FortiNet Firewall
=================
Interface
=========
Interface Types
===============
- Physical - Physical interface on Firewall (Ethernet or
Fibere Optic connection)
- VLAN - Subinerface of Physical Interface
called VLAN interfae (IEEE 802.1Q vlan)
- Aggregate - Combine multiple interfaces to increase
throughput and to provide redundancy (all ports are active)
- Redundant - Combine multiple interfaces, only one of the
interfaces are active and use for data transmission. Other ports are in standby
mode
- Zone - It is a group of one or more physical
or virtual interfaces. To simplify firewall policy configuration
- Virtual Wire Pair - consisting of two interfaces, with an
interface at each of the wire. No IP addressing is configured on a VWP, and
communication is restricted between the two
interfaces using firewall policies
- Software Switch
- Hardware Switch
- FortiNet WLAN Extension
- FortiNet LAN Extension
- VXLAN
- Tunnel
How to configure interface
==========================
config system interface
edit <name>
set vdom <VDOM_name>
set mode {static | dhcp | pppoe}
set ip <IP_address/netmask>
set security-mode {none | captive-portal | 802.1X}
set egress-shaping-profile <profile>
set device-identification {enable | disable}
set allowaccess {ping https ssh http snmp telnet fgfm radius-acct probe-
response fabric ftm}
set eap-supplicant {enable | disable}
set eap-method {peap | tls}
set eap-identity <identity>
set eap-password <password>
set eap-ca-cert <CA_cert>
set eap-user-cert <user_cert>
set secondary-IP enable
config secondaryip
edit 1
set ip [Link] [Link]
set allowaccess ping https ssh snmp http
next
end
next
end
How to configure Maximum Transmission Unit - MTU
=================================================
config system interface
edit <interface>
set mtu-override enable
set mtu <integer>
next
end
>ping [Link] -l 1472 -f
Pinging [Link] with 1472 bytes of data:
Reply from [Link]: bytes=1472 time=41ms TTL=52
Reply from [Link]: bytes=1472 time=42ms TTL=52
Reply from [Link]: bytes=1472 time=103ms TTL=52
Reply from [Link]: bytes=1472 time=38ms TTL=52
Ping statistics for [Link]:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 38ms, Maximum = 103ms, Average = 56ms
>ping [Link] -l 1473 -f
Pinging [Link] with 1473 bytes of data:
Request timed out.
Ping statistics for [Link]:
Packets: Sent = 1, Received = 0, Lost = 1 (100% loss),
How to configure Maximum Segment Size
=====================================
config system interface
edit "wan2"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set tcp-mss 1448
set role wan
next
end
How to configure default gateway
=================================
config router static
edit 1
set device port2
set gateway [Link]
next
end
How to configure DNS server
config sytem dns
set primary [Link]
set secondary [Link]
end
How to configure VLAN Interface
===============================
config system interface - Go to interface
configuration mode
edit VLAN_100 - Edit the name of VLAN
set vdom root - Set vdom name
set interface internal - Set parent physical
interface (In this case, physical interface name is internal)
set type vlan - Set interface type (vlan)
set vlanid 100 - Set VLAN ID
set mode static - Set IP address mode for
this vlan interface
set ip [Link] [Link] - Assign IP address on
this vlan interface
set allowaccess https ping - Administrative allow access
for this vlan interface
next - Exit edit mode
edit VLAN_200
set vdom root
set interface internal
set type vlan
set vlanid 200
set mode static
set ip [Link] [Link]
set allowaccess https ping
next
end
How to create Firewall addrss (Subnet Object)
==============================================
config firewall address - Firewall address
configuration
edit VLAN_100_Net - Edit
set type ipmask - Set object type (ipmask)
set subnet [Link] [Link] - Set subnet
next
edit VLAN_200_Net
set type ipmask
set subnet [Link] [Link]
next
end
config firewall policy
edit 1
set srcintf VLAN_100
set srcaddr VLAN_100_Net
set dstintf VLAN_200
set dstaddr VLAN_200_Net
set schedule always
set service ALL
set action accept
set nat disable
set status enable
next
edit 2
set srcintf VLAN_200
set srcaddr VLAN_200_Net
set dstintf VLAN_100
set dstaddr VLAN_100_Net
set schedule always
set service ALL
set action accept
set nat disable
set status enable
next
edit 3
set srcintf VLAN_100
set srcaddr VLAN_100_Net
set dstintf external
set dstaddr all
set schedule always
set service ALL
set action accept
set nat enable
set status enable
next
edit 4
set srcintf VLAN_200
set srcaddr VLAN_200_Net
set dstintf external
set dstaddr all
set schedule always
set service ALL
set action accept
set nat enable
set status enable
next
end