FortiManager 6.2 Cookbook
FortiManager 6.2 Cookbook
Version 6.2
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com/
FEEDBACK
Email: [email protected]
Change Log 5
SD-WAN 6
SD-WAN/ADVPN configuration 6
Adding FortiGate devices to FortiManager 7
Creating the overlay configuration 9
Configuring dynamic routing 22
Configuring SD-WAN 27
Using Intelligent Application Steering and Link Fail-over 32
Device Manager 34
Exporting a policy package from one FortiManager to another 34
VPN Manager 36
Configuring a full mesh VPN topology within a VPN console 36
FortiSwitch Manager 42
Using central management 42
Enabling FortiSwitch central management 42
Importing and editing FortiSwitch templates 43
Creating FortiSwitch templates 44
Assigning templates to FortiSwitch devices 47
Using per-device management 47
Enabling FortiSwitch per-device management 48
Configuring FortiSwitch profiles 48
Configuring FortiSwitch ports 49
Installing changes to FortiSwitch devices 50
Upgrading FortiSwitch firmware 52
Using zero touch deployment for FortiSwitch 53
System Settings 55
Configuring and debugging FortiManager HA clusters 55
Configuring the primary FortiManager unit in an HA cluster 55
Configuring backup FortiManager units in an HA cluster 55
Generating and downloading HA debug logs 56
Creating administrator accounts with restricted access 56
Restricting administrator access to ADOMs 57
Restricting administrator access to device groups 59
Restricting administrator access to policy packages 61
Others 62
Managing FortiAnalyzer from FortiManager 62
Adding FortiAnalyzer to FortiManager 62
Viewing managed FortiAnalyzer behavior 66
Centrally configuring FortiGate to send logs to managed FortiAnalyzer 67
Viewing logs and reports for managed FortiAnalyzer units 67
Managing multiple FortiAnalyzer units 69
Troubleshooting managed FortiAnalyzer units 69
Creating a third party blocklist provider workflow 71
SD-WAN/ADVPN configuration
Add the datacenter FortiGate and two branch office FortiGates to FortiManager.
For information about adding devices, go to the FortiManager Document Library > FortiManager Administration Guide
> Firewall Devices > Adding Devices.
1. Go to Device Manager > Device & Groups, and select a device group.
2. In the tree menu, select a device.
The content pane displays the device dashboard.
3. In the dashboard, locate the Configuration and Installation Status widget.
4. In the Total Revisions row, click Revision History.
5. In the Configuration Revision History dialog box, click Retrieve Config.
View the current configuration running on the device. If there are differences between the configuration file on the
device and the configuration file in the repository, a new revision is created and assigned a new ID number.
For information about retrieving configuration, go to the FortiManager Document Library > FortiManager
Administration Guide > Firewall Devices > Managing device configurations > Managing configuration history.
After initially importing policies from the device, make all changes related to policies and
objects in the Policy & Objects module in the FortiManager.
Making changes directly on the FortiGate device will require reimporting policies to
resynchronize the policies and objects.
For information about importing policies, go to the FortiManager Document Library > FortiManager Administration
Guide > Firewall Devices > Adding devices > Import policy Wizard.
Create dynamic interfaces to map port2, port3, port10, INET and MLPS of the three FortiGates.
Create dynamic interfaces to map the overlay with the underlay topologies. Interface mapping allows the new interface
to be used when creating policies.
Create the following dynamic interfaces:
l OL_INET_0
l OL_MPLS_0
l Port10
l Port2
l Port3
Create two overlays, one for the internet connection and one for the MPLS network. This is to create two secure links to
the datacenter and to implement SDWAN among those links.
Enabling VPN Zone and setting it to Create Default Zones, creates a dynamic interface
by default.
SDWAN does not support dynamic interfaces.
For information about creating VPN communities, go to the Fortinet Document Library > FortiManager
Administration Guide > IPsec VPN Communities > Creating IPsec VPN communities.
Property Setting
Advanced Options
net- Toggle OFF.
device
tunnel- Select nexthop from the dropdown.
5. search
For information about creating gateways, go to the Fortinet Document Library > FortiManager Administration Guide >
VPN > IPSec VPN gateways > Creating managed gateways.
Property Setting
Advanced Options
net-device Toggle OFF.
When configuring the VPN manager, take into account that the final outcome you want to have on the FortiGate is
shown the configurations below.
The configuration will be available on the FortiGates only after they are installed from FortiManager. The installation is
described later in the guide. These configurations are required for ADVPN to work. At this point you don’t need to install
the configurations on the FortiGates.
Example configurations
Create the firewall policies to install on the FortiGates. You create two policy packages: one for the branches and one
for the hub.
For information about creating firewall policies, go to the FortiManager Document Library > FortiManager
Administration Guide > Firewall Policy & Objects > Managing policies > Create new Firewall Policy.
After the policies are installed on the devices, FortiManager may make the following
modifications to the FortiGate configurations:
l The tunnel-search property will no longer be set to nexthop on the spokes.
l The auto-discovery-sender and auto-discovery-receiver properties will no longer be
enabled on the hub and spokes
You can use the GUI or scripts to correct the configuration; however, you should first complete
the following step, Configuring tunnel interfaces and dynamic mapping on page 18
After the policy packages are installed on the FortiGates, ensure the tunnel interfaces for Port 2 and Port 3 are
configured correctly.
After completing this task, you can fix the settings that were modified when Installing policy
packages on page 17See Fixing the settings in the policy package on page 20.
edit "OL_MPLS_0"
set vdom "root"
set ip 10.254.41.3 255.255.255.255
set allowaccess ping
set type tunnel
set remote-ip 10.254.41.1 255.255.255.0
set estimated-upstream-bandwidth 1500
set estimated-downstream-bandwidth 500
set snmp-index 113
set interface "port3"
next
edit "OL_INET_0"
set vdom "root"
set ip 10.254.40.3 255.255.255.255
set allowaccess ping
set type tunnel
set remote-ip 10.254.40.1 255.255.255.0
set estimated-upstream-bandwidth 100
set estimated-downstream-bandwidth 50
set snmp-index 114
set interface "port2"
next
end
After you have verified the configurations in the tunnel interfaces and dynamic mapping, fix the settings that were
modified when you installed the configurations and policies. After you have fixed the configurations, ensure the devices
are Up.
To complete this task, enable CLI Configurations in each device you want to configure.
BGP configurations are required to ensure ADVPN works properly. We recommend using FortiManager to create
CLI templates with meta data fields or scripts to execute advanced BGP configurations on the branches and hubs.
5. In the toolbar, click Run Script, and then select the devices you want to run the script on. Click Run Now.
next
end
end
config vdom
edit root
config aggregate-address
edit 1
set prefix 10.100.0.0 255.255.0.0
set summary-only enable
next
end
config neighbor
edit "10.200.1.2"
set remote-as 65500
next
end
config neighbor-group
edit "branch-peers-1"
set advertisement-interval 1
set link-down-failover enable
set soft-reconfiguration enable
set remote-as 65501
set keep-alive-timer 1
set holdtime-timer 3
next
end
config neighbor-range
edit 1
set prefix 10.254.40.0 255.255.255.0
set neighbor-group "branch-peers-1"
next
edit 2
set prefix 10.254.41.0 255.255.255.0
set neighbor-group "branch-peers-1"
next
end
config network
edit 1
set prefix 10.200.1.0 255.255.255.0
next
edit 2
set prefix 10.200.0.0 255.255.255.0
next
edit 3
set prefix 10.200.3.0 255.255.255.0
next
end
end
end
After you have configured the BGP routes in the hub and branches, use the routing table to verify the routes.
Branch 1:
Branch 2:
Hub
In ADVPN, the hub devices forward the data packets to the spokes before the shortcut is established. To prevent the
hub from using ECMP to send traffic to the spokes, create and implement a route policy.
next
end
Configuring SD-WAN
After you have configured the overlay and tunnel routes, enable SD-WAN for central management.
Enable central management so you can configure the settings once, and install them to one or more devices.
You can use basic SD-WAN configurations on the branches to test ADVPN.
Property Description
Gateway Make sure to specify the remote gateway for the overlay interfaces.
Default interface Make sure to specify the suffix _0 for OL_MPLS and OL_INET. For
example, OL_MPLS_0 and OL_INET_0.
Advanced Options
Priority Make sure to specify the priority for the OL_MPLS and OL_INET interfaces is
higher than port2 and port3.
This will redirect the traffic that does not match an SD-WAN rule to the
underlays in port2 and port3, instead of using ECMP for all the interface
members of the SD-WAN.
OL_INET_0 configuration:
Create health-check servers to verify that real servers are able respond to network connection attempts. You will need to
create a health-check server for the overlay and underlay topologies.
Create static routes for IPv4 and IPv6, and then assign them to the branches.
To view the routing tables, go to System Settings > Network, and click Routing Table or IPv6 Routing Table.
1. From the IPv4 or IPv6 routing table, click Create New in the toolbar. The Create New Network Route dialog is
displayed.
2. Enter the Destination IP/Mask.
3. Enter the Gateway.
4. From the Interface dropdown, select the network interface that connects to the gateway .
5. Click OK.
You can use FortiGate to load balance traffic depending on the application type and on the SLA. To do this, create
application-based SD-WAN rules in FortiManager and then install the configurations on the branches.
In the SD-WAN policy for Business Critical and Non-Business Critical Cloud App, make
sure to enable the Gateway option. This allows to FortiGate to redirect correctly.
For information about creating SD-WAN rules, go to the FortiManager Document Library > FortiManager
Administration Guide > SD-WAN > SD-WAN templates.
After the installation is complete you will see the logs are on FortiAnalyzer. If you log in to the
FortiGate WebUI you will notice an error message in the Security Fabric Settings page:
In this example, you will learn how to export a policy package from one FortiManager to another FortiManager.
1. Select a FortiManager policy package and installation target you want to export:
a. Select a FortiManager policy package and its installation target.
For example,
Policy Package: PP_001
Installation Target: Device1
2. Download the latest revision:
a. Go to Device Manager > Device & Groups > and double-click the installation target device (Device1 in this
example).
b. Go to System: Dashboard > Configuration and Installation Status > Total Revisions.
c. Download the latest revision (for example, Revision 1).
3. Add the device to the second FortiManager:
a. Go to your second FortiManager.
b. Go to Device Manager > Device & Groups > and click Add Device. The Add Device wizard displays.
Its SN must be similar to the one you got the revision from. It can be the same as the original SN, or you can
take the SN prefix (the first six characters) and append 10 digits to it.
For example, FG200D12345985242 is the original SN.
Prefix: FG200D
Appended 10 Digits: 0000000001
The new SN will be: FG200D0000000001.
used as protected subnets to generate static routes among the FortiGate devices.
e. After defining the authentication methods and encryption properties, click Next.
i. Optionally, under Advanced Options, the IKE version must be set to two in order to use IPv6 over
tunnels.
d. Select a Device.
e. Select a Default VPN Interface. The default VPN interface should have a valid IP and be mapped.
i. Optionally, specify the Local Gateway. This option can be left blank in most cases.
i. If Manual is selected, go to the Device Manager to set the IP on the relevant IPSec interfaces and define
the routings manually.
VPN gateway configuration settings summary:
For further FortiManager information, refer to the Administration Guides available in the
Fortinet Document Library.
FortiSwitch Manager is used to manage and monitor managed FortiSwitch units. Managed FortiSwitch units are
connected to FortiGate units that are managed by FortiManager. This chapter contains the following topics:
l Using central management on page 42
l Using per-device management on page 47
l Installing changes to FortiSwitch devices on page 50
l Upgrading FortiSwitch firmware on page 52
l Using zero touch deployment for FortiSwitch on page 53
You can use FortiSwitch Manager for central management or per-device management of managed FortiSwitch units.
This section describes how to use central management.
Following is a high-level summary of how to use central management:
1. Enable central management. See Enabling FortiSwitch central management on page 42.
2. Create templates.
You can import templates from managed switches, or you can create new templates. See Importing and editing
FortiSwitch templates on page 43 or Creating FortiSwitch templates on page 44.
3. Assign templates to managed switches. See Assigning templates to FortiSwitch devices on page 47.
4. Install changes to managed switches. See Installing changes to FortiSwitch devices on page 50.
When central management is enabled, you can create templates for a variety of switch configurations, and assign
templates to multiple managed switches of the same type.
3. Beside Central Management, select the FortiSwitch checkbox, and click OK.
You can import a template of settings from a managed FortiSwitch unit, and then use FortiManager to edit the template
before installing the changes back to the switch or assigning the template to other switches of the same type.
c. (Optional) In the New Name box, type a name for the template.
When you leave this option blank, the template is named by using the default naming pattern.
To edit a template:
Instead of importing a template of settings from FortiSwitch units to FortiManager, you can create templates on the
FortiSwitch Manager pane in FortiManager.
You can create the following components, and then create a variety of templates that select different combinations of
the components:
l VLANs
l Security policies
l LLDP profiles
l QoS policies
This topic describes how to create a security policy and a template.
d. In the Allowed VLAN box, select the VLAN configuration that you created.
e. In the Security Policy box, select the security policy that you created.
f. In the LLDP Profile box, select the LLDP profile that you created.
g. In the QoS Policy box, select the QoS policy that you created.
h. Set the remaining options as required.
5. Click OK.
To assign templates:
Only templates that apply to the specific device model are available for selection.
6. Install the template settings. See Installing changes to FortiSwitch devices on page 50.
You can use FortiSwitch Manager for central management or per-device management of managed FortiSwitch units.
This section describes how to use per-device management.
Following is a high-level summary of how to use per-device management:
1. Enable per-device management. See Enabling FortiSwitch per-device management on page 48.
2. Configure profiles for managed switches.
You can configure VLANs, security policies, LLDP profiles, and QoS policies, and the changes are saved to the
FortiGate database. See Configuring FortiSwitch profiles on page 48.
3. Configure ports for managed switches by assigning profiles.
When you configure ports, you can assign the profiles and policies that you created. See Configuring FortiSwitch
ports on page 49.
4. Install changes to managed switches. See Installing changes to FortiSwitch devices on page 50.
When per-device management is enabled, you can configure changes on each managed switch.
When per-device management is enabled, you can use the FortiSwitch Manager pane to configure profile and policy
settings for each managed switch. The settings are saved to the FortiGate database, but not yet assigned or installed to
switches.
You can configure the following types of profiles and policies:
l VLANs
l Security policies
l LLDP profiles
l QoS policies
After you create the profiles and policies, you can configure ports for managed switches to select the VLANs, policies,
and profiles you created, and then assign and install the settings to managed switches.
To configure VLANs:
3. Double-click a VLAN to open it for editing, or click Create New to create a new VLAN.
When per-device management is enabled, you can use the FortiSwitch Manager pane to configure ports for each
managed switch. When you configure ports, you can assign the VLANs, security policies, LLDP profiles, and QoS
policies that you created by using the FortiSwitch Profiles tab.
To configure switch ports:
1. Go to FortiSwitch Manager > Managed Switches.
2. In the tree menu, select a FortiGate.
The list of managed switches is displayed in the content pane.
3. Double-click a switch.
The FortiSwitch Ports pane is displayed.
You can install changes to managed FortiSwitch devices directly from the FortiSwitch Manager pane. Alternately you
can install changes when you install a configuration to the FortiGate that manages the switch.
You can use FortiManager to upgrade firmware for FortiSwitch units. By default, FortiManager retrieves the firmware
from FortiGuard.
You can also optionally import special firmware images for FortiSwitch to the FortiGuard module, and then use them to
upgrade FortiSwitch units.
You can configure FortiSwitch on FortiManager by using its serial number. Then you can use zero touch deployment of
FortiSwitch devices across the network. After configuring FortiSwitch on FortiManager, you can deploy remote
FortiSwitch devices by plugging them into remote FortiGate devices.
Requirements:
l FortiManager version 5.6 ADOM or later.
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with FortiSwitch.
l The FortiSwitch serial number is available.
You can also use the zero touch deployment process to deploy FortiGate devices.
Device Interface Select the port where the FortiSwitch will be connected.
You can configure two or more FortiManager units in a high availability (HA) cluster. You can also generate and
download a debug log for each unit in a FortiManager HA cluster.
The following is an overview of configuring FortiManager units in an HA cluster:
1. Configure the primary FortiManager unit.
2. Configure one or more backup FortiManager units.
3. If you encounter problems, review the debug log for each unit in an HA cluster.
You can configure one FortiManager unit to be the primary unit in a high availability (HA) cluster. You must know the
IP address and serial number of the FortiManager units that will be configured as backup (or peer) units in the HA cluster
to complete this procedure.
6. Click Apply.
You can configure up to four FortiManager units as backup (or peer) units in an HA cluster. You must know the
IP address and serial number of the primary FortiManager unit in the HA cluster to complete this procedure.
5. Click Apply.
You can run a command to generate a debug log for each FortiManager unit in an HA cluster, and then you can
download the logs using the GUI.
1. On the primary or backup FortiManager unit in an HA cluster, enter the following command:
diagnose debug application ha 255
3. Save the log file (ha-<date>.log) to your local computer. It can be opened in a text editor.
When you create an administrator account in FortiManager, by default the account grants access to all ADOMs and all
policy packages. However, you can configure administrator accounts with restricted access to the following items:
l ADOMs - see Restricting administrator access to ADOMs on page 57
l Device groups - see Restricting administrator access to device groups on page 59
l Policy packages - see Restricting administrator access to policy packages on page 61
When you create an administrator account, you can specify which ADOMs that users of the account can access. This
topic describes the different methods you can use to restrict access.
On the Device Manager pane, you can create device groups and add devices to the different groups. If you are using
ADOMs, select the ADOM, and then create the device group.
When you create an administrator account, you can specify which ADOMs the account can access, and which device
groups can be accessed in those ADOMs.
This topic describes how to create a device group and how to restrict administrator access to device groups.
6. Click OK.
When the administrator logs in to FortiManager, they can only access the specified device group on the Device
Manager pane. In this example, they can only access group1.
When you create an administrator account, you can specify which policy packages that administrator can access.
You can add a FortiAnalyzer unit to FortiManager and use FortiManager to manage FortiAnalyzer, but you must add the
FortiAnalyzer unit to an ADOM used for central management, which is similar to adding FortiGate units to FortiManager
for central management.
You can use the following methods to add FortiAnalyzer units to FortiManager:
l In FortiManager, use the Add FortiAnalyzer wizard in the Device Manager pane.
l In FortiAnalyzer, enable central management, and then go to FortiManager to authorize the device for central
management.
This topic includes the following sections:
l Preparing to add FortiAnalyzer to FortiManager on page 62
l Using the wizard to add FortiAnalyzer to FortiManager on page 63
l Additional information on page 65
When using FortiManager to manage FortiAnalyzer, it is recommended to use a FortiAnalyzer unit with factory settings
or a FortiAnalyzer unit that has been reset to the factory settings (factory-reset). A FortiAnalyzer unit with factory
settings helps avoid conflicts when FortiManager synchronizes the device database to FortiAnalyzer.
1. On the FortiAnalyzer unit, enable fgfm access on the interface used to connect to FortiManager.
config system interface
edit "port1"
set ip 10.3.121.142 255.255.0.0
set allowaccess fgfm
next
end
2. Ensure that FortiManager Features are disabled.
config system global
set fmg-status disable
end
3. Create an ADOM with the same name as the ADOM in FortiManager, such as manage_remote_faz.
FortiAnalyzer and FortiManager must have an ADOM of the same name. When you add FortiAnalyzer to
FortiManager, add it to the ADOM of the same name.
4. Set storage settings for the ADOM.
This section describes how to use the Add FortiAnalyzer wizard to add FortiAnalyzer to FortiManager.
FortiManager automatically compares ADOMs and devices on both FortiAnalyzer and FortiManager and
provides the comparison and verification results.
Additional information
This section describes some of the other scenarios you might encounter when adding FortiAnalyzer units to
FortiManager.
Missing ADOM
If the current ADOM in FortiManager does not exist on FortiAnalyzer, FortiManager automatically creates an ADOM
with same name and version on FortiAnalyzer before starting to synchronize the device list.
If FortiAnalyzer is receiving logs from FortiGate devices that do not exist on FortiManager, FortiManager identifies the
devices.
FortiManager can add the FortiGates and retrieve configurations for the FortiGates when adding the FortiAnalyzer unit.
If any errors occur during the synchronization step, FortiManager fails to add FortiAnalyzer.
After FortiManager manages the ADOM with FortiAnalyzer in it, you should use FortiManager to perform changes on all
devices in the ADOM. This topic describes the behavior you will view in the GUI for a FortiAnalyzer unit that is managed
by FortiManager.
3. Click OK.
Notice the Lock icon displayed on top bar, and notice that the Add Device, Edit, and Delete buttons are
unavailable.
After adding FortiAnalyzer to FortiManager, the device list is also synchronized to FortiAnalyzer. To make
these FortiGate devices send log to FortiAnalyzer, you can use provisioning templates to centrally configure the log
settings for FortiGates.
After you add FortiAnalyzer to the ADOM in FortiManager, the following FortiAnalyzer panes are available in
FortiManager:
l FortiView
l NOC-SOC
l Log View
l Event Manager
l Reports
All FortiAnalyzer functionality is available, except for the following:
l Importing and exporting a report template
l Importing and exporting a chart
l Importing and downloading a log file
In FortiManager, when you create a report and run it, and the same report is generated in the managed FortiAnalyzer.
3. Go to Policy & Objects > Policy Packages, and right-click the policy UUID to search the related policy logs.
FortiManager can manage multiple FortiAnalyzer units, but each FortiAnalyzer must be in its own ADOM. You cannot
add a second FortiAnalyzer unit to an ADOM.
For example, FortiManager can contain the following ADOMs: adom-1 and adom-2, and adom-1 manages FAZ-1:
If adding FortiAnalyzer failed, enable the following debug command, which will provide error or information in a debug
log, and then try adding FortiAnalyzer again.
diagnose debug application depmanager 255
diagnose debug enable
example: add_faz_dep_debug.txt
When you delete FortiAnalyzer from FortiManager, the ADOM on FortiAnalyzer should be unlocked. If the
ADOM remains locked, you can use the following command on the FortiAnalyzer unit to unlock the ADOM:
FAZ1000E # diag dvm adom unlock
adom ADOM name.
FAZ1000E # diag dvm adom unlock remote-faz
---Deleting DVM lock by remote FortiManager succeeded---
FAZ1000E#
The Alert console might display the Serial number already in use message. FortiManager might also display the Serial
number already in use message after failing to add FortiAnalyzer.
You can use the diagnose dvm device list command on the FortiAnalyzer unit and on the FortiManager unit to
see if the same FortiGate unit already exists on the FortiAnalyzer unit, but in different ADOM.
In this example, you will learn how to use your FortiManager to create a third party blocklist provider workflow.
Overview
You must create a script that will handle the entire workflow. Make sure the script can convert the third party blocklist
into a FortiManager XML file.
From an external server, you must schedule the periodic execution of that script. Using the communication tools
provided by the third party blocklist provider, the script will fetch the blocklist from the third party.
The category value in <cate></cate> could be either a normal web filter category or a local category.
Example:
# execute fmupdate scp import custom-url 20M-custom-url.xml 000.000.000.000 00
tmp/FORTIGUARD my_login my_password
This operation will replace the current <custom-url> package!
Do you want to continue? (y/n)y
Update successfully
In this example, FortiManager will upload the file from the following file:
scp://my_login:[email protected]:00/temp/FORTIGUARD/20M-custom-url.xml
3. Configure FortiManager to only use its local FortiGuard database or local blocklist database:
a. Select one of the following:
l Local FortiGuard database
l Local blocklist database
l Or both
config fmupdate custom-url-list
set db_selection <fortiguard-db|custom-url|both>
end
4. Test custom URLs managed by FortiManager:
a. Use the CLI in FortiManager to send categorization requests for custom URLs managed by FortiManager.
Example of the CLI command set:
# diagnose fmupdate fgd-url-rating FGT SN 1 www.foo.com
url rating flags: 0x2 (2:EXACT_MATCH, 1:PREFIX_MATCH)
rates according to url: 0x37 0x00 0x00 0x00
rates according to ip: 0x00 0x00 0x00 0x00
num_dots:-1, num_slash:-1
database version: 16.45562
0 ms
The FGT SN can be any FortiGate SN.
The returned category is in a hexadecimal output: 0x37.
In decimal format, the category is 56 or Web Hosting.
The memory capacity of the unit determines the number of URLs FortiManager can
manage.
edit 1
set servertype
update rating
set serveraddress {<IP_address> | <FQDN_address>}
next
end
set includedefaultservers disable
end