:
208.91.112.53
208.91.112.53#53
Non-authoritative answer:
Address: 172.20.120.126
85
Internet
FortiCall
wan 1
172.20.120.22
FortiGate
lan
192168.1.99/24
FortiVoice
192.168.1.111
86
Internal
Network
IP Phone
Setting up a FortiCall
account
Go to www.forticall.com and follow the set
up instructions. When the account is set
up, you will be provided with information to
activate your account. You will also need to
choose a phone number for inbound calls.
87
88
89
90
91
Results
Go to System > Dashboard > Status and
add the VoIP Usage widget.
When the widget appears, verify Voice
Calls.
92
Internet
wan 1
Primary IP: 172.20.120.22
Secondary IP: 172.20.120.25
FortiGate
port 1
192.168.1.200
lan
192.168.1.99/24
FortiRecorder
port 4
PoE Switch
FortiCam
93
Configuring the
FortiRecorder and
FortiCamera units
Connect locally to the FortiRecorder.
Go to System > Network > Interface.
Set an IP address for port1.
94
95
96
97
Results
From the Internet, go to the IP address of the
FortiGate units secondary IP (in the example,
https://172.20.120.25) and you should be
able to see securely live video feed using
HTTPS and RTSP (Real Time Streaming
Protocol)
98
t
t
t
99
Network PC
All Services
LAN
FortiGate
WAN 1
100
101
102
Results
Browse the Internet using the PC and
another network device, then refresh the
policy list. You can now see Sessions
occuring for both policies.
103
Internet
FortiGate
Server
104
105
106
Results
Go to Policy > Monitor > Policy Monitor
to see the active sessions.
107
108
iPad
Internal Network
(OS x)
FortiAP
FortiGate
Apple
TV
110
111
112
113
Results
Use Airplay from the iPad to stream video to
the Apple TV.
Go to Log & Report > Traffic Log >
Multicast Traffic to see the multicast traffic
between the WLAN1 and LAN interfaces.
114
115
116
iPad
Internal Network
OS x
FortiAP
FortiGate
AirPrint
118
119
120
121
122
123
Results
Print a document from an iOS device.
Go to Log & Report > Traffic Log >
Multicast Traffic to see the printing traffic
passing through the FortiGate unit.
124
125
Security Features
Security features, including antivirus, web filtering, application control, intrusion
protection (IPS), email filtering, and data leak prevention (DLP), apply core security
functions to the traffic accepted by your FortiGate unit.
Each security feature has a default profile. You can also create custom profiles to
meet the needs of your network. These profiles are then applied to your security
policies and used to monitor and, if necessary, block external and internal traffic that
is considered risky or dangerous.
This section contains the following examples:
126
t
t
t
t
t
t
t
t
t
t
t
t
t
t
t
Internet
FortiGate
Traffic monitored by
client reputation
Internal Network
Monitoring your network using client reputation
127
Results
After traffic has been monitoed for a day, go
to System > Dashboard > Threat History
to view the Threat History widget, which
shows a graph of monitored threats.
Any sections in red should be examined,
as they contain threats that are considered
Critical. To select this section, click on its
left side and then click on the right side.
Select a Drill-Down option to view more
information about the traffic and the client
reputation scores (the higher the score, the
riskier the behaviour).
129
Action applied
Application
targeted?
yes
Session begins
Application
specific
traffic
Application
control
enabled?
no
130
yes
Traffic not
affected
Creating an application
control sensor to monitor
traffic
Go to Security Profiles > Application
Control > Application Sensors. Select
the plus icon in the upper right corner of
the window to create a new sensor list for
monitoring application traffic.
Select Create New to add a new application
filter. Leave all Filter Options selected.
Ensure that you set the Action to Monitor.
At this stage in the process, you are
monitoring the traffic to locate any problems
that may be occurring, rather than blocking
applications.
131
132
Creating an application
sensor to block applications
Go to Security Profiles > Application
Control > Application Sensors and create
a new sensor list for blocking application
traffic.
133
134
Results
Go to Log & Report > Traffic Log >
Forward Traffic.
You can see the sensor is working and
blocking the traffic from the selected
application types, including the P2P
application Skype.
135
yes
Session begins
Web browsing
begins
NT 5
detected in
header?
no
136
Traffic
blocked
Traffic not
affected
Creating a custom
application control signature
Go to Security Profiles > Application
Control > Application List and select
Create New.
Use the following text to create the signature:
Make sure to remove all hard line breaks
from the signature. To ensure all breaks
have been removed, click and drag the
bottom right corner of the signature box
until the text appears in a single line.
F-SBID( --attack_id 8151;
--vuln_id 8151; --name "Windows.
action drop_session; --service
HTTP; --protocol tcp; --app_
--pattern "Windows NT 5."; --no_
case; --context header; )
The signature will appear at the top of the
application list and be listed in the
Web.Others category.
Creating an application
sensor
Go to Security Profiles > Application
Control > Application Sensors. Select
the plus icon in the upper right corner of the
window to create a new sensor.
137
138
Results
When a PC running one of the affected
operating systems attempts to connect to
the Internet using a browser, the connection
will fail. This includes Windows virtual
machines.
PCs running on other operating systems,
including later versions of Windows, will not
be affected.
139
140
This example uses the FortiOS intrusion protection system (IPS) to protect a web
server by configuring an IPS sensor to protect against common attacks and adding
it to the policy which allows external traffic to access the server. A denial of service
(DoS) security policy is also added to further protect the server against that specific
type of attack.
Attacks
FortiGate
Internet
Web Server
141
142
143
Results
144
Data leak prevention (DLP) analyzes outgoing traffic and blocks any sensitive
information from leaving the network. In this example, DLP will be used to block files
using the files name and type.
Internet
Data Leak
FortiGate
Internal Network
145
146
147
Results
Attempt to upload a file that matches the
file filter criteria using FTP protocol. The file
should be blocked and a message from the
server should appear.
148
149
SMTP
FTP
HTTP
Fortinet
D
L
P
Internet
Other
Data
150
151
Creating Filters
Use the Create New option to create new
individual filters.
For the first sensor, choose the Messages
filter type, set it to messages Containing
Credit Card #, select the services you wish
to examine, and set Action to Block.
152
153
154
155
Results
Testing SMTP
Using your favorite email client, send a
control email to an email server on the other
side of the FortiGate unit to verify everything
is working. Then try sending two emails; one
with the credit card numbers in the body
of the email message and one with the text
document as an attachment.
The control email makes it through, but the
emails with the credit card information are
not received at their destination.
Go to Log & Report > Traffic Log >
Forward Traffic. You should be able to find
a log entries showing that the traffic was
blocked. The logs even states that the reason
they were considered threats had to do with
credit-card information.
156
Testing FTP
Using your preferred FTP client, upload a
control file that shouldnt be stopped to an
FTP server on the other side of the FortiGate
unit.
To be as generic as possible, this example
uses the command line.
ftp> ls
229 Entering Extended Passive Mode
(|||61875|).
157
Testing HTTP
HTTP can be tested in two directions;
posting a credit card number and getting a
credit card number.
Try visiting one of the sites that you received
the test credit card number from. You will
receive a replacement message about the
transfer.
158
159
Website
Block
FortiGate
Internal Network
160
Results
In a web browser, visit www.fortinet.com
and docs.fortinet.com. In both cases, the
FortiGate unit displays a message, stating
that the website is blocked.
162
163
Website
Block
HTTPS Traffic
FortiGate
Internal Network
164
Verifying FortiGuard
Services are enabled
Go to System > Dashboard > Status.
In the License Information widget, verify
that you have an active subscription to
FortiGuard Web Filtering. If you have a
subscription, the service will have a green
checkmark beside it.
165
166
167
Results
Browse to https://www.youtube.com. A
replacement message appears indicating
that the website was blocked.
168
Website
Quota applied
to traffic
FortiGate
Internal Network
169
You can also apply quotas to specific subcategories within a FortiGuard Category,
such as Shopping and Auction and Social
Networking, both of which are found in
the General Interest - Personal category).
By doing this, you can target specific sites
you wish to limit without affecting every
site within the larger category.
170
171
Results
Browse to www.ebay.com, a website that is
found within the General Interest - Personal
category.
Access to the website is allowed for 15
minutes, after which a block message
appears. The message will persist for all
General Interest - Personal sites until the
quota is reset, which occurs every day at
midnight.
172
YouTube EDU
Internet
FortiGate
LAN
173
Adding an Application
Control Sensor
Go to Security Profiles > Application
Control > Application Sensors.
Select the Plus icon in the upper right corner
to create a new application sensor.
Select Create New to create the application
filter, and set the Sensor Type to Specify
Applications. Filter the results by searching
for youtube, and highlight all the entries that
contain it.
Configuring SSL/SSH
Inspection
Go to Policy > Policy > SSL/SSH
Inspection.
Create a new Deep Inspection Options
profile. Ensure that SSH Deep Scan is
enabled.
175
176
177
Results
Browse to www.youtube.com. You will arrive
at the YouTube for Education homepage and
only be able to access videos that have been
approved as educational content.
178
Method 1
Method 2
4. Results
4. Results
Internet
FortiGuard
Override
FortiGate
Internal Network
179
Method 1
Creating a ratings override
Go to Security Profiles > Web Filter >
Rating Overrides.
Create a new override and enter the URL
fortinet.com. Select Lookup Rating to see
its current FortiGuard Rating.
Set Category to Custom Categories (local
categories) and create a new Sub-Category
for blocked sites.
180
181
Results
In a web browser, go to www.fortinet.com.
The website will be blocked and a
replacement message from FortiGuard Web
Filtering will appear.
Method 2
Creating a user group and
two users
Go to User & Device > User > User
Groups. Select Create New and create the
group override_group.
182
183
184
Results
In a web browser, go to www.fortinet.com.
After the user authentication screen, the
website is blocked and a replacement
message from FortiGuard Web Filtering
appears.
Select Override. You are prompted to
authenticate to view the page.
185
186
Internal Network
Web Filter
FortiGate
Virus
Internet
Virus
Virus
187
Enabling flow-based
inspection in an antivirus
profile
Go to Security Profiles > Antivirus >
Profile. Select the plus icon in the upper
right corner of the window to create a new
profile.
Select Flow-based as the Inspection
Mode.
Configure the profile to inspect traffic based
on your network needs.
188
Enabling flow-based
inspection in a web filtering
profile
Go to Security Profiles > Web Filter >
Profile. Select the plus icon in the upper
right corner of the window to create a new
profile.
Select Flow-based as the Inspection
Mode.
Configure the profile to block traffic based on
your network needs.
189
Results
To test the AV scanning, go to www.eicar.org
and try to download a test file. The browser
will time out and display a message similar to
what is shown here from Google Chrome.
190
191
192
193
194
195
extended-utm-log enable
other-application-log enable
log enable
unknown-application-log enable
end
196
197
IPS sensor
Go to Security Profiles > Webfilter >
Profiles.
Apply the same settings to the sensor on the
sniffer device as on the primary FortiGate.
198
199
200
Results
Creating some logs
On a computer behind the primary FortiGate,
download some test files from the Eicar
website at:
http://www.eicar.org/85-0-Download.html
Visit some websites that should be blocked
by the policy, for example:
www.gambling.com
201
202
Internet
FortiGate
Exec1
192.168.13.10
Exec2
192.168.13.11
Internal Network
203
204
205
Results
Connect to the Internet from two computers
on the internal network: one that has an IP
address assigned to one of the executives
and one that doesnt.
Go to Log & Report > Traffic Log >
Forward Traffic Log. Right-click on one of
the column headings and make sure that the
Policy ID column is selected, then select
Apply.
Policy IDs are assigned by the order in which
policies were created and so in the example
the staff policys ID is 2, while the executive
policys ID is 3.
In the log, you can see that traffic from the
computer with the executive IP is flowing
through policy 3, while traffic from the other
computer uses policy 2.
Since policy 3 does not have any security
profiles enabled, traffic from the executives is
not being scanned for security events.
206
Wireless Networking
FortiOS WiFi networking provides a wide range of capabilities for integrating
wireless networks into your organizations network architecture. Each WiFi network,
or SSID, is represented by a virtual network interface to which you can apply firewall
policies, security profiles, and other features in the same way you would for physical
wired networks.
This chapter contains the following examples:
t
t
t
t
t
Wireless Networking
207
Internet
Internal Network
FortiGate
FortiAP
208
209
210
211
212
Results
Log in to the FortiGate unit using the guest
user management account. Go to User &
Device > User > Guest Management and
select Create New.
Use a guests email account to create a new
user ID.
213
214
Internet
FortiGate
FortiAP
Wireless Network
Internal Network
215
216
217
218
Results
Users connected to the new SSID will be
able to access the Internet. The wireless
devices will be in the same subnet as the
internal wired network.
Go to WiFi Controller > Monitor > Client
Monitor to see WiFi users and their IP
addresses.
Go to Log & Report > Traffic Log >
Forward Traffic to verify that the same
policy controls both wired and wireless
traffic.
219
FortiAP
Remote User
Internet
Internal Network
FortiGate
220
221
222
223
Connecting to the
corporate FortiGate
remotely
At the remote location, connect the FortiAP
to the Internet using an Ethernet cable. Next,
connect the FortiAP to power.
Once connected, the FortiAP requests an IP
address and locates the FortiGate wireless
controller.
The remote user can now access the
corporate network and browse the Internet
securely from behind the corporate firewall.
224
Results
Go to WiFi Controller > Monitor > Client
Monitor to see remote wireless users
connected to the FortiAP unit.
Go to Log & Report > Traffic Log >
Forward Traffic to see remote wireless
users appear in the logs.
225
wan 1
FortiGate
Marketing network
User jsmith
226
RADIUS server
192.168.1.114
Techdoc network
FortiAP
User twhite
227
set vlanid 10
end
end
228
229
230
Configuring a connection to
the RADIUS server
This example uses NPS on Windows
Server 2008. The RADIUS server has
already been configured with the user
group Techdoc, with member twhite, and
the user group Marketing, with member
jsmith.
231
232
233
234
Results
The SSID will appear in a list of available
wireless networks on the users devices.
Both twhite and jsmith can connect to the
SSID with their credentials.
If a certificate warning message appears,
accept the certificate.
235
Internet
Backhaul Channel
FortiGate
FortiAP-1
FortiAP-2
Leaf Channel
Leaf Channel
236
Configuring an interface on
the FortiGate for the APs
A dedicated network interface needs to be
configured on the Fortigate that will be used
only by the FortiAP units.
Go to System > Network > Interfaces and
edit an available internal port (in the example,
port11). Set Addressing mode to Dedicate
to FortiAP/FortiSwitch.
237
238
Creating a custom AP
profile
Go to WiFi & Switch Controller > WiFi
Network > Custom AP Profile.
Create a new profile for the FortiAP model
you are using.
Configure Radio 1 for the backhaul channel
and Radio 2 for the leaf channel.
For the backhaul channel, set Band to
802.11an_5G. For the leaf channel, set
Band to 802.11bgn_2.4G.
239
240
Preauthorize FortiAP-1
Go to WiFi & Switch Controller >
Managed Devices > Managed FortiAP.
Select Create New.
Enter the serial number of the FortiAP unit
and give the Managed Access Point a name.
241
Preauthorize FortiAP-2
Go to WiFi & Switch Controller >
Managed Devices > Managed FortiAP.
Select Create New.
Enter the serial number of the FortiAP and
give the Managed Access Point a name.
242
192.168.1.100
255.255.255.0
Gateway:
192.168.1.1
243
244
245
cfg a IPADDR=192.168.11.3
cfg a IPGW=192.168.11.1
cfg c
246
cfg
cfg
cfg
cfg
a MESH_AP_TYPE:=1
a MESH_AP_SSID:=backhaul-ssid
a MESH_AP_PASSWD:=12345678
c
cfg a AC_IPADDR=192.168.11.1
cfg c
247
Results
Wireless devices are now able to connect to
the leaf SSID, even if they are only within the
range of FortiAP-2.
There are several ways to verify that the
wireless network has been extended over
both FortiAP units.
Go to WiFi & Switch Controller >
Managed Devices > Managed FortiAPs.
You can see that Radio 2 (leaf-ssid) on
FortiAP-2 has one client connected to it,
while the same SSID on FortiAP-1 does not.
248
249
250
IPv6
Internet Protocol version 6 (IPv6) is the most significant advance in traditional
Internet communications protocol. The IPv6 address scheme is based on a 128bit address, rather than the 32-bit addresses used by IPv4, allowing IPv6 to have a
much higher address limit of over 340 undecillion possible addresses (that is 340
followed by 36 zeros). FortiGate units support IPv6 in a wide variety of network
configurations.
This section contains the following examples:
t
IPv6
251
Port 16
2001:db8::1/32
FortiGate
IPv6 Endpoint
(SLAAC IP)
252
edit port16
set ip6-address 2001:db8::1/32
set ip6-send-adv enable
edit 2001:db8::/32
next
end
end
end
253
254
Results
If you havent done so already, connect a
computer to the IPv6 interface you created.
On that computer, use the Command Prompt
or Terminal, whichever is available, to view
the IP configuration.
Windows: Enter
Command Prompt.
Mac: Enter
into the
into Terminal.
255
Authentication
Authentication, the act of confirming the identity of a person or device, is a key part
of network security. In the context of a private computer network, the identities of
users or host computers must be established to ensure that only authorized parties
can access the network. The FortiGate unit enables controlled network access and
applies authentication to users of security policies and VPN clients.
This section contains the following examples:
256
t
t
t
t
t
t
t
t
t
t
t
t
t
Internal Network
Users
FortiGate
Internet
cforbes
bbennet
egilbert
257
Creating users
Go to User & Device > User > User
Definition.
Using the User Creation Wizard, create
three local users: bbennet, cforbes, and
egilbert.
258
259
260
Results
When a user attempts to connect to the
Internet, the authentication screen will
appear. In order to get full Internet access,
log in as user cforbes.
Browse to www.ebay.com, a site that is in
the General Interest - Personal category.
Using this account, you can access the
website.
261
262
Internet
FortiWiFi
Wireless Mobile
Devices
263
264
Results
When a mobile user connects during a time
set matching the schedule group, they can
surf the Internet
Go to Log & Report > Traffic Log >
Forward Traffic to view the traffic from
these devices.
265
266
Internet
FSSO Agent
FortiGate
Windows AD
Internal Network
267
268
269
270
Adding a security
profile that includes an
authentication rule
Go to Policy > Policy > Policy.
Add an accept user identity security policy
and add the new FSSO group.
271
Results
Go to Log & Report > Traffic Log >
Forward Traffic. As users log into the
Windows AD system, the FortiGate collects
their connection information.
Select an entry for more information.
272
Internet
FSSO Agent
FortiGate
DC Agent
Windows AD
Internal Network
273
274
Creating an identity-based
security policy
Create an identity-based security policy that
uses the FSSO user group that you created.
Results
275
Internet
LDAP Server
192.168.1. 117
WAN 1
FortiGate
Internal Network
Port 1
FSSO Agent
Windows AD
Domain Controller
192.168.1.114
276
277
278
Results
279
(FSSO Agent)
FortiGate
280
FortiAuthenticator
SSO Users
281
Adding a FortiAuthenticator
to the FortiGate unit
In the FortiGate interface, go to User &
Device > Authentication > Single SignOn, and select Create New.
For the Type, select Fortinet Single
Sign-On Agent. Enter a Name for the
FortiAuthenticator unit.
Enter the IP address of the FortiAuthenticator
as the Primary Agent IP/Name, and enter
the secret key as the Password.
Select Apply & Refresh, and wait a minute
for the FortiAuthenticator to connect to
the FortiGate and download user group
information.
282
Results
With the identity-based policy being the only
policy connecting the internal network to the
internet, users on the internal network will
not be able to access the internet without
authenticating.
To connect to the internet, users
must navigate in a browser to the
FortiAuthenticators IP. Users will then log
into the FortiAuthenticator as an admin
would, but will only have access to their user
account settings in the FAC interface.
Once the user has logged in, the
FortiAuthenticator retains their user
information for a time specified in the SSO
Portal settings. They will have access to the
internet, and to any other services or servers
on the internal network configured to use
SSO with the FortiAuthenticator.
283
Internet
Polling Mode
Windows AD
284
FortiGate
Internal Network
The FortiGate Cookbook 5.0.7
285
286
Results
Go to Log & Report > Traffic Log >
Forward Traffic. When users log into
the Windows AD network, the FortiGate
will automatically poll the domain for their
account information, and record their traffic.
Select an entry for more information.
287
288
289
Certificate
Website
SSL proxy
Certificate
FortiGate
Internal Network
290
Enabling certificate
configuration in the webbased manager
Go to System > Config > Features and
enable Certificates.
Importing the CA
certificate into the web
browser
For Internet Explorer:
291
For Firefox:
Depending on platform, go to Tools >
Options or Edit > Preferences and find
the Advanced Encryption settings.
292
Results
Even if you bypass the error message by
selecting Continue to this website, the
browser may still show an error in the toolbar.
After you install the FortiGate SSL CA
certificate, there will be no certificate security
issue when you browse to sites on which
the FortiGate unit performs SSL content
inspection.
293
294
Internet
FortiGuard
FortiGate
Internal user
with FortiToken
or FortiToken Mobile
External user
with FortiToken
or FortiToken Mobile
Internal Network
295
Registering FortiToken
with a FortiGate unit and
FortiGuard
Go to User & Device > Two-factor
Authentication > FortiTokens and select
Create New. .Select the Serial Number
field and enter the FortiToken serial number.
If you have several FortiTokens to add, you
can list their serial numbers one per line in
a text file and use the Import function.
Select OK.
296
Adding two-factor
authentication to the users
account
Go to User & Device > User > User
Definition and open the users account for
editing.
Enable Two-factor Authentication and select
the FortiToken from the list. Select OK.
The FortiTokens list (User & Device > Twofactor Authentication > FortiTokens)
shows that the FortiToken is assigned to a
user.
297
Results
When the user tries to access an Internet
web site, the FortiGate unit requests user
name and password authentication:
t
298
IPsec
FortiGuard
FortiGate
FortiClient user
with FortiToken
or FortiToken Mobile
Internal Network
299
Registering FortiToken
with a FortiGate unit and
FortiGuard
Go to User & Device > Two-factor
Authentication > FortiTokens and select
Create New. .Select the Serial Number
field and enter the FortiToken serial number.
If you have several FortiTokens to add, you
can list their serial numbers one per line in a
text file and use the Import function.
!
300
Adding two-factor
authentication to the users
account
Go to User & Device > User >
User Definition and open the users
account for editing.
Enable Two-factor Authentication and select
the FortiToken from the list. Select OK.
301
302
303
304
Results
In FortiClient console, select Remote Access.
Select the VPN and enter the user name and
password.
305
Internet
SSL
FortiGuard
FortiGate
Remote user
with FortiToken
or FortiToken Mobile
Internal Network
306
Registering FortiToken
with a FortiGate unit and
FortiGuard
Go to User & Device > Two-factor
Authentication > FortiTokens and select
Create New. Select the Serial Number
field and enter the FortiToken serial number.
If you have several FortiTokens to add, you
can list their serial numbers one per line in a
text file and use the Import function.
307
Adding two-factor
authentication to the users
account
Go to User & Device > User >
User Definition and open the users
account for editing.
Select Enable Two-factor Authentication
and then select the FortiToken from the list.
Select OK.
308
309
310
Results
In a browser, enter the FortiGate IP
address and port 10443. For example
https://172.20.120.123:10443.
If you receive a warning about the certificate
being unrecognized, allow the browser to
continue access.
Enter the user name and password and
then select Login. If the user account has
two-factor authentication enabled, the
FortiToken Code field is added. Obtain
the code from the FortiToken device or
FortiToken Mobile app and enter it. Select
Login again.
311
LDAP
id: twhite
pw: ********
Web Mode
SSL
Tunnel Mode
Remote User
312
FortiGate
Internal Network
313
314
315
316
Results
Log into the SSL portal using the LDAP user
credentials. The FortiGate will automatically
contact the LDAP server for verification.
317
318
319
320
t
t
t
t
t
t
t
t
t
t
t
t
Internet
SSL Root
Browsing
WAN 1
172.20.120.123
FortiGate
Port 1
192.168.1.99/24
Internal Network
Windows Server
192.168.1.114
321
322
323
324
Results
Log into the portal using the credentials you
created in step two.
325
326
327
328
WAN 1
172.20.120.123
FortiGate
Internet
Port 1
192.168.1.99/24
SSL VPN
Remote User
(Android + FortiClient)
Internal Network
Connecting an Android to a FortiGate with SSL VPN
329
330
331
332
333
334
335
336
Internal Network
WAN 1
172.20.120.123
Client certificate
stored in browser
Certificates
must correspond
337
338
339
Results
On the remote client, attempt to connect to
the SSL VPN tunnel using a web browser or
FortiClient.
340
341
Using FortiClient
Open the FortiClient application and create a
new SSL VPN connection.
When connecting to this tunnel the first time,
you are presented with a security alert asking
whether or not to trust the certificate.
342
343
IPsec
Port 1
192.168.1.99/24
Internal
Network (HQ)
344
WAN 1
172.20.120.22
Internet
FortiGate
(Branch)
LAN
10.10.1.99/24
Internal
Network (Branch)
345
346
Creating an HQ security
policy and static route.
Go to Policy > Policy > Policy.
Create a policy for outbound traffic. Set
Incoming Interface to an internal port,
Source Address to the local address,
Outgoing Interface to the VPN Phase 1,
and Destination Address to the remote
LAN address.
347
348
349
Creating an HQ security
policy and static route.
Go to Policy > Policy > Policy.
Create a policy for outbound traffic. Set
Incoming Interface to an internal port,
Source Address to the local address,
Outgoing Interface to the VPN Phase 1,
and Destination Address to the remote
LAN address.
350
Results
Go to VPN > Monitor > IPSec Monitor to
verify the status of the VPN tunnel. It should
be up.
A user on either of the office networks should
be able to connect to any address on the
other office network transparently.
From the HQ FortiGate unit go to Log &
Report > Traffic Log > Forward Traffic to
verify that both inbound and outbound traffic
is occurring.
351
352
t If XAUTH is enabled, ensure that the settings are the same for both ends, and that the
FortiGate unit is set to Enable as Server.
t If your FortiGate unit is behind a NAT device, such as a router, configure port forwarding
for UDP ports 500 and 4500.
t Remove any Phase 1 or Phase 2 configurations that are not in use. If a duplicate
instance of the VPN tunnel appears on the IPsec Monitor, reboot your FortiGate unit to
try and clear the entry.
If you are still unable to connect to the VPN tunnel, run the diagnostic command in the CLI:
diag debug application ike -1
diag debug enable
The resulting output may indicate where the problem is occurring. When you are finished,
disable the diagnostics by using the following command:
diag debug reset
diag debug disable
353
wan1
172.20.120.123
FortiGate
port1
192.168.1.99/24
Internal
Network (HQ)
354
IPsec
port3
172.20.120.141
Internet
FortiGate
port4
10.10.1.99/24
Internal
Network (Branch)
355
356
Creating an HQ IPsec
security policy
Go to Policy > Policy > Policy.
Create a new policy. Set Type to VPN and
Subtype to IPsec. Configure the policy to
allow traffic from the local interface to pass
through the outgoing VPN interface (in the
example, wan1) using the VPN tunnel created
in Phase 1.
When the policy is created, ensure that it is
placed at the top of the policy list by clicking
on the policy sequence number and dragging
the row to the top of the policy table.
357
358
359
Results
Go to VPN > Monitor > IPSec Monitor to
verify the status of the VPN tunnel. It should
be up.
A user on either of the office networks should
be able to connect to any address on the
other office network transparently.
From the HQ FortiGate unit go to Log &
Report > Traffic Log > Forward Traffic.
360
WAN 1
172.20.120.123
FortiGate
Port 1
192.168.1.99/24
Internal Network
Internet
IPsec
Remote User
(iPad)
362
363
364
365
Results
On the FortiGate unit, go to VPN >
Monitor > IPsec Monitor and view the
status of the tunnel.
366
367
368
Internet
Port 1
192.168.1.99/24
IPsec
Remote User
(Android + FortiClient)
Internal Network
Connecting an Android to a FortiGate with IPsec VPN
369
370
set
set
set
set
sip 192.168.1.90
eip 192.168.1.99
status enable
usrgrp Android_Users
end
371
372
373
374
375
Results
In FortiClient, access the newly created
VPN and enter the assigned username and
password, then press Connect.
376
377
L2TP/IPsec
Port 1
Internet
L2TP/IPsec
Remote Windows 7
L2TP Client
Internal Network
378
set
set
set
set
sip 192.168.10.1
eip 192.168.10.101
status enable
usrgrp L2TP_users
end
379
380
edit L2TP_P2
set encapsulation transport-mode
end
381
Configuring a remote
Windows 7 L2TP client
To connect to the FortiGate using L2TP, the
remote client must be configured for L2TP/
IPsec. The following configuration was tested
on a PC running Windows 7.
On the Windows PC, create a new VPN
connection.
Right-click on the new connection and select
Properties, then modify the connection with
the settings shown.
The Host name is the wan1 interface of the
FortiGate unit that is acting as the L2TP/
IPsec server.
382
383
Results
On the remote users PC, connect to the
Internet using the L2TP/IPsec connection
you created.
Enter the L2TP users credentials and click
Connect.
384
385
Site 1
FortiGate
LAN
386
Site 2
IPsec VPN
Internet
IPsec VPN
CISCO ASA
LAN
From the options that appear, select Site-tosite, with the VPN Tunnel Interface set to
outside, then click Next.
387
388
389
390
Results
The tunnel should now be active. On the
FortiGate, verify that the tunnel is up by
navigating to VPN > Monitor > IPsec
Monitor.
The IPsec Monitor table will indicate the
source and destination addresses, and the
status of the tunnel (up or down) and its
uptime.
For more detailed tunnel information, go to
Log & Report > Event Log > VPN and
view the table.
391
Internet
Port 2
172.16.20.1
FGT_1
Port 1
Network_1
10.11.101.0/24
(VIP 10.21.101.0/24)
392
Port 2
172.16.30.1
IPsec
FGT1_to_FGT2
VPN Tunnel
FGT_2
Port 1
Network_2
10.11.101.0/24
(VIP 10.31.101.0/24)
The FortiGate Cookbook 5.0.7
393
394
395
396
Results
On a FortiGate unit, you can go to VPN >
Monitor > IPsec Monitor to see the status
of the VPN tunnel.
397
Internal
10.20.1.1/24
IPsec
WAN 1
172.20.120.123
Internet
WAN 2
172.20.120.23
FortiGate 2
WAN 2
172.20.120.127
Internal
10.21.1.1/24
OSPF
Internal
Network
(HQ)
398
Internal
Network
(Branch)
The FortiGate Cookbook 5.0.7
399
400
Configuring IP addresses
and OSPF on FortiGate 1
Go to System > Network > Interfaces.
Select the arrow for wan1 to expand the list.
Edit the primary tunnel interface and create
IP addresses.
401
Configuring firewall
addresses on FortiGate 1
Go to Firewall Objects > Address >
Addresses.
Edit the subnets behind FortiGate 1 and
FortiGate 2.
402
403
404
405
406
Configuring IP addresses
and OSPF on FortiGate 2
Go to System > Network > Interfaces.
Select the arrow for wan1 to expand the list.
Edit the primary tunnel interface and create
IP addresses.
407
Configuring firewall
addresses on FortiGate 2
Go to Firewall Objects > Address >
Addresses.
Edit the subnets behind FortiGate 1 and
FortiGate 2.
408
409
410
Results
Go to VPN > Monitor > IPsec Monitor to
verify the statuses of both the primary and
secondary IPsec VPN tunnels on FortiGate 1
and FortiGate 2.
411
412