NSE4 Prep Session Presentation
NSE4 Prep Session Presentation
What is a FortiGate?
FortiGate is a Unified Threat Management Device (UTM)
A UTM device is a security appliance that integrates a range of
security features into one appliance
Combines Firewall, Gateway AV, IPS, and App. Control into a single
platform
3
Section 1 - Introduction to FortiGate
FortiGuard
Subscription service that gives FortiGate access to 24x7 security
updates
Powered by a team of Fortinet researchers
Queries are real-time
FortiGate queries FDN (FortiGuard Distribution Network) every time it
scans for SPAM or Filtered Websites
Uses UDP for transport – connectionless and designed for speed
AV and IPS packages are not downloaded as frequently and must be
up-to-date to prevent new threats
Modes of Operation
NAT mode
Default operation mode
Forwards packets based on Layer 3, like a router
Each logical network interface has an IP address
Transparent mode
Forwards packets at Layer 2, like a switch
Only the management interface has an IP Address
4
Section 1 - Introduction to FortiGate
Administration
Factory default settings
Port 1 / Internal interface IP: 192.168.1.99/24
Built-in DHCP server is enabled on Port 1 / Internal Interface
Default login
User: admin
Password: <blank>
MODIFY THIS DEFAULT “root” password
5
Section 1 - Introduction to FortiGate
Administration Methods
GUI - Web Browser (HTTP/HTTPS) or FortiExplorer
CLI - Console, SSH, Telnet, GUI Widget
Administrator Profiles
Super Admin – “admin” – Full access to everything and settings
cannot be changed
Prof_Admin – full access to its own Virtual Domain and settings can
be changed
Users can be created with varying permissions (Read only, Read –
Write, etc).
Admins with smaller scope of permissions cannot create, or even view,
accounts with more permissions, including password changes
Two-Factor Authentication
Instead of using one way to verify your identity, you verify in two ways
FortiToken
Physical FortiToken
FortiToken Mobile
Android or iOS versions available
6
Section 1 - Introduction to FortiGate
Administrative Access
Trusted Sources – define which hosts or subnets are trusted sources of login attempts
7
Section 1 - Introduction to FortiGate
8
Section 1 - Introduction to FortiGate
Configuration Files
Configuration can be saved to an external file
Optional encryption
Can backup automatically
Upon logout
Not available on all models
To restore a previous configuration, upload file. FortiGate will
reboot
Encrypted & Unencrypted
Restoring Encrypted requires same device/model + build + password
required
Restoring Unecrypted only requires the same model
Different build is OK if the upgrade path is supported
If VDOMs are enabled, you can back up VDOMs individually
VDOM details discussed in a later section
Updgrade/Downgrade
Easiest method to upgrade: “Update” link on the System
Information widget and choose firmware file
Clean Install possible via CLI within the boot loader menu
Have physical access/terminal server in case reversion is needed
READ THE RELEASE NOTES
9
Section 1 - Q & A session
What is NOT a FortiGate Feature?
A. Database Auditing
B. Intrusion Prevention
C. Web Filtering
D. Application Control
10
Section 1 - Q & A session
Acme Web Hosting is replacing one of their firewalls with a FortiGate.
It must be able to apply port forwarding to their back-end web servers
while blocking virus uploads and TCP SYN floods from attackers.
Which operation mode is the best choice for these requirements?
A. NAT/route mode
B. NAT mode with an interface in one-arm sniffer mode
C. Transparent mode
D. No appropriate operation mode exists
11
Section 2
Logging & Monitoring
Section 2 – Logging & Monitoring
13
Section 2 – Logging & Monitoring
FortiAnalyzer/FortiManager
FortiAnalyzer – Long term, dedicated storage of log data
FortiManager – Centrally managed multiple FortiGate devices
Can also store logs and generate reports
Identical to FortiAnalyzer except for 2GB daily limit on logs received
Configure logging to FortiAnalyzer/FortiManager in the GUI or
CLI
FortiCloud
Subscription service
Long term log storage & reporting
Links to FortiCare user
14
Section 2 – Logging & Monitoring
15
Section 2 – Logging & Monitoring
16
Section 2 – Logging & Monitoring
17
Section 2 – Logging & Monitoring
Monitoring Logs
Monitoring logs is critical to protection of your network
Three ways to monitor:
Alert Emails
Send notification to email upon detection of event
Can’t configure alert email until SMTP server is defined and at
least one DNS server
Can send up to 3 addresses
Alert Message Console
GUI widget on the FortiGate dashboard
Individual alerts can be acknowledged and removed from the
list
Customizable alert options
SNMP
Configure FortiGate interface for SNMP access
Compile and load FortiGate MIBs into SNMP manager
Create SNMP communities to allow connection between
FortiGate to SNMP manager
Traps received by agent sent to SNMP manager
18
Section 2 – Logging & Monitoring
Logging Resources
The more logs that get generated, the more CPU memory and
disk storage space is required in order to process them
Traffic logs can be abbreviated to free up firewall resources
Crash Logs
Inspection of traffic handled by processes
Any time a process closes, it is a “crash”
Some are normal (closing scanunit to update definitions)
Normal shut down with no abnormalities shows a status of 0 (zero)
19
Section 2 - Q & A session
1. There are eight (8) log severity levels that indicate the importance of
an event. Not including Debug, which is only needed to log
diagnostic data, what are both the lowest AND highest severity
levels?
A. Notification, Emergency
B. Information, Critical
C. Error, Critical
D. Information, Emergency
E. Information, Alert
20
Section 2 - Q & A session
1. Which of the following are considered log types?
(Choose 3)
A. Forward log
B. Traffic log
C. Syslog
D. Event log
E. Security log
Answer: (B) Traffic Log, (D) Event log, (E) Security Log
21
Section 3
Firewall Policies
Section 3 – Firewall Policies
23
Section 3 – Firewall Policies
Policy List:
Policy & Objects > Policy > IPv4
Section View: Lists policies by ingress/egress interface pairs
Global View: Lists policies by policy sequence numbers
When policy has multiple source/destination interfaces or matches
any
Policy order can be adjusted
GUI: drag and drop Seq. #
CLI: use policy ID #, not Seq. #
config firewall policy
move <policy_id> (before|after) <policy_id>
end
Interfaces vs Zones
Incoming Interface: Interface / zone receiving packets
Outgoing interface: Interface / zone forwarding packets
Zone: Logical group of interfaces
Interface in a zone cannot be referenced individually
24
Section 3 – Firewall Policies
Matching by Source
Must specify at least one source
May express either, neither, or both
Source User
Source Device
Source Address - IP Address Object
Source User – Individual user or user group. May refer to:
Local firewall accounts
Accounts on a remote server (e.g. Active Directory)
FSSO
Personal Certificate (PKI-authenticated) users
Source Device – Identified or manually defined client device
Enables device identification on the source interface
Device Identification
Agentless
Agent-Based
25
Section 3 – Firewall Policies
Matching By Destination
Like source, address objects can use IP or FQDN
DNS query used to resolve FQDN
Country defines addresses by ISP’s geographical location
Database updated periodically within FortiGuard
Scheduling
Policies that only apply during specific times/days
Example: less restrictive “Lunch time” policy
Default schedule applies all the time
Recurring – happens every time during specified day(s) of the week
Matching By Service
Services determines matching transmission protocol and port
number
Can be predefined or custom
ALL matches all ports and protocols
Web Proxy Service also available if incoming interface is set to
web-proxy
Group Services and Web Proxy Service Group to simplify
administration
26
Section 3 – Firewall Policies
27
Section 3 – Firewall Policies
Logging
If you enable session starts, FortiGate will create a traffic log
when the session begins
Once a firewall policy closes an IP session, if you have
enabled logging in the policy, FortiGate will generate traffic
logs
During the session, if a security profile detects a violation,
FortiGate will record the attack log immediately
Monitoring
Active sessions, bytes or packets per policy
Can be used to determine how much traffic is matching each
firewall policy
Session Table
Accepted IP Sessions tracked in session table
Stores information about the state
Source and destination addresses, port number pairs, state, timeout
Source and destination itnerfaces
Source and Destination NAT actions
Performance Metrics
Max. Concurrent Sessions
New Sessions per second
28
Section 3 – Firewall Policies
29
Section 3 – Firewall Policies
Virtual IP (VIP)
Desitnation NAT objects
Default type is static NAT
Can be restricted to forward only certain ports
VIPs should be routable to the external facing (ingress)
interface for return traffic
Traffic Shaping aka QoS (Quality of Service)
Rate limiting is configurable
Inbandwidth and Outbandwidth
Forward traffic subject to ToS/DSCP priority queuing
Traffic shaping applied by a firewall policy may guarantee,
increase or decrease priority queue, or drop packets (policing)
Types:
Shared Shaper: applies a total bandwidth to all traffic using that
shaper
Per IP shaper: Bandwidth management per IP address
30
Section 3 – Firewall Policies
31
Section 3 - Q & A session
Which correctly define “Section View” and “Global View” to firewall policies?
(Choose Two)
Answer: (A) Section View…interface pairs, (D) Global View...policy sequence number
32
Section 3 - Q & A session
If you enable the option “Generate Logs when Session Starts”, what
effect does this have on the number of traffic log messages generated
for each session?
33
Section 4
Firewall Authentication
Section 4 – Firewall Authentication
What is Authentication?
Confirms identity of a user or device
Once the FortiGate identifies the user/device, FortiGate
applies the right firewall policies and profiles to allow / deny
access to each network resource
Allows action based on the user, not just the IP address.
Inspection rules follow individuals across multiple devices
Methods of Authentication
Local Password Authentication
Remote password authentication
Two-Factor authentication
Enabled on top of an existing method
Requires something you know and something you have
35
Section 4 – Firewall Authentication
36
Section 4 – Firewall Authentication
37
Section 4 – Firewall Authentication
Authentication Types
Active
User receives a login prompt and must manually enter credentials to
authenticate
Used with LDAP, RADIUS, Local, and TACACS+
Passive
User does not receive a login prompt as credentials are determined
automatically
Method varies depending on type of authentication used
Used with FSSO, RSSO, and NTLM
38
Section 4 – Firewall Authentication
Order of Operations
When both active and passive authentication are enabled, the
first method that can determine a user name is used
If the user’s information cannot first be determined through
passive means, active methods are employed
39
Section 4 – Firewall Authentication
Mixing Policies
Enabling authentication on a single policy does not always
force an active authentication prompt
2 Options:
Enable authentication on every policy that could match the traffic
Enable a captive portal on the ingress interface for the traffic
40
Section 4 – Firewall Authentication
Captive Portal
Network interfaces perform authentication at the interface level
Convenient way to authenticate web users on wired or Wi-Fi
Must be enabled on the ingress interface of the traffic
Only ACTIVE authentication methods can use captive portal
Exceptions:
Exempt list can be setup for devices that cannot use active
authentication
Example: Printers, Fax machines, game consoles
Disclaimers
Can be used in conjunction with captive portal, if desired.
Not considered authentication or a captive portal
Displays the Terms & Disclaimer agreement page before user
authenticates
Neither a security exemption list nor a captive portal exemption
on a firewall can bypass a disclaimer
41
Section 4 – Firewall Authentication
Authentication Timeout
Specifies how long a user can remain idle before the user must
authenticate again
Ensures users do not authenticate and then stay in memory
indefinitely
Three options for Timeout behavior:
IDLE (default)
Looks at the packets from the hosts IP
If no packets generated by the host device in the configured timeframe, the
user is logged out
HARD
Regardless of the user’s behavior, the timer starts as soon as the user
authenticates and expires after the configured value
NEW SESSION
Even if traffic is being generated on existing communications channels, the
authentication expires if no new sessions are created through the firewall
from the host device, within the configured timeout
42
Section 4 – Firewall Authentication
RADIUS
Protocol that provides Authentication, Authorization, and Accounting
Services (AAA)
No tree structure
Supported schemes:
chap
pap
mschap
mschap2
43
Section 4 – Firewall Authentication
44
Section 4 – Firewall Authentication
User Groups
Firewall policies can be assigned per user group
By assigning individual users to the appropriate user
groups, you can control access to network resource
The firewall user groups do not need to match any sort
of group that may already exist on a server
45
Section 4 – Firewall Authentication
Monitoring Users
After creating firewall policies, you can
monitor access of your firewall users
User Monitor Section in the GUI
User & Device > Monitor > Firewall
User Monitor displays who has authenticated
through the firewall policies of your FortiGate
device
Does include administrators
Also allows you to de-authenticate a user or
multiple users simultaneously
46
Section 4 - Q & A session
Which authentication scheme is not supported by the RADIUS
implementation on FortiGate?
A. CHAP
B. MSCHAP2
C. PAP
D. FSSO
47
Section 4 - Q & A session
Which best describes the authentication timeout?
A. How long FortiGate waits for the user to enter his or her credentials
B. How long a user is allowed to send and receive traffic before he or she
must authenticate again
C. How long an authenticated user can be idle (without sending traffic)
before they must authenticate again
D. How long a user-authenticated session can exist without having to
authenticate again
Answer: (C) How long an authenticated user can be idle (without sending traffic)
before they must authenticate again
48
Section 5
SSL VPN
Section 5 - SSL VPN
What is a VPN?
Secure logical network created for physically separated networks
Establishes connectivity using SSL (Layer 4 & Layer 5)
Information encapsulated at layer 6 & layer 7 (highest level in OSI model)
Authentication Methods
Remote Password Authentication (RADIUS, LDAP)
Two-Factor Authentication
Local Password Authentication
50
Section 5 - SSL VPN
51
Section 5 - SSL VPN
Split tunneling
Ensures that only the traffic for the private network is sent to the SSL VPN
gateway
Internet traffic is sent through the usual unencrypted route
This conserves bandwidth and alleviates bottlenecks
52
Section 5 - SSL VPN
Troubleshooting Tips
No response from URL when connecting to portal
Check the SSL VPN port assignment. Also verify that the
SSL VPN policy is configured correctly
Also check URL pattern - https://<FortiGate
IP>:<Port>/remote/login (port # and FortiGate IP)
Forticlient can’t connect
Check for compatibility
Ensure that you have the right remote gateway IP and port
Ensure you have the proper authentication
Tunnel connectivity or access issues
Ensure that there is a static route to direct packets destined
SSL VPN interface
Examine the policy allowing VPN access to the destination
network
Ensure the traffic is pointing to the right ingress/egress
interfaces
53
Section 5 – Q & A
Answer: (B) Access to internal network resources is possible from the SSL VPN portal
54
Section 5 – Q & A
Which of the following authentication methods can be used for SSL VPN
authentication? (Choose three.)
55
Section 6
Basic IPSec VPN
Section 6 – Basic IPSec VPN
What’s IPsec VPN?
Vendor neutral protocol used to connect distinct networks separated
by the internet. (L3 protocol – RFC 2401)
Benefits?
Authentication – Verify identity of initiator and sometimes
responder(signatures and certificates)
Data Integrity – Ensures data hasn’t been altered during transit
(hashing and data checksum)
Confidentiality – Ensured message access to intended recipient
(Encryption)
IPsec Encapsulation Modes
Tunnel Mode – Entire packet is encrypted and becomes the
data component of a new IP packet
Transport Mode – IPsec header is inserted into the IP packet,
and no new packet is created
Route-based (interface-based)
Traffic must be routed to IPsec virtual network interface.
Two firewall policies with action ACCEPT required per direction
In FortiOS 5.2+, VPN wizard automatically adds routes &
policies.
Policy based (tunnel based)
One firewall policy with action IPSEC required – bidirectional
policy
Policy based VPN settings are available in CLI by default
57
Section 6 – Basic IPSec VPN
IPsec Protocol
Internet Key Exchange (IKE)
Negotiation method of authentication
Transfers SA parameters (algorithm, key & protocol)
58
Section 6 – Basic IPSec VPN
Phase I
Authenticate peers
Authenticate peers eg PSK or signatures
Negotiate temporary IKE security association
In IKEv1 two possible ways:
Main mode – IKE proposal on SA - 6 packets exchanged
Aggressive mode – Not negotiable. 3 packets exchanged; phase 1
fails if responder doesn’t accept strict proposal
NAT Traversal
Detect if NAT devices exist on path (if yes, use UDP 4500)
59
Section 6 – Basic IPSec VPN
Phase II
Negotiate Ipsec SA for ESP.
Phase 2 periodically renegotiates cryptography, this maintains security.
Best Practices
Do not use Pre-shared keys – Weak authentication and keys are stored
in plaintext
Do not use Diffie-Hellman Group 1 (low) – low key strength 768bits
Use strong encryption algorithm - 3DES, AES
Use strong hashing algorithm SHA instead of MD5
Reduce the lifetime of the Security Association by enabling Perfect
Forward Secrecy
60
Section 6 – Q & A
Which of the following IKE modes is the one used during the IPsec phase 2
negotiation?
A. Aggressive mode
B. Quick mode
C. Main mode
D. Fast mode
61
Section 6 – Q & A
Which of the following statements is true regarding the differences between route-
based and policy-based IPsec VPNs? (Choose two.)
A. The firewall policies for policy-based are bidirectional. The firewall policies for
route-based are unidirectional
B. In policy-based VPNs the traffic crossing the tunnel must be routed to the virtual
IPsec interface. In route-based, it doesn’t
C. The action for firewall policies for route-based VPNs may be Accept or Deny, for
policy-based VPNs it is Encrypt
D. Policy-based VPN uses an IPsec interface, route-based does not.
62
Section 7
Antivirus and Conserve Mode
Section 7: Antivirus & Conserve Mode
What is a Malware?
is a category of software that is capable of copying itself and has detrimental effects,
such as corrupting computing system/environment
Types of Malware
Virus – Code injected into a system and spreads on its own via an exploit
eg. Trojan - Doesn’t replicate (such as Zeus. Worms – spreads to other hosts via network
(such as conficker and code red)
Grayware – Requires some kind of user interaction. Sometimes embedded in plugins,
toolbars that track user’s activity
Evasion Techniques
Polymorphism
Polymorphic viruses/malware can change the uniqueness of the file
making comparing a files unique digital signature to millions of signature a
challenge
Metamorphic
Avoid detection by mutating into several variants
Rewrites its code with each infection
64
Section 7: Antivirus & Conserve Mode
Signature Based
Matches FortiGuard AV signature database
Heuristics
Looks for “virus-like” attribute/code (eg Modify registry, encrypting files)
If greater than “virus-like” threshold, mark as suspicious
Greater chances of false positives
Sandboxing
Can detect Zero-day attacks with high certainty
Files (larger than oversize limit of 10MB) are sent to an isolated environment for
malware inspection
65
Section 7: Antivirus & Conserve Mode
Extended Database
Contain viruses that haven’t been detected for some time
Extreme Database
Detects all known viruses, including legacy OS such as DOS,Win95,
Windows 98, and so on
66
Section 7: Antivirus & Conserve Mode
67
Section 7 - Q & A
Files reported to be infected by the "Suspicious" virus were subject to which Antivirus
check?
A. Grayware
B. Virus
C. Sandbox
D. Heuristics
68
Section 7 – Q & A
Which are the three different types of Conserve Mode that can occur on a FortiGate
device? (Choose three.)
A. Proxy
B. Flow
C. Kernel
D. System
E. Device
Answer – A, C, D
69
Section 7 – Q & A
Files that are larger than the oversized limit are subjected to which Antivirus check?
A. Virus
B. Grayware
C. Sandbox
D. Heuristic
70
Section 8
Explicit Proxy
Section 8 - Explicit Proxy
What is web proxy?
Forwards requests for clients to website
May cache responses
If cache exist, proxy is a shortcut: responds itself with cached content
Types of proxies
Implicit Proxy
Intercepts request even though traffic isn’t pointing to proxy’s IP
Proxy listens on port 80 and port 443
Explicit Proxy
Client’s send request to a configured proxy, Not directly to a website
Proxy listens for packets to its IP and port number (Often port 8080 or
4443)
72
Section 8 - Explicit Proxy
How’s explicit proxy configured?
Browser proxy settings
Manually configure browser with one proxy’s IP (or FQDN) & port number
Can configure exception (Bypasses proxy settings)
Proxy Automatic Configuration
Support for more than one proxy
Defines how browsers choose a proxy
Specifies which traffic will be sent to which proxy
Configure each browser with PAC file URL
By default FortiGate host PAC file at: http://<FG_IP:<port>/proxy.pac
Web Proxy Auto-Discovery protocol
Allow browser to automatically discover where the proxy is located
Two Methods
DHCP Query
Sends a DHCPINFORM request to the DHCP server
The DHCP server replies with PAC file’s URL
DNS Query
Browser queries DNS server to resolve IP address of web server
Browser downloads PAC file & accesses web
73
Section 8 - Explicit Proxy
Benefits
Improves WAN bandwidth usage
Improves Server load
Increases Perceived responsiveness
74
Section 8 – Q & A
Which of the following are benefits of using web caching? (Choose three.)
Answer: (A) Decrease Bandwidth Utilization, (B) Reduce Server Load, (E)
Decrease Traffic Delay
75
Section 8 – Q & A
Which of the following statements is true regarding the TCP SYN packets that
go from a client, through an implicit web proxy (transparent proxy), to a web
server listening at TCP port 80? (Choose three.)
Answer: (A) The source IP address matches the client IP address, (D) The
destination IP Address matches the server IP Addresses, (E) The destination
TCP port number is 80
76
Section 9
Web Filtering
Section 9 – Web Filtering
Web Filtering
Control or track web activity
78
Section 9 – Web Filtering
FortiGuard Category Filter
Split into multiple categories and sub-categories
Layout will switch periodically as the internet changes
New categories and sub-categories are released and compatible with updates
firmware
79
Section 9 – Web Filtering
Static URL Filtering
Control web access by creating exception
Possible Static URL filter actions are:
Allow, Monitor, Block, Exempt
FortiGuard Quota
Can be used to limit the time user spend on web sites
By default, based on the user ID, otherwise tracked by IP
Can apply to categories with action: Monitor, Warn, or Authenticate
Fortinet Bar
Provide direct feedback to the user on quota
Applicable to ONLY http traffic
Safe search
Re-write URL to enable safe search
SSL inspection should be enabled
YouTube EDU redirect – Appends a unique identifier & redirects
YouTube search to configure YouTube profile page
80
Section 9 – Q & A
Which of the following are possible actions for static URL filtering? (Choose
three.)
A. Allow
B. Block
C. Warn
D. Exempt
E. Shape
81
Section 9 – Q & A
Which of the following statements are true regarding the web filtering modes?
(Choose two)
A. Proxy based mode allows for customizable block pages to display when
sites are prevented
B. Proxy based mode requires more resources than flow-based
C. Flow based mode offers more settings under the advanced configuration
section of the GUI
D. Proxy based mode offers higher throughput than flow-based mode
Answer: (A) Proxy based mode allows for customizable block pages to
display when sites are prevented, (B) Proxy mode requires more resrouces
than flow-based
82
Section 9 – Q & A
Which of the following web filtering modes can inspect the full URL? (Choose
two.)
A. Proxy based
B. DNS based
C. NAT based
D. Flow based
83
Section 10
Application Control
Section 10 - Application Control
Supported actions:
Shared and Per-IP traffic shaping
Block, Allow, Monitor, Quarantine
Uses IPSEngine
Not proxy-based – pattern matching
Can detect even if users try to circumvent via an external
proxy
Can start OSI Layer 2
Use byte flag to match Ethernet headers
For higher layers, protocol-specific flags and generic strings
85
Section 10 - Application Control
86
Section 10 - Application Control
Application Control Profile
Detect categories
Configure FortiGate action
Apply profile via firewall policy
Catch-All Categories
All Other Known Applications
Categories that belong to extended IPS database but don’t
appear on GUI
All Other Unknown Applications
Matches traffic that doesn’t conform to any application
control signature
Identifies the traffic as ‘Unknown Application’ in the logs
Custom Signature
Use proper syntax identifying the application name, protocol,
ports, context, and service
87
Section 10 – Q & A
Answer: (C) Encrypted traffic can be identified by the application control, (D)
Traffic shaping can be applied to the detected application traffic
88
Section 10 – Q & A
A. All traffic that matches the internal signature for unknown applications
B. Traffic that does not match the RFC pattern for its protocol
C. Any traffic that does not match an application control signature
D. A packet that fails the CRC check.
Answer: (C) Any traffic that does not match an application control signature
89
Section 11
Routing
Section 11 - Routing
Static Route Policy-Based Route
Manually configured routes More sophisticated then static and dynamic routes
Requiring a source, gateway IP and destination Can route by
Matches destination IP with the appropriate route Protocol
Source IP
Dynamic Route
Ports – Source or Destination
Automatically created route based on discovery from neighboring Type of Service
router
Precedent over routing table
Routing is based on destination IP
Can forward traffic or stop the policy
Supported protocols
RIP Blackhole Route
OSPF Traffic is dropped
BGP Prevents unnecessary traffic to unused subnets
IS-IS Unlike other routes, Blackhole routes are designed to make
networks unreachable
Multicast Route
Source sends single traffic stream to many receivers
FortiGate can be configured as multicast router
91
Section 11 - Routing
Destination – IP address and netmask
Gateway – IP address and interface
Distance
Estimates the quality of the route
Varies based on how route is determined
If 2 routes have the same destination, the lowest distance will be loaded into the routing table
Metric
Used to determine best route for dynamic routing protocols
Different protocols count metric differently
If 2 routes have the same destination and distance, the lowest metric will be loaded into the
routing table
Priority
Used by static routes to determine the best route
If 2 static routes have the same destination and distance, both will be loaded into the routing table
but only the lowest priority will be used
Device –The interface the route will apply to
Routes are active if the interface is both physically connected and administratively up
92
Section 11 - Routing
Codes
Defines what the flags
means
Flags
What kind of
route this is
Destination
[distance/Priority]
Gateway
Interface
93
Section 11 - Routing
Equal Cost Multi-path
Used if multiple static, BGP, OSPF routes have the same
Distance
Metric
Priority
Methods for determining route
Source IP
Source and Destination IP
Weighted Load Balancing
Spillover
94
Section 11 - Routing
Link aggregation - A method of bundling multiple point to point links
Achieve greater bandwidth
Provides link redundancy
Wan Link Load Balancing
Group of links connected to multiple ISPs
Virtual WAN link is created by the FortiGate
Only 1 Virtual WAN link per VDOM
Methods of Load Balancing
Source IP
Source and Destination IP Pair
Weighted Round Robin
Spillover
Quality of the link can also be measured
Similar to Link Health Monitor
Can measure jitter and latency
95
Section 11 - Routing
96
Section 11 – Q & A
Answer: (C),(D)
97
Section 11 – Q & A
98
Section 12
Virtual Networking
Section 12 – Virtual Networking
VLAN vs VDOM
VLAN turn one physical interface into many logical interfaces
VDOM takes a physical FortiGate and turns in to many logical firewalls
VLAN Concepts
NAT/Route Mode – VLANs are interfaces
Transparent Mode – VLANs are just identifiers
VDOM Concepts
VDOM share physical resources of the device
When enabled certain setting remain global
VDOMs can have their own administrators
Inter-VDOM Links
Connect different VDOMs via virtual interface
Only works between NAT-NAT and NAT-Transparent
Firewall polices and Routes are required to pass traffic
Management VDOM
Default is root
Where system, alert and FortiGuard update traffic originates
100
Section 12 – Virtual Networking
Independent VDOM
101
Section 12 – Virtual Networking
102
Section 12 – Virtual Networking
Mesh VDOM
103
Section 12 – Q & A
A FortiGate device is configured with four VDOMs: 'root' and 'vdom1' are in
NAT/route mode; 'vdom2' and 'vdom3' are in transparent mode. The
management VDOM is 'root'. Which of the following statements are true?
(Choose two.)
A. An inter-VDOM link between 'root' and 'vdom1' can be created.
B. An inter-VDOM link between 'vdom1' and 'vdom2' can be created.
C. An inter-VDOM link between 'vdom2 ' and 'vdom3' can be created.
D. Inter-VDOM link links must be manually configured for FortiGuard traffic.
Answer: (A) An inter-VDOM link between ‘room’ and ‘vdom1’ can be created,
(B) An inter-VDOM link between ‘vdom1’ and ‘vdom2’ can be created
104
Section 12 – Q & A
A FortiGate unit has multiple VDOMs in NAT/route mode with multiple VLAN
interfaces in each VDOM. Which of the following statements is correct
regarding the IP addresses assigned to each VLAN interface?
A. Different VLANs can share the same IP address as long as they have
different VLAN IDs.
B. Different VLANs can share the same IP address as long as they are in
different physical interfaces.
C. Different VLANs can share the same IP address as long as they are in
different VDOMs.
D. Different VLANs can never share the same IP addresses.
Answer: (C) Different VLANs can share the same IP Address as long as they
are in different VDOMs
105
Section 13
Transparent Mode
Section 13 – Transparent Mode
Modes of Operation
NAT/Route Mode – OSI Layer 3 Router
Transparent Mode – Forwards based on MAC as a transparent Bridge
Transparent Bridge
Stores MAC address and the interfaces used to access those addresses
Splits the network into multiple collision domains
Forwarding Domains/Broadcast Domains
By default ALL interfaces are part of a single broadcast domain regardless of VLAN by default
Broadcast storm
MAC flapping
Breaking up the Broadcast Domain into Forwarding domains reduces the traffic
Forwarding Domains will only broadcast to interfaces on the same domain.
Pairing Ports
2 ports logically bound makes for easier configuration
Prevents Broadcast Storm and MAC address flapping issues
Spanning Tree Protocol (STP)
Link Management Protocol for preventing Layer 2 loops
FortiGate’s with switch interfaces support STP
Other FortiGate does not participate but can be configured to forward and block STP PDUs
107
Section 13 – Q & A
Answer: (A) Only FortiGate switch interfaces participate in spanning tree, (D)
All FortiGate interfaces in transparent mode VDOMs may block or forward
BPDUs
108
Section 13 – Q & A
Answer: (A) The whole VDOM is a single broadcast domain even when
multiple VLANs are used, (C) Interfaces configured with the same VLAN ID
can belong to different broadcast domains
109
Section 14
High Availability
Section 14 – High Availability
HA requirements
2-4 FortiGates that are the same.
Model
Firmware
Operating Mode
At least 1 heartbeat link, multiple links are recommended
Uses FGCP
TCP 703
Detected state of FortiGate devices in the HA Cluster
Elects primary
Same interface on the FortiGate are attached to the same switch.
HA Modes of Operation
Active-Passive – Only the Master device processes traffic
Active-Active – Multiple devices processes traffic
Determine the Primary device
Override disabled (Default Configuration)
Monitored interfaces, uptime, priority, serial number
‘diagnose sys ha reset-uptime’
Override enabled
Highest HA priority determines the primary device
Easiest way to change primary is to change the HA priority
111
Section 14 – High Availability
Tasks of each device
Primary
Send ‘HELLO’ to secondary devices
Sycnchronize routing table, configurations, DHCP addresses and session information for failover
Active-Active – Distribute traffic among devices in the cluster
Secondary
Monitor ‘HELLO’ messages from the primary
Active-Active – Processes traffic distributed to the device from the primary
Failover
Types of Failover
Device – Primary stops sending heartbeat messages
Link – A monitors interface on the Primary is no longer responding
What happens during Failover
Log event is generated, email alerts and SNMP trap can be generated also
Virtual MAC from Primary moves to new elected master.
Gratious ARP is sent to let the network know the Virtual MAC is available through a new device
112
Section 14 – High Availability
Virtual Cluster
Allows a FortiGate to be the primary for some VDOMs and secondary on other
VDOMs on the same device
Can be used to traffic load balancing by sending traffic to mulitple FortiGates
Allows failover for VDOMs across FortiGates
113
Section 14 – Q & A
114
Question 2
115
Section 15
Advanced IPSec VPN
Section 15 – Advanced IPSec
VPN Configuration Wizard
Automatically Configures IKE Phase 1 and Phase 2 settings
Types of Peers
Static – Static IP can be Initiator or Responder
Dynamic DNS – Dynamic IP which can be resolved with DNS can be
Initiator or Responder
Dialup – Dynamic IP can only be a Initiator
VPN Topologies
Point-to-point
Dialup – Point to Multipoint
Hub and Spoke – Multiple sites connecting to a single site
Meshed – All sites are connected to multiple other sites
117
Section 15 – Advanced IPSec
Remote Gateway
Point-to-Multipoint configurations use dialup user
Point-to-Point configurations use Static IP or Dynamic DNS
Hub and Spoke – Multiple sites connecting to a single site
Meshed – All sites are connected to multiple other sites
Mode Config – Similar to DHCP allows Clients to get network setting
for IPSec network
NAT Traversal – required if clients are behind a NAT device
IKE Mode
Main
Aggressive
Extended Authentication (XAUTH)
Happens between phase 1 and phase 2
Requires a username and password be provided
Stonger authentication than just a pre-shared key
Quick Mode Selector (Phase 2)
The source and destination should matches all local and remote ip
subnets. 0.0.0.0/0 is a catch all to match everything.
118
Section 15 – Advanced IPSec
Initiator suggests tunnel security policy Initator suggests tunnel security policy, sends key and
Peer ID
Responders selects security policy
Responders selects security policy and replied with key,
Initiator send key Peer ID and hash payload
Responder sends key Initator send hash payload
Initiator sends Peer ID and hash Can be used when initiator source ip is not fix.
Responder send Peer ID and hash Peer ID send in the clear. XAUTH makes it more secure
Used when the initiator source ip is fixed
119
Section 15 – Advanced IPSec
Most Common issue is setting mismatches
Check debug output from the responder side
Initiator side will only show what the initiator sends
Most of the useful information is coming for the responder
If the tunnel is created but traffic is still not seen in the tunnel, the issue is
likely related to routing
120
Section 15 – Q & A
Which of the following combinations of two FortiGate device configurations (side A and
side B), can be used to successfully establish an IPsec VPN between them? (Choose
two.)
A. Side A: main mode, remote gateway as static IP address, policy-based VPN. Side B:
aggressive Mode, remote Gateway as static IP address, policy-based VPN.
B. Side A: main mode, remote gateway as static IP Address, policy-based VPN. Side B:
main mode, remote gateway as static IP address, route-based VPN.
C. Side A: main mode, remote gateway as static IP address, route-based VPN. Side B:
main mode, remote gateway as dialup, route-based VPN.
D. Side A: main mode, remote gateway as dialup, policy-based VPN. Side B: main mode,
remote gateway as dialup, policy-based VPN.
Answer: (B),(C)
121
Question 2
Answer: (C) Each aggressive mode dialup MUST accept connections from
different peer ID
122
Section 16
Intrusion Protection System
Section 16 – Intrusion Protection Systems
Types of attacks
Anomaly Exploit
124
Section 16 – Intrusion Protection Systems
FortiGuard
IPS Package
IPS Enigine
IPS Signatures
Signature Database
Which database to use
Regular – Common attacks no/rare false positves
Extended – Regular plus everything else. Enabled by default on devices with CP8
Each signature has a default action
Severity level often correlates to the attacks CVSS 2 rating
There are exceptions. All remote code execution signares are marks high or critical
sevaerity
Protocol Decoder
Parses packets to determine the protocol
Generally protocol detection is not port dependent
FortiGuard provides automatic updates to signature packages
FortiGuard website provides a lot of information regard vulnerabilities
and threat to network security
125
Section 16 – Intrusion Protection Systems
Zero Days
Exploits for unknown vulnerabilties
Detecting Zero Day attacks requires knowing your network baselines
Custom IPS Signatures can protect against new attacks when detected
Custom Signatures
Start with ‘F-SBID{‘ followed by a list of keywords
The first keyword is always the name
Protocol keyword should be included to prevent false postives with lower level
protocols
Attack ID is automatically generated and thus does not need to be included
FortiGate IPS
Does not scan each signatures. Instead a decision tree is used
Decision tree is loaded into RAM so enabling only the signatures that are needed
will increase system performance
Hardware accelerated anomaly detection also help system performance
126
Section 16 – Intrusion Protection Systems
DoS
Goal: Consume so many resources the system cannot respond to legitimate traffic
DoS sensor supports 4 protocols. TCP, UDP, ICMP, SCTP
Flood Sensor – High Volumes of a particular protocol or signal (TCP Syn Flood)
Sweep/Scan Sensor – Attempts to map which host ports respond to find possible
vulnerabilities (ICMP Sweep)
Source Signature – Detects high volume of traffic from a source
Destination Signature – Detects high volume of traffic to a destination
One arm sniffer
Uses SPAN/Mirror Port to monitor traffic
No added latency
Supported Profiles using IPS Engine
Web Filter (Flow)
Email Filter (Flow)
Intrustion Protection
Application Control
Reason to use One-arm sniffer
Easy way to demonstrate the capabilities of the FortiGate
Non-disruptive deployment
127
Section 16 – Intrusion Protection Systems
IPS Logs
128
Section 16 – Q & A
On your FortiGate 60D, you’ve configured firewall policies. They port forward traffic to your
Linux Apache web server. Select the best way to protect your web server by using the IPS
engine.
A. Enable IPS signatures for Linux servers with HTTP, TCP, and SSL protocols and Apache
applications. Configure DLP to block HTTP GET requests with credit card numbers.
B. Enable IPS signatures for Linux servers with HTTP, TCP, and SSL protocols and Apache
applications. Configure DLP to block HTTP GET requests with credit card numbers. Also
configure a DoS policy to prevent TCP SYN floods and port scans.
C. None. FortiGate 60D is a desktop model, which does not support IPS.
D. Enable IPS signatures for Linux and Windows servers with FTP, HTTP, TCP, and SSL
protocols and Apache and PHP applications.
Answer: (A) Enable IPS signatures for Linux servers with HTTP, TCP, and
SSL Protocols and Apache applications. Configure DLP to block HTTP GET
requests with credit card numbers
129
Question 3
130
Section 17
Fortinet Single Sign On
Chapter 17 – Fortinet Single Sign-On
132
Chapter 17 – Fortinet Single Sign-On
133
Chapter 17 – Fortinet Single Sign-On
134
Chapter 17 – Fortinet Single Sign-On
AD Access mode:
Standard: Domain\Username: Protection profile
applied only to user groups
Advanced: LDAP convention
Profile for User and User group
Nested or inherited groups
Fortigate must be configured as LDAP client
135
Chapter 17 – Q & A
Which of the following FSSO agents are required for a DC agent mode solution? (Choose two.)
A. FSSO Agent
B. DC agent
C. Collector Agent
D. Radius Server
Answer: (B) DC Agent, (C) Collector Agent
What are the advantages of FSSO DC agent mode over FSSO polling mode? (Choose two.)
136
Section 18
Certificate Operations
Chapter 18 – Certificate Operation
138
Chapter 18 – Certificate Operation
CA certifies that requester info is valid and true in Digital certificate. Types of Digital CA:
CA certificates: validates CA and contains CA public key
Local Service Certificates: defines network services like HTTPS web portals or EAP 802.1X auth servers; contains network
service public key
User certificates: identifies a user & contains users public key
139
Chapter 18 – Certificate Operation
SSL Handshake:
Client-Server exchange certs & validate
Symmetric key exchange, decrypt using private key
Decide on which protocols & ciphers to use for communication
Asymmetric crypto used to exchange symmetric key valid only for that session
140
Chapter 18 – Certificate Operation
Fortigate requires the private key to decrypt and inspect SSL traffic
Intercepts traffic from server and ‘re-signs’ with its certificate and key
FortiGate acts as ‘Sub-CA’
SSL Content Inspection requires a certificate that allows Fortigate to
issue certificates to any website. Requirements:
“CA = True” or “Key Usage = KeyCertSign”
142
Chapter 18 – Certificate Operation Quiz
Which of the following statements describe some of the differences between symmetric and asymmetric
cryptography? (Choose two.)
A. In symmetric cryptography, the keys are publicly available. In asymmetric cryptography, the keys
must be kept secret.
B. Asymmetric cryptography can encrypt data faster that symmetric cryptography.
C. Symmetric cryptography uses one pre-shared key. Asymmetric cryptography uses a pair or keys.
D. Asymmetric keys can be sent to the remote peer via digital certificates. Symmetric keys cannot.
Answer: (C) Symmetric cryptography uses one pre-shared key. Assymetric cryptography uses a pair of keys
Which of the following statements are true about PKI users created in a FortiGate device? (Choose two.)
E. Can be used for token-based authentication.
F. Can be used for two-factor authentication.
G. Are used for certificate-based authentication.
H. Cannot be members of user groups.
Answer: (B) Can be used for two-factor authentication, (C) Are used for certificate-based authentication
143
Section 19
Data Leak Protection
Chapter 19 – Data Leak Prevention
DLP is for outbound traffic only
Sensitive documents
Account numbers
Personal data, etc.
DLP delegates scans to appropriate processes (IPS, proxy, etc); does not directly
scan any traffic and Fortigate applies first matching criteria
DLP actions: None, Log only, Block, Quarantine IP address
For custom text/numbers, use RegEx with PCRE syntax
File Filters
» File types: examine contents regardless of filename/extension
» File Name patterns: Examine & filter purely based on filenames.
145
Chapter 19 – Data Leak Prevention
SSL/SSH inspection
Certificate inspection
Full Inspection
146
Chapter 19 – Data Leak Prevention
Fingerprinting
DLP sensors blocks traffic if fingerprint matches the sensors security
level
Identifies specific document, not name or file type
Fortigate makes checksum for each chunk of file
Checksums are stored in memory, even for large files
If most chunks match DLP positively identifies the file
Can function even if the file is changed a little
Default chunk size is 2800 bytes
DLP sensor actions apply to all fingerprints with its sensitivity level.
Default levels
Critical
Private
Warning
147
Chapter 19 – Q & A
Which of the following network protocol can be inspected by the Data Leak Prevention profile? (Choose
three.)
A. SMTP
B. HTTP-POST
C. AIM
D. MAPI
E. ICQ
148
Chapter 19 – Data Leak Prevention Quiz
Which of the following statements best describes what the Document Fingerprinting feature is for?
A. Protects sensitive documents from leakage.
B. Appends a fingerprint signature to all documents sent by users.
C. Appends a fingerprint signature to all the emails sent by users.
D. Validates the fingerprint signature included in users emails.
149
Section 20
Diagnostics
Chapter 20 – Diagnostics
Process states:
» S – Sleeping (killable)
» R – Running (killable)
» D – Do not Disturb/interrupt (not killable)
» Z – Zombie (not killable) -> requires a
reboot
152
Chapter 20 – Diagnostics Quiz
Which of the following outputs are for the diagnostic command ‘diagnose hardware deviceinfo nic’?
(Choose two.)
A. ARP cache
B. Physical MAC address
C. Errors and collisions
D. Listening TCP ports
Answer: (B) Physical MAC Address, (C) Errors and Collisions
Which of the following commands are appropriate for investigating high CPU? (Choose two.)
E. diag sys top
F. diag hardware sysinfo mem
G. diag debug flow
H. get system performance status
Answer: (A) diag sys top, (D) get system performance status
153
Section 21
Hardware Acceleration
Chapter 21 – Hardware Acceleration
155
Chapter 21 – Harware Acceleration
156
Chapter 21 – Hardware Acceleration
Content Processor (CP)
CP4: All kinds of cryptography and key related to IPsec Phase 2
CP6: SSL VPN and SSL/TLS inspection
CP8: IPS pattern matching with over 10Gbps throughput
Cascade interface for processor extension (multiple CP8)
157
Chapter 21 – Hardware Acceleration Quiz
Which statement best describes what the FortiGate hardware acceleration processors main task is?
A. Offload traffic processing tasks from the main CPU.
B. Offload management tasks from the main CPU. Answer: (A) Offload traffic processing tasks
C. Compress and optimize the network traffic. from the main CPU
Which of the following traffic shaping functions can be offloaded to a NP processor? (Choose two.)
E. Queue prioritization
F. Traffic cap (bandwidth limit)
G. Differentiated services field rewriting
H. Guarantee bandwidth
158
Chapter 21 – Hardware Acceleration Quiz
Which statement best describes what a Fortinet System on a Chip (SoC) is?
A. Low-power chip that provides general purpose processing power.
B. Chip that combines general purpose processing power with Fortinet’s custom ASIC technology.
C. Light-version chip (with fewer features) of a SP processor.
D. Light-version chip (with fewer features) of a CP processor
159
Section 22
IPV6
Chapter 22 – IPv6
IPv6 128 bit identifiers
Unicast identifier for single interface; 64 subnet & 64 interface ID
Anycast for a set of interfaces (packet delivered to nearest interface)
Allocated from the unicast address space
Multicast for a set of interfaces (packet delivered to all interfaces)
Neighbor Discovery Protocol (NDP)
For Nodes:
Address resolution and Neighbor reachability
Link layer address changes
For Hosts:
Discover neighbor routers
Auto-config address, prefix and other parameters
For Routers:
Advertise their presence, on-link prefixes, and host config parameters
Maintain next-hop info
NDP replaces ARP, ICMPv4 router discovery & ICMPv4 redirect
161
Chapter 22 – IPv6
AutoConfiguration
Is stateless
ICMPv6 used to deliver IP address
Duplicate Address Detection mechanism
Link Local is the first address generates, connecting the
node to its own private network
While using Auto Config, DHCPv6 may be used to
provide DNS and other values.
IPv6 Transition techniques
Dual stack where IPv4 and IPv6 coexist on the same
device
Translation between IPv6 and IPv4 addresses, such as
NAT64 and DNS64
Tunneling of IPv6 traffic in IPv4 traffic such as 6in4
AH and ESP are mandatory and integral in IPv6
FortiOS supports IPv6 versions of dynamic routing
protocols
NAT64: IPv6 to IPv4 translation
Source v6 destination v4
162
Chapter 22 – Q & A
Which of the following are valid address types in IPv6? (Choose three.)
A. Unicast
Answer: (A) Unicast, (B) Anycast, (C) Multicast
B. Anycast
C. Multicast
D. Broadcast
E. Allcast
163